SlideShare a Scribd company logo
1 of 13
Culturally Responsive Literacy Resources Template
Part 1: Culturally Responsive Resource Information
Part 2: Cultural Values and Perspectives
Part 3: Curriculum Applications for Literacy Development
Title:
Medium:
Description:
Citation:
Language Acquisition Theory:
Social Studies:
· Reading:
· Writing:
· Listening:
· Speaking:
Science:
· Reading:
· Writing:
· Listening:
· Speaking:
Math:
· Reading:
· Writing:
· Listening:
· Speaking:
Elective of your Choice:
· Reading:
· Writing:
· Listening:
· Speaking:
Title:
Medium:
Description:
Citation:
Language Acquisition Theory:
Social Studies:
· Reading:
· Writing:
· Listening:
· Speaking:
Science:
· Reading:
· Writing:
· Listening:
· Speaking:
Math:
· Reading:
· Writing:
· Listening:
· Speaking:
Elective of your Choice:
· Reading:
· Writing:
· Listening:
· Speaking:
Title:
Medium:
Description:
Citation:
Language Acquisition Theory:
Social Studies:
· Reading:
· Writing:
· Listening:
· Speaking:
Science:
· Reading:
· Writing:
· Listening:
· Speaking:
Math:
· Reading:
· Writing:
· Listening:
· Speaking:
Elective of your Choice:
· Reading:
· Writing:
· Listening:
· Speaking:
© 2015. Grand Canyon University. All Rights Reserved.
CIS 1130Analyzing TCP/IP Ports and AssociationsTCP/IP
Applications
Learning Objectives
In this lab you will define the functions of TCP/IP port
associations and review the common port number assignments.
You will also use several utilities that will allow you to explore
and analyze protocols, ports, and processes. When you have
completed this lab, you will be able to
Define the functions of TCP/IP port associations
List some of the well known port number assignments
Explore the various protocols, ports, and processes employed in
a typical network communicationDescribe the functions of the
DNS advance network servicesDetail the common client
configuration settings of DNS
Lab Materials and Setup
The materials you will need for this lab arePencil and paperPC
running Windows XP, Windows Vista, or Windows 7Internet
access
Instructions
After exploring the higher-layer transport protocols, you would
like to know how TCP/IP keeps track of all the different
sessions on a typical networked PC. You decide to examine the
protocols, ports, and processes involved in the typical browsing
of a Web site.
Task 1:Start with a description of the function of a TCP or UDP
port.
Task 2: Match the following port numbers to the appropriate
protocols.
Port 20
Port 21
Port 22
Port 23
Port 25
Port 69
Port 80
Port no
Port 137
Port 138
Port143
Port 443
Note: Some protocols use more than one port number.
Application
Port
SMTP
TFTP
FTP
HTTP
HTTPS
POP3
IMAP4
SSH
Telnet
Hint: Windows lists all of the well-known ports and protocol
services that are associated with them in a document named
"services." Access this list in Windows 7 by opening Notepad
(Start I All Pro- grams I Accessories I Notepad) and navigating
to c:windowssystem32driversetc. Change the view from
"Text Documents (*.txt)" to "All Documents(*.*)" to view and
open the services document.
Task 3: The services document is a static list of well-known
ports on a Windows PC. You will seldom if ever see all of these
endpoint ports open or active at one time. You can view a static
listing of the active ports using the netstat command-line utility.
netstat has a number of switches to customize the out- put of the
list. Run the netstat /?command and provide a description of
the following switches:
Switch
Description
netstat –a
netstat -b
netstat -n
netstat -o
Note: You'll be making heavy use of the help functions of
commands throughout the rest of the Lab in order to use some
of these more advanced functions! When in doubt, type the
command and add a space and/? to the end of the command! For
example: ping /?
Instructions
Having just finished the chapter on network naming in the
MikeMeyers'CompTIANetwork+ Guideto Managingand
Troubleshooting Networks textbook, you know that you are
going to have to implement DNS on the network lab's systems.
You want to get a jump on the setup, so you set out to define
DNS and WINS and examine how they are configured on the
client machines in use at the home office of ITCF.
Task 1: Describe the function of the DNS service on a TCP/IP
network.
Task 2: Local PCs cache any addresses resolved by DNS on the
hard disk. To view a display of resolved addresses cached on
your PC, you will use the command-line utility ipconfig
/displaydns. Open a command prompt and type ipconfig
/displaydns. What are your results?
CIS 1130TCP/IP and Routing
Learning Objectives
In this lab, you will experiment with some common windows
commands to explore the TCP/IP configuration of your
computer and view its routing table.Understand the netstat
command and outputTry the route command and explain what a
routing table does
Lab Materials and Setup
The materials you'll need for this lab are
A Windows PC with Internet accessThe MikeMeyers'
CompTIANetwork+ Guide to Managing and Troubleshooting
