SlideShare a Scribd company logo
1 of 1
Download to read offline
1(A) Description:
Computer security protects computer systems, networks, and information from harm, theft, and
unauthorized use. Computer hardware is protected by the same means used to protect other
valuable or sensitive equipment, namely, serial numbers, doors and locks, and alarms. You will
complete the following for extra credit:
Identify your network information:
From your pc and mobile phone look up and identify the following information and answer the
following questions.
Identify your network IPv4 Address
Identify your MAC address
Identify your current Default Gateway
Is your DHCP server the same as your Default Gateway? Yes or No
Do you have an IPv6 address? Yes or No
(B) Investigating Network Connection Settings Est. Time: 15 minutes Core 1 Objective: 2.5 Using
a computer connected to a network, answer these questions: 1. What is the hardware device used
to make this connection (network card, onboard port, wireless)? List the devices name as
Windows sees it in the Device Manager window. 2. What is the MAC address of the wired or
wireless network adapter? What command or window did you use to get your answer? 3. For a
wireless connection, is the network secured? How do you know? 4. What is the IPv4 address of
the network connection? 5. Are your TCP/IP version 4 settings using static or dynamic IP
addressing? 6. What is the IPv6 address of your network connection? 7. Disable and enable your
network connection. Now what is your IPv4 address?

More Related Content

Similar to 1A Description Computer security protects computer system.pdf

Running head network design 1 netwo
Running head network design                             1 netwoRunning head network design                             1 netwo
Running head network design 1 netwoAKHIL969626
 
1- Every computer has a name- Yours is called (run the command -ipconf.pdf
1- Every computer has a name- Yours is called (run the command -ipconf.pdf1- Every computer has a name- Yours is called (run the command -ipconf.pdf
1- Every computer has a name- Yours is called (run the command -ipconf.pdfcontact28
 
General it terminologies
General it terminologiesGeneral it terminologies
General it terminologiesRajesh R Singh
 
General it terminologies
General it terminologiesGeneral it terminologies
General it terminologiesRajeshRaushan8
 
Wireless Networking Final Exam Results
Wireless Networking Final Exam ResultsWireless Networking Final Exam Results
Wireless Networking Final Exam ResultsWalmart Super Center
 
Wireless Networking Final Exam Results
Wireless Networking Final Exam ResultsWireless Networking Final Exam Results
Wireless Networking Final Exam ResultsWalmart Super Center
 
Wireless Networking Final Exam Results
Wireless Networking Final Exam ResultsWireless Networking Final Exam Results
Wireless Networking Final Exam ResultsWalmart Super Center
 
IT Essentials (Version 7.0) - ITE Chapter 6 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 6 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 6 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 6 Exam AnswersITExamAnswers.net
 
Fa13 7718-ch7 9-singh
Fa13 7718-ch7 9-singhFa13 7718-ch7 9-singh
Fa13 7718-ch7 9-singhMary-Jo Apigo
 
Network Troubleshooting
Network TroubleshootingNetwork Troubleshooting
Network TroubleshootingJoy Sarker
 
Networking question
Networking questionNetworking question
Networking questionDEVBEJ
 
Unit 1: Recognizing Computers
Unit 1: Recognizing Computers Unit 1: Recognizing Computers
Unit 1: Recognizing Computers Ellian Canoog
 
Software ,hardware,firmware,addressing
Software ,hardware,firmware,addressingSoftware ,hardware,firmware,addressing
Software ,hardware,firmware,addressingNajmulIslam38
 
3.7.10 Lab Use Wireshark to View Network Traffic
3.7.10 Lab Use Wireshark to View Network Traffic3.7.10 Lab Use Wireshark to View Network Traffic
3.7.10 Lab Use Wireshark to View Network TrafficRio Ap
 

Similar to 1A Description Computer security protects computer system.pdf (20)

Running head network design 1 netwo
Running head network design                             1 netwoRunning head network design                             1 netwo
Running head network design 1 netwo
 
1- Every computer has a name- Yours is called (run the command -ipconf.pdf
1- Every computer has a name- Yours is called (run the command -ipconf.pdf1- Every computer has a name- Yours is called (run the command -ipconf.pdf
1- Every computer has a name- Yours is called (run the command -ipconf.pdf
 
General it terminologies
General it terminologiesGeneral it terminologies
General it terminologies
 
General it terminologies
General it terminologiesGeneral it terminologies
General it terminologies
 
Dasar komputer chapter8
Dasar komputer chapter8Dasar komputer chapter8
Dasar komputer chapter8
 
Internet Protocols
Internet ProtocolsInternet Protocols
Internet Protocols
 
Systems Administration
Systems AdministrationSystems Administration
Systems Administration
 
Wireless Networking Final Exam Results
Wireless Networking Final Exam ResultsWireless Networking Final Exam Results
Wireless Networking Final Exam Results
 
Wireless Networking Final Exam Results
Wireless Networking Final Exam ResultsWireless Networking Final Exam Results
Wireless Networking Final Exam Results
 
Wireless Networking Final Exam Results
Wireless Networking Final Exam ResultsWireless Networking Final Exam Results
Wireless Networking Final Exam Results
 
IT Essentials (Version 7.0) - ITE Chapter 6 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 6 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 6 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 6 Exam Answers
 
Fa13 7718-ch7 9-singh
Fa13 7718-ch7 9-singhFa13 7718-ch7 9-singh
Fa13 7718-ch7 9-singh
 
Network Troubleshooting
Network TroubleshootingNetwork Troubleshooting
Network Troubleshooting
 
Network
NetworkNetwork
Network
 
Networking question
Networking questionNetworking question
Networking question
 
Unit 1: Recognizing Computers
Unit 1: Recognizing Computers Unit 1: Recognizing Computers
Unit 1: Recognizing Computers
 
Ccnafile
CcnafileCcnafile
Ccnafile
 
Software ,hardware,firmware,addressing
Software ,hardware,firmware,addressingSoftware ,hardware,firmware,addressing
Software ,hardware,firmware,addressing
 
3.7.10 Lab Use Wireshark to View Network Traffic
3.7.10 Lab Use Wireshark to View Network Traffic3.7.10 Lab Use Wireshark to View Network Traffic
3.7.10 Lab Use Wireshark to View Network Traffic
 
NewIinternet security
NewIinternet securityNewIinternet security
NewIinternet security
 

More from adamsapparels

1Given the function Gtexpt where tgt0 a If .pdf
1Given the function Gtexpt where tgt0  a If .pdf1Given the function Gtexpt where tgt0  a If .pdf
1Given the function Gtexpt where tgt0 a If .pdfadamsapparels
 
1a scientific technical operational and economic are the.pdf
1a scientific technical operational and economic are the.pdf1a scientific technical operational and economic are the.pdf
1a scientific technical operational and economic are the.pdfadamsapparels
 
1Es la economa una ciencia social fra y despiadada que c.pdf
1Es la economa una ciencia social fra y despiadada que c.pdf1Es la economa una ciencia social fra y despiadada que c.pdf
1Es la economa una ciencia social fra y despiadada que c.pdfadamsapparels
 
17 The output of this C code is presented below Please exp.pdf
17 The output of this C code is presented below Please exp.pdf17 The output of this C code is presented below Please exp.pdf
17 The output of this C code is presented below Please exp.pdfadamsapparels
 
1Daha az yaplandrlmtr bu da almay zorlatrr Bu zellik .pdf
1Daha az yaplandrlmtr bu da almay zorlatrr Bu zellik .pdf1Daha az yaplandrlmtr bu da almay zorlatrr Bu zellik .pdf
1Daha az yaplandrlmtr bu da almay zorlatrr Bu zellik .pdfadamsapparels
 
1964 PasswordReport and IPasswordReport interface You have .pdf
1964 PasswordReport and IPasswordReport interface You have .pdf1964 PasswordReport and IPasswordReport interface You have .pdf
1964 PasswordReport and IPasswordReport interface You have .pdfadamsapparels
 
17 You Explain It Quartiles Violent crimes include rape r.pdf
17 You Explain It Quartiles Violent crimes include rape r.pdf17 You Explain It Quartiles Violent crimes include rape r.pdf
17 You Explain It Quartiles Violent crimes include rape r.pdfadamsapparels
 
1Incluidas las primeras empresas digitales Seleccione una.pdf
1Incluidas las primeras empresas digitales Seleccione una.pdf1Incluidas las primeras empresas digitales Seleccione una.pdf
1Incluidas las primeras empresas digitales Seleccione una.pdfadamsapparels
 
1Strawberries have four times as much DNA as humans How do.pdf
1Strawberries have four times as much DNA as humans How do.pdf1Strawberries have four times as much DNA as humans How do.pdf
1Strawberries have four times as much DNA as humans How do.pdfadamsapparels
 
1Ekonomik teori A Ekonomik olaylar aklamaya alr B e.pdf
1Ekonomik teori  A Ekonomik olaylar aklamaya alr  B e.pdf1Ekonomik teori  A Ekonomik olaylar aklamaya alr  B e.pdf
1Ekonomik teori A Ekonomik olaylar aklamaya alr B e.pdfadamsapparels
 
1Mitoz ve mayoz blnme arasndaki farklarla ilgili aadaki .pdf
1Mitoz ve mayoz blnme arasndaki farklarla ilgili aadaki .pdf1Mitoz ve mayoz blnme arasndaki farklarla ilgili aadaki .pdf
1Mitoz ve mayoz blnme arasndaki farklarla ilgili aadaki .pdfadamsapparels
 
1Need help drawing penile tissue and Uterus penile tissue.pdf
1Need help drawing penile tissue and Uterus penile tissue.pdf1Need help drawing penile tissue and Uterus penile tissue.pdf
1Need help drawing penile tissue and Uterus penile tissue.pdfadamsapparels
 
1Sre modelleme ynergeleri hangi hedeflere katkda bulunm.pdf
1Sre modelleme ynergeleri hangi hedeflere katkda bulunm.pdf1Sre modelleme ynergeleri hangi hedeflere katkda bulunm.pdf
1Sre modelleme ynergeleri hangi hedeflere katkda bulunm.pdfadamsapparels
 
1Research the data amount of spending by Torontonians What.pdf
1Research the data amount of spending by Torontonians What.pdf1Research the data amount of spending by Torontonians What.pdf
1Research the data amount of spending by Torontonians What.pdfadamsapparels
 
1a Cmo termina la sntesis en la transcripcin a secu.pdf
1a  Cmo termina la sntesis en la transcripcin  a secu.pdf1a  Cmo termina la sntesis en la transcripcin  a secu.pdf
1a Cmo termina la sntesis en la transcripcin a secu.pdfadamsapparels
 
1Social media has become more important to brand managers t.pdf
1Social media has become more important to brand managers t.pdf1Social media has become more important to brand managers t.pdf
1Social media has become more important to brand managers t.pdfadamsapparels
 
1How can you predict whether a BCL protein is proapoptotic.pdf
1How can you predict whether a BCL protein is proapoptotic.pdf1How can you predict whether a BCL protein is proapoptotic.pdf
1How can you predict whether a BCL protein is proapoptotic.pdfadamsapparels
 
1In the short story of The Lesson By Toni Cade Bambara what.pdf
1In the short story of The Lesson By Toni Cade Bambara what.pdf1In the short story of The Lesson By Toni Cade Bambara what.pdf
1In the short story of The Lesson By Toni Cade Bambara what.pdfadamsapparels
 
1Qu recursos subyacen a la posicin competitiva de Southw.pdf
1Qu recursos subyacen a la posicin competitiva de Southw.pdf1Qu recursos subyacen a la posicin competitiva de Southw.pdf
1Qu recursos subyacen a la posicin competitiva de Southw.pdfadamsapparels
 
1Gayri Safi Yurtii Hasla Neleri Kapsar A Belirli bir yl.pdf
1Gayri Safi Yurtii Hasla Neleri Kapsar  A Belirli bir yl.pdf1Gayri Safi Yurtii Hasla Neleri Kapsar  A Belirli bir yl.pdf
1Gayri Safi Yurtii Hasla Neleri Kapsar A Belirli bir yl.pdfadamsapparels
 

More from adamsapparels (20)

1Given the function Gtexpt where tgt0 a If .pdf
1Given the function Gtexpt where tgt0  a If .pdf1Given the function Gtexpt where tgt0  a If .pdf
1Given the function Gtexpt where tgt0 a If .pdf
 
1a scientific technical operational and economic are the.pdf
1a scientific technical operational and economic are the.pdf1a scientific technical operational and economic are the.pdf
1a scientific technical operational and economic are the.pdf
 
1Es la economa una ciencia social fra y despiadada que c.pdf
1Es la economa una ciencia social fra y despiadada que c.pdf1Es la economa una ciencia social fra y despiadada que c.pdf
1Es la economa una ciencia social fra y despiadada que c.pdf
 
17 The output of this C code is presented below Please exp.pdf
17 The output of this C code is presented below Please exp.pdf17 The output of this C code is presented below Please exp.pdf
17 The output of this C code is presented below Please exp.pdf
 
1Daha az yaplandrlmtr bu da almay zorlatrr Bu zellik .pdf
1Daha az yaplandrlmtr bu da almay zorlatrr Bu zellik .pdf1Daha az yaplandrlmtr bu da almay zorlatrr Bu zellik .pdf
1Daha az yaplandrlmtr bu da almay zorlatrr Bu zellik .pdf
 
1964 PasswordReport and IPasswordReport interface You have .pdf
1964 PasswordReport and IPasswordReport interface You have .pdf1964 PasswordReport and IPasswordReport interface You have .pdf
1964 PasswordReport and IPasswordReport interface You have .pdf
 
17 You Explain It Quartiles Violent crimes include rape r.pdf
17 You Explain It Quartiles Violent crimes include rape r.pdf17 You Explain It Quartiles Violent crimes include rape r.pdf
17 You Explain It Quartiles Violent crimes include rape r.pdf
 
1Incluidas las primeras empresas digitales Seleccione una.pdf
1Incluidas las primeras empresas digitales Seleccione una.pdf1Incluidas las primeras empresas digitales Seleccione una.pdf
1Incluidas las primeras empresas digitales Seleccione una.pdf
 
1Strawberries have four times as much DNA as humans How do.pdf
1Strawberries have four times as much DNA as humans How do.pdf1Strawberries have four times as much DNA as humans How do.pdf
1Strawberries have four times as much DNA as humans How do.pdf
 
1Ekonomik teori A Ekonomik olaylar aklamaya alr B e.pdf
1Ekonomik teori  A Ekonomik olaylar aklamaya alr  B e.pdf1Ekonomik teori  A Ekonomik olaylar aklamaya alr  B e.pdf
1Ekonomik teori A Ekonomik olaylar aklamaya alr B e.pdf
 
1Mitoz ve mayoz blnme arasndaki farklarla ilgili aadaki .pdf
1Mitoz ve mayoz blnme arasndaki farklarla ilgili aadaki .pdf1Mitoz ve mayoz blnme arasndaki farklarla ilgili aadaki .pdf
1Mitoz ve mayoz blnme arasndaki farklarla ilgili aadaki .pdf
 
