SlideShare a Scribd company logo
1 of 91
Download to read offline
Activity 5
Activity 5.2.2.4
Documentation Table
Problems
Solutions The G0/1 physical interface is up but G0/1.10 is administratively down. Implement the no
shutdown command to enable the G0/1.10 PC3 is configured with the wrong default gateway
address. Change the default gateway on PC3 from 172.17.10.1 to 172.17.30.1 Subinterface VLAN
assignments are switched on R1. Issue the no encapsulation dot1q command to remove the incorrect
configuration. Then configure the subinterfaces with the correct encap dot1q command command.
Reenter the correct IP address information.
========================================
Step 1: Calculate a summary route on R1 to reach LANs on R3.
172.22.1.128: ... Show more content on Helpwriting.net ...
a. Can PC1 ping PC4? No
b. Can PC2 ping PC5? No
c. Can PC3 ping PC6? No
Step 2: Document the problem and the solutions.
List the problems and the solutions that will allow these PCs to ping each other. Keep in mind that
there could be more than one problem or more than one solution.
PC1 to PC4
a. Explain the connectivity issues between PC1 and PC4.
Answer: PC1 is on VLAN 30 instead of VLAN 10. The G1/1 port on S1 is configured as an access
port.
b. Record the necessary actions to correct the issues.
Answer: Issue the switchport access vlan 10 command on F0/11 interface on S2. Issue the
switchport mode trunk command on G1/1 interfaces for S1 and
... Get more on HelpWriting.net ...
Unit 2 TASK 1 Decoding the Jargon
TASK 1: Decoding the Jargon
a. Create a booklet which explain the function of hardware components and identify communication
between components. The pages should include photographs and diagrams to illustrate the
information you include. (P1)
Components communication
The following diagram shows how components communicate each other's.
CPU
Also known as the processor, the CPU is the heart of the computer and has two part:
Control Unit
The control unit controls the flow of data through the processor.
Arithmetic/Logic unit (ALU)
The ALU performs mathematical, logical, and decision operations in a computer and is the final
processing performed by the processor.
RAM
A computer can only run a program when it is in memory ... Show more content on Helpwriting.net
...
DOS is the basic system that people have to using Command line prompt to communicate with
computer via simple interface which is not "friendly" user interface.
The DOS can't run multitask on computer which can only load one program until it finished. But
some of the features still quite useful that people still use it. Such as:
5. CHKDSK
6. GBUPDATE
7. IPCONFIG
8. PING
9. FDISK
Comparison of two operating systems
We can see there are many different between those two computer operating system which the
Windows 8 operating system have a lots of advance features and higher performance that suit to
nowadays. The DOS system usually used to be run a specific program which prevents any virus or
hacker attack in the solo computer such as sale program, data base in the hospital or council data
base.
Features
Windows 8
DOS
Network
Yes
N/A
GUI
Yes
N/A
Multiuser
Yes
N/A
Server Administration
Yes
N/A
Command line interface
Yes
Yes
Entertain
Yes
N/A
Sound
Yes
Yes
Multitask
Yes
N/A
c. In your document explain the purpose of different software utilities which is available. Explain
how software utilities can improve the performance of computer systems (P3, D1)
Windows 8 Utility
Virus Protection
The specific program used to prevent viruses, worms and Trojans which attached in the email or
website.
Every computer need to install an anti–virus software and
... Get more on HelpWriting.net ...
Program that creates a shell and executes some shell commands
/* myshell.c
Description: Program that creates a shell and executes some shell commands
*/
#include <stdio.h>
#include <unistd.h>
#include <sys/types.h>
#include <errno.h>
#include <string.h>
#include <stdlib.h>
#include <sys/wait.h>
extern char **getln();
// Function used to check the file input direction command int inputFile(char **args, char **fileIn) {
int i,j; //go thorough the command line arguments for(i=0;args[i] != NULL;i++) {
// check for the input direction symbol if(args[i][0] == '<') {
// save the filename command if(args[i+1] != NULL) { *fileIn = args[i+1]; }
/*for(j=i;args[j–1] != NULL;j++) { args[j] = args[j+2]; }*/ ... Show more content on Helpwriting.net
...
= 'x')) { convert = strtol(args[i],NULL,16); printf("The number is %ld n", convert); sum = sum +
convert; } // check if it is a valid integer or not num = atoi(args[i]); if (num == 0) { //printf("Number
is: %i n", num); } else { sum = sum + num; } } } // check to see if there is arg or args command, if
there is then print // number of arguments and list them on the screen if((strcmp(args[0],"arg") == 0)
|| strcmp(args[0],"args") == 0) { for(j=1;args[j] != NULL;j++) { count++; }
printf("Output: argc = %d, ", count); printf("args = ");
for(j=1;args[j] != NULL;j++) { printf("%s, ", args[j]); } printf("n"); }
// check the error messages for the addition command and print the total sum
if(strcmp(args[0],"add") == 0) { if(sum == 0 && num ==0) { printf("Invalid integer/ String Error
n"); } else { printf("Output: "); for(k=1;args[k] != NULL;k++) { printf("%s + ", args[k]); }
printf("= %d n", sum); } }
// check if there is a multilplication command, if there is then multiply all the // valid arguments and
print the product // Accepted inputs: Only ints, Invalid Inputs: 0,Strings // Details and cases are
explained in readme file int zeroCheck=0; if(strcmp(args[0],"mul") == 0) { int product=1;
for(counter=1;args[counter] != NULL;counter++) {
... Get more on HelpWriting.net ...
Unix Based Operating Systems System
UNIX–based operating systems are very popular, and they are being used everywhere from
computer science research labs and universities to technology firms like Google, Facebook, and
IBM. There are many different types UNIX–based operating systems, some of them being Mac OS,
Ubuntu (Figure 1) and Solaris. When it comes to programming, many computer scientists, including
myself, prefer UNIX–based operating systems over Windows operating system, because it is the
main operating system for many technology companies (2) and easy to use. Linux, a UNIX based
operating system, is the operating system used Google, Amazon and NASA. North Carolina State
University has a great computer science program that is made to prepare students for the workforce
... Show more content on Helpwriting.net ...
Windows operating system is different from Mac OS or Ubuntu or any other operating system, and
it takes a considerable amount of time for an individual to get used to a different operating system.
According to stackoverflow [3], an online community for programmers, 26% of programmers use
Mac OS as their operating system, and 21.7% use Linux as their operating system. Companies want
to hire computer scientists familiar with the technology stack of the company, and having
experience in the company's operating system is a very valuable skill. Also, using a UNIX based
operating system build a certain set of skill sets, such as experience in using a UNIX terminal, that
companies consider a must have skill for computer scientists. By having Windows as the operating
system for computer science labs, NCUS is not providing the opportunity for students to experience
using a different operating system, that might be operating system they use after graduation.
Unfamiliarly with the work computer's operating system, not knowing how to perform simple tasks
fast enough could have a significant effect on the programmer's work and the overall productivity of
the company. Therefore, addressing this issue will make the transition between university and
working at a technology firm smoother, and help students build a skill set that will be useful in the
future. Background Many companies are switching from Windows to UNIX based systems,
especially Linux
... Get more on HelpWriting.net ...
It250 Linux Course Review and Hw Helper
IT250 Linux Operating System
S.No Question Points
1 What commands are used to create an ext2–second extended–filesystem? mke2fs or mkfs.ext2
2 Which of the following types of filesystems can the command e2fsck be used to check?
A. ext2
B. ext3
C. jfs
D. vfat
3 What command can be used to start a program with a lower scheduling priority? nice
____________
FINAL
Which of the following Linux utilities lists the names of files in a single directory? ls Which
component of X Window allows customization of the user interface?
Window manager
Which of the following control structures is a multiple–branch decision mechanism capable of more
than three decisions?
The Case structure
What is the meaning of the DocumentRoot directive in the Apache ... Show more content on
Helpwriting.net ...
yum
Which of the following symbols instructs the shell to redirect the output of a command to the
specified file instead of the screen and overwrite the file?
You would use the > symbol
The special character that causes the shell to generate filenames that match any single character in
the name of an existing file is _____.
The question mark
In vim, which of the following keystrokes is used to exit the editor and save the contents of the file
being edited?
ZZ
Which of the following control structures is a multiple–branch decision mechanism capable of more
than three decisions?
The Case structure
Which component of X Window allows customization of the user interface?
Window manager
Which of the following utilities is used to view a file one screen at a time? less What utility is used
to search for a particular string within a file or a group of files? grep The utility that can be used to
copy a file, including text and executable program (binary) files, is ___________. cp Which of the
following partitions does Linux use when all the information that Linux is processing cannot be
stored in RAM?
Swap
Which of the following keystrokes helps you undo the last change made in the vim editor? u What
network utilities works only if a remote system trusts your local computer? rsh What represents the
root partition in Linux?
The forward slash /
The C compiler that Linux commonly uses is _________.
GNU gcc
What
... Get more on HelpWriting.net ...
Essay on Cmit 350 Final Project
WAN Implementation with SOHO Skills Configuration Prepared for: University of Maryland
University College Prepared by: Nathan Poole Table of Contents I. Springfield Site Device and STP
Configurations II. Worchester Site Subnetting Configurations III. Boston Site Routing Protocol,
Route Summarization and Topology Improvements IV. Sacramento Site VLAN, Routing on a Stick
(ROS) and DHCP Implementation V. Los Angeles Site Management Technologies VI. xACME
WAN – WAN Implementation and Secure Communications VII. Bibliography WAN
Implementation with SOHO Skills Configuration I. Springfield Site Device and STP Configurations
Problem Statement: The device hostnames on each switch are generic and ... Show more content on
Helpwriting.net ...
End with CNTL/Z SpringfieldSwitch1(config)#Banner motd #Make sure you get an A on this
paper!# SpringfieldSwitch1(config)#exit LOGIN Banner (Displayed after the MOTD banner before
the login prompt.) SpringfieldSwitch1(config)#Banner login # Enter TEXT message. End with the
character '#'. *** Login Required. Unauthorized use is prohibited ***# Problem Statement:
Implement device passwords on both console port and VTY. All passwords should be encrypted.
Console Port Password SpringfieldSwitch1#config t Enter configuration commands, one per line.
End with CNTL/Z. SpringfieldSwitch1(config)#enable secret 1qazZAQ! VTY Password
SpringfieldSwitch1#config t Enter configuration commands, one per line. End with CNTL/Z.
SpringfieldSwitch1(config)#line vty 0 15 SpringfieldSwitch1(config–line)#password TELNET1234
SpringfieldSwitch1(config–line)#end SpringfieldSwitch1#service password–encryption Problem
Statement: Create Server VLANs, Faculty VLANs, Instructional VLANs and Administrative
VLANs on all switches. SpringfieldSwitch1&gt;en Password: SpringfieldSwitch1#config t Enter
configuration commands, one per line. End with CNTL/Z. SpringfieldSwitch1(config)#vlan 11
SpringfieldSwitch1(config–vlan)#name faculty SpringfieldSwitch1(config–vlan)#vlan 12
SpringfieldSwitch1(config–vlan)#name server SpringfieldSwitch1(config–vlan)#vlan 14
SpringfieldSwitch1(config–vlan)#name
... Get more on HelpWriting.net ...
Lab Network+
Lesson 2 Lab Worksheet Lab Exercises Lab 1 How TCP/IP Protocols Work through the TCP/IP
Model The purpose of this lab is to familiarize the students with the TCP/IP Model and some of the
protocols that are used in it. This lab is important to the student because it takes the student through
a thought experiment about how data would pass thorough the TCP/IP Model down from the
computer and up through the destination computer. By doing this thought experiment the student
will come to better understand how different protocols work together to accomplish a specific task.
Materials Word processing document Textbook Do the Lab Follow ... Show more content on
Helpwriting.net ...
Take Note This lab uses Windows 7. If you are using Windows 8, Vista or Windows XP, you will
need to make some slight variations to the lab. Materials word processing document Computer
running Windows 7 Professional Do the Lab The IPCONFIG Command 1. Click the Start button at
the bottom left of your Windows 7 Desktop Display in order to bring up the Windows 7 start menu
(Figure 2–12). [pic] 2. Type CMD into the Search Programs and Files box at the bottom of the Start
Menu and press Enter. 3. The Command Line Interface (CLI) Window will come up (as shown in
Figure 2–13). The CLI is a window where you can enter commands into the computer in the form of
text. This type of interface was how a person interacted with DOS. It is also how a person is able to
currently interact with Linux if they choose not to use one of several graphical interfaces available
for use with Linux. [pic] 4. Once you have opened the Command Line Interface (CLI), type in the
command ipconfig. When the ipconfig command is entered, the CLI changes to something similar to
Figure 2–14. You should note that the
... Get more on HelpWriting.net ...
Cisco Activity
Task 3: Interpreting Debug Output.
Note: If you already configured IP addressing on R1, please remove all the interface commands now
before proceeding. Furthermore, R2 and R3 should be configured through the end of "Task 2: Basic
Router Configuration".
Step 1 – On R1 from privileged EXEC mode, enter the debug ip routing command.
R1# debug ip routing.
IP routing debugging is on.
The debug ip routing command will show when routes are added, modified and deleted from the
routing table. For example, every time you successfully configure and activate an interface, Cisco
IOS adds a route to the routing table. We can verify this by observing output from the debug ip
routing command.
Step 2 – Enter interface configuration mode for R1's LAN ... Show more content on Helpwriting.net
...
End with CNTL/Z.
R1(config)# interface serial 0/0/0
Configure the ip address as specified in the Topology Diagram.
R1(config–if)# ip address 172.16.2.1 255.255.255.0 is_up: 0 state: 0 sub state: 1 line: 0 has_route:
False
As soon as you press the enter key, Cisco IOS debug output informs you that there is now a route,
but its state is "False". Since R1 is the DCE side of our lab environment, we must specify how fast
bits will be clocked between R1 and R2.
Step 6 Enter the clock rate command on R1.
You can specify any valid clocking speed. Use the ? to find the valid rates. Here, we used 64000
bps.
R1(config–if)# clock rate 64000
Step 7 Enter the command necessary to insure the interface is fully configured.
R1(config–if)# no shutdown
After you enter the correct command, you should see debug output similar to the following:
is_up: 0 state: 0 sub state: 1 line: 0 has_route: False
%LINK–3–UPDOWN: Interface Serial0/0/0, changed state to down
Unlike the LAN interface, fully configuring the WAN interface is not always enough to have the
route entered in the routing table even if your cable connections are correct. The other side of the
WAN link must also be configured. /u&gt;
Step 8 If possible, establish a separate terminal session with R2. Click on R2
This will allow you to observe the debug output on R2 when you make changes on R1. You can also
turn on debug ip routing on R2.
R2#debug ip routing
IP routing debugging is on
Enter
... Get more on HelpWriting.net ...
Course Materials
Lab 5.1 Connect the Internetwork Lab Review Questions 1. For what purpose is a transceiver used?
A transceiver can be used for converting one type of Ethernet connector to another or by converting
one type of I/O port to an Ethernet port. 2. This lab connects routers directly to each other via serial
cables. Is this a typical configuration? No, By default, Cisco routers are DTE (Data Terminal
Equipment)/ DCE (Data Circuit–Terminating Equipment) If not, to what equipment does the DCE
end of the serial cable usually connect? If Router A is connected to the DTE end of the cable, Router
B must be connected to the DCE end 3. What does a rollover (console) cable look like? Rollover
cable is often used to connect a computer terminal to a ... Show more content on Helpwriting.net ...
Refer to Figure 5–2. What will the host name of your router be? lab–a 2. Which interfaces is your
router using? F0/0, F0/1, and S0/3/0 3. What are the IP addresses and subnet masks for those
interfaces? 192.5.5.1 and 255.255.255.0, 205.7.5.1 and 255.255.255.0, 201.100.11.1 and
255.255.255.0 4. What is the enable secret password? class 5. What is the enable password? cisco 6.
What is the VTY password? cisco 15. There is another way to access the initial configuration dialog
other than being prompted for it automatically as a consequence of having erased the contents of
NVRAM. You can use the setup command at the privileged EXEC mode prompt. Press Enter if
necessary to reach the user EXEC mode prompt. What does this prompt look like? Greater than
symbol (>) 16. Type enable and press Enter to access privileged EXEC mode, which is also known
as enable mode. You should be prompted for the enable secret password you configured in the
system configuration dialog. How do you know you are being prompted for the enable secret
password and not the enable password? Because the secret password was set during the initial setup
process 17. Type class and press Enter. How did the prompt change? lab–a> to lab–a# Review
Questions 1. When configuring a router, when would you choose basic management setup rather
than extended setup? You would use basic management setup when you only need to configure
... Get more on HelpWriting.net ...
Disadvantages Of 2 User Interface
2 User Interface
User Interface is a function of the operating system that allows individuals to access and command
the computer. It is the junction between a user and a computer program. Task of the users are
changing rapidly and even functionality of computer becomes more complex according to it user
must adjust their behavior and problem solving strategies to the system. This situation becomes
worst as user do not have that proper experience and knowledge [5], [6].
A well designed interface can provide much more helpful information in a more appropriate manner
through interaction specially for those user who have lack of knowledge. Therefore user interface is
must so that it can give bene t to both user and resource management. An interface is a set of
commands or ... Show more content on Helpwriting.net ...
Menu Driven Interface (MDI) This type of interface lets you interact with a computer or device
through a series of screens or menus. Menu is presented, make a choice and then the next menu
appears on the screen.Then make another choice and so on. Example: Cash point machines (ATMs)
and iPod or mobile phone, they both use a menu driven interface [7].
ˆ Advantages of MDI
{ There are no commands to learn or remember.
{ Each and every step are given so that the user doesn't have to re– member anything.
{ Even if don't know what to do, can usually guess way around the options. { Menu interfaces don't
have to be visual, they can be spoken – good for telephones or for visually impaired people.
{ They don't need huge amounts of processing power or memory.
ˆ Disadvantages of MDI
{ A poorly designed menu interface may be slow to use.
{ It can be irritating if there are too many menu screens to work through. { If often can't go to the
exact place then want right at the start. Then have to work own way through the menu screens even
if know where then want to get to.
Dept. of Computer Engg. 5 DYPCOE, Akurdi, Pune
Operating System Design User Interface to Operating
... Get more on HelpWriting.net ...
Ccna
1. Refer to the exhibit. What three statements are true about the IP configuration that is shown?
(Choose three.)
The address that is assigned to the computer represents private addressing.
The computer is unable to communicate outside of the local network.
The network of this computer can have 126 hosts.
The prefix of the computer address is /27.
The IP address that is assigned to the computer is routable on the Internet.
The IP address that is assigned to the computer is a broadcast address. 2. As network administrator,
what is the subnet mask that allows 510 hosts given the IP address 172.30.0.0?
255.255.0.0
255.255.248.0
255.255.252.0
255.255.254.0
255.255.255.0
255.255.255.128 3. Which OSI layers ... Show more content on Helpwriting.net ...
Refer to the exhibit. Assume all devices are using default configurations. How many subnets are
required to address the topology that is shown?
1
3
4
5
7
13. Refer to the exhibit. Which two statements describe the information that is represented in the
header? (Choose two)
This is a server response.
The UDP protocol is being used.
The destination port indicates a Telnet session.
The return segment will contain a source port of 23.
The next session originated from the client of this session will use the source port number 13358.
14. Refer to the exhibit. The command that is shown was issued on a PC. What does the IP address
192.168.33.2 represent?
IP address of the host default gateway of the host
IP address of the homepage for the host primary domain name server for the host
IP address of the website resolver1.mooki.local 15. Refer to the exhibit. A router, whose table is
shown, receives a packet that is destined for 192.168.1.4. How will router treat the packet?
The packet will be dropped.
The packet will be forwarded via FastEthernet 0/0.
The packet will be forwarded to the destination host.
The packet will be forwarded to the 192.168.1.3 next–hop
... Get more on HelpWriting.net ...
A Brief Look at Scilab
Scilab with dynamically typed objects it is a interpreted language . Scilab runs is available in binary
format, for the platforms: Unix/Linux workstations MacOSX. MacOSX and Windows, users can
also be installed using Scilab. Compilation of source code is also possible in Scilab. Scilab was
named Basil, developed at INRIA as part of the Meta2project. It was developed in the name of
Scilab by the Scilab group, which comprised of a team of INRIA Metal au and ENPC. Since 2004,
Scilab development was been coordinated by a consortium .Scilab is used as a scripting language to
test algorithms and to perform computations numerical. Scilab is a programming language, and
around 2000 Scilab coded functions are available in library . The Scilab syntax is very simple, and
also which are the fundamental object of scientific calculus the uses the matrices, and it is provided
with specific functions and operators. Matrices are of different types which includes real, complex,
string, polynomial, and rational. Scilab programs are very quiet compact and they are smaller than
their counterparts in C, C++, or Java. Scilab is mainly a combination of scientific computing,
numerical libraries from such areas as numerical library such as linear algebra, optimization and
numerical integration it is a easy access . It is also simple to expand Scilab environment in a
computer. Using static or dynamic links, one can easily import new functionalities from external
libraries into Scilab . New
... Get more on HelpWriting.net ...
Color And Its Effect On The Human Eye
Colour When designing GUIs you need to be conscious of the colours. Microsoft office uses grey as
the main colour, blue for the title bar, highlighting, drop down lists and some text. Many uses feel
grey is dull and boring colour to use, however if the colour bright red or black was used it would be
uncomfortable eyes. Trichromatic System and luminance (Red, Green, Blue) Trichromatic system
uses a combination of three colours that are the basis of 3D vision, which are red, blue and green.
The human eye has a trichromatic system. The three colours of the trichromatic are detected by three
different types of cells on the retina of the eye, these are known as receptors. There has been much
work on developing the theory of this system into ... Show more content on Helpwriting.net ...
Proximity is the way we view things which are close together as a group or look closer than they
actually are. Continuity is taking more of an interest in a straight smooth lines rather than rigid and
rapidly changing lines. Symmetry is when a shape or object is repeated on both sides to make it a
mirror image. We see symmetrical shapes easily than unsymmetrical shapes. Similarity is objects
and shapes placed together as they look similar, where as dissimilar objects are likely to be viewed
individually. There are also laws that relate to common groupings. Fate is when we see objects that
move together as a group. Region is when objects are enclosed together somehow as a group. And
connected is when we see objects connected by continuous lines. Objects GUI is built using a
number of separate objects. Each object is used in a clear order. So images are layered. It is
important that images appear in order and overlay the first image, or else an interface may look as
an incomplete object to the user. If images are positioned behind or in front of text, then the whole
interface will not be able to be seen. Therefore GUI should appear in front of text on the desktop and
not behind existing images on the desktop. Furthermore if the positioning of the objects has not been
precisely arranged then the GUI or parts of the GUI may not appear behind the main screen. This
leads to the user not being able to access the full range of commands. Another thing is the
... Get more on HelpWriting.net ...
Guide to Unix Using Linux Fourth Edition Chapter 1 Review...
Guide to UNIX Using Linux Fourth Edition Chapter 1 Solutions
Answers to the Chapter 1 Review Questions
1. Your boss drops by your office in a hurry to ask you to attend a meeting at 10:30 on Friday
morning and you can't find a pen to make a note as a reminder. What Linux command can you use
to make a quick note to store in a file called Meeting? Answer: b. cat > Meeting
2. Before you make the note in Question 1, you decide to determine Friday's date, so that you can
include it in your note. What Linux command can you use to quickly determine the Friday's date?
Answer: a. cal
3. While you are typing a command, you misspell the name of a file you want to specify with the
command. Which of the following ... Show more content on Helpwriting.net ...
What key sequence can you use to repeat the last command, which was used to print the file?
Answer: c. Press the up arrow key one time.
21. Your international company is scheduling a meeting among managers in Canada, the United
States, Spain, Sweden, and Hong Kong on the basis of Greenwich Mean Time (GMT). What
command enables you to display the current time in GMT? Answer: b. date –u
22. How would you describe the purpose of the more command? Answer: The more command
enables you to view a file's contents by scrolling down.
23. What is the purpose of Telnet? Answer: Telnet can be used to connect a UNIX , Linux, or
Windows PC to a remote computer.
24. You enter Cal on the command line to view a calendar but only see an error message. Explain
why you got the error message. Answer: UNIX and Linux are case sensitive, so to display a calendar
you must use the cal command and not Cal.
25. Explain how you can run more than one command on a single command line. Answer: To run
more than one command on a single line, use the : (semicolon) character to separate each command.
Hands–On Projects Tips and Solutions for Chapter 1
Project 1–1
In this project, students use Telnet in Windows 2000/XP/Vista to access a remote computer running
UNIX/Linux. Students will need accounts on both the Windows 2000/XP/Vista
... Get more on HelpWriting.net ...
Analyzing The Multi User Operating System With Li And Ci...
Q 2 Analyzing the multi user operating system with GUI and CLI
GUI with it's capacity to show content utilizing distinctive textual styles and in addition to show
realistic, gives a greater number of abilities than prohibitive character–based interface. In any case
the character interface is truly essential and considered great from another perspective: it is more
programmable and more capable than any GUI can ever be. Additionally we have to recognize that
thought of GUI interface from most regular execution – mouse–based registration drop sort of
interface that is frequently connected with this term. It is only one conceivable usage of GUI
interface. Different usage are conceivable as will be talked about beneath.
While noteworthy for ... Show more content on Helpwriting.net ...
User can use the GNOME desktop, panel, applications, and tool set to customize working
environment and manager system tasks. GNOME also provides an application set, including a word
processor, a spreadsheet program, a database manager, a presentation tool, a Web browser, and an
email program.
Command Line Interface
A command line interface (CLI) enables users to write commands in a console window so as to
interact with an operating system.
CLI FEW TASKS: Locate Managed objects in managed object topology Enable or Disable
Modules. Acknowledge or delete Alarms.
CLI COMMANDS CAN BE DIVIDED INTO TWO TYPES:
a) BASIC COMMANDS: They are used to set parameter values, define command alias, check
command status, login and logout of server.
b) EXTENDED COMMANDS: These are commands that changes the topology of managed objects,
their properties & their attributes. They are used to perform several Functions:
A Few CLI COMMANDS USED IN SOLARIS:
S.No. COMMAND DESCRIPTION
1. alias this allows the user view the current aliases
2. bdiff compares two large files
3. cd changes directories
4. date returns the date and time
5. ln creates a link between two files
6. pwd displays the name of the working directory
7. Rm removes files
FreeBSD:
It supports three GUI:
GNOME
GNOME is a user–friendly desktop environment which makes it convenient for applications to
synchronize as environment includes panel for starting applications
... Get more on HelpWriting.net ...
What Is An Operating System Essay
Operating Systems What is an operating system The operating system is responsible for controlling
all of the tasks and processes. Operating systems consists of a collection of programs, with each
having a specific task allocated to it. These programs are designed to make the computer system run
as efficiently as possible. The most commonly used operating systems are Mac OS, Windows and
Linux. What Operating systems do · Allow users to interact with the machine (e.g. selecting
programs). · Allocate space in memory for programs. · Run programs (transfer instructions for
memory to processor then executing them). · Manage the storing of data. · Management of
input/output devices. Difference Operating Systems Windows Windows is the most widely used
Operating System in the world, It's initial introduction was in 1981 as a command–line interface; the
GUI (graphical user interface) was introduced in 1985 and has seen 26 different versions. Mac OS
In 1984 Apple released its first OS, which became known as "Mac OS" as of 1997. The original OS
was a fork of Apples older OS "Lisa" which was, at the time, extremely advanced. Linux Linux
began in 1991 as a personal project by Lines Torvalds, he set out to create a new, free Operating
System. Since then it has grown from an OS containing a few C files to having over 18 million lines
of source code and available under the GNU General Public License. The GNU license guarantees
that
... Get more on HelpWriting.net ...
LAB 2 Essay
LAB
Network Documentation
2
Introduction
In this lab, you will learn how to use various tools and techniques to determine and document IP
network design. You will use the Windows Command Prompt to generate network traffic; Wireshark
to capture and analyze the generated traffic; PuTTY to remotely access the Cisco Switch; and
finally, you will issue IOS commands on the Cisco Switch to understand its various interfaces and
inner workings.
Learning Objectives
Upon completing this lab, you will be able to:
Develop a plan for identifying and documenting the logical IP network design and IP addressing
schema based on data collected from Lab #1
Use PuTTY to establish Telnet and SSH to the IP addresses of the identified ... Show more content
on Helpwriting.net ...
You will use this information to complete the deliverables for this lab.
FIGURE 2.3
Windows Command
Prompt window
7. Repeat step 6 for the following IP addresses to create a packet stream for Wireshark.
172.30.0.2
172.16.8.1
172.17.0.2
172.16.0.2
172.19.0.1
172.19.0.2 8. Minimize the Windows Command Prompt window. 9. Double–click the PuTTY icon
on the desktop to start the PuTTY application.
Note:
The next steps use PuTTY, a terminal emulator program that you can use as a client to create a
variety of secure connections to network resources. This lab uses it to create Telnet and SSH
sessions.
Hands–On Steps
21
10. In the PuTTY application window, type the IP address for LAN Switch 1, 172.16.8.5. Select the
Telnet
radio button and click the Open button to start the connection.
FIGURE 2.4
PuTTY application window 2
a. Username: cisco
b. Password: cisco
FIGURE 2.5
PuTTY terminal console window Network Documentation
11. PuTTY will launch a terminal console window. At the login prompt, type the following:
22
LAB #2 | Network Documentation
Note:
The next steps involve using the Cisco IOS show command to obtain network documentation
information from the interface you've connected to (LAN Switch 1). Cisco IOS is a package of
routing, switching, and networking commands integrated with a Cisco–specific operating system, of
which the show command
... Get more on HelpWriting.net ...
Bt594 Final Project
TM1: Installing and using Linux operating systems BIT594 – Technologies in Practice Due date:
31/03/2016 Bobbi–jo Ataahua Paikea – 4203318 Question 1: Installing Ubuntu Task 1: Download
the latest version of Ubuntu Download the latest version of Ubuntu (the recommended flavour is
32–bit, as not all software will run on a 64–bit). Take a screenshot while downloading the latest
version and include this in the electronic file you submit. You need to document the screenshot and
describe accurately what the screenshot was about. Write no more than 50 words to explain the
screenshot. Figure 1: Download of Ubuntu 14.04.4 LTS (Trusty Tahr). Screenshot description:
Captured in the screenshot as seen in figure 1 is the download process of ... Show more content on
Helpwriting.net ...
Take three screenshots of relevant stages during the installation process. Write no more than 100
words for each screenshot to describe what was accomplished. Include the screenshots in the word–
processed document you submit. Marks will be awarded for the relevance of the screenshots
selected. It will be for you to decide and explain why the screenshots selected are relevant.
Explanation for chosen screenshots: As question 2 is clearly focused on terminal/command line,
below are three screenshots that have relevance to the command–line environment. Instead of using
the GUI environment to install a new application on the Ubuntu desktop, the terminal/command line
was used. Using the terminal/command line showcases a different route of installing a new
application. The command–line environment also allows the processors to do more precise task
procedures. Users are able to view a list of details and descriptions about applications before
choosing one to install. Figure 1: Package names and short descriptions of the three
... Get more on HelpWriting.net ...
Windows Vista and Server Essay
Lab 2
Configuring Servers
–––––––––––––––––––––––––––––––––––––––––––––––––
This lab contains the following exercises and activities: Exercise 2.1Exercise 2.2Exercise 2.3Lab
Challenge | Completing Post–Installation Tasks
Adding Roles and Features Converting the GUI Interface to Server Core
Using the Server Core Interface
|
Exercise 2.1 | Completing Post–Installation Tasks | Overview | In this exercise, you complete the
tasks necessary to set up a server on which Windows Server 2012 has just been installed. | Mindset
... Show more content on Helpwriting.net ...
Migrate Roles and Features with Windows Server Manager | * Question3 | How would the
installation of the roles and features selected in this exercise differ if the server was running
Windows Server 2008 R2?You would NOT be using powershell to do it. So, the process would be a
lot more lengthy. |
Question 4 | How can you prove that the Web Server (IIS) role is installed on the server? You will
see that it is checked off in roles and features And If you try to install it again with powershell it will
tell you no changes need to be made if it's already installed. |
Exercise 2.3 | Converting the GUI Interface to Server Core | Overview | Windows Server 2012, for
the first time, enables you to convert a server installed using the full graphical user interface to one
that uses Server Core. This enables administrators who are less familiar with the Windows
PowerShell interface to install and configure a server using the familiar GUI tools, and then convert
it to Server Core to minimize hardware resource utilization. | Mindset | What advantages does Server
Core provide over the full Windows Server 2012 interface? | Completion time | 10 minutes |
* 13. Take a screen shot of the Server Core interface by pressing Alt+Prt Scr and then paste it into
your Lab 2 worksheet file in the page provided by pressing
... Get more on HelpWriting.net ...
M11Cde Skills-Based Assessment
School of Engineering & Computing Department of Computing Internet Information Security
(M11CDE) Layered Security Student Name: BUSAABANG OBI SID:4560229 I certify that this is
my own work yes/no and that I have read and understand the University Assessment regulations.
Signature: [pic] Submission Details The details below indicate what you should submit, when you
should submit it and where is should be submitted to. Submission Date and Method Deadline 11
January 2013 11:50pm online submission. Submission Format: 1. Fill the online quiz for the
practical test which will be available one week before the final fixed deadline. 2. Download an
electronic copy of this document and ... Show more content on Helpwriting.net ...
If it is not immediately apparent subtract the last non–zero octet from 256. Edinburgh information
The LAN for Edinburgh has been assigned an IP network address of 192.168.5.0 Again, each subnet
of the above network needs to
... Get more on HelpWriting.net ...
Computer Software : Operating System Software
Computer Software
Computer software is a program that enables a computer to perform a specific task. Computer is
useless without a software. For example without internet browser you cannot search anything on the
internet. You need system software such as word processer, which enables a user to perform a task,
and system software such as an operating system, which enables software to run properly. Computer
software has to be installed within the computer storage (such as hard drive, memory, or RAM).
Once the software is installed, the computer is able to execute the software.
Types of software's:
Operating System Software:
An operating system is a software that enable the computer hardware to communicate with the
computer software. Without ... Show more content on Helpwriting.net ...
It is a multitasking computer operating system. It was designed to be a small and flexible operating
system.
DOS–command line:
Disk Operating System (DOS) was the first operating system used by IBM computers. It was
originally available in two versions "PC–DOS" and "MS–DOS"
Linux–command line:
Linux is a software that enables application and the computer operator to access the devices on the
computer to perform desired functions.
Windows 95, NT, 98, ME, 2000, XP, Vista, and Windows 7:
These are the computer operating systems designed by the Microsoft.
Novell Netware:
Novell Netware is also a brand of operating system designed for networks or simply a local area
network (LAN) operating system. Netware is a product of the popular IT–centred company called
Novell.
MAC OS:
Mac operating is series of graphical user interface (GUI). Mac operating system was developed by
Apple Inc. It was first introduced in 1984.
MAC OS X:
This operating system was released in 2001. It is the latest version of Mac OS. It is a series of UNIX
based graphical interface operating system.
Virus:
Virus is a software program that are designed to spreads from one computer to another and to
interfere with computer operations. While using the internet your computer may have come in
contact with computer viruses. A computer virus might corrupt or delete data on the computer, or
erase everything on your hard disk. Viruses also spread ether by portable media, such as external
... Get more on HelpWriting.net ...
Week 3 iLab
Student Name: Rolando Salas Date: 7/26/14
Database Server Security Demands – iLab3
Objectives
In this lab, the students will examine the following objectives.
Become familiar with well–known and ephemeral ports
Create ACL to meet requirements on database security demands
Learn best practices to create and apply ACLs.
Scenario
A small company is using the topology shown below. The Public Server is actually an off–site
Database Server that contains company records. Assume that the 200.100.0.0/16 network represents
the Internet. The Dallas and Chicago Servers and hosts need to access the database server securely.
Only users in the Dallas and Chicago LANs should be able to access the database ... Show more
content on Helpwriting.net ...
The ephemeral UDP/TCP ports range from 49152 to 65535.
#4. What is wrong with ACL 105? access–list 105 permit tcp any any access–list 105 deny tcp host
201.141.0.3 any
On this ACL you listing first to permit all TCP traffic from any source IP address to any destination
IP address before putting first the hosts IP address except you don't want. In other words, the second
line should have been first and the first line secondly to specify that to deny all TCP packets from
the host 201.141.0.3 from any source IP addresses.
#5. What well–known TCP port does Oracle Database (sql net) server use?
Oracle uses 1521 as a standard default port but doesn't outright own the port since the port lies
within the registered port number range.
#6. A company is managing an Oracle Database located in a Public Server to support day–to–day
operations in Dallas and Chicago networks. The company has requested its Internet Access Provider
(ISP) to create the necessary ACL at the ISP router securing that only responses from Oracle server
to certain hosts are allowed to enter Dallas and Chicago LANs.
ISP network engineers decided to use extended ACL, and applies it to F0/0 interface in ISP router.
Why did they decide to create an extended ACL and apply it in interface F0/0 for inbound traffic?
An extended ACL was created to filter traffic closer to the source and so traffic coming from the
Host will be filtered.
... Get more on HelpWriting.net ...
Essay On Graphical And Command Line Interface
5. Evaluation The creation of our graphical and Command Line interface came about as a means of
testing our algorithms. Since we were attempting to mine associations from large datasets, it made
sense to test our mining algorithms on artificially created datasets so as to check whether or not our
algorithms were successful. Therefore, we devised the graphical interface to allow us to create
sufficiently large datasets based upon association rules. This allowed us to plant specific rules with
set supports and confidence with in our test datasets. We were then able to run our test datasets
through our association mining algorithms to verify whether or not the algorithms correctly
identified the rules which we had planted with the correct ... Show more content on Helpwriting.net
...
6. Conclusion and Future Extensions This project was one of our top choices specifically because it
approached a very interesting problem while giving us the opportunity to work with a renowned
company. We had the chance to expand our machine learning knowledge, enhance our technical
abilities and get an insight into what it is like to work with a real client from industry. This
experience was challenging as we found out clients can be difficult to work with and sometimes
unreliable. Therefore, one of our main gains from this project is that we learned how to overcome
non ideal situations that arise due to uncooperative clients. We also strengthened our team work
skills as well as our time management aptitudes, due to using the Scrum methodology. As we were
very fond of the idea that stood behind our project, we tried to implement it at the best of our
abilities. We wanted to make it accessible to everyone, not only companies in the financial sector
and we had multiple thoughts on how to achieve this. Unfortunately, due to the limited time we
could not put all of them into practice. One of the future extensions that we considered was
changing the internal representation of association rules and the associated values such as support
and confidence. We
... Get more on HelpWriting.net ...
Cisco Switch Configuration
Define hostname It is very useful define the name of your Cisco switch/router. To do it: Enable
administrative privilege Router>en Enter the configuration mode: Router#configure terminal Define
the hostname (the name router is changed to Ciscozine) Router(config)#hostname Ciscozine
Ciscozine(config)# Assign the privileged level secret The enable secret password allows you to enter
enable mode (sometimes referred to as privileged mode or privileged–EXEC mode). To set a secret
password: Enable administrative privilege Ciscozine>en Enter the configuration mode:
Ciscozine#configure terminal Define the privileged–EXEC mode password; remember to use a
strong password (combine letters, numbers, nd symbols). The enable secret ... Show more content
on Helpwriting.net ...
To "encrypt" it: Enable administrative privilege Ciscozine>en Enter the configuration mode:
Ciscozine#configure terminal The actual encryption process occurs when the current configuration
is written or when a password is configured. Password encryption (it uses Vigenere algorithm) is
applied to all passwords, including username passwords, authentication key passwords, the
privileged command password, console and virtual terminal line access passwords, and Border
Gateway Protocol neighbor passwords. This command is primarily useful for keeping unauthorized
individuals from viewing your password in your configuration file. Ciscozine(config)#service
password–encryption REMEMBER:The Vigenere algorithm is used to obfuscate the passwords (not
really encrypt them as there is no encryption key) in order to prevent "shoulder surfing" from
exposing passwords to someone who briefly looks at a running configuration. If, however, someone
gets hold of the configuration they can easily retrieve the passwords using the reverse translation of
the Vigenere algorithm. You could check your current configuration with the command "show
running–config". Ciscozine#show running–config Building configuration... Current configuration :
782 bytes ! version 12.2 service timestamps debug datetime msec service timestamps log datetime
msec service
... Get more on HelpWriting.net ...
It320 Hmwk 4.1
IT320
IT320 Wan Technology/ Unit 4
Assignment: 4.1
1. At what layer of the OSI model does CDP operate?
Data Link layer
2. What is the primary use for CDP?
To discover information about directly connected Cisco devices
3. What network layer protocols can CDP provide information for?
IP, Internetwork Packet Exchange (IPX), and AppleTalk
4. When CDP is enabled on an interface, a router (or switch) sends CDP advertisements on a regular
basis, which list information about the sending router. Included in the packets are a series of
Type/Length/Value, or TLV, data structures.
5. The show cdp neighbors command can be used to display one line of information about each
directly connected CDP–enabled device. List the six pieces ... Show more content on
Helpwriting.net ...
Compiled Thu 20–Feb–03 14:09 by pwade advertisement version: 2
RTC# show cdp interface
Ethernet0 is up, line protocol is up
122 Routers and Routing Basics CCNA 2 Labs and Study Guide
Encapsulation ARPA
Sending CDP packets every 60 seconds
Holdtime is 180 seconds
Serial0 is up, line protocol is up
Encapsulation HDLC
Sending CDP packets every 60 seconds
Holdtime is 180 seconds
Serial1 is administratively down, line protocol is down
Encapsulation HDLC
Sending CDP packets every 60 seconds
Holdtime is 180 seconds
16. List and briefly describe the debug options displayed after entering the following command:
RTB#debug cdp ? adjacency CDP neighbor info events CDP events ip CDP ip info packets CDP
packet–related information
17. Fill in the table that follows.
Command Description
... Get more on HelpWriting.net ...
Nt1330 Unit 3 Assignment 4 Command Line
CM 523 Homework 4: Command Line Bochao Sun Nov. 14, 2017 When I encountered command
line during last week's class, I found it a little confusing and "aloof". I was totally unfamiliar with its
purpose and syntax, and the interface is merely characters of same font and size. I thought it is
something only for computer science students and does not have anything to do with web design and
interaction. Things changed a lot as I learn to use it. In fact, such flat interface excludes all graphical
display formats in regular commands thus makes it clearer to find the target directory and file by
looking their names and types (e.g. style.css) returned after the "ls" command. It should occupy less
RAM of the computer than Finder because it does not "render" – figure out icons and thumbnails –
for all files ... Show more content on Helpwriting.net ...
When I am using graphical user interface, I can go back and forth to the last directory by simply
clicking at arrow on the Finder window. However, I need to type commands every time to change
directory (cd) and know what is in the directory (pwd). Therefore, CLI both saves time and takes
time. It also takes time to learn and get used to the set of commands that make sense in CLI. What's
more, contents are permanently deleted after the "rm" or "rm –r" command, which may cause loss of
important documents by mistake. Another detail that I pay attention to is that in Finder, I can
preview most files by pressing the Space button and switch the files with arrow buttons on
keyboard, while previewing is not available on CLI. I need to open it with an "open" command. In
addition, CLI once surprised me by making reasonable suggestions. The first time I tried to open a
website in CLI, I typed the address without "http://" and it was actually regarded as a path (see
below). When it could not found the folder and file on my computer, it surprisingly asked "Perhaps
you meant (suggested
... Get more on HelpWriting.net ...
Ls Command Questions And Answers
Chapter 1 1. Use the whatis command to determine the purpose of the ls command. Command:
whatis ls Explanation: ls displays the content of a directory 2. Use the man program to find out what
the –R option does when used with the date command. output date and time in RFC 2822 format.
Example: Mon, 07 Aug 2006 12:34:56 –0600 3. Use the man program to determine what other
commands you should also see in relation to the clear command tput(1), terminfo(5) This describes
ncurses version 5.7 (patch 20100109). 4. Use the cal command to determine on what day of the
week you were born. cal [[day] month] year] 5. Use the cal command to determine which year
between 2005 and 2010 is a leap year. ... Show more content on Helpwriting.net ...
man who > who_info less who_info tail –12 who_info head –12 who_info 14. Create a file called
favorite_foods, and list your favorite foods, entering five or six or more. Press Enter after each
favorite food so it appears on its own line (make certain you also press Enter after the final food
item). After the file is created, add two more foods you like that are not on the list (press Enter after
the final food item). View the list of foods to make certain the two items you added appear at the end
of the list. cat> food fish putin sheperd pie ^C Cat >>food Chiken wings Hamburger ^C 15. View
the documentation for who and then view the documentation for w. How are these commands
similar?. who – show who is logged on w – Show who is logged on and what they are doing. 16.
Run the who –uH and w commands using one command–line sequence to compare the results. who
–H NAME LINE TIME COMMENT student :0 2015–09–16 13:16 (console) student pts/2 2015–
09–16 13:17 student pts/3 2015–09–16 13:18 ––––––––– student@linux–6c76:~> who –u student :0
2015–09–16 13:16 ? 2696 (console) student pts/2 2015–09–16 13:17 00:17
... Get more on HelpWriting.net ...
What Is User Interface?
What is User Interface? "User Interface (UI) Design focuses on anticipating what users might need
to do and ensuring that the interface has elements that are easy to access, understand, and use to
facilitate those actions." [5] In this research paper I am going to take you through the history, basics,
and advances. These elements are very important to know because without them software designers
would be lost.
To start, one of the biggest patterns in the history of software is the shift from computation design to
presentation design. Since our machines have become stronger more time has been spent on
presantation. "The history of that progression can be conveniently broken into three eras: batch
(1945–1968), command–line (1969–1983) and graphical (1984 and after). The story begins, of
course, with the invention[6] of the digital computer. The opening dates on the latter two eras are the
years when vital new interface technologies broke out of the laboratory and began to transform users
' expectations about interfaces in a serious way. Those technologies were interactive timesharing and
the graphical user interface." [1]
In the batch era, computing power was very expensive. The larger computers of that era needed less
logic cycles per second. User interfaces were, very repetitive and basic. Users were doing most of
the work for their computers rather than the other way around. User interfaces became overhead and
software was designed to keep the processor a going like a
... Get more on HelpWriting.net ...
Unit 14 Event-Driven Programming (P1, M1, D1)
Contents P1 – Identify the key features of event driven programming such as events, event loops
and event handlers 2 P2 – Explain how development environment components (e.g. Solution
Explorer, Forms, Toolbox, Code Editor, Debugger, and Property Window) simplify the
development. 3 M1 – Describe the features of an event driven language that make it suitable for
creating a GUI 5 D1 – Evaluate the suitability of event driven programs for non–graphical
applications 6 References 7 P1 – Identify the key features of event driven programming such as
events, event loops and event handlers Events – An event occurs when the user interacts with a
object. * Usually this means a mouse movement or click * Keyboard actions are also ... Show more
content on Helpwriting.net ...
* There are numerous non–graphical applications that make use of event driven programs, an
example of this is a smoke alarm: when it sense smoke and the density of smoke reaches a certain
level, the alarm goes off. An event has taken place there; a smoke alarm is non–graphical application
but it's very useful for event driven programming. Text – Microsoft DOS: An ms Dos operating
system makes use of no graphical interface; it doesn't make use of wimp when it's interacting with
the user. The user uses/enters computer commands into the computer to give instructions such as
saving files, opening new documents other than using a mouse to do these actions. A keyboard is
used to enter these commands and "key down" events occur when this happens. Non–graphical
applications compared to graphical applications ten to be out of date/old and harder to understand.
Of course this is not true in some cases, but with programs such as Ms Dos it is harder to remember
all the command lines. But with graphical applications that have an interaction interface are simpler
to understand and function. Summary In this task I have described procedural programming and its
structure with examples. I've described also what IDE is and how it simplifies the development
process and I've chosen Visual Basic as an IDE example and I described its components. For merit
task I have described GUI with advantages and also I have
... Get more on HelpWriting.net ...
Questions with Explanation
Q1: If an Ethernet port on router was assigned an IP address of 172.16.112.1/20, what is the
maximum number of hosts allowed on this subnet? A. 1024 B. 2046 C. 4094 D. 4096 E. 8190
Answer: C Explanation: Given IP address of 172.16.112.1 / 20, subnet mask: 255.255.240.0 max.
num of hosts =(( 2^12) –2 ) = 4096–2 = 4094 Q2.:An access list was written with the four
statements shown in the graphic. Which single access list statement will combine all four of these
statements into a single statements that will have exactly the same effect?
A. access–list 10 permit 172.29.16.0 0.0.0.255 B. access–list 10 permit 172.29.16.0 0.0.1.255 C.
access–list 10 permit 172.29.16.0 0.0.3.255 D. access–list 10 permit 172.29.16.0 0.0.15.255 E.
access–list 10 ... Show more content on Helpwriting.net ...
A host in an Ethernet network can communicate with another host,only if it knows the Ethernet
address (MAC address) of that host.The higher level protocols like IP use a different kind of
addressing scheme like (IP address) from the lower level hardware addressing scheme like MAC
address.ARP is used to get the Ethernet address of a host from its IP address.ARP is extensively
used by all the hosts in an Ethernet network.In this case there is already an entry for this IP
address,Meaning this host already knows the MAC to IP address mapping for this destination so
there is no need to send out an ARP request instead it will send the ICMP packet directly to
192.168.1.254 via unicast. Q7.An internetwork has been configured as shown in the diagram, with
both routers using EIGRP routing for AS 44.Users on the Branch router are unable to reach any of
the subnets on the HQ router.Which of the following commands is necessary to fix this problem.?
A. Branch(config–router)# version 2 B. Branch(config–router)# no auto–summary C.
Branch(config–router)# redistribute eigrp 44 D. Branch(config–router)# EIGRP log–neighbor–
changes E. Branch(config–router)# default–information originate Explanation:By default, EIGRP
... Get more on HelpWriting.net ...
What Is An Operating System?
Unit 2 Assignment 1 P2/M1
What is an operating system?
An operating system is software that communicates with the hardware and it allows other programs
to run it. Operating systems is the structure that allows you to communicate with computer hardware
in a communicating way , without an operating system you wouldn't be able to tell the computer to
do anything and it won't have any instructions to follow.
Purpose of an operating system:
Operating system controls the hardware and software properties of the system in a computer these
properties include things like processer, memory and disk space. Computers must have an operating
system to run other programs also an operating system does basic tasks such as looking and
recognizing the input from the keyboard and also sending output to display on the screen , keeping
track of files and directories on the disk and controlling the disk drivers and printers.
The purpose of an operating system, a purpose of an operating system is memory management this
process happens when a computer searches for a memory to programs that run in the same time.
Virtual memory is a data storage that will keep separate memory addresses accessed before by the
user, this process will increase the amount of RAM and transfer data to the secondary storage.
Virtual memory can have an impact on how well computer will work because of its storage.
An operating system manages the hardware and software resources of the system. A computer must
have an
... Get more on HelpWriting.net ...
What Is A Operating System?
What is a operating system? An operating system is the most essential software that is placed in a
computer. It achieves the computer 's memory and procedures, and the software and hardware. Also,
it importantly allows you to interact with the computer itself even if you cant speak the computers
language. It provides mutual services for computer programs. Some examples of operating systems
are Windows (vista, 7), Mac OS, Haiku, Linux, BSD. Command line operating systems Some
examples of command line operating systems are Linux and DOS. DOS, also known as disc
operating system is a user interface where you can command the computer difficult but basic tasks
to be done quickly. LINUX is a public/ open–source operating system based by UNIX. ... Show
more content on Helpwriting.net ...
A great example of a GUI that uses a control panel is Windows 7. What is machine and peripheral
management? The Peripheral management manages peripheral device by conveying them
commands in the devices own code. Every peripheral device has its own specific code. One
language is binary. For example, in Linux OS, it is the process of turning inputs into outputs. Some
peripheral devices are keyboards, mouse, webcams etc. What is file management? File management
consists of files that are placed in an area of storage and where you can name your file regarding its
content and place it where ever you want. It is the way toward looking after files, reports into
classifications and subcategories as wanted by a client. Essential parts of file management are
arranging, naming and grouping PC information. What is meant by customising the desktop?
Operating systems allow you to customise your desktop which means you can adapt specific
features on the user interface. This means the look can be changed to your preference. Also, it is a
handy way to organise/ navigate your work whilst adding your own look. For example, you can
change your background picture to your preference. It could be your national flag, your favourite
colour or even favourite car. On the picture to the left my favourite car is a Lamborghini in green.
What is device driver? Every
... Get more on HelpWriting.net ...
Linux: the Kernal and Shell Essay examples
Linux: The Kernel And Shell
Josh Harkey
AIU Online
Abstract
This manual has been written to explore the many distributions of Linux. It will define some of the
components of the OS as they relate to the shell and kernel. It will also go over some of the more
popular distributions of Linux and the shells. Finally, it will give a brief overview of some useful
commands that can be used in the bash shell.
Linux: The Kernel and Shell It is important to know some the inner workings of an operating system
to help better understand how they and why they are beneficial. This is one of the reasons for this
manual. It will also give a better understanding of some of the more popular distributions of Linux.
The Kernel And Shell As They ... Show more content on Helpwriting.net ...
As a result, Linux offers the user a way to have an OS that comes with more functionality, and in an
environment that can be customized for the task at hand.
Five Common Distributions
Since Linux is allowed to be changed by its users there are more than 600 distributions available.
Here is a list of five of the most commonly used.
FEDORA– fedoraproject.org (2013) states, "fedora is fast, stable, and powerful operating system for
everyday use built by a worldwide community." This distribution is most commonly used by
developers and Linux enthusiast.
DEBIAN– debian.org (2013) states, "Debian provides more than a pure OS: it comes with over
37,500 packages, pre compiled software bundled up in a nice format for easy installation on your
machine." It is one of the oldest distributions still in active development, and is often the base for
newer distributions. People that have a passion for Linux enjoy Debian. openSUSE– according to
opensuse.org (2013), " The openSUSE distribution is a stable, way to use and complete multi–
purpose distribution.it is aimed towards users and developers working on desktop or server." This
distribution is generally used in an enterprise environment, and is sponsored by Novell. It is known
for its ease of use on the surface and advanced options further in.
LINUX MINT– linuxmint.com (2013) states, "The purpose of Linux mint is to produce a modern,
elegant and comfortable operating system which is both powerful
... Get more on HelpWriting.net ...
Advantages And Disadvantages Of MATLAB
The name MATLAB stands for Matrix Laboratory. MATLAB is a high–performance language for
technical computing. It integrates computation, visualization, and programming in an easy–to–use
environment where problems and solutions are expressed in familiar mathematical notation. Typical
uses include:
Math and computation
Algorithm development
Modelling, simulation, and prototyping
Data analysis, exploration, and visualization
Scientific and engineering graphics
Application development, including Graphical User Interface building
MATLAB is an interactive system whose basic data element is an array that does not require
dimensioning. This allows you to solve many technical computing problems, especially those with
matrix and vector formulations, ... Show more content on Helpwriting.net ...
Three principal elements required to create a MATLAB Graphical User Interface. The elements are
components, figures, callbacks.
1. Components
Each item on a GUI is a graphical component. The types of components include graphical controls
(pushbuttons, radio buttons, edit boxes, lists, sliders, etc.), static elements (frames and text strings),
menus, and axes. Graphical controls and static elements are created by the functions and axes are
used to display graphical data which is created by the function axes.
2. Figures
The components of a GUI must be arranged within a figure, which is a window on the computer
screen.
3. Callbacks
Finally, there must be some way to perform an action if a user clicks on a button. A mouse click or a
key press is an event, and the MATLAB program must respond to each event if the program is to
perform its function. The code executed in response to an event is known as a call back. There must
be a callback to implement the function of each graphical component on the
... Get more on HelpWriting.net ...
Basic Device And Security Configuration Paper
Basic Device and Security Configuration
Kevin Kormylo, Okoma Mita, Dan O'Donnell
CIT/249
January 12, 2015 Steve Acklin
Basic Device and Security Configuration
When designing a network there are basic network and security configurations that one needs to
consider. Choosing a hostname for each device is very important, this allows the user to know what
device they are working on. Configuring interfaces with a proper IP, subnet, and descriptions are
part of the basic configuration of a network device.
One needs to consider the security setting for the network devices. There are some basic
configurations that one can choose to use in their configuration. Passwords and a username should
be used for consoling and remote access to any ... Show more content on Helpwriting.net ...
We were able to name the devices and create the banners as required. All passwords were encrypted
and remote access was successful for SSH and telnet. All interfaces were assigned a description that
were being used and the others not being used, were shutdown. We secured remote access by a
username and password along with the rsa key. We verified our configuration by posting the running
configuration in our team thread.
Team A's assignment
The assignment was broken up into two parts. Each member had a device to configure Dan
configured Branch1 router, Adam was assigned Branch2 router, Okoma configured the switch, PC,
ISP, and Kevin configured the Core router. We did not receive a config from Adam so, Kevin was
able to do that part too. Okoma and Dan provided a brief written summary of the work they
performed and Kevin put the paper together.
Switch1 running configuration:
Current configuration : 3826 bytes
!
version 12.2 no service pad service timestamps debug uptime service timestamps log uptime service
password–encryption
!
hostname Switch1
!
no logging console enable secret 5 $1$m1XN$lgDd.3R8lddprN/Z8Vxzu0 enable password 7
110A000712001E1F
!
username admin password 7 02051D590E141A32 no aaa new–model ip subnet–zero
!
ip domain–name mycompany.com
!
! crypto pki trustpoint TP–self–signed–1363906688 enrollment selfsigned subject–name cn=IOS–
Self–Signed–Certificate–1363906688
... Get more on HelpWriting.net ...
MATLAB: A High-Performance Language For Technical Computing
The name MATLAB stands for Matrix Laboratory. MATLAB is a high–performance language for
technical computing. It integrates computation, visualization, and programming in an easy–to–use
environment where problems and solutions are expressed in familiar mathematical notation. Typical
uses include:
Math and computation
Algorithm development
Modelling, simulation, and prototyping
Data analysis, exploration, and visualization
Scientific and engineering graphics
Application development, including Graphical User Interface building
MATLAB is an interactive system whose basic data element is an array that does not require
dimensioning. This allows you to solve many technical computing problems, especially those with
matrix and vector formulations, ... Show more content on Helpwriting.net ...
Editor window Creates and debugs script and function files.
Help window Provides help information.
Command history Window & logs commands entered in the command window.
Workspace window Provides information about the variables that are used.
Current Folder Shows the files in the current directory. 4.2.7 Working on the Command Window
To type a command the cursor must be placed next to the command prompt (>>).
Press Enter key to execute the command.
Several commands can be typed in the same line. This is done by typing a comma (,) between the
commands.
If a semicolon (;) is typed at the end of a command, the output of the command is not displayed. It is
useful when the result is obvious or the output is very large.
A previously typed command can be recalled to the command prompt with the upper arrow key. The
down–arrow key can be used to move down the previously typed commands.
If a command is too long to fit in one line, it can be continued to the next line by typing three
periods (...) and press the Enter key.
The symbol %, when it is typed in the beginning of a line, the line is designated as a comment.
4.3 Working on Matlab
... Get more on HelpWriting.net ...
New204
NETW204: Assignment 1 (50 points) Each answer is worth 1 point each, 50 questions = 50 total
points. Type answers in the appropriate cell; text will automatically wrap. Post your completed
assignment to the dropbox. NAME | Manuel Crail | Router Configuration Exercise (5 points) When
configuring a router, there are certain basic tasks performed, * Naming the router * Setting
passwords * Configuring interfaces * Configuring a banner * Saving changes on a router * Verifying
basic configuration and router operations | Question | Answer | 1 | The first prompt is _______ mode
and will allow you to view the state of the router. | User Mode | 2 | What major limitation does this
mode have? | Does ... Show more content on Helpwriting.net ...
Create a summary static route for R1 in figure 1 for the 3 LANs it has attached. Use the steps from
your text Chapter 2 page 125: Calculating a Summary Route. 192.168.20.0/24 Binary
form=11000000.10101000.00010100.00000000=/22 192.168.21.0/24 Binary
form=11000000.10101000.00010101.00000000=/22 192.168.22.0/24 Binary
form=11000000.10101000.00010110.00000000=/22 Summarized into one route=192.168.0.0
/22=255.255.252.0 Write the networks in binary form. Check work above please | | | | | | | | | |
Question | Answer | 48 | Find subnet mask by counting Bits matching from left to right: ____. This is
your subnet mask for the summary route. | 22 or 255.255.252.0 | 49 | Find summary address by
putting 0s (zeros) in remaining address positions after the left to right matching ends (For example if
the first 21 bits match from the left, put 0s (zeros) in the remaining 11 positions of the 32 bit address
to find address for the summary). | 11000000.10101000.00010100.00000000 | 50 | Summary Route
(Address and subnet mask found above combined) for routing table | 192.168.0.0 and 255.255.252.0
... Get more on HelpWriting.net ...
Centos 7 Essay
Task 3
Short Description of Task
Editing network settings on an existing CentOS 7 Linux system.
Long Description of Task
Using the existing CentOS 7 Linux system with a network connection created and set, edit the
settings for the NIC by using nmtui and nmcli commands as well as /etc/sysconfig/network–scripts/
directory. The both commands are used for network configuration, but nmtui has a GUI mode and it
is easier to use. On the other hand, nmcli has more advanced options. The directory
/etc/sysconfig/network–scripts/ keeps all network interface files that start with the name ifcfg– and
can be used to edit network settings.
Pre–Implementation Test Plan
Ensure that the user is the root user or can use root privileges for commands.
... Show more content on Helpwriting.net ...
By using keyboard keys, choose Edit a Connection. Select the name of the network connection and
on the right pane select Edit button.
To change the profile name, delete the existing name and type a new one.
Select IP configuration Automatic for DHCP or Manual for static IP address.
For static IP address, type IP addresses with format (–– removed HTML ––) /CIDR (Figure 3).
Type Default Getaway address.
Type DNS servers IP addresses.
Select (–– removed HTML ––) , if the configuration requires several IP addresses.
Choose Automatically connect for IPv6 configurations.
Select OK to save the network configurations.
Select Back to go back Network Manager TUI.
Select OK or Quit to go back to the terminal.
Edit network settings by using etc/sysconfig/network–scripts/ directory:
In the terminal, open etc/sysconfig/network–scripts/ directory by using command cd
etc/sysconfig/network–scripts
List the files of the directory with the command ll. For more precise search, use pipes and grep
filter: ll | grep "ifcfg".
Open the network configuration file with editor with root privileges sudo vi ifcfg– (–– removed
HTML ––) (Figure 4).
For DHCP find the lines BOOTPROTO=none and ONBOOT=no and change them to
BOOTPROTO=dhcp ONBOOT=yes and restart the network by using command with root privileges
systemctl restart network.
... Get more on HelpWriting.net ...
Week 4 B IP Subnetting Lab Essay
Introduction
Assignment
Develop a subnetting plan and implement it in the lab. Configure RIP as a routing protocol.
Conditions
NYEDGE1 is the hub router. The two remote office routers NYEDGE2 and NYWAN1 connect to
NYEDGE1 through serial connections. Each router has a locally attached Ethernet network.
The serial line data rates and DTE/DCE settings have already been configured on all three routers.
You only need to assign the IP address to the interfaces.
Notes
The routers are connected directly to each other in this lab and do not actually connect through any
leased line services.
Diagram
Gi0/0
Ethernet
NYWAN1
Serial0/1/0
Serial0/0/1
DCE
NYEDGE1
Serial0/0/0
Serial0/0/0
DCE
Gi0/0
Ethernet
Task Index


Task 1 – Create a subnet ... Show more content on Helpwriting.net ...
You are not encouraged to use this subnetwork because it specifies the wire address.
Nor should you use the last subnet, 192.50.6.224, because it is considered the major network
broadcast address. Therefore you can only use subnets 32, 64, 96, 128, 160 and 192. With this
design requirement, you only need to use five of the six usable subnetworks, leaving one for any
additional segments in the future. Likewise, for each subnet, you cannot use the first and last
address. For example, subnet 192.50.1.32 extends all the way to 192.50.1.63. But you cannot use
these two IP addresses (.32 and .63) because they are the wire and the broadcast addresses for this
subnetwork. But you can use any of the 30 IP addresses in between.
Task 3 – Configure the interfaces in each router Step 1: Configure Gi0/0, s0/0/0, and S0/0/1 for
NYEDGE1.
Action:
ip address <ip address> < subnet mask>
Result:
NYEDGE1>enable
NYEDGE1#config t
Enter configuration commands, one per line.
End with CNTL/Z.
NYEDGE1(config)#int g0/0
NYEDGE1(config–if)#ip address 192.50.6.33 255.255.255.224
NYEDGE1(config–if)#no shut
NYEDGE1(config–if)#
NYEDGE1(config–if)#int s0/0/0
NYEDGE1(config–if)#ip address 192.50.6.65 255.255.255.224
NYEDGE1(config–if)#no shut
NYEDGE1(config–if)#
NYEDGE1(config–if)#int s0/0/1
NYEDGE1(config–if)#ip address 192.50.6.129 255.255.255.224
NYEDGE1(config–if)#no shut
NYEDGE1(config–if)#
NYEDGE1(config–if)#end
Explanation:
Subnet 192.50.6.32 is assigned to g0/0. Subnet 192.50.6.128 is
... Get more on HelpWriting.net ...