Networks textbookPencil and paper
Instructions – Part 1
In today’s lab, you will be working with common commands on
your windows workstation to view the network configuration.
Task 1: Run the IPConfig command and understand the output.
Log in to any available networked Windows computer. Select
Start | Run or just Start, type cmd, and press enter to open a
command prompt;
From the command prompt, type ipconfig /all, and then press
enter. Fill in as much information as you can from your screen
into the table.
For a tip on what to include, check Lab Project 7.3 in your
textbook.
Task 2: Run the Netstat command and understand the output.
Start a command prompt at your computer and enter netstat –nr
to view its routing table.
Create a screenshot of the output and paste it into this document
under this task.
Under the pasted screenshot, briefly explain what each column
is for.
CIS 1130Building an Ethernet Patch CableEthernet Basics
Learning Objectives
In this lab, you will research a TIA/EIA 568B patch cable.
When you have completed this lab you will be able toIdentify
proper orientation of RJ-45 connectorsIdentify the wire pairs of
a UTP patch cable according to the specifications of the
TIA/EIA 568B standard
Lab Materials and Setup
The MikeMeyers'CompTIANetwork+Guide to Managingand
Troubleshooting Networkstextbook
A computer with Internet accessPencil and paper
Instructions – Part 1
The TIA/EIA 568B standard defines the arrangement of 4 pair
UTP cabling into RJ 45 connector. In purchasing commercial
premade cables the emerging standard is 568B.
Task 1: Using the Internet conduct a search for the TIA/EIA
568B standard wiring diagram. There are many sites that offer
color coded diagrams for wiring straight through patch cables.
Using your color coded diagram record the proper color wire for
each of the pins of the RJ 45 modular connector when
assembled using the TIA/EIA 568B standard.
Pin 1:
Pin 2:
Pin 3:
Pin 4:
Pin 5:
Pin 6:
Pin 7:
Pin 8:
Optional:
When possible in class we would make cables using these
standards. Depending on this course format, that may not be
possible. However if you have an extra UTP cable available you
can examine or disassemble it to compare the concepts and
layout of the pairs.
Learning Objectives
In this lab, you'll examine the standards and technology of
1000BaseT, 1000BaseSX, and 1000BaseLX Ethernet. When you
have completed this lab, you will be able to
Define the 1000BaseT Ethernet specifications, requirements,
and limitationsDefine the 1000BaseSX and 1000BaseLX
Ethernet specifications, requirements, and
limitationsRecommend Gigabit Ethernet NICsDetermine
appropriate use of fiber-optic Ethernet based on application
Instructions – Part 2
Your client is building a new regional complex consisting of
two physical buildings. One building will house all of the
administrative departments. The other building, located
approximately 900 feet away from the administrative building,
will be a large, garage-like structure where the inspection of
automobiles will be conducted. The professional installers have
submitted a proposal that has been accepted, outlining the
following parameters:
The proposed cabling for the internal office space of the
administrative building is Category 6 UTP. The administrative
network will need to support 75 to 100 devices (servers,
computers, and printers).
The proposed cabling for the internal area of the inspection
building is Category 6 UTP. The network in the inspection
building will need to support 25 to 40 devices (computers and
printers).
For the backbone between the two buildings, the proposal is
single-mode 12-fiber optic cabling.
Using this general information, follow Steps 1 through 4 to
develop an implementation plan for the new site. The design
should take advantage of the Gigabit Ethernet technology.
Task 1:Utilizing the textbook and online resources, research and
document the following information for 1000BaseT Ethernet:
Speed:
Distance:
Cabling:
Connectors:
Task 2: Utilizing online resources research and document the
following information for 1000BaseTX Ethernet:
Speed:
Distance:
Cabling:
Connectors:
Task 3:Utilizing the textbook and online resources, research and
document the following information for 1000BaseSX Ethernet:
Speed:
Distance:
Cabling:
Connectors:
Task 4:Utilizing the textbook and online resources, research and
document the following information for 1000BaseLX Ethernet
Speed:
Distance:
Cabling:
Connectors:
Task 5:Utilizing online resources research and document the
following information for 1000BaseZX Ethernet:
Speed:
Distance:
Cabling:
Connectors:
Task 6:As discussed in the scenario, the new facility will have
approximately 100 to 140 network devices (computers and
printers). In order to implement Gigabit Ethernet throughout the
organization, each device will need a gigabit NIC. Launch your
browser and research the current pricing for Gigabit Ethernet
NICs. Document your findings in the following space:

