What network protocol enables data to be exchanged

Assignment Help Computer Engineering
Reference no: EM131293523

Assignments 1: Computer Architecture Strayer

Part 1: Quiz Computer Architecture

1. The CompTIA six-step troubleshooting process includes a step in which you Verify full system functionality and, if applicable, implement preventative measures. Which number is this step?

2. You check the contents of your computer toolkit before performing upgrades on a desktop computer.

3. Which of the following tools in your toolkit should you use to verify proper operation of the power supply?

4. CompTIA has created a six-step process for troubleshooting. The first step in the process is to identify the problem. Which of the followings steps resembles the next step in the methodology?

5. CompTIA has created a six-step process for troubleshooting. The first step in the process is to identify the problem. Which of the followings steps resembles the next step in the methodology?

6. Toolkits generally have _____ for the removal and replacement of jumpers.

7. Which of the following are the two types of USB connectors found on recent devices?

8. A USB port can support a total of ______ devices through the use of hubs.

9. USB 1.1 ports run at a top speed of ______ per second.

10. Which of the following is not a type of USB ports found on systems?

11. A (n) ______ card is used to facilitate the input and output of analog audio, with new cards enabling the playback of digital audio sources.

12. The maximum length for a USB cable attached to 12Mbps or 480Mbps device is ______ meter(s).

13. To force-quit an app on an iOS-based device, press and hold the Sleep/Wake button for a few seconds until a red slider appears. What is the next step?

14. Which of these is not a consideration when configuring a mobile device to receive email?

POP3 uses which port by default?

15. The process to synchronize a Bluetooth device to a mobile device is called ______.

16. Which of the following is not a way for mobile devices to connect to the Internet?

17. When troubleshooting mobile wireless connections, which of these is unlikely to be a factor?

18. A(n) ________ adds the measurements of pitch, roll, and yaw to mobile devices, just like in the concept of flight dynamics.

19. __________ is the practice to track and record the location of a mobile device over time.

IMAP uses which port by default?

Part 2: Quiz Computer Architecture

1. You are about to install an operating system on a computer. Which of the following is necessary to do?

2. When you clone a system, you produce a system that is identical in every way to the original. The cloned system has the same SID as the original system. If both systems are placed on the network, you will have a conflict. What tool/utility can you use to modify the Windows SID?

3. You are instructing a user who wants to upgrade as to whether her Windows XP system can support Windows 7. To provide this information you want to access the Windows System Information. Which of the following provides that access from a run-line utility?

4. What should you do to verify a complete and successful Windows installation? (Choose all that apply.)

5. _______ is a Windows 7 log file that contains information about the user directory structure, including security identifiers.

6. Which of the following log files contains information about setup actions during the installation of Windows Vista?

7. The GUI-based application for analyzing and configuring hard drives is ________.

8. When using wildcard symbols at the command prompt, the asterisk (*) replaces _______.

9. Windows XP needs which minimum requirements to install successfully? (Choose all that apply.)

10. In Widows 7 Administrative Tools, what do you use to view and edit Group Policy security settings?

11. Which one of the following is the minimum RAM requirement needed for Windows 7 32-bit?

12. To enable applications written for older versions of Windows to run properly on Windows 7/Vista/XP, you can use the __________Wizard built into Windows.

13. Antistatic mats and wrist straps prevent______, which can damage parts and systems.

14. STOP errors (blue screen - also known as a blue screen of death) can be caused by which of the following?

15. As a technician on the job, you are required to perform several tests in addition to investigating clues you received during the initial interview. Which of the following tests are you not required to perform?

16. Which of the following files are involved in the boot process? (Choose all that apply.)

17. The ability to diagnose and troubleshoot problems depends upon a combination of technical skill and the ability______.

18. When a stop error/BSOD occurs, by default Windows 7 writes the debugging information to the hard drive in a file called ___________.

19. Which of these keys is used to access startup options immediately after the computer starts up?

20. If a disk access time gets longer over time, what could be the possible cause?

Assignment 2 Network Design

Imagine that you have been hired as a contractor by a local business that has recently purchased new office space for its growing business. Design a network for the local business based on the following information: The business has approximately fifty employees, and the new office space will stretch across the third and fifth floors of a building. The fourth floor is currently occupied by another tenant.

Write a two to four page paper in which you:

Suggest the equipment that you would utilize to design and implement a network, based on the scenario. Justify the need for your suggestions.

Recommend the strategy that you would use to combat the design challenge of occupying non-adjacent floors. Suggest a solution that includes the cabling / connecting of the two (2) differing office space floors.

Determine the primary security concerns regarding the scenario in question. Explain the controls you would implement in order to lessen those concerns.

Detail the specifics of your network design through the use of graphical tools in Visio, or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length

Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides, citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, the students name, the professors name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

Explain the complexities in an information technology environment by applying best practices and using appropriate technologies and methodologies.

Describe protocols for inter process communication for communication across networks.

Outline why the Information Assurance and Security perspective needs to pervade all aspects of information technology.

Use technology and information resources to research issues in information technology.

Write clearly and concisely about introductory information technology topics using proper writing mechanics and technical style conventions.