More Related Content

Similar to Activity 5

Whole c++ lectures ITM1 Th
Whole c++ lectures ITM1 ThWhole c++ lectures ITM1 Th
Whole c++ lectures ITM1 ThAram Mohammed
 
Linux Assignment 3
Linux Assignment 3Linux Assignment 3
Linux Assignment 3Diane Allen
 
embeddedc-lecture1-160404055102.pptx
embeddedc-lecture1-160404055102.pptxembeddedc-lecture1-160404055102.pptx
embeddedc-lecture1-160404055102.pptxsangeetaSS
 
ExampleIT-600Journal Entry 1Every operating system, whethe.docx
ExampleIT-600Journal Entry 1Every operating system, whethe.docxExampleIT-600Journal Entry 1Every operating system, whethe.docx
ExampleIT-600Journal Entry 1Every operating system, whethe.docxSANSKAR20
 
C++ advanced PPT.pdf
C++ advanced PPT.pdfC++ advanced PPT.pdf
C++ advanced PPT.pdfDinashMaliya3
 
មេរៀនៈ Data Structure and Algorithm in C/C++
មេរៀនៈ Data Structure and Algorithm in C/C++មេរៀនៈ Data Structure and Algorithm in C/C++
មេរៀនៈ Data Structure and Algorithm in C/C++Ngeam Soly
 
MSMDC_CLI363
MSMDC_CLI363MSMDC_CLI363
MSMDC_CLI363mokacao
 
Possibility of arbitrary code execution by Step-Oriented Programming by Hiroa...
Possibility of arbitrary code execution by Step-Oriented Programming by Hiroa...Possibility of arbitrary code execution by Step-Oriented Programming by Hiroa...
Possibility of arbitrary code execution by Step-Oriented Programming by Hiroa...CODE BLUE
 
Possibility of arbitrary code execution by Step-Oriented Programming
Possibility of arbitrary code execution by Step-Oriented ProgrammingPossibility of arbitrary code execution by Step-Oriented Programming
Possibility of arbitrary code execution by Step-Oriented Programmingkozossakai
 
Lecture01
Lecture01Lecture01
Lecture01Xafran
 
Dotnetintroduce 100324201546-phpapp02
Dotnetintroduce 100324201546-phpapp02Dotnetintroduce 100324201546-phpapp02
Dotnetintroduce 100324201546-phpapp02Wei Sun
 

Similar to Activity 5 (13)

Whole c++ lectures ITM1 Th
Whole c++ lectures ITM1 ThWhole c++ lectures ITM1 Th
Whole c++ lectures ITM1 Th
 
Linux Assignment 3
Linux Assignment 3Linux Assignment 3
Linux Assignment 3
 
embeddedc-lecture1-160404055102.pptx
embeddedc-lecture1-160404055102.pptxembeddedc-lecture1-160404055102.pptx
embeddedc-lecture1-160404055102.pptx
 
ArduinoWorkshop2.pdf
ArduinoWorkshop2.pdfArduinoWorkshop2.pdf
ArduinoWorkshop2.pdf
 
Lab 1 Essay
Lab 1 EssayLab 1 Essay
Lab 1 Essay
 
ExampleIT-600Journal Entry 1Every operating system, whethe.docx
ExampleIT-600Journal Entry 1Every operating system, whethe.docxExampleIT-600Journal Entry 1Every operating system, whethe.docx
ExampleIT-600Journal Entry 1Every operating system, whethe.docx
 
C++ advanced PPT.pdf
C++ advanced PPT.pdfC++ advanced PPT.pdf
C++ advanced PPT.pdf
 
មេរៀនៈ Data Structure and Algorithm in C/C++
មេរៀនៈ Data Structure and Algorithm in C/C++មេរៀនៈ Data Structure and Algorithm in C/C++
មេរៀនៈ Data Structure and Algorithm in C/C++
 
MSMDC_CLI363
MSMDC_CLI363MSMDC_CLI363
MSMDC_CLI363
 
Possibility of arbitrary code execution by Step-Oriented Programming by Hiroa...
Possibility of arbitrary code execution by Step-Oriented Programming by Hiroa...Possibility of arbitrary code execution by Step-Oriented Programming by Hiroa...
Possibility of arbitrary code execution by Step-Oriented Programming by Hiroa...
 
