COMMUNICATION AND NET CENTRIC COMPUTING ASSIGNMENT 1 ID: s3637967 Note: The tasks are in bold font. Task 1a: Task 1 : Investigate the Hamming Code to identify a single error using even parity check. (5 marks) Represent your student number in binary following the instructions in step 1 and step 2; Step 1: write your student number: Step 2: use “1” to represent the odd numbers, and “0” for the even numbers. 3 6 3 7 9 6 7 1 0 1 1 1 0 1 D1 D2 D3 D4
Words: 905 - Pages: 4
1. What is your in game name? Cyanuric 2. What is your Discord username? (Ex. Name#1234) Cyanuric#6861 3. What is your legal first name? Samuel, I prefer Sam if that's okay. 4. What is your age? 14 5. What do you plan on doing to help MineSuperior? I pretty much want to make the server a better place by becoming a staff member. I know that sounds like a bit of a cliche but I really mean that. I also want to make the server a better place for everyone. Whether it is done by banning a hacker
Words: 899 - Pages: 4
The goal of this assignment is to familiarize you with the process going from the characterization of a disease in human patients, to the identification of a mutated gene causing it, to the use of a mouse model to investigate how this mutation is causing the disease. Question 1: Based on this video, describe the symptoms of the SCA1 disease. Answer: SCA1 is an evolving, neurodegenerative disease involving loss of balance and coordination (a.k.a. ataxia). Moreover, this disease of the nervous system
Words: 1404 - Pages: 6
WhatsApp Encryption is the process of converting the information such as text, photo and video into unreadable scrambled phrase or code which people are unable to read it. WhatsApp uses end to end encryption method to secure the privacy and safety of the message. The videos, photos and text are secured by the end to end encryption. It will not be able to read by other people including WhatsApp company because the message had been encryption before send to the recipients. When the message fall
Words: 492 - Pages: 2
which allows Christo to have the accounts of all the tasks. A.3.2.1 Corei7 is of the 7th generation core microprocessors indicated by the suffix in the name. A.3.2.2 CPU performs the data processing task in real time.It also acts as a controlling unit by means of which Data a sequence of Data input and output is maintained through CPU’s busesSerial and Arthimetic. A.3.3 Integrated Intel HD Graphics NVIDIA Quadro M4000
Words: 628 - Pages: 3
CE3.15 I was in-charge of assuring the security for the network. I selected the network switch as the main device for configuring security as it acts as the heart of the network. I proposed the use of Cisco Network switches for the design. Although there are top selling network switches brands like Linksys, D-link, Netgear, Juniper networks available, I chose Cisco Catalyst 2960 series network switch. I decided that the routers were physically secured by providing a locker room facility and a video
Words: 898 - Pages: 4
The technical writing document selected for review in task one is an IT process showing how to set up and use an application called “Teamviewer”. The software allows a user to setup remote access to another computer or server as well as providing the ability to give remote support. The audience the document is aiming to inform is the basic computer user. Much of this can be discerned from the types of examples given for comparison to everyday process a layman would know. Specifically, under section
Words: 1004 - Pages: 5
Power on off button until the screen turns on. (After fully started CVNAP will beep and E presses alarm on/off to stop beep.) 2. E than turns on the Mobile Impedance Monitor (MIM) by holding down the tiny running man symbol until the screen turns on. 3. Once on E selects WIFI from the two settings. By scrolling to the right with the arrow key and pressing the B button. 4. After connection is established E presses the A button to starts the device. 5. Once both CNAP and MIM E opens Bio lab on the right
Words: 563 - Pages: 3
Both solutions will be analyzed based on the requirements and criteria listed above. During the analysis, each solution will be given a score from 1 to 10 according to how well it meets each criterion. In the end, a overall score will be calculated base on the score and the Criteria Weighting Scale listed in Section 4 on page 2 for each solution. The solution that has the higher score will be the more feasible solution. From here, the solution that preloads the local cache will be called solution
Words: 592 - Pages: 3
Item A: Maintaining access Item B: Maintaining access refers to the phase when the hacker tries to retain his 'ownership' of the system. Hacking Phase 4 (2018). Item C: When an attacker infiltrates a target system, the attacker can choose to use both the system and its resources and further use the system as a botnet, or a network of private computers infected with malicious software. The attacker can control the systems as a group without the owners' knowledge to scan and exploit other systems
Words: 471 - Pages: 2