More Related Content

Similar to Culturally Responsive Literacy Resources Template Part 1.docx

Running head network design 1 netwo
Running head network design                             1 netwoRunning head network design                             1 netwo
Running head network design 1 netwoAKHIL969626
 
ECET 375 Invent Yourself/newtonhelp.com
ECET 375 Invent Yourself/newtonhelp.comECET 375 Invent Yourself/newtonhelp.com
ECET 375 Invent Yourself/newtonhelp.comlechenau125
 
Cnd labguide
Cnd labguideCnd labguide
Cnd labguideYahye159
 
ECET 375 Effective Communication/tutorialrank.com
 ECET 375 Effective Communication/tutorialrank.com ECET 375 Effective Communication/tutorialrank.com
ECET 375 Effective Communication/tutorialrank.comjonhson203
 
NETWORKING SYSTEMS .docx
NETWORKING SYSTEMS                                                .docxNETWORKING SYSTEMS                                                .docx
NETWORKING SYSTEMS .docxdohertyjoetta
 
Implementing IP V4
Implementing IP V4Implementing IP V4
Implementing IP V4Napoleon NV
 
Wireshark - Basics
Wireshark - BasicsWireshark - Basics
Wireshark - BasicsYoram Orzach
 
1.- Networking Models, Devices.pdf
1.- Networking Models, Devices.pdf1.- Networking Models, Devices.pdf
1.- Networking Models, Devices.pdfOpositorGonzalez1
 
Arduino Teaching Program
Arduino Teaching ProgramArduino Teaching Program
Arduino Teaching ProgramMax Kleiner
 
Ecet 375 Education Redefined - snaptutorial.com
Ecet 375     Education Redefined - snaptutorial.comEcet 375     Education Redefined - snaptutorial.com
Ecet 375 Education Redefined - snaptutorial.comDavisMurphyC86
 
Ecet 375 Education Specialist-snaptutorial.com
Ecet 375 Education Specialist-snaptutorial.comEcet 375 Education Specialist-snaptutorial.com
Ecet 375 Education Specialist-snaptutorial.comrobertlesew62
 
Scaling Networks Lab Manual 1st Edition Cisco Solutions Manual
Scaling Networks Lab Manual 1st Edition Cisco Solutions ManualScaling Networks Lab Manual 1st Edition Cisco Solutions Manual
Scaling Networks Lab Manual 1st Edition Cisco Solutions Manualnudicixox
 
1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf
1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf
1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdfeyebolloptics
 
manual on networking cabling with pratical guide
manual on networking cabling with pratical guidemanual on networking cabling with pratical guide
manual on networking cabling with pratical guideNuhuSamaila
 
CCNA-lab-Manual.pdf
CCNA-lab-Manual.pdfCCNA-lab-Manual.pdf
CCNA-lab-Manual.pdfDrPreethiD1
 
Ecet 375 Enhance teaching / snaptutorial.com
Ecet 375  Enhance teaching / snaptutorial.comEcet 375  Enhance teaching / snaptutorial.com
Ecet 375 Enhance teaching / snaptutorial.comDavis117a
 

Similar to Culturally Responsive Literacy Resources Template Part 1.docx (20)

Running head network design 1 netwo
Running head network design                             1 netwoRunning head network design                             1 netwo
Running head network design 1 netwo
 
ECET 375 Invent Yourself/newtonhelp.com
ECET 375 Invent Yourself/newtonhelp.comECET 375 Invent Yourself/newtonhelp.com
ECET 375 Invent Yourself/newtonhelp.com
 
Cnd labguide
Cnd labguideCnd labguide
Cnd labguide
 
ECET 375 Effective Communication/tutorialrank.com
 ECET 375 Effective Communication/tutorialrank.com ECET 375 Effective Communication/tutorialrank.com
ECET 375 Effective Communication/tutorialrank.com
 
NETWORKING SYSTEMS .docx
NETWORKING SYSTEMS                                                .docxNETWORKING SYSTEMS                                                .docx
NETWORKING SYSTEMS .docx
 
Implementing IP V4
Implementing IP V4Implementing IP V4
Implementing IP V4
 
Wireshark - Basics
Wireshark - BasicsWireshark - Basics
Wireshark - Basics
 
opnet lab report
opnet lab reportopnet lab report
opnet lab report
 
1.- Networking Models, Devices.pdf
1.- Networking Models, Devices.pdf1.- Networking Models, Devices.pdf
1.- Networking Models, Devices.pdf
 
ICT 10 Lesson Plan
ICT 10 Lesson PlanICT 10 Lesson Plan
ICT 10 Lesson Plan
 
Arduino Teaching Program
Arduino Teaching ProgramArduino Teaching Program
Arduino Teaching Program
 