Possibility of arbitrary code execution by Step-Oriented Programming
Possibility of arbitrary code execution by Step-Oriented ProgrammingPossibility of arbitrary code execution by Step-Oriented Programming
Possibility of arbitrary code execution by Step-Oriented Programming
 
Lecture01
Lecture01Lecture01
Lecture01
 
Dotnetintroduce 100324201546-phpapp02
Dotnetintroduce 100324201546-phpapp02Dotnetintroduce 100324201546-phpapp02
Dotnetintroduce 100324201546-phpapp02
 

More from Heidi Owens

Zaner Bloser 12In Ruled Sulphite Paper Gr 3 H
Zaner Bloser 12In Ruled Sulphite Paper Gr 3  HZaner Bloser 12In Ruled Sulphite Paper Gr 3  H
Zaner Bloser 12In Ruled Sulphite Paper Gr 3 HHeidi Owens
 
Essay On Science And Technology For Students
Essay On Science And Technology For StudentsEssay On Science And Technology For Students
Essay On Science And Technology For StudentsHeidi Owens
 
Top College Admission Essays. Top College Admi
Top College Admission Essays. Top College AdmiTop College Admission Essays. Top College Admi
Top College Admission Essays. Top College AdmiHeidi Owens
 
Rhetorical Analysis Thesis Statement Rhetorical Anal
Rhetorical Analysis Thesis Statement  Rhetorical AnalRhetorical Analysis Thesis Statement  Rhetorical Anal
Rhetorical Analysis Thesis Statement Rhetorical AnalHeidi Owens
 
Types Of Persuasive Essa. Online assignment writing service.
Types Of Persuasive Essa. Online assignment writing service.Types Of Persuasive Essa. Online assignment writing service.
Types Of Persuasive Essa. Online assignment writing service.Heidi Owens
 
Free Printable Lined Writing Paper Template - Printabl
Free Printable Lined Writing Paper Template - PrintablFree Printable Lined Writing Paper Template - Printabl
Free Printable Lined Writing Paper Template - PrintablHeidi Owens
 
Reflective Essay The Importance Of Reflective Wri
Reflective Essay The Importance Of Reflective WriReflective Essay The Importance Of Reflective Wri
Reflective Essay The Importance Of Reflective WriHeidi Owens
 
Professional Narrative Essay Examples Sitedoct.Org
Professional Narrative Essay Examples  Sitedoct.OrgProfessional Narrative Essay Examples  Sitedoct.Org
Professional Narrative Essay Examples Sitedoct.OrgHeidi Owens
 
Looking For Veterans Day Activities And Crafts For First
Looking For Veterans Day Activities And Crafts For FirstLooking For Veterans Day Activities And Crafts For First
Looking For Veterans Day Activities And Crafts For FirstHeidi Owens
 
LaTeX Templates Journal Article Essay Writing Exa
LaTeX Templates  Journal Article  Essay Writing ExaLaTeX Templates  Journal Article  Essay Writing Exa
LaTeX Templates Journal Article Essay Writing ExaHeidi Owens
 
Analysis Essay Character Analysis - NamS EPortfolio
Analysis Essay Character Analysis - NamS EPortfolioAnalysis Essay Character Analysis - NamS EPortfolio
Analysis Essay Character Analysis - NamS EPortfolioHeidi Owens
 
Essay Introduction Paragraph. Purdue OWL. 2
Essay Introduction Paragraph. Purdue OWL. 2Essay Introduction Paragraph. Purdue OWL. 2
Essay Introduction Paragraph. Purdue OWL. 2Heidi Owens
 
College Essay Requirements. Online assignment writing service.
College Essay Requirements. Online assignment writing service.College Essay Requirements. Online assignment writing service.
College Essay Requirements. Online assignment writing service.Heidi Owens
 
Franklin Montessori SchoolS Science Fair Display Boar
Franklin Montessori SchoolS Science Fair Display BoarFranklin Montessori SchoolS Science Fair Display Boar
Franklin Montessori SchoolS Science Fair Display BoarHeidi Owens
 
Image Result For Music Writing Sheets For Violin Blank Sh
Image Result For Music Writing Sheets For Violin  Blank ShImage Result For Music Writing Sheets For Violin  Blank Sh
Image Result For Music Writing Sheets For Violin Blank ShHeidi Owens
 
Essays For School - Sample College Admission Essays
Essays For School - Sample College Admission EssaysEssays For School - Sample College Admission Essays
Essays For School - Sample College Admission EssaysHeidi Owens
 
Interesting Ways To Start An Essay. Interesting Ways To Start An ...
Interesting Ways To Start An Essay. Interesting Ways To Start An ...Interesting Ways To Start An Essay. Interesting Ways To Start An ...
Interesting Ways To Start An Essay. Interesting Ways To Start An ...Heidi Owens
 
6 Best Free Printable Kindergarten Paper - Printa
6 Best Free Printable Kindergarten Paper - Printa6 Best Free Printable Kindergarten Paper - Printa
6 Best Free Printable Kindergarten Paper - PrintaHeidi Owens
 
Steps To Writing A Good Research Paper. Online assignment writing service.
Steps To Writing A Good Research Paper. Online assignment writing service.Steps To Writing A Good Research Paper. Online assignment writing service.
Steps To Writing A Good Research Paper. Online assignment writing service.Heidi Owens
 
Story Writing Paper. Online assignment writing service.
Story Writing Paper. Online assignment writing service.Story Writing Paper. Online assignment writing service.
Story Writing Paper. Online assignment writing service.Heidi Owens
 

More from Heidi Owens (20)

Zaner Bloser 12In Ruled Sulphite Paper Gr 3 H
Zaner Bloser 12In Ruled Sulphite Paper Gr 3  HZaner Bloser 12In Ruled Sulphite Paper Gr 3  H
Zaner Bloser 12In Ruled Sulphite Paper Gr 3 H
 
Essay On Science And Technology For Students
Essay On Science And Technology For StudentsEssay On Science And Technology For Students
Essay On Science And Technology For Students
 
Top College Admission Essays. Top College Admi
Top College Admission Essays. Top College AdmiTop College Admission Essays. Top College Admi
Top College Admission Essays. Top College Admi
 
Rhetorical Analysis Thesis Statement Rhetorical Anal
Rhetorical Analysis Thesis Statement  Rhetorical AnalRhetorical Analysis Thesis Statement  Rhetorical Anal
Rhetorical Analysis Thesis Statement Rhetorical Anal
 
Types Of Persuasive Essa. Online assignment writing service.
Types Of Persuasive Essa. Online assignment writing service.Types Of Persuasive Essa. Online assignment writing service.
Types Of Persuasive Essa. Online assignment writing service.
 
Free Printable Lined Writing Paper Template - Printabl
Free Printable Lined Writing Paper Template - PrintablFree Printable Lined Writing Paper Template - Printabl
Free Printable Lined Writing Paper Template - Printabl
 
Reflective Essay The Importance Of Reflective Wri
Reflective Essay The Importance Of Reflective WriReflective Essay The Importance Of Reflective Wri
Reflective Essay The Importance Of Reflective Wri
 
Professional Narrative Essay Examples Sitedoct.Org
Professional Narrative Essay Examples  Sitedoct.OrgProfessional Narrative Essay Examples  Sitedoct.Org
Professional Narrative Essay Examples Sitedoct.Org
 
Looking For Veterans Day Activities And Crafts For First
Looking For Veterans Day Activities And Crafts For FirstLooking For Veterans Day Activities And Crafts For First
Looking For Veterans Day Activities And Crafts For First
 
LaTeX Templates Journal Article Essay Writing Exa
LaTeX Templates  Journal Article  Essay Writing ExaLaTeX Templates  Journal Article  Essay Writing Exa
LaTeX Templates Journal Article Essay Writing Exa
 
Analysis Essay Character Analysis - NamS EPortfolio
Analysis Essay Character Analysis - NamS EPortfolioAnalysis Essay Character Analysis - NamS EPortfolio
Analysis Essay Character Analysis - NamS EPortfolio
 
Essay Introduction Paragraph. Purdue OWL. 2
Essay Introduction Paragraph. Purdue OWL. 2Essay Introduction Paragraph. Purdue OWL. 2
Essay Introduction Paragraph. Purdue OWL. 2
 
College Essay Requirements. Online assignment writing service.
College Essay Requirements. Online assignment writing service.College Essay Requirements. Online assignment writing service.
College Essay Requirements. Online assignment writing service.
 
Franklin Montessori SchoolS Science Fair Display Boar
Franklin Montessori SchoolS Science Fair Display BoarFranklin Montessori SchoolS Science Fair Display Boar
Franklin Montessori SchoolS Science Fair Display Boar
 
Image Result For Music Writing Sheets For Violin Blank Sh
Image Result For Music Writing Sheets For Violin  Blank ShImage Result For Music Writing Sheets For Violin  Blank Sh
Image Result For Music Writing Sheets For Violin Blank Sh
 
Essays For School - Sample College Admission Essays
Essays For School - Sample College Admission EssaysEssays For School - Sample College Admission Essays
Essays For School - Sample College Admission Essays
 
Interesting Ways To Start An Essay. Interesting Ways To Start An ...
Interesting Ways To Start An Essay. Interesting Ways To Start An ...Interesting Ways To Start An Essay. Interesting Ways To Start An ...
Interesting Ways To Start An Essay. Interesting Ways To Start An ...
 
6 Best Free Printable Kindergarten Paper - Printa
6 Best Free Printable Kindergarten Paper - Printa6 Best Free Printable Kindergarten Paper - Printa
6 Best Free Printable Kindergarten Paper - Printa
 
Steps To Writing A Good Research Paper. Online assignment writing service.
Steps To Writing A Good Research Paper. Online assignment writing service.Steps To Writing A Good Research Paper. Online assignment writing service.
Steps To Writing A Good Research Paper. Online assignment writing service.
 
Story Writing Paper. Online assignment writing service.
Story Writing Paper. Online assignment writing service.Story Writing Paper. Online assignment writing service.
Story Writing Paper. Online assignment writing service.
 

Recently uploaded

Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........LeaCamillePacle
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationAadityaSharma884161
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayMakMakNepo
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 

Recently uploaded (20)

Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint Presentation
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up Friday
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 

Activity 5

  • 1. Activity 5 Activity 5.2.2.4 Documentation Table Problems Solutions The G0/1 physical interface is up but G0/1.10 is administratively down. Implement the no shutdown command to enable the G0/1.10 PC3 is configured with the wrong default gateway address. Change the default gateway on PC3 from 172.17.10.1 to 172.17.30.1 Subinterface VLAN assignments are switched on R1. Issue the no encapsulation dot1q command to remove the incorrect configuration. Then configure the subinterfaces with the correct encap dot1q command command. Reenter the correct IP address information. ======================================== Step 1: Calculate a summary route on R1 to reach LANs on R3. 172.22.1.128: ... Show more content on Helpwriting.net ... a. Can PC1 ping PC4? No b. Can PC2 ping PC5? No c. Can PC3 ping PC6? No Step 2: Document the problem and the solutions. List the problems and the solutions that will allow these PCs to ping each other. Keep in mind that there could be more than one problem or more than one solution. PC1 to PC4 a. Explain the connectivity issues between PC1 and PC4. Answer: PC1 is on VLAN 30 instead of VLAN 10. The G1/1 port on S1 is configured as an access port. b. Record the necessary actions to correct the issues. Answer: Issue the switchport access vlan 10 command on F0/11 interface on S2. Issue the switchport mode trunk command on G1/1 interfaces for S1 and ... Get more on HelpWriting.net ...
  • 2.
  • 3. Unit 2 TASK 1 Decoding the Jargon TASK 1: Decoding the Jargon a. Create a booklet which explain the function of hardware components and identify communication between components. The pages should include photographs and diagrams to illustrate the information you include. (P1) Components communication The following diagram shows how components communicate each other's. CPU Also known as the processor, the CPU is the heart of the computer and has two part: Control Unit The control unit controls the flow of data through the processor. Arithmetic/Logic unit (ALU) The ALU performs mathematical, logical, and decision operations in a computer and is the final processing performed by the processor. RAM A computer can only run a program when it is in memory ... Show more content on Helpwriting.net ... DOS is the basic system that people have to using Command line prompt to communicate with computer via simple interface which is not "friendly" user interface. The DOS can't run multitask on computer which can only load one program until it finished. But some of the features still quite useful that people still use it. Such as: 5. CHKDSK 6. GBUPDATE 7. IPCONFIG 8. PING 9. FDISK Comparison of two operating systems We can see there are many different between those two computer operating system which the Windows 8 operating system have a lots of advance features and higher performance that suit to nowadays. The DOS system usually used to be run a specific program which prevents any virus or hacker attack in the solo computer such as sale program, data base in the hospital or council data base. Features
  • 4. Windows 8 DOS Network Yes N/A GUI Yes N/A Multiuser Yes N/A Server Administration Yes N/A Command line interface Yes Yes Entertain Yes N/A Sound Yes Yes Multitask Yes N/A c. In your document explain the purpose of different software utilities which is available. Explain how software utilities can improve the performance of computer systems (P3, D1) Windows 8 Utility Virus Protection The specific program used to prevent viruses, worms and Trojans which attached in the email or website. Every computer need to install an anti–virus software and ... Get more on HelpWriting.net ...
  • 5.
  • 6. Program that creates a shell and executes some shell commands /* myshell.c Description: Program that creates a shell and executes some shell commands */ #include <stdio.h> #include <unistd.h> #include <sys/types.h> #include <errno.h> #include <string.h> #include <stdlib.h> #include <sys/wait.h> extern char **getln(); // Function used to check the file input direction command int inputFile(char **args, char **fileIn) { int i,j; //go thorough the command line arguments for(i=0;args[i] != NULL;i++) { // check for the input direction symbol if(args[i][0] == '<') { // save the filename command if(args[i+1] != NULL) { *fileIn = args[i+1]; } /*for(j=i;args[j–1] != NULL;j++) { args[j] = args[j+2]; }*/ ... Show more content on Helpwriting.net ... = 'x')) { convert = strtol(args[i],NULL,16); printf("The number is %ld n", convert); sum = sum + convert; } // check if it is a valid integer or not num = atoi(args[i]); if (num == 0) { //printf("Number is: %i n", num); } else { sum = sum + num; } } } // check to see if there is arg or args command, if there is then print // number of arguments and list them on the screen if((strcmp(args[0],"arg") == 0) || strcmp(args[0],"args") == 0) { for(j=1;args[j] != NULL;j++) { count++; } printf("Output: argc = %d, ", count); printf("args = "); for(j=1;args[j] != NULL;j++) { printf("%s, ", args[j]); } printf("n"); } // check the error messages for the addition command and print the total sum if(strcmp(args[0],"add") == 0) { if(sum == 0 && num ==0) { printf("Invalid integer/ String Error
  • 7. n"); } else { printf("Output: "); for(k=1;args[k] != NULL;k++) { printf("%s + ", args[k]); } printf("= %d n", sum); } } // check if there is a multilplication command, if there is then multiply all the // valid arguments and print the product // Accepted inputs: Only ints, Invalid Inputs: 0,Strings // Details and cases are explained in readme file int zeroCheck=0; if(strcmp(args[0],"mul") == 0) { int product=1; for(counter=1;args[counter] != NULL;counter++) { ... Get more on HelpWriting.net ...
  • 8.
  • 9. Unix Based Operating Systems System UNIX–based operating systems are very popular, and they are being used everywhere from computer science research labs and universities to technology firms like Google, Facebook, and IBM. There are many different types UNIX–based operating systems, some of them being Mac OS, Ubuntu (Figure 1) and Solaris. When it comes to programming, many computer scientists, including myself, prefer UNIX–based operating systems over Windows operating system, because it is the main operating system for many technology companies (2) and easy to use. Linux, a UNIX based operating system, is the operating system used Google, Amazon and NASA. North Carolina State University has a great computer science program that is made to prepare students for the workforce ... Show more content on Helpwriting.net ... Windows operating system is different from Mac OS or Ubuntu or any other operating system, and it takes a considerable amount of time for an individual to get used to a different operating system. According to stackoverflow [3], an online community for programmers, 26% of programmers use Mac OS as their operating system, and 21.7% use Linux as their operating system. Companies want to hire computer scientists familiar with the technology stack of the company, and having experience in the company's operating system is a very valuable skill. Also, using a UNIX based operating system build a certain set of skill sets, such as experience in using a UNIX terminal, that companies consider a must have skill for computer scientists. By having Windows as the operating system for computer science labs, NCUS is not providing the opportunity for students to experience using a different operating system, that might be operating system they use after graduation. Unfamiliarly with the work computer's operating system, not knowing how to perform simple tasks fast enough could have a significant effect on the programmer's work and the overall productivity of the company. Therefore, addressing this issue will make the transition between university and working at a technology firm smoother, and help students build a skill set that will be useful in the future. Background Many companies are switching from Windows to UNIX based systems, especially Linux ... Get more on HelpWriting.net ...
  • 10.
  • 11. It250 Linux Course Review and Hw Helper IT250 Linux Operating System S.No Question Points 1 What commands are used to create an ext2–second extended–filesystem? mke2fs or mkfs.ext2 2 Which of the following types of filesystems can the command e2fsck be used to check? A. ext2 B. ext3 C. jfs D. vfat 3 What command can be used to start a program with a lower scheduling priority? nice ____________ FINAL Which of the following Linux utilities lists the names of files in a single directory? ls Which component of X Window allows customization of the user interface? Window manager Which of the following control structures is a multiple–branch decision mechanism capable of more than three decisions? The Case structure What is the meaning of the DocumentRoot directive in the Apache ... Show more content on Helpwriting.net ... yum Which of the following symbols instructs the shell to redirect the output of a command to the specified file instead of the screen and overwrite the file? You would use the > symbol The special character that causes the shell to generate filenames that match any single character in the name of an existing file is _____. The question mark In vim, which of the following keystrokes is used to exit the editor and save the contents of the file being edited? ZZ Which of the following control structures is a multiple–branch decision mechanism capable of more than three decisions? The Case structure Which component of X Window allows customization of the user interface? Window manager Which of the following utilities is used to view a file one screen at a time? less What utility is used
  • 12. to search for a particular string within a file or a group of files? grep The utility that can be used to copy a file, including text and executable program (binary) files, is ___________. cp Which of the following partitions does Linux use when all the information that Linux is processing cannot be stored in RAM? Swap Which of the following keystrokes helps you undo the last change made in the vim editor? u What network utilities works only if a remote system trusts your local computer? rsh What represents the root partition in Linux? The forward slash / The C compiler that Linux commonly uses is _________. GNU gcc What ... Get more on HelpWriting.net ...
  • 13.
  • 14. Essay on Cmit 350 Final Project WAN Implementation with SOHO Skills Configuration Prepared for: University of Maryland University College Prepared by: Nathan Poole Table of Contents I. Springfield Site Device and STP Configurations II. Worchester Site Subnetting Configurations III. Boston Site Routing Protocol, Route Summarization and Topology Improvements IV. Sacramento Site VLAN, Routing on a Stick (ROS) and DHCP Implementation V. Los Angeles Site Management Technologies VI. xACME WAN – WAN Implementation and Secure Communications VII. Bibliography WAN Implementation with SOHO Skills Configuration I. Springfield Site Device and STP Configurations Problem Statement: The device hostnames on each switch are generic and ... Show more content on Helpwriting.net ... End with CNTL/Z SpringfieldSwitch1(config)#Banner motd #Make sure you get an A on this paper!# SpringfieldSwitch1(config)#exit LOGIN Banner (Displayed after the MOTD banner before the login prompt.) SpringfieldSwitch1(config)#Banner login # Enter TEXT message. End with the character '#'. *** Login Required. Unauthorized use is prohibited ***# Problem Statement: Implement device passwords on both console port and VTY. All passwords should be encrypted. Console Port Password SpringfieldSwitch1#config t Enter configuration commands, one per line. End with CNTL/Z. SpringfieldSwitch1(config)#enable secret 1qazZAQ! VTY Password SpringfieldSwitch1#config t Enter configuration commands, one per line. End with CNTL/Z. SpringfieldSwitch1(config)#line vty 0 15 SpringfieldSwitch1(config–line)#password TELNET1234 SpringfieldSwitch1(config–line)#end SpringfieldSwitch1#service password–encryption Problem Statement: Create Server VLANs, Faculty VLANs, Instructional VLANs and Administrative VLANs on all switches. SpringfieldSwitch1&gt;en Password: SpringfieldSwitch1#config t Enter configuration commands, one per line. End with CNTL/Z. SpringfieldSwitch1(config)#vlan 11 SpringfieldSwitch1(config–vlan)#name faculty SpringfieldSwitch1(config–vlan)#vlan 12 SpringfieldSwitch1(config–vlan)#name server SpringfieldSwitch1(config–vlan)#vlan 14 SpringfieldSwitch1(config–vlan)#name ... Get more on HelpWriting.net ...
  • 15.
  • 16. Lab Network+ Lesson 2 Lab Worksheet Lab Exercises Lab 1 How TCP/IP Protocols Work through the TCP/IP Model The purpose of this lab is to familiarize the students with the TCP/IP Model and some of the protocols that are used in it. This lab is important to the student because it takes the student through a thought experiment about how data would pass thorough the TCP/IP Model down from the computer and up through the destination computer. By doing this thought experiment the student will come to better understand how different protocols work together to accomplish a specific task. Materials Word processing document Textbook Do the Lab Follow ... Show more content on Helpwriting.net ... Take Note This lab uses Windows 7. If you are using Windows 8, Vista or Windows XP, you will need to make some slight variations to the lab. Materials word processing document Computer running Windows 7 Professional Do the Lab The IPCONFIG Command 1. Click the Start button at the bottom left of your Windows 7 Desktop Display in order to bring up the Windows 7 start menu (Figure 2–12). [pic] 2. Type CMD into the Search Programs and Files box at the bottom of the Start Menu and press Enter. 3. The Command Line Interface (CLI) Window will come up (as shown in Figure 2–13). The CLI is a window where you can enter commands into the computer in the form of text. This type of interface was how a person interacted with DOS. It is also how a person is able to currently interact with Linux if they choose not to use one of several graphical interfaces available for use with Linux. [pic] 4. Once you have opened the Command Line Interface (CLI), type in the command ipconfig. When the ipconfig command is entered, the CLI changes to something similar to Figure 2–14. You should note that the ... Get more on HelpWriting.net ...
  • 17.
  • 18. Cisco Activity Task 3: Interpreting Debug Output. Note: If you already configured IP addressing on R1, please remove all the interface commands now before proceeding. Furthermore, R2 and R3 should be configured through the end of "Task 2: Basic Router Configuration". Step 1 – On R1 from privileged EXEC mode, enter the debug ip routing command. R1# debug ip routing. IP routing debugging is on. The debug ip routing command will show when routes are added, modified and deleted from the routing table. For example, every time you successfully configure and activate an interface, Cisco IOS adds a route to the routing table. We can verify this by observing output from the debug ip routing command. Step 2 – Enter interface configuration mode for R1's LAN ... Show more content on Helpwriting.net ... End with CNTL/Z. R1(config)# interface serial 0/0/0 Configure the ip address as specified in the Topology Diagram. R1(config–if)# ip address 172.16.2.1 255.255.255.0 is_up: 0 state: 0 sub state: 1 line: 0 has_route: False As soon as you press the enter key, Cisco IOS debug output informs you that there is now a route, but its state is "False". Since R1 is the DCE side of our lab environment, we must specify how fast bits will be clocked between R1 and R2. Step 6 Enter the clock rate command on R1. You can specify any valid clocking speed. Use the ? to find the valid rates. Here, we used 64000 bps. R1(config–if)# clock rate 64000 Step 7 Enter the command necessary to insure the interface is fully configured. R1(config–if)# no shutdown After you enter the correct command, you should see debug output similar to the following: is_up: 0 state: 0 sub state: 1 line: 0 has_route: False %LINK–3–UPDOWN: Interface Serial0/0/0, changed state to down
  • 19. Unlike the LAN interface, fully configuring the WAN interface is not always enough to have the route entered in the routing table even if your cable connections are correct. The other side of the WAN link must also be configured. /u&gt; Step 8 If possible, establish a separate terminal session with R2. Click on R2 This will allow you to observe the debug output on R2 when you make changes on R1. You can also turn on debug ip routing on R2. R2#debug ip routing IP routing debugging is on Enter ... Get more on HelpWriting.net ...
  • 20.
  • 21. Course Materials Lab 5.1 Connect the Internetwork Lab Review Questions 1. For what purpose is a transceiver used? A transceiver can be used for converting one type of Ethernet connector to another or by converting one type of I/O port to an Ethernet port. 2. This lab connects routers directly to each other via serial cables. Is this a typical configuration? No, By default, Cisco routers are DTE (Data Terminal Equipment)/ DCE (Data Circuit–Terminating Equipment) If not, to what equipment does the DCE end of the serial cable usually connect? If Router A is connected to the DTE end of the cable, Router B must be connected to the DCE end 3. What does a rollover (console) cable look like? Rollover cable is often used to connect a computer terminal to a ... Show more content on Helpwriting.net ... Refer to Figure 5–2. What will the host name of your router be? lab–a 2. Which interfaces is your router using? F0/0, F0/1, and S0/3/0 3. What are the IP addresses and subnet masks for those interfaces? 192.5.5.1 and 255.255.255.0, 205.7.5.1 and 255.255.255.0, 201.100.11.1 and 255.255.255.0 4. What is the enable secret password? class 5. What is the enable password? cisco 6. What is the VTY password? cisco 15. There is another way to access the initial configuration dialog other than being prompted for it automatically as a consequence of having erased the contents of NVRAM. You can use the setup command at the privileged EXEC mode prompt. Press Enter if necessary to reach the user EXEC mode prompt. What does this prompt look like? Greater than symbol (>) 16. Type enable and press Enter to access privileged EXEC mode, which is also known as enable mode. You should be prompted for the enable secret password you configured in the system configuration dialog. How do you know you are being prompted for the enable secret password and not the enable password? Because the secret password was set during the initial setup process 17. Type class and press Enter. How did the prompt change? lab–a> to lab–a# Review Questions 1. When configuring a router, when would you choose basic management setup rather than extended setup? You would use basic management setup when you only need to configure ... Get more on HelpWriting.net ...
  • 22.
  • 23. Disadvantages Of 2 User Interface 2 User Interface User Interface is a function of the operating system that allows individuals to access and command the computer. It is the junction between a user and a computer program. Task of the users are changing rapidly and even functionality of computer becomes more complex according to it user must adjust their behavior and problem solving strategies to the system. This situation becomes worst as user do not have that proper experience and knowledge [5], [6]. A well designed interface can provide much more helpful information in a more appropriate manner through interaction specially for those user who have lack of knowledge. Therefore user interface is must so that it can give bene t to both user and resource management. An interface is a set of commands or ... Show more content on Helpwriting.net ... Menu Driven Interface (MDI) This type of interface lets you interact with a computer or device through a series of screens or menus. Menu is presented, make a choice and then the next menu appears on the screen.Then make another choice and so on. Example: Cash point machines (ATMs) and iPod or mobile phone, they both use a menu driven interface [7]. ˆ Advantages of MDI { There are no commands to learn or remember. { Each and every step are given so that the user doesn't have to re– member anything. { Even if don't know what to do, can usually guess way around the options. { Menu interfaces don't have to be visual, they can be spoken – good for telephones or for visually impaired people. { They don't need huge amounts of processing power or memory. ˆ Disadvantages of MDI { A poorly designed menu interface may be slow to use. { It can be irritating if there are too many menu screens to work through. { If often can't go to the exact place then want right at the start. Then have to work own way through the menu screens even if know where then want to get to. Dept. of Computer Engg. 5 DYPCOE, Akurdi, Pune Operating System Design User Interface to Operating ... Get more on HelpWriting.net ...
  • 24.
  • 25. Ccna 1. Refer to the exhibit. What three statements are true about the IP configuration that is shown? (Choose three.) The address that is assigned to the computer represents private addressing. The computer is unable to communicate outside of the local network. The network of this computer can have 126 hosts. The prefix of the computer address is /27. The IP address that is assigned to the computer is routable on the Internet. The IP address that is assigned to the computer is a broadcast address. 2. As network administrator, what is the subnet mask that allows 510 hosts given the IP address 172.30.0.0? 255.255.0.0 255.255.248.0 255.255.252.0 255.255.254.0 255.255.255.0 255.255.255.128 3. Which OSI layers ... Show more content on Helpwriting.net ... Refer to the exhibit. Assume all devices are using default configurations. How many subnets are required to address the topology that is shown? 1 3 4 5 7 13. Refer to the exhibit. Which two statements describe the information that is represented in the header? (Choose two) This is a server response. The UDP protocol is being used. The destination port indicates a Telnet session. The return segment will contain a source port of 23. The next session originated from the client of this session will use the source port number 13358. 14. Refer to the exhibit. The command that is shown was issued on a PC. What does the IP address 192.168.33.2 represent? IP address of the host default gateway of the host IP address of the homepage for the host primary domain name server for the host IP address of the website resolver1.mooki.local 15. Refer to the exhibit. A router, whose table is
  • 26. shown, receives a packet that is destined for 192.168.1.4. How will router treat the packet? The packet will be dropped. The packet will be forwarded via FastEthernet 0/0. The packet will be forwarded to the destination host. The packet will be forwarded to the 192.168.1.3 next–hop ... Get more on HelpWriting.net ...
  • 27.
  • 28. A Brief Look at Scilab Scilab with dynamically typed objects it is a interpreted language . Scilab runs is available in binary format, for the platforms: Unix/Linux workstations MacOSX. MacOSX and Windows, users can also be installed using Scilab. Compilation of source code is also possible in Scilab. Scilab was named Basil, developed at INRIA as part of the Meta2project. It was developed in the name of Scilab by the Scilab group, which comprised of a team of INRIA Metal au and ENPC. Since 2004, Scilab development was been coordinated by a consortium .Scilab is used as a scripting language to test algorithms and to perform computations numerical. Scilab is a programming language, and around 2000 Scilab coded functions are available in library . The Scilab syntax is very simple, and also which are the fundamental object of scientific calculus the uses the matrices, and it is provided with specific functions and operators. Matrices are of different types which includes real, complex, string, polynomial, and rational. Scilab programs are very quiet compact and they are smaller than their counterparts in C, C++, or Java. Scilab is mainly a combination of scientific computing, numerical libraries from such areas as numerical library such as linear algebra, optimization and numerical integration it is a easy access . It is also simple to expand Scilab environment in a computer. Using static or dynamic links, one can easily import new functionalities from external libraries into Scilab . New ... Get more on HelpWriting.net ...
  • 29.
  • 30. Color And Its Effect On The Human Eye Colour When designing GUIs you need to be conscious of the colours. Microsoft office uses grey as the main colour, blue for the title bar, highlighting, drop down lists and some text. Many uses feel grey is dull and boring colour to use, however if the colour bright red or black was used it would be uncomfortable eyes. Trichromatic System and luminance (Red, Green, Blue) Trichromatic system uses a combination of three colours that are the basis of 3D vision, which are red, blue and green. The human eye has a trichromatic system. The three colours of the trichromatic are detected by three different types of cells on the retina of the eye, these are known as receptors. There has been much work on developing the theory of this system into ... Show more content on Helpwriting.net ... Proximity is the way we view things which are close together as a group or look closer than they actually are. Continuity is taking more of an interest in a straight smooth lines rather than rigid and rapidly changing lines. Symmetry is when a shape or object is repeated on both sides to make it a mirror image. We see symmetrical shapes easily than unsymmetrical shapes. Similarity is objects and shapes placed together as they look similar, where as dissimilar objects are likely to be viewed individually. There are also laws that relate to common groupings. Fate is when we see objects that move together as a group. Region is when objects are enclosed together somehow as a group. And connected is when we see objects connected by continuous lines. Objects GUI is built using a number of separate objects. Each object is used in a clear order. So images are layered. It is important that images appear in order and overlay the first image, or else an interface may look as an incomplete object to the user. If images are positioned behind or in front of text, then the whole interface will not be able to be seen. Therefore GUI should appear in front of text on the desktop and not behind existing images on the desktop. Furthermore if the positioning of the objects has not been precisely arranged then the GUI or parts of the GUI may not appear behind the main screen. This leads to the user not being able to access the full range of commands. Another thing is the ... Get more on HelpWriting.net ...
  • 31.
  • 32. Guide to Unix Using Linux Fourth Edition Chapter 1 Review... Guide to UNIX Using Linux Fourth Edition Chapter 1 Solutions Answers to the Chapter 1 Review Questions 1. Your boss drops by your office in a hurry to ask you to attend a meeting at 10:30 on Friday morning and you can't find a pen to make a note as a reminder. What Linux command can you use to make a quick note to store in a file called Meeting? Answer: b. cat > Meeting 2. Before you make the note in Question 1, you decide to determine Friday's date, so that you can include it in your note. What Linux command can you use to quickly determine the Friday's date? Answer: a. cal 3. While you are typing a command, you misspell the name of a file you want to specify with the command. Which of the following ... Show more content on Helpwriting.net ... What key sequence can you use to repeat the last command, which was used to print the file? Answer: c. Press the up arrow key one time. 21. Your international company is scheduling a meeting among managers in Canada, the United States, Spain, Sweden, and Hong Kong on the basis of Greenwich Mean Time (GMT). What command enables you to display the current time in GMT? Answer: b. date –u 22. How would you describe the purpose of the more command? Answer: The more command enables you to view a file's contents by scrolling down. 23. What is the purpose of Telnet? Answer: Telnet can be used to connect a UNIX , Linux, or Windows PC to a remote computer. 24. You enter Cal on the command line to view a calendar but only see an error message. Explain why you got the error message. Answer: UNIX and Linux are case sensitive, so to display a calendar you must use the cal command and not Cal. 25. Explain how you can run more than one command on a single command line. Answer: To run more than one command on a single line, use the : (semicolon) character to separate each command. Hands–On Projects Tips and Solutions for Chapter 1
  • 33. Project 1–1 In this project, students use Telnet in Windows 2000/XP/Vista to access a remote computer running UNIX/Linux. Students will need accounts on both the Windows 2000/XP/Vista ... Get more on HelpWriting.net ...
  • 34.
  • 35. Analyzing The Multi User Operating System With Li And Ci... Q 2 Analyzing the multi user operating system with GUI and CLI GUI with it's capacity to show content utilizing distinctive textual styles and in addition to show realistic, gives a greater number of abilities than prohibitive character–based interface. In any case the character interface is truly essential and considered great from another perspective: it is more programmable and more capable than any GUI can ever be. Additionally we have to recognize that thought of GUI interface from most regular execution – mouse–based registration drop sort of interface that is frequently connected with this term. It is only one conceivable usage of GUI interface. Different usage are conceivable as will be talked about beneath. While noteworthy for ... Show more content on Helpwriting.net ... User can use the GNOME desktop, panel, applications, and tool set to customize working environment and manager system tasks. GNOME also provides an application set, including a word processor, a spreadsheet program, a database manager, a presentation tool, a Web browser, and an email program. Command Line Interface A command line interface (CLI) enables users to write commands in a console window so as to interact with an operating system. CLI FEW TASKS: Locate Managed objects in managed object topology Enable or Disable Modules. Acknowledge or delete Alarms. CLI COMMANDS CAN BE DIVIDED INTO TWO TYPES: a) BASIC COMMANDS: They are used to set parameter values, define command alias, check command status, login and logout of server. b) EXTENDED COMMANDS: These are commands that changes the topology of managed objects, their properties & their attributes. They are used to perform several Functions: A Few CLI COMMANDS USED IN SOLARIS: S.No. COMMAND DESCRIPTION 1. alias this allows the user view the current aliases 2. bdiff compares two large files 3. cd changes directories 4. date returns the date and time 5. ln creates a link between two files 6. pwd displays the name of the working directory 7. Rm removes files FreeBSD:
  • 36. It supports three GUI: GNOME GNOME is a user–friendly desktop environment which makes it convenient for applications to synchronize as environment includes panel for starting applications ... Get more on HelpWriting.net ...
  • 37.
  • 38. What Is An Operating System Essay Operating Systems What is an operating system The operating system is responsible for controlling all of the tasks and processes. Operating systems consists of a collection of programs, with each having a specific task allocated to it. These programs are designed to make the computer system run as efficiently as possible. The most commonly used operating systems are Mac OS, Windows and Linux. What Operating systems do · Allow users to interact with the machine (e.g. selecting programs). · Allocate space in memory for programs. · Run programs (transfer instructions for memory to processor then executing them). · Manage the storing of data. · Management of input/output devices. Difference Operating Systems Windows Windows is the most widely used Operating System in the world, It's initial introduction was in 1981 as a command–line interface; the GUI (graphical user interface) was introduced in 1985 and has seen 26 different versions. Mac OS In 1984 Apple released its first OS, which became known as "Mac OS" as of 1997. The original OS was a fork of Apples older OS "Lisa" which was, at the time, extremely advanced. Linux Linux began in 1991 as a personal project by Lines Torvalds, he set out to create a new, free Operating System. Since then it has grown from an OS containing a few C files to having over 18 million lines of source code and available under the GNU General Public License. The GNU license guarantees that ... Get more on HelpWriting.net ...
  • 39.
  • 40. LAB 2 Essay LAB Network Documentation 2 Introduction In this lab, you will learn how to use various tools and techniques to determine and document IP network design. You will use the Windows Command Prompt to generate network traffic; Wireshark to capture and analyze the generated traffic; PuTTY to remotely access the Cisco Switch; and finally, you will issue IOS commands on the Cisco Switch to understand its various interfaces and inner workings. Learning Objectives Upon completing this lab, you will be able to: Develop a plan for identifying and documenting the logical IP network design and IP addressing schema based on data collected from Lab #1 Use PuTTY to establish Telnet and SSH to the IP addresses of the identified ... Show more content on Helpwriting.net ... You will use this information to complete the deliverables for this lab. FIGURE 2.3 Windows Command Prompt window 7. Repeat step 6 for the following IP addresses to create a packet stream for Wireshark. 172.30.0.2 172.16.8.1 172.17.0.2 172.16.0.2 172.19.0.1 172.19.0.2 8. Minimize the Windows Command Prompt window. 9. Double–click the PuTTY icon on the desktop to start the PuTTY application.
  • 41. Note: The next steps use PuTTY, a terminal emulator program that you can use as a client to create a variety of secure connections to network resources. This lab uses it to create Telnet and SSH sessions. Hands–On Steps 21 10. In the PuTTY application window, type the IP address for LAN Switch 1, 172.16.8.5. Select the Telnet radio button and click the Open button to start the connection. FIGURE 2.4 PuTTY application window 2 a. Username: cisco b. Password: cisco FIGURE 2.5 PuTTY terminal console window Network Documentation 11. PuTTY will launch a terminal console window. At the login prompt, type the following: 22 LAB #2 | Network Documentation Note: The next steps involve using the Cisco IOS show command to obtain network documentation information from the interface you've connected to (LAN Switch 1). Cisco IOS is a package of routing, switching, and networking commands integrated with a Cisco–specific operating system, of which the show command ... Get more on HelpWriting.net ...
  • 42.
  • 43. Bt594 Final Project TM1: Installing and using Linux operating systems BIT594 – Technologies in Practice Due date: 31/03/2016 Bobbi–jo Ataahua Paikea – 4203318 Question 1: Installing Ubuntu Task 1: Download the latest version of Ubuntu Download the latest version of Ubuntu (the recommended flavour is 32–bit, as not all software will run on a 64–bit). Take a screenshot while downloading the latest version and include this in the electronic file you submit. You need to document the screenshot and describe accurately what the screenshot was about. Write no more than 50 words to explain the screenshot. Figure 1: Download of Ubuntu 14.04.4 LTS (Trusty Tahr). Screenshot description: Captured in the screenshot as seen in figure 1 is the download process of ... Show more content on Helpwriting.net ... Take three screenshots of relevant stages during the installation process. Write no more than 100 words for each screenshot to describe what was accomplished. Include the screenshots in the word– processed document you submit. Marks will be awarded for the relevance of the screenshots selected. It will be for you to decide and explain why the screenshots selected are relevant. Explanation for chosen screenshots: As question 2 is clearly focused on terminal/command line, below are three screenshots that have relevance to the command–line environment. Instead of using the GUI environment to install a new application on the Ubuntu desktop, the terminal/command line was used. Using the terminal/command line showcases a different route of installing a new application. The command–line environment also allows the processors to do more precise task procedures. Users are able to view a list of details and descriptions about applications before choosing one to install. Figure 1: Package names and short descriptions of the three ... Get more on HelpWriting.net ...
  • 44.
  • 45. Windows Vista and Server Essay Lab 2 Configuring Servers ––––––––––––––––––––––––––––––––––––––––––––––––– This lab contains the following exercises and activities: Exercise 2.1Exercise 2.2Exercise 2.3Lab Challenge | Completing Post–Installation Tasks Adding Roles and Features Converting the GUI Interface to Server Core Using the Server Core Interface | Exercise 2.1 | Completing Post–Installation Tasks | Overview | In this exercise, you complete the tasks necessary to set up a server on which Windows Server 2012 has just been installed. | Mindset ... Show more content on Helpwriting.net ... Migrate Roles and Features with Windows Server Manager | * Question3 | How would the installation of the roles and features selected in this exercise differ if the server was running Windows Server 2008 R2?You would NOT be using powershell to do it. So, the process would be a lot more lengthy. | Question 4 | How can you prove that the Web Server (IIS) role is installed on the server? You will see that it is checked off in roles and features And If you try to install it again with powershell it will tell you no changes need to be made if it's already installed. | Exercise 2.3 | Converting the GUI Interface to Server Core | Overview | Windows Server 2012, for the first time, enables you to convert a server installed using the full graphical user interface to one that uses Server Core. This enables administrators who are less familiar with the Windows PowerShell interface to install and configure a server using the familiar GUI tools, and then convert it to Server Core to minimize hardware resource utilization. | Mindset | What advantages does Server Core provide over the full Windows Server 2012 interface? | Completion time | 10 minutes | * 13. Take a screen shot of the Server Core interface by pressing Alt+Prt Scr and then paste it into your Lab 2 worksheet file in the page provided by pressing ... Get more on HelpWriting.net ...
  • 46.
  • 47. M11Cde Skills-Based Assessment School of Engineering & Computing Department of Computing Internet Information Security (M11CDE) Layered Security Student Name: BUSAABANG OBI SID:4560229 I certify that this is my own work yes/no and that I have read and understand the University Assessment regulations. Signature: [pic] Submission Details The details below indicate what you should submit, when you should submit it and where is should be submitted to. Submission Date and Method Deadline 11 January 2013 11:50pm online submission. Submission Format: 1. Fill the online quiz for the practical test which will be available one week before the final fixed deadline. 2. Download an electronic copy of this document and ... Show more content on Helpwriting.net ... If it is not immediately apparent subtract the last non–zero octet from 256. Edinburgh information The LAN for Edinburgh has been assigned an IP network address of 192.168.5.0 Again, each subnet of the above network needs to ... Get more on HelpWriting.net ...
  • 48.
  • 49. Computer Software : Operating System Software Computer Software Computer software is a program that enables a computer to perform a specific task. Computer is useless without a software. For example without internet browser you cannot search anything on the internet. You need system software such as word processer, which enables a user to perform a task, and system software such as an operating system, which enables software to run properly. Computer software has to be installed within the computer storage (such as hard drive, memory, or RAM). Once the software is installed, the computer is able to execute the software. Types of software's: Operating System Software: An operating system is a software that enable the computer hardware to communicate with the computer software. Without ... Show more content on Helpwriting.net ... It is a multitasking computer operating system. It was designed to be a small and flexible operating system. DOS–command line: Disk Operating System (DOS) was the first operating system used by IBM computers. It was originally available in two versions "PC–DOS" and "MS–DOS" Linux–command line: Linux is a software that enables application and the computer operator to access the devices on the computer to perform desired functions. Windows 95, NT, 98, ME, 2000, XP, Vista, and Windows 7: These are the computer operating systems designed by the Microsoft. Novell Netware: Novell Netware is also a brand of operating system designed for networks or simply a local area network (LAN) operating system. Netware is a product of the popular IT–centred company called Novell. MAC OS: Mac operating is series of graphical user interface (GUI). Mac operating system was developed by Apple Inc. It was first introduced in 1984. MAC OS X: This operating system was released in 2001. It is the latest version of Mac OS. It is a series of UNIX based graphical interface operating system. Virus: Virus is a software program that are designed to spreads from one computer to another and to interfere with computer operations. While using the internet your computer may have come in
  • 50. contact with computer viruses. A computer virus might corrupt or delete data on the computer, or erase everything on your hard disk. Viruses also spread ether by portable media, such as external ... Get more on HelpWriting.net ...
  • 51.
  • 52. Week 3 iLab Student Name: Rolando Salas Date: 7/26/14 Database Server Security Demands – iLab3 Objectives In this lab, the students will examine the following objectives. Become familiar with well–known and ephemeral ports Create ACL to meet requirements on database security demands Learn best practices to create and apply ACLs. Scenario A small company is using the topology shown below. The Public Server is actually an off–site Database Server that contains company records. Assume that the 200.100.0.0/16 network represents the Internet. The Dallas and Chicago Servers and hosts need to access the database server securely. Only users in the Dallas and Chicago LANs should be able to access the database ... Show more content on Helpwriting.net ... The ephemeral UDP/TCP ports range from 49152 to 65535. #4. What is wrong with ACL 105? access–list 105 permit tcp any any access–list 105 deny tcp host 201.141.0.3 any On this ACL you listing first to permit all TCP traffic from any source IP address to any destination IP address before putting first the hosts IP address except you don't want. In other words, the second line should have been first and the first line secondly to specify that to deny all TCP packets from the host 201.141.0.3 from any source IP addresses. #5. What well–known TCP port does Oracle Database (sql net) server use? Oracle uses 1521 as a standard default port but doesn't outright own the port since the port lies within the registered port number range. #6. A company is managing an Oracle Database located in a Public Server to support day–to–day operations in Dallas and Chicago networks. The company has requested its Internet Access Provider (ISP) to create the necessary ACL at the ISP router securing that only responses from Oracle server
  • 53. to certain hosts are allowed to enter Dallas and Chicago LANs. ISP network engineers decided to use extended ACL, and applies it to F0/0 interface in ISP router. Why did they decide to create an extended ACL and apply it in interface F0/0 for inbound traffic? An extended ACL was created to filter traffic closer to the source and so traffic coming from the Host will be filtered. ... Get more on HelpWriting.net ...
  • 54.
  • 55. Essay On Graphical And Command Line Interface 5. Evaluation The creation of our graphical and Command Line interface came about as a means of testing our algorithms. Since we were attempting to mine associations from large datasets, it made sense to test our mining algorithms on artificially created datasets so as to check whether or not our algorithms were successful. Therefore, we devised the graphical interface to allow us to create sufficiently large datasets based upon association rules. This allowed us to plant specific rules with set supports and confidence with in our test datasets. We were then able to run our test datasets through our association mining algorithms to verify whether or not the algorithms correctly identified the rules which we had planted with the correct ... Show more content on Helpwriting.net ... 6. Conclusion and Future Extensions This project was one of our top choices specifically because it approached a very interesting problem while giving us the opportunity to work with a renowned company. We had the chance to expand our machine learning knowledge, enhance our technical abilities and get an insight into what it is like to work with a real client from industry. This experience was challenging as we found out clients can be difficult to work with and sometimes unreliable. Therefore, one of our main gains from this project is that we learned how to overcome non ideal situations that arise due to uncooperative clients. We also strengthened our team work skills as well as our time management aptitudes, due to using the Scrum methodology. As we were very fond of the idea that stood behind our project, we tried to implement it at the best of our abilities. We wanted to make it accessible to everyone, not only companies in the financial sector and we had multiple thoughts on how to achieve this. Unfortunately, due to the limited time we could not put all of them into practice. One of the future extensions that we considered was changing the internal representation of association rules and the associated values such as support and confidence. We ... Get more on HelpWriting.net ...
  • 56.
  • 57. Cisco Switch Configuration Define hostname It is very useful define the name of your Cisco switch/router. To do it: Enable administrative privilege Router>en Enter the configuration mode: Router#configure terminal Define the hostname (the name router is changed to Ciscozine) Router(config)#hostname Ciscozine Ciscozine(config)# Assign the privileged level secret The enable secret password allows you to enter enable mode (sometimes referred to as privileged mode or privileged–EXEC mode). To set a secret password: Enable administrative privilege Ciscozine>en Enter the configuration mode: Ciscozine#configure terminal Define the privileged–EXEC mode password; remember to use a strong password (combine letters, numbers, nd symbols). The enable secret ... Show more content on Helpwriting.net ... To "encrypt" it: Enable administrative privilege Ciscozine>en Enter the configuration mode: Ciscozine#configure terminal The actual encryption process occurs when the current configuration is written or when a password is configured. Password encryption (it uses Vigenere algorithm) is applied to all passwords, including username passwords, authentication key passwords, the privileged command password, console and virtual terminal line access passwords, and Border Gateway Protocol neighbor passwords. This command is primarily useful for keeping unauthorized individuals from viewing your password in your configuration file. Ciscozine(config)#service password–encryption REMEMBER:The Vigenere algorithm is used to obfuscate the passwords (not really encrypt them as there is no encryption key) in order to prevent "shoulder surfing" from exposing passwords to someone who briefly looks at a running configuration. If, however, someone gets hold of the configuration they can easily retrieve the passwords using the reverse translation of the Vigenere algorithm. You could check your current configuration with the command "show running–config". Ciscozine#show running–config Building configuration... Current configuration : 782 bytes ! version 12.2 service timestamps debug datetime msec service timestamps log datetime msec service ... Get more on HelpWriting.net ...
  • 58.
  • 59. It320 Hmwk 4.1 IT320 IT320 Wan Technology/ Unit 4 Assignment: 4.1 1. At what layer of the OSI model does CDP operate? Data Link layer 2. What is the primary use for CDP? To discover information about directly connected Cisco devices 3. What network layer protocols can CDP provide information for? IP, Internetwork Packet Exchange (IPX), and AppleTalk 4. When CDP is enabled on an interface, a router (or switch) sends CDP advertisements on a regular basis, which list information about the sending router. Included in the packets are a series of Type/Length/Value, or TLV, data structures. 5. The show cdp neighbors command can be used to display one line of information about each directly connected CDP–enabled device. List the six pieces ... Show more content on Helpwriting.net ... Compiled Thu 20–Feb–03 14:09 by pwade advertisement version: 2 RTC# show cdp interface Ethernet0 is up, line protocol is up 122 Routers and Routing Basics CCNA 2 Labs and Study Guide Encapsulation ARPA Sending CDP packets every 60 seconds Holdtime is 180 seconds Serial0 is up, line protocol is up Encapsulation HDLC Sending CDP packets every 60 seconds Holdtime is 180 seconds Serial1 is administratively down, line protocol is down Encapsulation HDLC Sending CDP packets every 60 seconds Holdtime is 180 seconds 16. List and briefly describe the debug options displayed after entering the following command:
  • 60. RTB#debug cdp ? adjacency CDP neighbor info events CDP events ip CDP ip info packets CDP packet–related information 17. Fill in the table that follows. Command Description ... Get more on HelpWriting.net ...
  • 61.
  • 62. Nt1330 Unit 3 Assignment 4 Command Line CM 523 Homework 4: Command Line Bochao Sun Nov. 14, 2017 When I encountered command line during last week's class, I found it a little confusing and "aloof". I was totally unfamiliar with its purpose and syntax, and the interface is merely characters of same font and size. I thought it is something only for computer science students and does not have anything to do with web design and interaction. Things changed a lot as I learn to use it. In fact, such flat interface excludes all graphical display formats in regular commands thus makes it clearer to find the target directory and file by looking their names and types (e.g. style.css) returned after the "ls" command. It should occupy less RAM of the computer than Finder because it does not "render" – figure out icons and thumbnails – for all files ... Show more content on Helpwriting.net ... When I am using graphical user interface, I can go back and forth to the last directory by simply clicking at arrow on the Finder window. However, I need to type commands every time to change directory (cd) and know what is in the directory (pwd). Therefore, CLI both saves time and takes time. It also takes time to learn and get used to the set of commands that make sense in CLI. What's more, contents are permanently deleted after the "rm" or "rm –r" command, which may cause loss of important documents by mistake. Another detail that I pay attention to is that in Finder, I can preview most files by pressing the Space button and switch the files with arrow buttons on keyboard, while previewing is not available on CLI. I need to open it with an "open" command. In addition, CLI once surprised me by making reasonable suggestions. The first time I tried to open a website in CLI, I typed the address without "http://" and it was actually regarded as a path (see below). When it could not found the folder and file on my computer, it surprisingly asked "Perhaps you meant (suggested ... Get more on HelpWriting.net ...
  • 63.
  • 64. Ls Command Questions And Answers Chapter 1 1. Use the whatis command to determine the purpose of the ls command. Command: whatis ls Explanation: ls displays the content of a directory 2. Use the man program to find out what the –R option does when used with the date command. output date and time in RFC 2822 format. Example: Mon, 07 Aug 2006 12:34:56 –0600 3. Use the man program to determine what other commands you should also see in relation to the clear command tput(1), terminfo(5) This describes ncurses version 5.7 (patch 20100109). 4. Use the cal command to determine on what day of the week you were born. cal [[day] month] year] 5. Use the cal command to determine which year between 2005 and 2010 is a leap year. ... Show more content on Helpwriting.net ... man who > who_info less who_info tail –12 who_info head –12 who_info 14. Create a file called favorite_foods, and list your favorite foods, entering five or six or more. Press Enter after each favorite food so it appears on its own line (make certain you also press Enter after the final food item). After the file is created, add two more foods you like that are not on the list (press Enter after the final food item). View the list of foods to make certain the two items you added appear at the end of the list. cat> food fish putin sheperd pie ^C Cat >>food Chiken wings Hamburger ^C 15. View the documentation for who and then view the documentation for w. How are these commands similar?. who – show who is logged on w – Show who is logged on and what they are doing. 16. Run the who –uH and w commands using one command–line sequence to compare the results. who –H NAME LINE TIME COMMENT student :0 2015–09–16 13:16 (console) student pts/2 2015– 09–16 13:17 student pts/3 2015–09–16 13:18 ––––––––– student@linux–6c76:~> who –u student :0 2015–09–16 13:16 ? 2696 (console) student pts/2 2015–09–16 13:17 00:17 ... Get more on HelpWriting.net ...
  • 65.
  • 66. What Is User Interface? What is User Interface? "User Interface (UI) Design focuses on anticipating what users might need to do and ensuring that the interface has elements that are easy to access, understand, and use to facilitate those actions." [5] In this research paper I am going to take you through the history, basics, and advances. These elements are very important to know because without them software designers would be lost. To start, one of the biggest patterns in the history of software is the shift from computation design to presentation design. Since our machines have become stronger more time has been spent on presantation. "The history of that progression can be conveniently broken into three eras: batch (1945–1968), command–line (1969–1983) and graphical (1984 and after). The story begins, of course, with the invention[6] of the digital computer. The opening dates on the latter two eras are the years when vital new interface technologies broke out of the laboratory and began to transform users ' expectations about interfaces in a serious way. Those technologies were interactive timesharing and the graphical user interface." [1] In the batch era, computing power was very expensive. The larger computers of that era needed less logic cycles per second. User interfaces were, very repetitive and basic. Users were doing most of the work for their computers rather than the other way around. User interfaces became overhead and software was designed to keep the processor a going like a ... Get more on HelpWriting.net ...
  • 67.
  • 68. Unit 14 Event-Driven Programming (P1, M1, D1) Contents P1 – Identify the key features of event driven programming such as events, event loops and event handlers 2 P2 – Explain how development environment components (e.g. Solution Explorer, Forms, Toolbox, Code Editor, Debugger, and Property Window) simplify the development. 3 M1 – Describe the features of an event driven language that make it suitable for creating a GUI 5 D1 – Evaluate the suitability of event driven programs for non–graphical applications 6 References 7 P1 – Identify the key features of event driven programming such as events, event loops and event handlers Events – An event occurs when the user interacts with a object. * Usually this means a mouse movement or click * Keyboard actions are also ... Show more content on Helpwriting.net ... * There are numerous non–graphical applications that make use of event driven programs, an example of this is a smoke alarm: when it sense smoke and the density of smoke reaches a certain level, the alarm goes off. An event has taken place there; a smoke alarm is non–graphical application but it's very useful for event driven programming. Text – Microsoft DOS: An ms Dos operating system makes use of no graphical interface; it doesn't make use of wimp when it's interacting with the user. The user uses/enters computer commands into the computer to give instructions such as saving files, opening new documents other than using a mouse to do these actions. A keyboard is used to enter these commands and "key down" events occur when this happens. Non–graphical applications compared to graphical applications ten to be out of date/old and harder to understand. Of course this is not true in some cases, but with programs such as Ms Dos it is harder to remember all the command lines. But with graphical applications that have an interaction interface are simpler to understand and function. Summary In this task I have described procedural programming and its structure with examples. I've described also what IDE is and how it simplifies the development process and I've chosen Visual Basic as an IDE example and I described its components. For merit task I have described GUI with advantages and also I have ... Get more on HelpWriting.net ...
  • 69.
  • 70. Questions with Explanation Q1: If an Ethernet port on router was assigned an IP address of 172.16.112.1/20, what is the maximum number of hosts allowed on this subnet? A. 1024 B. 2046 C. 4094 D. 4096 E. 8190 Answer: C Explanation: Given IP address of 172.16.112.1 / 20, subnet mask: 255.255.240.0 max. num of hosts =(( 2^12) –2 ) = 4096–2 = 4094 Q2.:An access list was written with the four statements shown in the graphic. Which single access list statement will combine all four of these statements into a single statements that will have exactly the same effect? A. access–list 10 permit 172.29.16.0 0.0.0.255 B. access–list 10 permit 172.29.16.0 0.0.1.255 C. access–list 10 permit 172.29.16.0 0.0.3.255 D. access–list 10 permit 172.29.16.0 0.0.15.255 E. access–list 10 ... Show more content on Helpwriting.net ... A host in an Ethernet network can communicate with another host,only if it knows the Ethernet address (MAC address) of that host.The higher level protocols like IP use a different kind of addressing scheme like (IP address) from the lower level hardware addressing scheme like MAC address.ARP is used to get the Ethernet address of a host from its IP address.ARP is extensively used by all the hosts in an Ethernet network.In this case there is already an entry for this IP address,Meaning this host already knows the MAC to IP address mapping for this destination so there is no need to send out an ARP request instead it will send the ICMP packet directly to 192.168.1.254 via unicast. Q7.An internetwork has been configured as shown in the diagram, with both routers using EIGRP routing for AS 44.Users on the Branch router are unable to reach any of the subnets on the HQ router.Which of the following commands is necessary to fix this problem.? A. Branch(config–router)# version 2 B. Branch(config–router)# no auto–summary C. Branch(config–router)# redistribute eigrp 44 D. Branch(config–router)# EIGRP log–neighbor– changes E. Branch(config–router)# default–information originate Explanation:By default, EIGRP ... Get more on HelpWriting.net ...
  • 71.
  • 72. What Is An Operating System? Unit 2 Assignment 1 P2/M1 What is an operating system? An operating system is software that communicates with the hardware and it allows other programs to run it. Operating systems is the structure that allows you to communicate with computer hardware in a communicating way , without an operating system you wouldn't be able to tell the computer to do anything and it won't have any instructions to follow. Purpose of an operating system: Operating system controls the hardware and software properties of the system in a computer these properties include things like processer, memory and disk space. Computers must have an operating system to run other programs also an operating system does basic tasks such as looking and recognizing the input from the keyboard and also sending output to display on the screen , keeping track of files and directories on the disk and controlling the disk drivers and printers. The purpose of an operating system, a purpose of an operating system is memory management this process happens when a computer searches for a memory to programs that run in the same time. Virtual memory is a data storage that will keep separate memory addresses accessed before by the user, this process will increase the amount of RAM and transfer data to the secondary storage. Virtual memory can have an impact on how well computer will work because of its storage. An operating system manages the hardware and software resources of the system. A computer must have an ... Get more on HelpWriting.net ...
  • 73.
  • 74. What Is A Operating System? What is a operating system? An operating system is the most essential software that is placed in a computer. It achieves the computer 's memory and procedures, and the software and hardware. Also, it importantly allows you to interact with the computer itself even if you cant speak the computers language. It provides mutual services for computer programs. Some examples of operating systems are Windows (vista, 7), Mac OS, Haiku, Linux, BSD. Command line operating systems Some examples of command line operating systems are Linux and DOS. DOS, also known as disc operating system is a user interface where you can command the computer difficult but basic tasks to be done quickly. LINUX is a public/ open–source operating system based by UNIX. ... Show more content on Helpwriting.net ... A great example of a GUI that uses a control panel is Windows 7. What is machine and peripheral management? The Peripheral management manages peripheral device by conveying them commands in the devices own code. Every peripheral device has its own specific code. One language is binary. For example, in Linux OS, it is the process of turning inputs into outputs. Some peripheral devices are keyboards, mouse, webcams etc. What is file management? File management consists of files that are placed in an area of storage and where you can name your file regarding its content and place it where ever you want. It is the way toward looking after files, reports into classifications and subcategories as wanted by a client. Essential parts of file management are arranging, naming and grouping PC information. What is meant by customising the desktop? Operating systems allow you to customise your desktop which means you can adapt specific features on the user interface. This means the look can be changed to your preference. Also, it is a handy way to organise/ navigate your work whilst adding your own look. For example, you can change your background picture to your preference. It could be your national flag, your favourite colour or even favourite car. On the picture to the left my favourite car is a Lamborghini in green. What is device driver? Every ... Get more on HelpWriting.net ...
  • 75.
  • 76. Linux: the Kernal and Shell Essay examples Linux: The Kernel And Shell Josh Harkey AIU Online Abstract This manual has been written to explore the many distributions of Linux. It will define some of the components of the OS as they relate to the shell and kernel. It will also go over some of the more popular distributions of Linux and the shells. Finally, it will give a brief overview of some useful commands that can be used in the bash shell. Linux: The Kernel and Shell It is important to know some the inner workings of an operating system to help better understand how they and why they are beneficial. This is one of the reasons for this manual. It will also give a better understanding of some of the more popular distributions of Linux. The Kernel And Shell As They ... Show more content on Helpwriting.net ... As a result, Linux offers the user a way to have an OS that comes with more functionality, and in an environment that can be customized for the task at hand. Five Common Distributions Since Linux is allowed to be changed by its users there are more than 600 distributions available. Here is a list of five of the most commonly used. FEDORA– fedoraproject.org (2013) states, "fedora is fast, stable, and powerful operating system for everyday use built by a worldwide community." This distribution is most commonly used by developers and Linux enthusiast. DEBIAN– debian.org (2013) states, "Debian provides more than a pure OS: it comes with over 37,500 packages, pre compiled software bundled up in a nice format for easy installation on your machine." It is one of the oldest distributions still in active development, and is often the base for newer distributions. People that have a passion for Linux enjoy Debian. openSUSE– according to opensuse.org (2013), " The openSUSE distribution is a stable, way to use and complete multi– purpose distribution.it is aimed towards users and developers working on desktop or server." This distribution is generally used in an enterprise environment, and is sponsored by Novell. It is known for its ease of use on the surface and advanced options further in. LINUX MINT– linuxmint.com (2013) states, "The purpose of Linux mint is to produce a modern, elegant and comfortable operating system which is both powerful ... Get more on HelpWriting.net ...
  • 77.
  • 78. Advantages And Disadvantages Of MATLAB The name MATLAB stands for Matrix Laboratory. MATLAB is a high–performance language for technical computing. It integrates computation, visualization, and programming in an easy–to–use environment where problems and solutions are expressed in familiar mathematical notation. Typical uses include: Math and computation Algorithm development Modelling, simulation, and prototyping Data analysis, exploration, and visualization Scientific and engineering graphics Application development, including Graphical User Interface building MATLAB is an interactive system whose basic data element is an array that does not require dimensioning. This allows you to solve many technical computing problems, especially those with matrix and vector formulations, ... Show more content on Helpwriting.net ... Three principal elements required to create a MATLAB Graphical User Interface. The elements are components, figures, callbacks. 1. Components Each item on a GUI is a graphical component. The types of components include graphical controls (pushbuttons, radio buttons, edit boxes, lists, sliders, etc.), static elements (frames and text strings), menus, and axes. Graphical controls and static elements are created by the functions and axes are used to display graphical data which is created by the function axes. 2. Figures The components of a GUI must be arranged within a figure, which is a window on the computer screen. 3. Callbacks Finally, there must be some way to perform an action if a user clicks on a button. A mouse click or a key press is an event, and the MATLAB program must respond to each event if the program is to perform its function. The code executed in response to an event is known as a call back. There must be a callback to implement the function of each graphical component on the ... Get more on HelpWriting.net ...
  • 79.
  • 80. Basic Device And Security Configuration Paper Basic Device and Security Configuration Kevin Kormylo, Okoma Mita, Dan O'Donnell CIT/249 January 12, 2015 Steve Acklin Basic Device and Security Configuration When designing a network there are basic network and security configurations that one needs to consider. Choosing a hostname for each device is very important, this allows the user to know what device they are working on. Configuring interfaces with a proper IP, subnet, and descriptions are part of the basic configuration of a network device. One needs to consider the security setting for the network devices. There are some basic configurations that one can choose to use in their configuration. Passwords and a username should be used for consoling and remote access to any ... Show more content on Helpwriting.net ... We were able to name the devices and create the banners as required. All passwords were encrypted and remote access was successful for SSH and telnet. All interfaces were assigned a description that were being used and the others not being used, were shutdown. We secured remote access by a username and password along with the rsa key. We verified our configuration by posting the running configuration in our team thread. Team A's assignment The assignment was broken up into two parts. Each member had a device to configure Dan configured Branch1 router, Adam was assigned Branch2 router, Okoma configured the switch, PC, ISP, and Kevin configured the Core router. We did not receive a config from Adam so, Kevin was able to do that part too. Okoma and Dan provided a brief written summary of the work they performed and Kevin put the paper together. Switch1 running configuration: Current configuration : 3826 bytes ! version 12.2 no service pad service timestamps debug uptime service timestamps log uptime service password–encryption ! hostname Switch1
  • 81. ! no logging console enable secret 5 $1$m1XN$lgDd.3R8lddprN/Z8Vxzu0 enable password 7 110A000712001E1F ! username admin password 7 02051D590E141A32 no aaa new–model ip subnet–zero ! ip domain–name mycompany.com ! ! crypto pki trustpoint TP–self–signed–1363906688 enrollment selfsigned subject–name cn=IOS– Self–Signed–Certificate–1363906688 ... Get more on HelpWriting.net ...
  • 82.
  • 83. MATLAB: A High-Performance Language For Technical Computing The name MATLAB stands for Matrix Laboratory. MATLAB is a high–performance language for technical computing. It integrates computation, visualization, and programming in an easy–to–use environment where problems and solutions are expressed in familiar mathematical notation. Typical uses include: Math and computation Algorithm development Modelling, simulation, and prototyping Data analysis, exploration, and visualization Scientific and engineering graphics Application development, including Graphical User Interface building MATLAB is an interactive system whose basic data element is an array that does not require dimensioning. This allows you to solve many technical computing problems, especially those with matrix and vector formulations, ... Show more content on Helpwriting.net ... Editor window Creates and debugs script and function files. Help window Provides help information. Command history Window & logs commands entered in the command window. Workspace window Provides information about the variables that are used. Current Folder Shows the files in the current directory. 4.2.7 Working on the Command Window To type a command the cursor must be placed next to the command prompt (>>). Press Enter key to execute the command. Several commands can be typed in the same line. This is done by typing a comma (,) between the commands. If a semicolon (;) is typed at the end of a command, the output of the command is not displayed. It is useful when the result is obvious or the output is very large. A previously typed command can be recalled to the command prompt with the upper arrow key. The down–arrow key can be used to move down the previously typed commands. If a command is too long to fit in one line, it can be continued to the next line by typing three periods (...) and press the Enter key. The symbol %, when it is typed in the beginning of a line, the line is designated as a comment. 4.3 Working on Matlab ... Get more on HelpWriting.net ...
  • 84.
  • 85. New204 NETW204: Assignment 1 (50 points) Each answer is worth 1 point each, 50 questions = 50 total points. Type answers in the appropriate cell; text will automatically wrap. Post your completed assignment to the dropbox. NAME | Manuel Crail | Router Configuration Exercise (5 points) When configuring a router, there are certain basic tasks performed, * Naming the router * Setting passwords * Configuring interfaces * Configuring a banner * Saving changes on a router * Verifying basic configuration and router operations | Question | Answer | 1 | The first prompt is _______ mode and will allow you to view the state of the router. | User Mode | 2 | What major limitation does this mode have? | Does ... Show more content on Helpwriting.net ... Create a summary static route for R1 in figure 1 for the 3 LANs it has attached. Use the steps from your text Chapter 2 page 125: Calculating a Summary Route. 192.168.20.0/24 Binary form=11000000.10101000.00010100.00000000=/22 192.168.21.0/24 Binary form=11000000.10101000.00010101.00000000=/22 192.168.22.0/24 Binary form=11000000.10101000.00010110.00000000=/22 Summarized into one route=192.168.0.0 /22=255.255.252.0 Write the networks in binary form. Check work above please | | | | | | | | | | Question | Answer | 48 | Find subnet mask by counting Bits matching from left to right: ____. This is your subnet mask for the summary route. | 22 or 255.255.252.0 | 49 | Find summary address by putting 0s (zeros) in remaining address positions after the left to right matching ends (For example if the first 21 bits match from the left, put 0s (zeros) in the remaining 11 positions of the 32 bit address to find address for the summary). | 11000000.10101000.00010100.00000000 | 50 | Summary Route (Address and subnet mask found above combined) for routing table | 192.168.0.0 and 255.255.252.0 ... Get more on HelpWriting.net ...
  • 86.
  • 87. Centos 7 Essay Task 3 Short Description of Task Editing network settings on an existing CentOS 7 Linux system. Long Description of Task Using the existing CentOS 7 Linux system with a network connection created and set, edit the settings for the NIC by using nmtui and nmcli commands as well as /etc/sysconfig/network–scripts/ directory. The both commands are used for network configuration, but nmtui has a GUI mode and it is easier to use. On the other hand, nmcli has more advanced options. The directory /etc/sysconfig/network–scripts/ keeps all network interface files that start with the name ifcfg– and can be used to edit network settings. Pre–Implementation Test Plan Ensure that the user is the root user or can use root privileges for commands. ... Show more content on Helpwriting.net ... By using keyboard keys, choose Edit a Connection. Select the name of the network connection and on the right pane select Edit button. To change the profile name, delete the existing name and type a new one. Select IP configuration Automatic for DHCP or Manual for static IP address. For static IP address, type IP addresses with format (–– removed HTML ––) /CIDR (Figure 3). Type Default Getaway address. Type DNS servers IP addresses. Select (–– removed HTML ––) , if the configuration requires several IP addresses. Choose Automatically connect for IPv6 configurations. Select OK to save the network configurations. Select Back to go back Network Manager TUI. Select OK or Quit to go back to the terminal. Edit network settings by using etc/sysconfig/network–scripts/ directory: In the terminal, open etc/sysconfig/network–scripts/ directory by using command cd etc/sysconfig/network–scripts List the files of the directory with the command ll. For more precise search, use pipes and grep filter: ll | grep "ifcfg". Open the network configuration file with editor with root privileges sudo vi ifcfg– (–– removed HTML ––) (Figure 4). For DHCP find the lines BOOTPROTO=none and ONBOOT=no and change them to BOOTPROTO=dhcp ONBOOT=yes and restart the network by using command with root privileges systemctl restart network.
  • 88. ... Get more on HelpWriting.net ...
  • 89.
  • 90. Week 4 B IP Subnetting Lab Essay Introduction Assignment Develop a subnetting plan and implement it in the lab. Configure RIP as a routing protocol. Conditions NYEDGE1 is the hub router. The two remote office routers NYEDGE2 and NYWAN1 connect to NYEDGE1 through serial connections. Each router has a locally attached Ethernet network. The serial line data rates and DTE/DCE settings have already been configured on all three routers. You only need to assign the IP address to the interfaces. Notes The routers are connected directly to each other in this lab and do not actually connect through any leased line services. Diagram Gi0/0 Ethernet NYWAN1 Serial0/1/0 Serial0/0/1 DCE NYEDGE1 Serial0/0/0 Serial0/0/0 DCE Gi0/0 Ethernet Task Index
  • 91.   Task 1 – Create a subnet ... Show more content on Helpwriting.net ... You are not encouraged to use this subnetwork because it specifies the wire address. Nor should you use the last subnet, 192.50.6.224, because it is considered the major network broadcast address. Therefore you can only use subnets 32, 64, 96, 128, 160 and 192. With this design requirement, you only need to use five of the six usable subnetworks, leaving one for any additional segments in the future. Likewise, for each subnet, you cannot use the first and last address. For example, subnet 192.50.1.32 extends all the way to 192.50.1.63. But you cannot use these two IP addresses (.32 and .63) because they are the wire and the broadcast addresses for this subnetwork. But you can use any of the 30 IP addresses in between. Task 3 – Configure the interfaces in each router Step 1: Configure Gi0/0, s0/0/0, and S0/0/1 for NYEDGE1. Action: ip address <ip address> < subnet mask> Result: NYEDGE1>enable NYEDGE1#config t Enter configuration commands, one per line. End with CNTL/Z. NYEDGE1(config)#int g0/0 NYEDGE1(config–if)#ip address 192.50.6.33 255.255.255.224 NYEDGE1(config–if)#no shut NYEDGE1(config–if)# NYEDGE1(config–if)#int s0/0/0 NYEDGE1(config–if)#ip address 192.50.6.65 255.255.255.224 NYEDGE1(config–if)#no shut NYEDGE1(config–if)# NYEDGE1(config–if)#int s0/0/1 NYEDGE1(config–if)#ip address 192.50.6.129 255.255.255.224 NYEDGE1(config–if)#no shut NYEDGE1(config–if)# NYEDGE1(config–if)#end Explanation: Subnet 192.50.6.32 is assigned to g0/0. Subnet 192.50.6.128 is ... Get more on HelpWriting.net ...