1Need help drawing penile tissue and Uterus penile tissue.pdf
1Need help drawing penile tissue and Uterus penile tissue.pdf1Need help drawing penile tissue and Uterus penile tissue.pdf
1Need help drawing penile tissue and Uterus penile tissue.pdf
 
1Sre modelleme ynergeleri hangi hedeflere katkda bulunm.pdf
1Sre modelleme ynergeleri hangi hedeflere katkda bulunm.pdf1Sre modelleme ynergeleri hangi hedeflere katkda bulunm.pdf
1Sre modelleme ynergeleri hangi hedeflere katkda bulunm.pdf
 
1Research the data amount of spending by Torontonians What.pdf
1Research the data amount of spending by Torontonians What.pdf1Research the data amount of spending by Torontonians What.pdf
1Research the data amount of spending by Torontonians What.pdf
 
1a Cmo termina la sntesis en la transcripcin a secu.pdf
1a  Cmo termina la sntesis en la transcripcin  a secu.pdf1a  Cmo termina la sntesis en la transcripcin  a secu.pdf
1a Cmo termina la sntesis en la transcripcin a secu.pdf
 
1Social media has become more important to brand managers t.pdf
1Social media has become more important to brand managers t.pdf1Social media has become more important to brand managers t.pdf
1Social media has become more important to brand managers t.pdf
 
1How can you predict whether a BCL protein is proapoptotic.pdf
1How can you predict whether a BCL protein is proapoptotic.pdf1How can you predict whether a BCL protein is proapoptotic.pdf
1How can you predict whether a BCL protein is proapoptotic.pdf
 
1In the short story of The Lesson By Toni Cade Bambara what.pdf
1In the short story of The Lesson By Toni Cade Bambara what.pdf1In the short story of The Lesson By Toni Cade Bambara what.pdf
1In the short story of The Lesson By Toni Cade Bambara what.pdf
 
1Qu recursos subyacen a la posicin competitiva de Southw.pdf
1Qu recursos subyacen a la posicin competitiva de Southw.pdf1Qu recursos subyacen a la posicin competitiva de Southw.pdf
1Qu recursos subyacen a la posicin competitiva de Southw.pdf
 
1Gayri Safi Yurtii Hasla Neleri Kapsar A Belirli bir yl.pdf
1Gayri Safi Yurtii Hasla Neleri Kapsar  A Belirli bir yl.pdf1Gayri Safi Yurtii Hasla Neleri Kapsar  A Belirli bir yl.pdf
1Gayri Safi Yurtii Hasla Neleri Kapsar A Belirli bir yl.pdf
 

Recently uploaded

Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 

Recently uploaded (20)

Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 

1A Description Computer security protects computer system.pdf

  • 1. 1(A) Description: Computer security protects computer systems, networks, and information from harm, theft, and unauthorized use. Computer hardware is protected by the same means used to protect other valuable or sensitive equipment, namely, serial numbers, doors and locks, and alarms. You will complete the following for extra credit: Identify your network information: From your pc and mobile phone look up and identify the following information and answer the following questions. Identify your network IPv4 Address Identify your MAC address Identify your current Default Gateway Is your DHCP server the same as your Default Gateway? Yes or No Do you have an IPv6 address? Yes or No (B) Investigating Network Connection Settings Est. Time: 15 minutes Core 1 Objective: 2.5 Using a computer connected to a network, answer these questions: 1. What is the hardware device used to make this connection (network card, onboard port, wireless)? List the devices name as Windows sees it in the Device Manager window. 2. What is the MAC address of the wired or wireless network adapter? What command or window did you use to get your answer? 3. For a wireless connection, is the network secured? How do you know? 4. What is the IPv4 address of the network connection? 5. Are your TCP/IP version 4 settings using static or dynamic IP addressing? 6. What is the IPv6 address of your network connection? 7. Disable and enable your network connection. Now what is your IPv4 address?