Ecet 375 Education Redefined - snaptutorial.com
Ecet 375     Education Redefined - snaptutorial.comEcet 375     Education Redefined - snaptutorial.com
Ecet 375 Education Redefined - snaptutorial.com
 
Ecet 375 Education Specialist-snaptutorial.com
Ecet 375 Education Specialist-snaptutorial.comEcet 375 Education Specialist-snaptutorial.com
Ecet 375 Education Specialist-snaptutorial.com
 
Scaling Networks Lab Manual 1st Edition Cisco Solutions Manual
Scaling Networks Lab Manual 1st Edition Cisco Solutions ManualScaling Networks Lab Manual 1st Edition Cisco Solutions Manual
Scaling Networks Lab Manual 1st Edition Cisco Solutions Manual
 
1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf
1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf
1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf
 
Itep
ItepItep
Itep
 
New204
New204New204
New204
 
manual on networking cabling with pratical guide
manual on networking cabling with pratical guidemanual on networking cabling with pratical guide
manual on networking cabling with pratical guide
 
CCNA-lab-Manual.pdf
CCNA-lab-Manual.pdfCCNA-lab-Manual.pdf
CCNA-lab-Manual.pdf
 
Ecet 375 Enhance teaching / snaptutorial.com
Ecet 375  Enhance teaching / snaptutorial.comEcet 375  Enhance teaching / snaptutorial.com
Ecet 375 Enhance teaching / snaptutorial.com
 

More from dorishigh

Cyber War versus Cyber Realities Cyber War v.docx
Cyber War versus Cyber Realities Cyber War v.docxCyber War versus Cyber Realities Cyber War v.docx
Cyber War versus Cyber Realities Cyber War v.docxdorishigh
 
Cyber terrorism, by definition, is the politically motivated use.docx
Cyber terrorism, by definition, is the politically motivated use.docxCyber terrorism, by definition, is the politically motivated use.docx
Cyber terrorism, by definition, is the politically motivated use.docxdorishigh
 
Cyber Security ThreatsYassir NourDr. Fonda IngramETCS-690 .docx
Cyber Security ThreatsYassir NourDr. Fonda IngramETCS-690 .docxCyber Security ThreatsYassir NourDr. Fonda IngramETCS-690 .docx
Cyber Security ThreatsYassir NourDr. Fonda IngramETCS-690 .docxdorishigh
 
Cyber Security in Industry 4.0Cyber Security in Industry 4.0 (.docx
Cyber Security in Industry 4.0Cyber Security in Industry 4.0 (.docxCyber Security in Industry 4.0Cyber Security in Industry 4.0 (.docx
Cyber Security in Industry 4.0Cyber Security in Industry 4.0 (.docxdorishigh
 
Cyber Security and the Internet of ThingsVulnerabilities, T.docx
Cyber Security and the Internet of ThingsVulnerabilities, T.docxCyber Security and the Internet of ThingsVulnerabilities, T.docx
Cyber Security and the Internet of ThingsVulnerabilities, T.docxdorishigh
 
Cyber Security Gone too farCarlos Diego LimaExce.docx
Cyber Security Gone too farCarlos Diego LimaExce.docxCyber Security Gone too farCarlos Diego LimaExce.docx
Cyber Security Gone too farCarlos Diego LimaExce.docxdorishigh
 
CW 1R Checklist and Feedback Sheet Student Copy Go through this.docx
CW 1R Checklist and Feedback Sheet Student Copy Go through this.docxCW 1R Checklist and Feedback Sheet Student Copy Go through this.docx
CW 1R Checklist and Feedback Sheet Student Copy Go through this.docxdorishigh
 
CW 1 Car Industry and AIby Victoria StephensonSubmission.docx
CW 1 Car Industry and AIby Victoria StephensonSubmission.docxCW 1 Car Industry and AIby Victoria StephensonSubmission.docx
CW 1 Car Industry and AIby Victoria StephensonSubmission.docxdorishigh
 
CWTS CWFT Module 7 Chapter 2 Eco-maps 1 ECO-MAPS .docx
CWTS CWFT Module 7 Chapter 2 Eco-maps 1 ECO-MAPS .docxCWTS CWFT Module 7 Chapter 2 Eco-maps 1 ECO-MAPS .docx
CWTS CWFT Module 7 Chapter 2 Eco-maps 1 ECO-MAPS .docxdorishigh
 
Cw2 Marking Rubric Managerial Finance0Fail2(1-29) Fail.docx
Cw2 Marking Rubric Managerial Finance0Fail2(1-29) Fail.docxCw2 Marking Rubric Managerial Finance0Fail2(1-29) Fail.docx
Cw2 Marking Rubric Managerial Finance0Fail2(1-29) Fail.docxdorishigh
 
Cyber AttacksProtecting National Infrastructure, 1st ed.Ch.docx
Cyber AttacksProtecting National Infrastructure, 1st ed.Ch.docxCyber AttacksProtecting National Infrastructure, 1st ed.Ch.docx
Cyber AttacksProtecting National Infrastructure, 1st ed.Ch.docxdorishigh
 
CVPSales price per unit$75.00Variable Cost per unit$67.00Fixed C.docx
CVPSales price per unit$75.00Variable Cost per unit$67.00Fixed C.docxCVPSales price per unit$75.00Variable Cost per unit$67.00Fixed C.docx
CVPSales price per unit$75.00Variable Cost per unit$67.00Fixed C.docxdorishigh
 
CYB207 v2Wk 4 – Assignment TemplateCYB205 v2Page 2 of 2.docx
CYB207 v2Wk 4 – Assignment TemplateCYB205 v2Page 2 of 2.docxCYB207 v2Wk 4 – Assignment TemplateCYB205 v2Page 2 of 2.docx
CYB207 v2Wk 4 – Assignment TemplateCYB205 v2Page 2 of 2.docxdorishigh
 
CUSTOMERSERVICE-TRAINIGPROGRAM 2 TA.docx
CUSTOMERSERVICE-TRAINIGPROGRAM 2  TA.docxCUSTOMERSERVICE-TRAINIGPROGRAM 2  TA.docx
CUSTOMERSERVICE-TRAINIGPROGRAM 2 TA.docxdorishigh
 
Customer Service Test (Chapter 6 - 10)Name Multiple Choice.docx
Customer Service Test (Chapter 6 - 10)Name Multiple Choice.docxCustomer Service Test (Chapter 6 - 10)Name Multiple Choice.docx
Customer Service Test (Chapter 6 - 10)Name Multiple Choice.docxdorishigh
 
Customer Value Funnel Questions1. Identify the relevant .docx
Customer Value Funnel Questions1. Identify the relevant .docxCustomer Value Funnel Questions1. Identify the relevant .docx
Customer Value Funnel Questions1. Identify the relevant .docxdorishigh
 
Customer service is something that we have all heard of and have som.docx
Customer service is something that we have all heard of and have som.docxCustomer service is something that we have all heard of and have som.docx
Customer service is something that we have all heard of and have som.docxdorishigh
 
Customer requests areProposed Cloud Architecture (5 pages n.docx
Customer requests areProposed Cloud Architecture (5 pages n.docxCustomer requests areProposed Cloud Architecture (5 pages n.docx
Customer requests areProposed Cloud Architecture (5 pages n.docxdorishigh
 
Customer Relationship Management Presented ByShan Gu Cris.docx
Customer Relationship Management Presented ByShan Gu Cris.docxCustomer Relationship Management Presented ByShan Gu Cris.docx
Customer Relationship Management Presented ByShan Gu Cris.docxdorishigh
 
Custom Vans Inc. Custom Vans Inc. specializes in converting st.docx
Custom Vans Inc. Custom Vans Inc. specializes in converting st.docxCustom Vans Inc. Custom Vans Inc. specializes in converting st.docx
Custom Vans Inc. Custom Vans Inc. specializes in converting st.docxdorishigh
 

More from dorishigh (20)

Cyber War versus Cyber Realities Cyber War v.docx
Cyber War versus Cyber Realities Cyber War v.docxCyber War versus Cyber Realities Cyber War v.docx
Cyber War versus Cyber Realities Cyber War v.docx
 
Cyber terrorism, by definition, is the politically motivated use.docx
Cyber terrorism, by definition, is the politically motivated use.docxCyber terrorism, by definition, is the politically motivated use.docx
Cyber terrorism, by definition, is the politically motivated use.docx
 
Cyber Security ThreatsYassir NourDr. Fonda IngramETCS-690 .docx
Cyber Security ThreatsYassir NourDr. Fonda IngramETCS-690 .docxCyber Security ThreatsYassir NourDr. Fonda IngramETCS-690 .docx
Cyber Security ThreatsYassir NourDr. Fonda IngramETCS-690 .docx
 
Cyber Security in Industry 4.0Cyber Security in Industry 4.0 (.docx
Cyber Security in Industry 4.0Cyber Security in Industry 4.0 (.docxCyber Security in Industry 4.0Cyber Security in Industry 4.0 (.docx
Cyber Security in Industry 4.0Cyber Security in Industry 4.0 (.docx
 