Part 1: Quiz Computer Architecture

1. A ______ is a network node that provides a connection between a LAN and a WAN or the Internet.

2. Which of the following network types are considered short range and low speed? (Choose all that apply.)

3. All email systems provide the transfer of text messages and attachments to the corresponding recipients.

4. Nonetheless, to configure an email client, a mail server protocol type is required. Which of the following protocols are considered mail server types?

5. What cable type is known for transmitting signal through light rather than electrical signals?

6. A domain name is used to identify one or more IP addresses or URLs to a particular web page. Which of the following sections are needed to make a complete domain name, from the end of the name to the start? (Choose all that apply.)

7. An IPV4 address consists of ______ numbers that range from 0 to 255.

8. Which of the following Internet access methods represents broadband Internet service?

9. A ______ is a computer on the network that provides other computers within the network with access to resources, such as disk drives, folders, printers, modems, scanners, and Internet access.

10. What protocol is used by both web browsers or specialized programs to exchange and manipulate files over an Internet protocol computer network?

11. What network protocol enables data to be exchanged between two computers over a secure channel?

All the following are standards for wireless encryption except ________?

12. Biometrics refers to the biological information gathered from a human body to authenticate a user. All the following are types of biometrics except ________?

13. Which of the following features can be used as a simple firewall within wireless routers and WAPs?

There are three standard account levels within Windows XP. Which of the following is not a standard account level?

14. Windows XP can be installed on either _____ or ______ file systems.

15. Two-way firewalls provide protection against unauthorized ______ and ______ traffic.

16. Social engineering is composed of a variety of methods to manipulate users into performing actions or providing information. Which of the following are among the many methods used during social engineering?

17. Which of the following settings could affect a user from joining a wireless network? (Choose all that apply.)

18. Which of the following wireless encryption standards uses AES encryption?

19. A software ______ is a program designed to block unauthorized data packers while permitting authorized data packets on a network.

Reference no: EM131293523

Questions Cloud

Standard of electronic industries association of america : For connecting modem a computer, a computer must be equipped with a port that conforms to the RR-32 standard of the electronic industries association of America. What do the letters RS stand for?
What tools such as quality assurance would you use : What tools, such as quality assurance, strategic planning, etc., would you use, as a Health Care Organization Chief Executive officer to identify and remedy any health disparities among different population groups in the community your organizatio..
Provide grammar correction for the given essay : GIven is the essay.-GIven the essay topic iS: "Nursing Staffing". - Provide grammar correction for the given essay.
Discuss the factors that helped you make the decision : Discuss the factors that helped you make the decision to purchase the product from the retailer. What are the top three factors that are most important to you in this purchase decision?
What network protocol enables data to be exchanged : What network protocol enables data to be exchanged between two computers over a secure channel? Which of the following wireless encryption standards uses AES encryption?
Activities in the systems development life cycle : Examine the activities in the Systems Development Life Cycle (SDLC). Select the activities that you believe to be the most critical for the success of a project that is developed using SDLC.
Compare the project evaluation and review technique : Compare the project evaluation and review technique (PERT), the critical path method (CPM), and the Gantt chart. Determine whether projects should apply all three approaches or only when called upon to assess risk on an ongoing project.
Briefly analyse the external and internal environments : Briefly analyse the external and internal environments (SWOT)realisation. The business concept relates to a new product relevant to the case which forms the overarching focus of the learning activities of this section of the subject.
Mining hidden value in the deep web : Article about - Mining Hidden Value in the Deep Web: Challenges and Opportunities Containing the following learning outcomes

Reviews

Write a Review

Computer Engineering Questions & Answers

  Write down a user-defined function

Write down a user-defined function

  The number closest from the average is the number

Also, your test desire would be very incomplete as I was asking for 6 test: taking the average of 1 number does not seem to be a very extensive test either. you don not need screen dump for the test. just a table with list of inputs and expected r..

  Is the number positive or negative

if the machine is big endian and the number is an IEEE single precision floating point value, determine the decimal equivalent of the number stored at address 100.(you may leave your answer in scientific notation form, as a number times a power of..

  Ientify three key business requirements or needs that the

3. identify three key business requirements or needs that the system must meet of your selected

  Questionassume you want to deposit a certain amount of

questionassume you want to deposit a certain amount of money into a saving account and after that leave it alone to

  What information is required to setup a new account

What information is required to setup a new account - what category information is collected by the site and what are the default privacy settings

  Provide 1 illustration of a module name that is acceptable

provide 1 example of a module name that is acceptable to the compiler but not recommended according to the features of

  Find the collection of decidable languages is closed

find the collection of decidable languages is closed.

  Write down a function named twomax which takes a pointer to

write a function named twomax that takes a pointer to an array of integer numbers array size a pointer to integer which

  How many files will the server need to store

If the server instead sends the audio and video streams separately and has the client synchronize the streams, how many files will the server need to store?

  Handling of global ethics issue by organizations

Our textbook describes the ethics as “the principles of right and wrong which individuals utilize in order to make choices in order to guide their behaviors”.One global ethical issue is software piracy. What can the organizations such as Microsoft ..

  What happen if you did not break

When using Case statements, what would happen if you did not "Break?" Please give an example and explain. Where, in your everyday life, would you use all of the looping techniques.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd