Evaluate your personal computer configurations and determine whether it is a candidate for a clean install, migration, or if it’s unable to utilize the operating system. My home computer is already running Windows 7 home premium with Intel ® Core ™ 2 DUO T6600 @ 2.20 GHz 2.20 GHz, 4.00 Gigabyte memory with 2.84 Gigabyte usable with 32 bit version Operating System. I determined that my computer is able to support Windows 7 Operating System. I will be able to upgrade my computer from Windows 7 Home
Words: 295 - Pages: 2
Chapter Review Activities 1. C: Represents one binary digit 2. D: Kilobyte 3. C: 64 bits per quadruple word 4. A: Used for short-term memory C: Used to process data 5. A: The CPU tells the RAM which address holds the data that the CPU wants to read. 6. C: Character set 7. D: The binary equivalent of decimal 123456789 8. A: An actuator arm 9. B: Provides a convenient way to name a set of data for easier operations like copying and moving C: Name give users
Words: 647 - Pages: 3
1. B. The network uses standards defined in TCP/IP RFCs, plus other standards. 2. C. Ethernet D. TCP/IP mapping 3. A. It exists as a written document. C. It has been passed through some form of review and approval or certification process. 4. A. De facto standard documents have been reviewed more thoroughly. C. De facto standards typically mean that the standards group has been authorized by many countries to create standards that apply to multiple countries.
Words: 699 - Pages: 3
1.1.1 103↓ | 102↓ | 101↓ | 100↓ | | 1000X | 100X | 10X | 1X | | 2____ | 9____ | 3____ | 1____ | | 2000+ | 900 + | 30 + | 1 = | 2931 | 1.1.2 22↓ | 21↓ | 20↓ | | 4X | 2X | 1X | | 1____ | 1____ | 0____ | | 4+ | 2 + | 0 = | 6 | 1.1.3 21↓ | 20↓ | | 2X | 1X | | 1____ | 1____ | | 2 + | 1 = | 3 | 1.1.4 24↓ | 23↓ | 22↓ | 21↓ | 20↓ | | 16X | 8X | 4X | 2X | 1X | | 1____ | 0____ | 0____ | 1____ | 0____ | | 16 + | 0 + | 0 + | 2 + | 0 = | 18
Words: 552 - Pages: 3
exercise 3.3.1 : Using your textbook and Internet research, create a mapping between the TCP/IP model and the OSI reference model. What are the distinct differences between them? The four layers of the TCP/IP architecture can be compared to certain levels of the OSI model. It’s important to know what each level of the TCP/IP protocol architecture does, and how these layers map to the OSI model. The Application Layer of the TCP/IP model performs much the same tasks as the Application, Presentation
Words: 691 - Pages: 3
Unit 7 Assignment 1 Multiple Choice 1.) A 11.) C 2.) A, B 12.) A 3.) B, D 13.) A, D 4.) A 14.) C 5.) A 15.) B, C 6.) B, D 16.) B, D 7.) A 17.) C 8.) C 18.) B, D 9.) C 19.) A, C 10.) D 20.) B, C Key Terms Switched circuit - A circuit established through one or more intermediate switching devices, such as circuit switches or packet switches. Dedicated circuit - it is used in reference to a phone or data line, or to an electrical circuit. Circuit switching - a methodology of implementing
Words: 336 - Pages: 2
5.1.1 The IEEE 802.1standard concerns with the standards and recommendations in the of architecture and internetworking of local area networks (LANs) and metropolitan area networks (MANs), security, network management, and protocol issues above the Data Link Layer. 5.1.2 The original 802.3 standard that defined PoE is IEEE 802.3af. The standard was enhanced in 2009 and give the new standard name 802.3af PoE+. 5.1.3 Standard | Cabling | Maximum Length | 10BASE5 | Coaxial (thicknet) | 500m
Words: 656 - Pages: 3
2.2.3 Application layer The application layer consists of management and business-oriented software. It can also be understood as a user interface for the control layer. From the management point of view, the programs running in the application layer may provide the network engineers with statistics about their networks. Currently using application layer metrics in the form of a common measurement solution received minor attention. Such as application of a measurement can be a generic usage-based
Words: 395 - Pages: 2
1.11 ROUTING PROTOCOLS USED IN MANET PROACTIVE ROUTING (TABLE- DRIVEN) PROTOCOLS: In this protocol, all the nodes continuously search for routing related information within a network. Each node maintains one or more routing tables which represents the entire topology of the network. These tables are updated regularly so that when a route is needed, these tables will be checked to find out whether the routing information is already available or not. If any node already knows the path for sending
Words: 454 - Pages: 2
Cover Page Course: Computer Architecture 101 (ICT121) Student Name: Muhammad Hasif Bin Sarodin Student Number: P1401518 Due Date: 26 August 2014, 2359 hours Certification: I certify the content of the assignment to be my own and original work and that all sources have been accurately reported and acknowledged, and that this document has not been previously submitted in its entirety or in any educational establishment. TUTOR-MARKED ASSIGNMENT This tutor-marked assignment is worth 21% of the
Words: 1908 - Pages: 8