Cyber Security and the Internet of ThingsVulnerabilities, T.docx
Cyber Security and the Internet of ThingsVulnerabilities, T.docxCyber Security and the Internet of ThingsVulnerabilities, T.docx
Cyber Security and the Internet of ThingsVulnerabilities, T.docx
 
Cyber Security Gone too farCarlos Diego LimaExce.docx
Cyber Security Gone too farCarlos Diego LimaExce.docxCyber Security Gone too farCarlos Diego LimaExce.docx
Cyber Security Gone too farCarlos Diego LimaExce.docx
 
CW 1R Checklist and Feedback Sheet Student Copy Go through this.docx
CW 1R Checklist and Feedback Sheet Student Copy Go through this.docxCW 1R Checklist and Feedback Sheet Student Copy Go through this.docx
CW 1R Checklist and Feedback Sheet Student Copy Go through this.docx
 
CW 1 Car Industry and AIby Victoria StephensonSubmission.docx
CW 1 Car Industry and AIby Victoria StephensonSubmission.docxCW 1 Car Industry and AIby Victoria StephensonSubmission.docx
CW 1 Car Industry and AIby Victoria StephensonSubmission.docx
 
CWTS CWFT Module 7 Chapter 2 Eco-maps 1 ECO-MAPS .docx
CWTS CWFT Module 7 Chapter 2 Eco-maps 1 ECO-MAPS .docxCWTS CWFT Module 7 Chapter 2 Eco-maps 1 ECO-MAPS .docx
CWTS CWFT Module 7 Chapter 2 Eco-maps 1 ECO-MAPS .docx
 
Cw2 Marking Rubric Managerial Finance0Fail2(1-29) Fail.docx
Cw2 Marking Rubric Managerial Finance0Fail2(1-29) Fail.docxCw2 Marking Rubric Managerial Finance0Fail2(1-29) Fail.docx
Cw2 Marking Rubric Managerial Finance0Fail2(1-29) Fail.docx
 
Cyber AttacksProtecting National Infrastructure, 1st ed.Ch.docx
Cyber AttacksProtecting National Infrastructure, 1st ed.Ch.docxCyber AttacksProtecting National Infrastructure, 1st ed.Ch.docx
Cyber AttacksProtecting National Infrastructure, 1st ed.Ch.docx
 
CVPSales price per unit$75.00Variable Cost per unit$67.00Fixed C.docx
CVPSales price per unit$75.00Variable Cost per unit$67.00Fixed C.docxCVPSales price per unit$75.00Variable Cost per unit$67.00Fixed C.docx
CVPSales price per unit$75.00Variable Cost per unit$67.00Fixed C.docx
 
CYB207 v2Wk 4 – Assignment TemplateCYB205 v2Page 2 of 2.docx
CYB207 v2Wk 4 – Assignment TemplateCYB205 v2Page 2 of 2.docxCYB207 v2Wk 4 – Assignment TemplateCYB205 v2Page 2 of 2.docx
CYB207 v2Wk 4 – Assignment TemplateCYB205 v2Page 2 of 2.docx
 
CUSTOMERSERVICE-TRAINIGPROGRAM 2 TA.docx
CUSTOMERSERVICE-TRAINIGPROGRAM 2  TA.docxCUSTOMERSERVICE-TRAINIGPROGRAM 2  TA.docx
CUSTOMERSERVICE-TRAINIGPROGRAM 2 TA.docx
 
Customer Service Test (Chapter 6 - 10)Name Multiple Choice.docx
Customer Service Test (Chapter 6 - 10)Name Multiple Choice.docxCustomer Service Test (Chapter 6 - 10)Name Multiple Choice.docx
Customer Service Test (Chapter 6 - 10)Name Multiple Choice.docx
 
Customer Value Funnel Questions1. Identify the relevant .docx
Customer Value Funnel Questions1. Identify the relevant .docxCustomer Value Funnel Questions1. Identify the relevant .docx
Customer Value Funnel Questions1. Identify the relevant .docx
 
Customer service is something that we have all heard of and have som.docx
Customer service is something that we have all heard of and have som.docxCustomer service is something that we have all heard of and have som.docx
Customer service is something that we have all heard of and have som.docx
 
Customer requests areProposed Cloud Architecture (5 pages n.docx
Customer requests areProposed Cloud Architecture (5 pages n.docxCustomer requests areProposed Cloud Architecture (5 pages n.docx
Customer requests areProposed Cloud Architecture (5 pages n.docx
 
Customer Relationship Management Presented ByShan Gu Cris.docx
Customer Relationship Management Presented ByShan Gu Cris.docxCustomer Relationship Management Presented ByShan Gu Cris.docx
Customer Relationship Management Presented ByShan Gu Cris.docx
 
Custom Vans Inc. Custom Vans Inc. specializes in converting st.docx
Custom Vans Inc. Custom Vans Inc. specializes in converting st.docxCustom Vans Inc. Custom Vans Inc. specializes in converting st.docx
Custom Vans Inc. Custom Vans Inc. specializes in converting st.docx
 

Recently uploaded

18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxAnaBeatriceAblay2
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 

Recently uploaded (20)

18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 

Culturally Responsive Literacy Resources Template Part 1.docx

  • 1. Culturally Responsive Literacy Resources Template Part 1: Culturally Responsive Resource Information Part 2: Cultural Values and Perspectives Part 3: Curriculum Applications for Literacy Development Title: Medium: Description: Citation: Language Acquisition Theory: Social Studies: · Reading: · Writing: · Listening: · Speaking: Science: · Reading: · Writing: · Listening: · Speaking: Math: · Reading: · Writing: · Listening: · Speaking:
  • 2. Elective of your Choice: · Reading: · Writing: · Listening: · Speaking: Title: Medium: Description: Citation: Language Acquisition Theory: Social Studies: · Reading: · Writing: · Listening: · Speaking: Science: · Reading: · Writing: · Listening: · Speaking: Math: · Reading: · Writing: · Listening: · Speaking: Elective of your Choice: · Reading: · Writing: · Listening: · Speaking: Title: Medium: Description: Citation: Language Acquisition Theory:
  • 3. Social Studies: · Reading: · Writing: · Listening: · Speaking: Science: · Reading: · Writing: · Listening: · Speaking: Math: · Reading: · Writing: · Listening: · Speaking: Elective of your Choice: · Reading: · Writing: · Listening: · Speaking: © 2015. Grand Canyon University. All Rights Reserved. CIS 1130Analyzing TCP/IP Ports and AssociationsTCP/IP Applications Learning Objectives In this lab you will define the functions of TCP/IP port associations and review the common port number assignments. You will also use several utilities that will allow you to explore and analyze protocols, ports, and processes. When you have completed this lab, you will be able to Define the functions of TCP/IP port associations List some of the well known port number assignments
  • 4. Explore the various protocols, ports, and processes employed in a typical network communicationDescribe the functions of the DNS advance network servicesDetail the common client configuration settings of DNS Lab Materials and Setup The materials you will need for this lab arePencil and paperPC running Windows XP, Windows Vista, or Windows 7Internet access Instructions After exploring the higher-layer transport protocols, you would like to know how TCP/IP keeps track of all the different sessions on a typical networked PC. You decide to examine the protocols, ports, and processes involved in the typical browsing of a Web site. Task 1:Start with a description of the function of a TCP or UDP port. Task 2: Match the following port numbers to the appropriate protocols. Port 20 Port 21 Port 22 Port 23 Port 25 Port 69 Port 80 Port no
  • 5. Port 137 Port 138 Port143 Port 443 Note: Some protocols use more than one port number. Application Port SMTP TFTP FTP HTTP HTTPS POP3 IMAP4 SSH Telnet Hint: Windows lists all of the well-known ports and protocol services that are associated with them in a document named "services." Access this list in Windows 7 by opening Notepad (Start I All Pro- grams I Accessories I Notepad) and navigating to c:windowssystem32driversetc. Change the view from "Text Documents (*.txt)" to "All Documents(*.*)" to view and open the services document.
  • 6. Task 3: The services document is a static list of well-known ports on a Windows PC. You will seldom if ever see all of these endpoint ports open or active at one time. You can view a static listing of the active ports using the netstat command-line utility. netstat has a number of switches to customize the out- put of the list. Run the netstat /?command and provide a description of the following switches: Switch Description netstat –a netstat -b netstat -n netstat -o Note: You'll be making heavy use of the help functions of commands throughout the rest of the Lab in order to use some of these more advanced functions! When in doubt, type the command and add a space and/? to the end of the command! For example: ping /? Instructions Having just finished the chapter on network naming in the MikeMeyers'CompTIANetwork+ Guideto Managingand Troubleshooting Networks textbook, you know that you are going to have to implement DNS on the network lab's systems. You want to get a jump on the setup, so you set out to define DNS and WINS and examine how they are configured on the client machines in use at the home office of ITCF.
  • 7. Task 1: Describe the function of the DNS service on a TCP/IP network. Task 2: Local PCs cache any addresses resolved by DNS on the hard disk. To view a display of resolved addresses cached on your PC, you will use the command-line utility ipconfig /displaydns. Open a command prompt and type ipconfig /displaydns. What are your results? CIS 1130TCP/IP and Routing Learning Objectives In this lab, you will experiment with some common windows commands to explore the TCP/IP configuration of your computer and view its routing table.Understand the netstat command and outputTry the route command and explain what a routing table does Lab Materials and Setup The materials you'll need for this lab are A Windows PC with Internet accessThe MikeMeyers' CompTIANetwork+ Guide to Managing and Troubleshooting Networks textbookPencil and paper Instructions – Part 1 In today’s lab, you will be working with common commands on your windows workstation to view the network configuration.
  • 8. Task 1: Run the IPConfig command and understand the output. Log in to any available networked Windows computer. Select Start | Run or just Start, type cmd, and press enter to open a command prompt; From the command prompt, type ipconfig /all, and then press enter. Fill in as much information as you can from your screen into the table. For a tip on what to include, check Lab Project 7.3 in your textbook. Task 2: Run the Netstat command and understand the output. Start a command prompt at your computer and enter netstat –nr to view its routing table. Create a screenshot of the output and paste it into this document under this task. Under the pasted screenshot, briefly explain what each column
  • 9. is for. CIS 1130Building an Ethernet Patch CableEthernet Basics Learning Objectives In this lab, you will research a TIA/EIA 568B patch cable. When you have completed this lab you will be able toIdentify proper orientation of RJ-45 connectorsIdentify the wire pairs of a UTP patch cable according to the specifications of the TIA/EIA 568B standard Lab Materials and Setup The MikeMeyers'CompTIANetwork+Guide to Managingand Troubleshooting Networkstextbook A computer with Internet accessPencil and paper Instructions – Part 1 The TIA/EIA 568B standard defines the arrangement of 4 pair UTP cabling into RJ 45 connector. In purchasing commercial premade cables the emerging standard is 568B. Task 1: Using the Internet conduct a search for the TIA/EIA 568B standard wiring diagram. There are many sites that offer color coded diagrams for wiring straight through patch cables. Using your color coded diagram record the proper color wire for each of the pins of the RJ 45 modular connector when assembled using the TIA/EIA 568B standard. Pin 1: Pin 2: Pin 3: Pin 4: Pin 5: Pin 6: Pin 7: Pin 8:
  • 10. Optional: When possible in class we would make cables using these standards. Depending on this course format, that may not be possible. However if you have an extra UTP cable available you can examine or disassemble it to compare the concepts and layout of the pairs. Learning Objectives In this lab, you'll examine the standards and technology of 1000BaseT, 1000BaseSX, and 1000BaseLX Ethernet. When you have completed this lab, you will be able to Define the 1000BaseT Ethernet specifications, requirements, and limitationsDefine the 1000BaseSX and 1000BaseLX Ethernet specifications, requirements, and limitationsRecommend Gigabit Ethernet NICsDetermine appropriate use of fiber-optic Ethernet based on application Instructions – Part 2 Your client is building a new regional complex consisting of two physical buildings. One building will house all of the administrative departments. The other building, located approximately 900 feet away from the administrative building, will be a large, garage-like structure where the inspection of automobiles will be conducted. The professional installers have submitted a proposal that has been accepted, outlining the following parameters: The proposed cabling for the internal office space of the administrative building is Category 6 UTP. The administrative network will need to support 75 to 100 devices (servers, computers, and printers). The proposed cabling for the internal area of the inspection building is Category 6 UTP. The network in the inspection
  • 11. building will need to support 25 to 40 devices (computers and printers). For the backbone between the two buildings, the proposal is single-mode 12-fiber optic cabling. Using this general information, follow Steps 1 through 4 to develop an implementation plan for the new site. The design should take advantage of the Gigabit Ethernet technology. Task 1:Utilizing the textbook and online resources, research and document the following information for 1000BaseT Ethernet: Speed: Distance: Cabling: Connectors: Task 2: Utilizing online resources research and document the following information for 1000BaseTX Ethernet: Speed: Distance: Cabling: Connectors: Task 3:Utilizing the textbook and online resources, research and document the following information for 1000BaseSX Ethernet:
  • 12. Speed: Distance: Cabling: Connectors: Task 4:Utilizing the textbook and online resources, research and document the following information for 1000BaseLX Ethernet Speed: Distance: Cabling: Connectors: Task 5:Utilizing online resources research and document the following information for 1000BaseZX Ethernet: Speed: Distance: Cabling: Connectors: Task 6:As discussed in the scenario, the new facility will have approximately 100 to 140 network devices (computers and
  • 13. printers). In order to implement Gigabit Ethernet throughout the organization, each device will need a gigabit NIC. Launch your browser and research the current pricing for Gigabit Ethernet NICs. Document your findings in the following space: