The document provides instructions for configuring a Cisco switch or router. It begins by explaining how to define the hostname of the device using the commands "enable", "configure terminal", and "hostname". Next, it states to assign privileged EXEC mode using the command "enable secret password". Finally, it mentions configuring VLANs, interfaces, and IP addresses to set up the basic network connectivity of the switch.
Example
IT-600
Journal Entry 1
Every operating system, whether Windows, Linux, or Macintosh have command, which guide the owner operator about the system they are using, cores, memory, processor, hardware, software, etc. They system I am using is Apple Mac OS Sierra Version 10.12.1, as displayed below.
Not being familiar with OS, I had difficulty finding out where to click and run command system_profiler, so the hardware and software information can be retrieved. Finally, after good research online, it was just the matter of clicking on system icons to get information (with more than one way).
So, on Mac OS, one can either go under Application folder and click on Utilities folder and once that opens up just click on System Information. Another way of getting on this page is to click on the Apple Menu on top left corner. Just click About This Mac and then click System Report.
Once the profiler is open, one can view information on three different contents of the system, Hardware, Network, and Software. The Hardware information is copy/paste below:
Hardware Overview:
Model Name: MacBook Pro
Model Identifier: MacBookPro9,2
Processor Name: Intel Core i7
Processor Speed: 2.9 GHz
Number of Processors: 1
Total Number of Cores: 2
L2 Cache (per Core): 256 KB
L3 Cache: 4 MB
Memory: 8 GB
Boot ROM Version: MBP91.00D3.B0D
SMC Version (system): 2.2f41
Serial Number (system): C1MKXC86DTY4
Hardware UUID: 3571F1FE-3368-58D3-85B6-26F7DDCCB1CF
Sudden Motion Sensor:
State: Enabled
This operating system in use is MacBook Pro, which can easily identified by MacBookPro9.2. The name of the processor being used on this machine is Intel Core i7 with 2.9 GHz speed. There are two different memory slots in this system, BANK0/DIMMO and BANK 1/DIMMO both of them are 4 GB with 1600 MHz speed. There are total of 2 Cores and 256 KB of L2 Cache is being used per core. Moreover, the System Profiler expands more inside information about hard drives, Bluetooth, Camera, Diagnostics, SD Card Reader, Ethernet Cards, FireWire, PCI, Memory, Printers, Storage, USB, Serial-ATA Device, etc. Under Serial-ATA Device, one can learn more about the Intel 7 Series. It is emphasizing more towards the vendor, product, link speed, negotiated link speed, physical interconnect.
Intel 7 Series Chipset:
Vendor: Intel
Product: 7 Series Chipset
Link Speed: 6 Gigabit
Negotiated Link Speed: 3 Gigabit
Physical Interconnect: SATA
Description: AHCI Version 1.30 Supported
APPLE HDD HTS541010A9E662:
Capacity: 1 TB (1,000,204,886,016 bytes)
Model: APPLE HDD HTS541010A9E662
Revision: JA0AB5D0
Serial Number: JA8006ET05XU8Y
Native Command Queuing: Yes
Queue Depth: 32
Removable Media: No
Detachable Drive: No
BSD Name: disk0
Rotational Rate: 5400
Medium Type: Rotational
Partition Map Type: GPT (GUID Partition Table)
S.M.A.R.T. status: Verified
Volumes:
EFI:
Capacity: 209.7 MB (209,715,200 bytes)
BSD Name: disk0s1
Content: EFI
Volume UUID: 0 ...
Understanding the Windows Server Administration Fundamentals (Part-1)Tuan Yang
Windows Server Administration is an advanced computer networking topic that includes server installation and configuration, server roles, storage, Active Directory and Group Policy, file, print, and web services, remote access, virtualization, application servers, troubleshooting, performance, and reliability.
Learn more about:
» What is the Server?
» Server Roles.
» Server Hardware.
» Work groups & Domains.
» Device and printers.
» Windows Server OS Management tools.
Faster Computing was impressed with your presentation. The company.pdframizmemonahmedabado1
Faster Computing was impressed with your presentation. The company is interested in moving
forward with the project, but the senior management team has responded to the presentation with
the following questions and concerns:
IMPORTANT: follow these instructions
your claims need credibility, The NIST docs will get you there.
they need assurance, what apps can they expect
They had an old way of doing business, is the new way you are suggesting manageable?
is your company a solution ? if youre telling them they will have to figure out, then your offering
is zero value.
Style: write in third person, no "I" or "we"; "...a study was performed...."
Use the bullet separators in your formatting
Use IEEE reference style
Security: use NIST SP800-53
Think Open Office or Libre for Windows apps
Log files, look at NIST SP800-92
Different types of linux, "keyword linux distros"
Note: you are writing to Faster Computing's management and not an audience of engineers and
administrators.
(12.3.2: Describe the implementation of controls.)
How will security be implemented in the Linux systemsboth workstations and servers?
(10.1.2: Gather project requirements to meet stakeholder needs.)
End users have expressed some concern about completing their day-to-day tasks on Linux. How
would activities such as web browsing work? How would they work with their previous
Microsoft Office files?
(12.4.1: Document how IT controls are monitored.)
The current Windows administrators are unsure about administering Linux systems. How are
common tasks, such as process monitoring and management, handled in Linux? How does
logging work? Do we have event logs like we do in Windows?
(2.3.2: Incorporate relevant evidence to support the position.)
Some folks in IT raised questions about the Linux flavor that was recommended. They would
like to see comparisons between your recommendation and a couple of other popular options.
What makes your recommendation the best option?
(10.1.3: Define the specifications of the required technologies.)
How does software installation work on Linux? Can we use existing Windows software?
How can Linux work together with the systems that will continue to run Windows? How will we
share files between the different system types?
The deliverable for this phase of the project is a memo. There is no minimum or maximum page
requirement, but all of the questions must be fully answered with sufficient detail. The
recommended format is to respond to the questions in a bulleted format. Provide sufficient detail
to fully address the questions. You must cite at least two quality sources.
(1.2.3: Explain specialized terms or concepts to facilitate audience comprehension.)
Create a memorandum template with a header of your own design or choosing, brief
introduction, addresses Faster Computing, Inc's questions, and summarizes your position on
adopting the specific version of Linux.
(1.4.3: Write concise and logical sentences in standard academic English that clarify
relations.
Example
IT-600
Journal Entry 1
Every operating system, whether Windows, Linux, or Macintosh have command, which guide the owner operator about the system they are using, cores, memory, processor, hardware, software, etc. They system I am using is Apple Mac OS Sierra Version 10.12.1, as displayed below.
Not being familiar with OS, I had difficulty finding out where to click and run command system_profiler, so the hardware and software information can be retrieved. Finally, after good research online, it was just the matter of clicking on system icons to get information (with more than one way).
So, on Mac OS, one can either go under Application folder and click on Utilities folder and once that opens up just click on System Information. Another way of getting on this page is to click on the Apple Menu on top left corner. Just click About This Mac and then click System Report.
Once the profiler is open, one can view information on three different contents of the system, Hardware, Network, and Software. The Hardware information is copy/paste below:
Hardware Overview:
Model Name: MacBook Pro
Model Identifier: MacBookPro9,2
Processor Name: Intel Core i7
Processor Speed: 2.9 GHz
Number of Processors: 1
Total Number of Cores: 2
L2 Cache (per Core): 256 KB
L3 Cache: 4 MB
Memory: 8 GB
Boot ROM Version: MBP91.00D3.B0D
SMC Version (system): 2.2f41
Serial Number (system): C1MKXC86DTY4
Hardware UUID: 3571F1FE-3368-58D3-85B6-26F7DDCCB1CF
Sudden Motion Sensor:
State: Enabled
This operating system in use is MacBook Pro, which can easily identified by MacBookPro9.2. The name of the processor being used on this machine is Intel Core i7 with 2.9 GHz speed. There are two different memory slots in this system, BANK0/DIMMO and BANK 1/DIMMO both of them are 4 GB with 1600 MHz speed. There are total of 2 Cores and 256 KB of L2 Cache is being used per core. Moreover, the System Profiler expands more inside information about hard drives, Bluetooth, Camera, Diagnostics, SD Card Reader, Ethernet Cards, FireWire, PCI, Memory, Printers, Storage, USB, Serial-ATA Device, etc. Under Serial-ATA Device, one can learn more about the Intel 7 Series. It is emphasizing more towards the vendor, product, link speed, negotiated link speed, physical interconnect.
Intel 7 Series Chipset:
Vendor: Intel
Product: 7 Series Chipset
Link Speed: 6 Gigabit
Negotiated Link Speed: 3 Gigabit
Physical Interconnect: SATA
Description: AHCI Version 1.30 Supported
APPLE HDD HTS541010A9E662:
Capacity: 1 TB (1,000,204,886,016 bytes)
Model: APPLE HDD HTS541010A9E662
Revision: JA0AB5D0
Serial Number: JA8006ET05XU8Y
Native Command Queuing: Yes
Queue Depth: 32
Removable Media: No
Detachable Drive: No
BSD Name: disk0
Rotational Rate: 5400
Medium Type: Rotational
Partition Map Type: GPT (GUID Partition Table)
S.M.A.R.T. status: Verified
Volumes:
EFI:
Capacity: 209.7 MB (209,715,200 bytes)
BSD Name: disk0s1
Content: EFI
Volume UUID: 0 ...
Understanding the Windows Server Administration Fundamentals (Part-1)Tuan Yang
Windows Server Administration is an advanced computer networking topic that includes server installation and configuration, server roles, storage, Active Directory and Group Policy, file, print, and web services, remote access, virtualization, application servers, troubleshooting, performance, and reliability.
Learn more about:
» What is the Server?
» Server Roles.
» Server Hardware.
» Work groups & Domains.
» Device and printers.
» Windows Server OS Management tools.
Faster Computing was impressed with your presentation. The company.pdframizmemonahmedabado1
Faster Computing was impressed with your presentation. The company is interested in moving
forward with the project, but the senior management team has responded to the presentation with
the following questions and concerns:
IMPORTANT: follow these instructions
your claims need credibility, The NIST docs will get you there.
they need assurance, what apps can they expect
They had an old way of doing business, is the new way you are suggesting manageable?
is your company a solution ? if youre telling them they will have to figure out, then your offering
is zero value.
Style: write in third person, no "I" or "we"; "...a study was performed...."
Use the bullet separators in your formatting
Use IEEE reference style
Security: use NIST SP800-53
Think Open Office or Libre for Windows apps
Log files, look at NIST SP800-92
Different types of linux, "keyword linux distros"
Note: you are writing to Faster Computing's management and not an audience of engineers and
administrators.
(12.3.2: Describe the implementation of controls.)
How will security be implemented in the Linux systemsboth workstations and servers?
(10.1.2: Gather project requirements to meet stakeholder needs.)
End users have expressed some concern about completing their day-to-day tasks on Linux. How
would activities such as web browsing work? How would they work with their previous
Microsoft Office files?
(12.4.1: Document how IT controls are monitored.)
The current Windows administrators are unsure about administering Linux systems. How are
common tasks, such as process monitoring and management, handled in Linux? How does
logging work? Do we have event logs like we do in Windows?
(2.3.2: Incorporate relevant evidence to support the position.)
Some folks in IT raised questions about the Linux flavor that was recommended. They would
like to see comparisons between your recommendation and a couple of other popular options.
What makes your recommendation the best option?
(10.1.3: Define the specifications of the required technologies.)
How does software installation work on Linux? Can we use existing Windows software?
How can Linux work together with the systems that will continue to run Windows? How will we
share files between the different system types?
The deliverable for this phase of the project is a memo. There is no minimum or maximum page
requirement, but all of the questions must be fully answered with sufficient detail. The
recommended format is to respond to the questions in a bulleted format. Provide sufficient detail
to fully address the questions. You must cite at least two quality sources.
(1.2.3: Explain specialized terms or concepts to facilitate audience comprehension.)
Create a memorandum template with a header of your own design or choosing, brief
introduction, addresses Faster Computing, Inc's questions, and summarizes your position on
adopting the specific version of Linux.
(1.4.3: Write concise and logical sentences in standard academic English that clarify
relations.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Safalta Digital marketing institute in Noida, provide complete applications that encompass a huge range of virtual advertising and marketing additives, which includes search engine optimization, virtual communication advertising, pay-per-click on marketing, content material advertising, internet analytics, and greater. These university courses are designed for students who possess a comprehensive understanding of virtual marketing strategies and attributes.Safalta Digital Marketing Institute in Noida is a first choice for young individuals or students who are looking to start their careers in the field of digital advertising. The institute gives specialized courses designed and certification.
for beginners, providing thorough training in areas such as SEO, digital communication marketing, and PPC training in Noida. After finishing the program, students receive the certifications recognised by top different universitie, setting a strong foundation for a successful career in digital marketing.
Normal Labour/ Stages of Labour/ Mechanism of LabourWasim Ak
Normal labor is also termed spontaneous labor, defined as the natural physiological process through which the fetus, placenta, and membranes are expelled from the uterus through the birth canal at term (37 to 42 weeks
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Han’s Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insider’s LMA Course, this piece examines the course’s effects via a variety of Tim Han LMA course reviews and Success Insider comments.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
1. M11Cde Skills-Based Assessment
School of Engineering & Computing Department of Computing Internet Information Security
(M11CDE) Layered Security Student Name: BUSAABANG OBI SID:4560229 I certify that this is
my own work yes/no and that I have read and understand the University Assessment regulations.
Signature: [pic] Submission Details The details below indicate what you should submit, when you
should submit it and where is should be submitted to. Submission Date and Method Deadline 11
January 2013 11:50pm online submission. Submission Format: 1. Fill the online quiz for the
practical test which will be available one week before the final fixed deadline. 2. Download an
electronic copy of this document and ... Show more content on Helpwriting.net ...
If it is not immediately apparent subtract the last non–zero octet from 256. Edinburgh information
The LAN for Edinburgh has been assigned an IP network address of 192.168.5.0 Again, each subnet
of the above network needs to
... Get more on HelpWriting.net ...
2.
3. Unit 2 TASK 1 Decoding the Jargon
TASK 1: Decoding the Jargon
a. Create a booklet which explain the function of hardware components and identify communication
between components. The pages should include photographs and diagrams to illustrate the
information you include. (P1)
Components communication
The following diagram shows how components communicate each other's.
CPU
Also known as the processor, the CPU is the heart of the computer and has two part:
Control Unit
The control unit controls the flow of data through the processor.
Arithmetic/Logic unit (ALU)
The ALU performs mathematical, logical, and decision operations in a computer and is the final
processing performed by the processor.
RAM
A computer can only run a program when it is in memory ... Show more content on Helpwriting.net
...
DOS is the basic system that people have to using Command line prompt to communicate with
computer via simple interface which is not "friendly" user interface.
The DOS can't run multitask on computer which can only load one program until it finished. But
some of the features still quite useful that people still use it. Such as:
5. CHKDSK
6. GBUPDATE
7. IPCONFIG
8. PING
9. FDISK
Comparison of two operating systems
We can see there are many different between those two computer operating system which the
Windows 8 operating system have a lots of advance features and higher performance that suit to
nowadays. The DOS system usually used to be run a specific program which prevents any virus or
hacker attack in the solo computer such as sale program, data base in the hospital or council data
base.
Features
4. Windows 8
DOS
Network
Yes
N/A
GUI
Yes
N/A
Multiuser
Yes
N/A
Server Administration
Yes
N/A
Command line interface
Yes
Yes
Entertain
Yes
N/A
Sound
Yes
Yes
Multitask
Yes
N/A
c. In your document explain the purpose of different software utilities which is available. Explain
how software utilities can improve the performance of computer systems (P3, D1)
Windows 8 Utility
Virus Protection
The specific program used to prevent viruses, worms and Trojans which attached in the email or
website.
Every computer need to install an anti–virus software and
... Get more on HelpWriting.net ...
5.
6. What Is An Operating System?
Unit 2 Assignment 1 P2/M1
What is an operating system?
An operating system is software that communicates with the hardware and it allows other programs
to run it. Operating systems is the structure that allows you to communicate with computer hardware
in a communicating way , without an operating system you wouldn't be able to tell the computer to
do anything and it won't have any instructions to follow.
Purpose of an operating system:
Operating system controls the hardware and software properties of the system in a computer these
properties include things like processer, memory and disk space. Computers must have an operating
system to run other programs also an operating system does basic tasks such as looking and
recognizing the input from the keyboard and also sending output to display on the screen , keeping
track of files and directories on the disk and controlling the disk drivers and printers.
The purpose of an operating system, a purpose of an operating system is memory management this
process happens when a computer searches for a memory to programs that run in the same time.
Virtual memory is a data storage that will keep separate memory addresses accessed before by the
user, this process will increase the amount of RAM and transfer data to the secondary storage.
Virtual memory can have an impact on how well computer will work because of its storage.
An operating system manages the hardware and software resources of the system. A computer must
have an
... Get more on HelpWriting.net ...
7.
8. Bt594 Final Project
TM1: Installing and using Linux operating systems BIT594 – Technologies in Practice Due date:
31/03/2016 Bobbi–jo Ataahua Paikea – 4203318 Question 1: Installing Ubuntu Task 1: Download
the latest version of Ubuntu Download the latest version of Ubuntu (the recommended flavour is
32–bit, as not all software will run on a 64–bit). Take a screenshot while downloading the latest
version and include this in the electronic file you submit. You need to document the screenshot and
describe accurately what the screenshot was about. Write no more than 50 words to explain the
screenshot. Figure 1: Download of Ubuntu 14.04.4 LTS (Trusty Tahr). Screenshot description:
Captured in the screenshot as seen in figure 1 is the download process of ... Show more content on
Helpwriting.net ...
Take three screenshots of relevant stages during the installation process. Write no more than 100
words for each screenshot to describe what was accomplished. Include the screenshots in the word–
processed document you submit. Marks will be awarded for the relevance of the screenshots
selected. It will be for you to decide and explain why the screenshots selected are relevant.
Explanation for chosen screenshots: As question 2 is clearly focused on terminal/command line,
below are three screenshots that have relevance to the command–line environment. Instead of using
the GUI environment to install a new application on the Ubuntu desktop, the terminal/command line
was used. Using the terminal/command line showcases a different route of installing a new
application. The command–line environment also allows the processors to do more precise task
procedures. Users are able to view a list of details and descriptions about applications before
choosing one to install. Figure 1: Package names and short descriptions of the three
... Get more on HelpWriting.net ...
9.
10. Guide to Unix Using Linux Fourth Edition Chapter 1 Review...
Guide to UNIX Using Linux Fourth Edition Chapter 1 Solutions
Answers to the Chapter 1 Review Questions
1. Your boss drops by your office in a hurry to ask you to attend a meeting at 10:30 on Friday
morning and you can't find a pen to make a note as a reminder. What Linux command can you use
to make a quick note to store in a file called Meeting? Answer: b. cat > Meeting
2. Before you make the note in Question 1, you decide to determine Friday's date, so that you can
include it in your note. What Linux command can you use to quickly determine the Friday's date?
Answer: a. cal
3. While you are typing a command, you misspell the name of a file you want to specify with the
command. Which of the following ... Show more content on Helpwriting.net ...
What key sequence can you use to repeat the last command, which was used to print the file?
Answer: c. Press the up arrow key one time.
21. Your international company is scheduling a meeting among managers in Canada, the United
States, Spain, Sweden, and Hong Kong on the basis of Greenwich Mean Time (GMT). What
command enables you to display the current time in GMT? Answer: b. date –u
22. How would you describe the purpose of the more command? Answer: The more command
enables you to view a file's contents by scrolling down.
23. What is the purpose of Telnet? Answer: Telnet can be used to connect a UNIX , Linux, or
Windows PC to a remote computer.
24. You enter Cal on the command line to view a calendar but only see an error message. Explain
why you got the error message. Answer: UNIX and Linux are case sensitive, so to display a calendar
you must use the cal command and not Cal.
25. Explain how you can run more than one command on a single command line. Answer: To run
more than one command on a single line, use the : (semicolon) character to separate each command.
Hands–On Projects Tips and Solutions for Chapter 1
11. Project 1–1
In this project, students use Telnet in Windows 2000/XP/Vista to access a remote computer running
UNIX/Linux. Students will need accounts on both the Windows 2000/XP/Vista
... Get more on HelpWriting.net ...
12.
13. It320 Hmwk 4.1
IT320
IT320 Wan Technology/ Unit 4
Assignment: 4.1
1. At what layer of the OSI model does CDP operate?
Data Link layer
2. What is the primary use for CDP?
To discover information about directly connected Cisco devices
3. What network layer protocols can CDP provide information for?
IP, Internetwork Packet Exchange (IPX), and AppleTalk
4. When CDP is enabled on an interface, a router (or switch) sends CDP advertisements on a regular
basis, which list information about the sending router. Included in the packets are a series of
Type/Length/Value, or TLV, data structures.
5. The show cdp neighbors command can be used to display one line of information about each
directly connected CDP–enabled device. List the six pieces ... Show more content on
Helpwriting.net ...
Compiled Thu 20–Feb–03 14:09 by pwade advertisement version: 2
RTC# show cdp interface
Ethernet0 is up, line protocol is up
122 Routers and Routing Basics CCNA 2 Labs and Study Guide
Encapsulation ARPA
Sending CDP packets every 60 seconds
Holdtime is 180 seconds
Serial0 is up, line protocol is up
Encapsulation HDLC
Sending CDP packets every 60 seconds
Holdtime is 180 seconds
Serial1 is administratively down, line protocol is down
Encapsulation HDLC
Sending CDP packets every 60 seconds
Holdtime is 180 seconds
16. List and briefly describe the debug options displayed after entering the following command:
14. RTB#debug cdp ? adjacency CDP neighbor info events CDP events ip CDP ip info packets CDP
packet–related information
17. Fill in the table that follows.
Command Description
... Get more on HelpWriting.net ...
15.
16. Advantages And Disadvantages Of MATLAB
The name MATLAB stands for Matrix Laboratory. MATLAB is a high–performance language for
technical computing. It integrates computation, visualization, and programming in an easy–to–use
environment where problems and solutions are expressed in familiar mathematical notation. Typical
uses include:
Math and computation
Algorithm development
Modelling, simulation, and prototyping
Data analysis, exploration, and visualization
Scientific and engineering graphics
Application development, including Graphical User Interface building
MATLAB is an interactive system whose basic data element is an array that does not require
dimensioning. This allows you to solve many technical computing problems, especially those with
matrix and vector formulations, ... Show more content on Helpwriting.net ...
Three principal elements required to create a MATLAB Graphical User Interface. The elements are
components, figures, callbacks.
1. Components
Each item on a GUI is a graphical component. The types of components include graphical controls
(pushbuttons, radio buttons, edit boxes, lists, sliders, etc.), static elements (frames and text strings),
menus, and axes. Graphical controls and static elements are created by the functions and axes are
used to display graphical data which is created by the function axes.
2. Figures
The components of a GUI must be arranged within a figure, which is a window on the computer
screen.
3. Callbacks
Finally, there must be some way to perform an action if a user clicks on a button. A mouse click or a
key press is an event, and the MATLAB program must respond to each event if the program is to
perform its function. The code executed in response to an event is known as a call back. There must
be a callback to implement the function of each graphical component on the
... Get more on HelpWriting.net ...
17.
18. Disadvantages Of 2 User Interface
2 User Interface
User Interface is a function of the operating system that allows individuals to access and command
the computer. It is the junction between a user and a computer program. Task of the users are
changing rapidly and even functionality of computer becomes more complex according to it user
must adjust their behavior and problem solving strategies to the system. This situation becomes
worst as user do not have that proper experience and knowledge [5], [6].
A well designed interface can provide much more helpful information in a more appropriate manner
through interaction specially for those user who have lack of knowledge. Therefore user interface is
must so that it can give bene t to both user and resource management. An interface is a set of
commands or ... Show more content on Helpwriting.net ...
Menu Driven Interface (MDI) This type of interface lets you interact with a computer or device
through a series of screens or menus. Menu is presented, make a choice and then the next menu
appears on the screen.Then make another choice and so on. Example: Cash point machines (ATMs)
and iPod or mobile phone, they both use a menu driven interface [7].
ˆ Advantages of MDI
{ There are no commands to learn or remember.
{ Each and every step are given so that the user doesn't have to re– member anything.
{ Even if don't know what to do, can usually guess way around the options. { Menu interfaces don't
have to be visual, they can be spoken – good for telephones or for visually impaired people.
{ They don't need huge amounts of processing power or memory.
ˆ Disadvantages of MDI
{ A poorly designed menu interface may be slow to use.
{ It can be irritating if there are too many menu screens to work through. { If often can't go to the
exact place then want right at the start. Then have to work own way through the menu screens even
if know where then want to get to.
Dept. of Computer Engg. 5 DYPCOE, Akurdi, Pune
Operating System Design User Interface to Operating
... Get more on HelpWriting.net ...
19.
20. Cisco Activity
Task 3: Interpreting Debug Output.
Note: If you already configured IP addressing on R1, please remove all the interface commands now
before proceeding. Furthermore, R2 and R3 should be configured through the end of "Task 2: Basic
Router Configuration".
Step 1 – On R1 from privileged EXEC mode, enter the debug ip routing command.
R1# debug ip routing.
IP routing debugging is on.
The debug ip routing command will show when routes are added, modified and deleted from the
routing table. For example, every time you successfully configure and activate an interface, Cisco
IOS adds a route to the routing table. We can verify this by observing output from the debug ip
routing command.
Step 2 – Enter interface configuration mode for R1's LAN ... Show more content on Helpwriting.net
...
End with CNTL/Z.
R1(config)# interface serial 0/0/0
Configure the ip address as specified in the Topology Diagram.
R1(config–if)# ip address 172.16.2.1 255.255.255.0 is_up: 0 state: 0 sub state: 1 line: 0 has_route:
False
As soon as you press the enter key, Cisco IOS debug output informs you that there is now a route,
but its state is "False". Since R1 is the DCE side of our lab environment, we must specify how fast
bits will be clocked between R1 and R2.
Step 6 Enter the clock rate command on R1.
You can specify any valid clocking speed. Use the ? to find the valid rates. Here, we used 64000
bps.
R1(config–if)# clock rate 64000
Step 7 Enter the command necessary to insure the interface is fully configured.
R1(config–if)# no shutdown
After you enter the correct command, you should see debug output similar to the following:
is_up: 0 state: 0 sub state: 1 line: 0 has_route: False
%LINK–3–UPDOWN: Interface Serial0/0/0, changed state to down
21. Unlike the LAN interface, fully configuring the WAN interface is not always enough to have the
route entered in the routing table even if your cable connections are correct. The other side of the
WAN link must also be configured. /u>
Step 8 If possible, establish a separate terminal session with R2. Click on R2
This will allow you to observe the debug output on R2 when you make changes on R1. You can also
turn on debug ip routing on R2.
R2#debug ip routing
IP routing debugging is on
Enter
... Get more on HelpWriting.net ...
22.
23. Cisco Switch Configuration
Define hostname It is very useful define the name of your Cisco switch/router. To do it: Enable
administrative privilege Router>en Enter the configuration mode: Router#configure terminal Define
the hostname (the name router is changed to Ciscozine) Router(config)#hostname Ciscozine
Ciscozine(config)# Assign the privileged level secret The enable secret password allows you to enter
enable mode (sometimes referred to as privileged mode or privileged–EXEC mode). To set a secret
password: Enable administrative privilege Ciscozine>en Enter the configuration mode:
Ciscozine#configure terminal Define the privileged–EXEC mode password; remember to use a
strong password (combine letters, numbers, nd symbols). The enable secret ... Show more content
on Helpwriting.net ...
To "encrypt" it: Enable administrative privilege Ciscozine>en Enter the configuration mode:
Ciscozine#configure terminal The actual encryption process occurs when the current configuration
is written or when a password is configured. Password encryption (it uses Vigenere algorithm) is
applied to all passwords, including username passwords, authentication key passwords, the
privileged command password, console and virtual terminal line access passwords, and Border
Gateway Protocol neighbor passwords. This command is primarily useful for keeping unauthorized
individuals from viewing your password in your configuration file. Ciscozine(config)#service
password–encryption REMEMBER:The Vigenere algorithm is used to obfuscate the passwords (not
really encrypt them as there is no encryption key) in order to prevent "shoulder surfing" from
exposing passwords to someone who briefly looks at a running configuration. If, however, someone
gets hold of the configuration they can easily retrieve the passwords using the reverse translation of
the Vigenere algorithm. You could check your current configuration with the command "show
running–config". Ciscozine#show running–config Building configuration... Current configuration :
782 bytes ! version 12.2 service timestamps debug datetime msec service timestamps log datetime
msec service
... Get more on HelpWriting.net ...
24.
25. Nt1330 Unit 3 Assignment 4 Command Line
CM 523 Homework 4: Command Line Bochao Sun Nov. 14, 2017 When I encountered command
line during last week's class, I found it a little confusing and "aloof". I was totally unfamiliar with its
purpose and syntax, and the interface is merely characters of same font and size. I thought it is
something only for computer science students and does not have anything to do with web design and
interaction. Things changed a lot as I learn to use it. In fact, such flat interface excludes all graphical
display formats in regular commands thus makes it clearer to find the target directory and file by
looking their names and types (e.g. style.css) returned after the "ls" command. It should occupy less
RAM of the computer than Finder because it does not "render" – figure out icons and thumbnails –
for all files ... Show more content on Helpwriting.net ...
When I am using graphical user interface, I can go back and forth to the last directory by simply
clicking at arrow on the Finder window. However, I need to type commands every time to change
directory (cd) and know what is in the directory (pwd). Therefore, CLI both saves time and takes
time. It also takes time to learn and get used to the set of commands that make sense in CLI. What's
more, contents are permanently deleted after the "rm" or "rm –r" command, which may cause loss of
important documents by mistake. Another detail that I pay attention to is that in Finder, I can
preview most files by pressing the Space button and switch the files with arrow buttons on
keyboard, while previewing is not available on CLI. I need to open it with an "open" command. In
addition, CLI once surprised me by making reasonable suggestions. The first time I tried to open a
website in CLI, I typed the address without "http://" and it was actually regarded as a path (see
below). When it could not found the folder and file on my computer, it surprisingly asked "Perhaps
you meant (suggested
... Get more on HelpWriting.net ...
26.
27. Basic Device And Security Configuration Paper
Basic Device and Security Configuration
Kevin Kormylo, Okoma Mita, Dan O'Donnell
CIT/249
January 12, 2015 Steve Acklin
Basic Device and Security Configuration
When designing a network there are basic network and security configurations that one needs to
consider. Choosing a hostname for each device is very important, this allows the user to know what
device they are working on. Configuring interfaces with a proper IP, subnet, and descriptions are
part of the basic configuration of a network device.
One needs to consider the security setting for the network devices. There are some basic
configurations that one can choose to use in their configuration. Passwords and a username should
be used for consoling and remote access to any ... Show more content on Helpwriting.net ...
We were able to name the devices and create the banners as required. All passwords were encrypted
and remote access was successful for SSH and telnet. All interfaces were assigned a description that
were being used and the others not being used, were shutdown. We secured remote access by a
username and password along with the rsa key. We verified our configuration by posting the running
configuration in our team thread.
Team A's assignment
The assignment was broken up into two parts. Each member had a device to configure Dan
configured Branch1 router, Adam was assigned Branch2 router, Okoma configured the switch, PC,
ISP, and Kevin configured the Core router. We did not receive a config from Adam so, Kevin was
able to do that part too. Okoma and Dan provided a brief written summary of the work they
performed and Kevin put the paper together.
Switch1 running configuration:
Current configuration : 3826 bytes
!
version 12.2 no service pad service timestamps debug uptime service timestamps log uptime service
password–encryption
!
hostname Switch1
28. !
no logging console enable secret 5 $1$m1XN$lgDd.3R8lddprN/Z8Vxzu0 enable password 7
110A000712001E1F
!
username admin password 7 02051D590E141A32 no aaa new–model ip subnet–zero
!
ip domain–name mycompany.com
!
! crypto pki trustpoint TP–self–signed–1363906688 enrollment selfsigned subject–name cn=IOS–
Self–Signed–Certificate–1363906688
... Get more on HelpWriting.net ...
29.
30. Analyzing The Multi User Operating System With Li And Ci...
Q 2 Analyzing the multi user operating system with GUI and CLI
GUI with it's capacity to show content utilizing distinctive textual styles and in addition to show
realistic, gives a greater number of abilities than prohibitive character–based interface. In any case
the character interface is truly essential and considered great from another perspective: it is more
programmable and more capable than any GUI can ever be. Additionally we have to recognize that
thought of GUI interface from most regular execution – mouse–based registration drop sort of
interface that is frequently connected with this term. It is only one conceivable usage of GUI
interface. Different usage are conceivable as will be talked about beneath.
While noteworthy for ... Show more content on Helpwriting.net ...
User can use the GNOME desktop, panel, applications, and tool set to customize working
environment and manager system tasks. GNOME also provides an application set, including a word
processor, a spreadsheet program, a database manager, a presentation tool, a Web browser, and an
email program.
Command Line Interface
A command line interface (CLI) enables users to write commands in a console window so as to
interact with an operating system.
CLI FEW TASKS: Locate Managed objects in managed object topology Enable or Disable
Modules. Acknowledge or delete Alarms.
CLI COMMANDS CAN BE DIVIDED INTO TWO TYPES:
a) BASIC COMMANDS: They are used to set parameter values, define command alias, check
command status, login and logout of server.
b) EXTENDED COMMANDS: These are commands that changes the topology of managed objects,
their properties & their attributes. They are used to perform several Functions:
A Few CLI COMMANDS USED IN SOLARIS:
S.No. COMMAND DESCRIPTION
1. alias this allows the user view the current aliases
2. bdiff compares two large files
3. cd changes directories
4. date returns the date and time
5. ln creates a link between two files
6. pwd displays the name of the working directory
7. Rm removes files
FreeBSD:
31. It supports three GUI:
GNOME
GNOME is a user–friendly desktop environment which makes it convenient for applications to
synchronize as environment includes panel for starting applications
... Get more on HelpWriting.net ...
32.
33. LAB 2 Essay
LAB
Network Documentation
2
Introduction
In this lab, you will learn how to use various tools and techniques to determine and document IP
network design. You will use the Windows Command Prompt to generate network traffic; Wireshark
to capture and analyze the generated traffic; PuTTY to remotely access the Cisco Switch; and
finally, you will issue IOS commands on the Cisco Switch to understand its various interfaces and
inner workings.
Learning Objectives
Upon completing this lab, you will be able to:
Develop a plan for identifying and documenting the logical IP network design and IP addressing
schema based on data collected from Lab #1
Use PuTTY to establish Telnet and SSH to the IP addresses of the identified ... Show more content
on Helpwriting.net ...
You will use this information to complete the deliverables for this lab.
FIGURE 2.3
Windows Command
Prompt window
7. Repeat step 6 for the following IP addresses to create a packet stream for Wireshark.
172.30.0.2
172.16.8.1
172.17.0.2
172.16.0.2
172.19.0.1
172.19.0.2 8. Minimize the Windows Command Prompt window. 9. Double–click the PuTTY icon
on the desktop to start the PuTTY application.
34. Note:
The next steps use PuTTY, a terminal emulator program that you can use as a client to create a
variety of secure connections to network resources. This lab uses it to create Telnet and SSH
sessions.
Hands–On Steps
21
10. In the PuTTY application window, type the IP address for LAN Switch 1, 172.16.8.5. Select the
Telnet
radio button and click the Open button to start the connection.
FIGURE 2.4
PuTTY application window 2
a. Username: cisco
b. Password: cisco
FIGURE 2.5
PuTTY terminal console window Network Documentation
11. PuTTY will launch a terminal console window. At the login prompt, type the following:
22
LAB #2 | Network Documentation
Note:
The next steps involve using the Cisco IOS show command to obtain network documentation
information from the interface you've connected to (LAN Switch 1). Cisco IOS is a package of
routing, switching, and networking commands integrated with a Cisco–specific operating system, of
which the show command
... Get more on HelpWriting.net ...
35.
36. Linux: the Kernal and Shell Essay examples
Linux: The Kernel And Shell
Josh Harkey
AIU Online
Abstract
This manual has been written to explore the many distributions of Linux. It will define some of the
components of the OS as they relate to the shell and kernel. It will also go over some of the more
popular distributions of Linux and the shells. Finally, it will give a brief overview of some useful
commands that can be used in the bash shell.
Linux: The Kernel and Shell It is important to know some the inner workings of an operating system
to help better understand how they and why they are beneficial. This is one of the reasons for this
manual. It will also give a better understanding of some of the more popular distributions of Linux.
The Kernel And Shell As They ... Show more content on Helpwriting.net ...
As a result, Linux offers the user a way to have an OS that comes with more functionality, and in an
environment that can be customized for the task at hand.
Five Common Distributions
Since Linux is allowed to be changed by its users there are more than 600 distributions available.
Here is a list of five of the most commonly used.
FEDORA– fedoraproject.org (2013) states, "fedora is fast, stable, and powerful operating system for
everyday use built by a worldwide community." This distribution is most commonly used by
developers and Linux enthusiast.
DEBIAN– debian.org (2013) states, "Debian provides more than a pure OS: it comes with over
37,500 packages, pre compiled software bundled up in a nice format for easy installation on your
machine." It is one of the oldest distributions still in active development, and is often the base for
newer distributions. People that have a passion for Linux enjoy Debian. openSUSE– according to
opensuse.org (2013), " The openSUSE distribution is a stable, way to use and complete multi–
purpose distribution.it is aimed towards users and developers working on desktop or server." This
distribution is generally used in an enterprise environment, and is sponsored by Novell. It is known
for its ease of use on the surface and advanced options further in.
LINUX MINT– linuxmint.com (2013) states, "The purpose of Linux mint is to produce a modern,
elegant and comfortable operating system which is both powerful
... Get more on HelpWriting.net ...
37.
38. Lab Network+
Lesson 2 Lab Worksheet Lab Exercises Lab 1 How TCP/IP Protocols Work through the TCP/IP
Model The purpose of this lab is to familiarize the students with the TCP/IP Model and some of the
protocols that are used in it. This lab is important to the student because it takes the student through
a thought experiment about how data would pass thorough the TCP/IP Model down from the
computer and up through the destination computer. By doing this thought experiment the student
will come to better understand how different protocols work together to accomplish a specific task.
Materials Word processing document Textbook Do the Lab Follow ... Show more content on
Helpwriting.net ...
Take Note This lab uses Windows 7. If you are using Windows 8, Vista or Windows XP, you will
need to make some slight variations to the lab. Materials word processing document Computer
running Windows 7 Professional Do the Lab The IPCONFIG Command 1. Click the Start button at
the bottom left of your Windows 7 Desktop Display in order to bring up the Windows 7 start menu
(Figure 2–12). [pic] 2. Type CMD into the Search Programs and Files box at the bottom of the Start
Menu and press Enter. 3. The Command Line Interface (CLI) Window will come up (as shown in
Figure 2–13). The CLI is a window where you can enter commands into the computer in the form of
text. This type of interface was how a person interacted with DOS. It is also how a person is able to
currently interact with Linux if they choose not to use one of several graphical interfaces available
for use with Linux. [pic] 4. Once you have opened the Command Line Interface (CLI), type in the
command ipconfig. When the ipconfig command is entered, the CLI changes to something similar to
Figure 2–14. You should note that the
... Get more on HelpWriting.net ...
39.
40. It250 Linux Course Review and Hw Helper
IT250 Linux Operating System
S.No Question Points
1 What commands are used to create an ext2–second extended–filesystem? mke2fs or mkfs.ext2
2 Which of the following types of filesystems can the command e2fsck be used to check?
A. ext2
B. ext3
C. jfs
D. vfat
3 What command can be used to start a program with a lower scheduling priority? nice
____________
FINAL
Which of the following Linux utilities lists the names of files in a single directory? ls Which
component of X Window allows customization of the user interface?
Window manager
Which of the following control structures is a multiple–branch decision mechanism capable of more
than three decisions?
The Case structure
What is the meaning of the DocumentRoot directive in the Apache ... Show more content on
Helpwriting.net ...
yum
Which of the following symbols instructs the shell to redirect the output of a command to the
specified file instead of the screen and overwrite the file?
You would use the > symbol
The special character that causes the shell to generate filenames that match any single character in
the name of an existing file is _____.
The question mark
In vim, which of the following keystrokes is used to exit the editor and save the contents of the file
being edited?
ZZ
Which of the following control structures is a multiple–branch decision mechanism capable of more
than three decisions?
The Case structure
Which component of X Window allows customization of the user interface?
Window manager
Which of the following utilities is used to view a file one screen at a time? less What utility is used
41. to search for a particular string within a file or a group of files? grep The utility that can be used to
copy a file, including text and executable program (binary) files, is ___________. cp Which of the
following partitions does Linux use when all the information that Linux is processing cannot be
stored in RAM?
Swap
Which of the following keystrokes helps you undo the last change made in the vim editor? u What
network utilities works only if a remote system trusts your local computer? rsh What represents the
root partition in Linux?
The forward slash /
The C compiler that Linux commonly uses is _________.
GNU gcc
What
... Get more on HelpWriting.net ...
42.
43. Computer Software : Operating System Software
Computer Software
Computer software is a program that enables a computer to perform a specific task. Computer is
useless without a software. For example without internet browser you cannot search anything on the
internet. You need system software such as word processer, which enables a user to perform a task,
and system software such as an operating system, which enables software to run properly. Computer
software has to be installed within the computer storage (such as hard drive, memory, or RAM).
Once the software is installed, the computer is able to execute the software.
Types of software's:
Operating System Software:
An operating system is a software that enable the computer hardware to communicate with the
computer software. Without ... Show more content on Helpwriting.net ...
It is a multitasking computer operating system. It was designed to be a small and flexible operating
system.
DOS–command line:
Disk Operating System (DOS) was the first operating system used by IBM computers. It was
originally available in two versions "PC–DOS" and "MS–DOS"
Linux–command line:
Linux is a software that enables application and the computer operator to access the devices on the
computer to perform desired functions.
Windows 95, NT, 98, ME, 2000, XP, Vista, and Windows 7:
These are the computer operating systems designed by the Microsoft.
Novell Netware:
Novell Netware is also a brand of operating system designed for networks or simply a local area
network (LAN) operating system. Netware is a product of the popular IT–centred company called
Novell.
MAC OS:
Mac operating is series of graphical user interface (GUI). Mac operating system was developed by
Apple Inc. It was first introduced in 1984.
MAC OS X:
This operating system was released in 2001. It is the latest version of Mac OS. It is a series of UNIX
based graphical interface operating system.
Virus:
Virus is a software program that are designed to spreads from one computer to another and to
interfere with computer operations. While using the internet your computer may have come in
44. contact with computer viruses. A computer virus might corrupt or delete data on the computer, or
erase everything on your hard disk. Viruses also spread ether by portable media, such as external
... Get more on HelpWriting.net ...
45.
46. Unix Based Operating Systems System
UNIX–based operating systems are very popular, and they are being used everywhere from
computer science research labs and universities to technology firms like Google, Facebook, and
IBM. There are many different types UNIX–based operating systems, some of them being Mac OS,
Ubuntu (Figure 1) and Solaris. When it comes to programming, many computer scientists, including
myself, prefer UNIX–based operating systems over Windows operating system, because it is the
main operating system for many technology companies (2) and easy to use. Linux, a UNIX based
operating system, is the operating system used Google, Amazon and NASA. North Carolina State
University has a great computer science program that is made to prepare students for the workforce
... Show more content on Helpwriting.net ...
Windows operating system is different from Mac OS or Ubuntu or any other operating system, and
it takes a considerable amount of time for an individual to get used to a different operating system.
According to stackoverflow [3], an online community for programmers, 26% of programmers use
Mac OS as their operating system, and 21.7% use Linux as their operating system. Companies want
to hire computer scientists familiar with the technology stack of the company, and having
experience in the company's operating system is a very valuable skill. Also, using a UNIX based
operating system build a certain set of skill sets, such as experience in using a UNIX terminal, that
companies consider a must have skill for computer scientists. By having Windows as the operating
system for computer science labs, NCUS is not providing the opportunity for students to experience
using a different operating system, that might be operating system they use after graduation.
Unfamiliarly with the work computer's operating system, not knowing how to perform simple tasks
fast enough could have a significant effect on the programmer's work and the overall productivity of
the company. Therefore, addressing this issue will make the transition between university and
working at a technology firm smoother, and help students build a skill set that will be useful in the
future. Background Many companies are switching from Windows to UNIX based systems,
especially Linux
... Get more on HelpWriting.net ...
47.
48. What Is User Interface?
What is User Interface? "User Interface (UI) Design focuses on anticipating what users might need
to do and ensuring that the interface has elements that are easy to access, understand, and use to
facilitate those actions." [5] In this research paper I am going to take you through the history, basics,
and advances. These elements are very important to know because without them software designers
would be lost.
To start, one of the biggest patterns in the history of software is the shift from computation design to
presentation design. Since our machines have become stronger more time has been spent on
presantation. "The history of that progression can be conveniently broken into three eras: batch
(1945–1968), command–line (1969–1983) and graphical (1984 and after). The story begins, of
course, with the invention[6] of the digital computer. The opening dates on the latter two eras are the
years when vital new interface technologies broke out of the laboratory and began to transform users
' expectations about interfaces in a serious way. Those technologies were interactive timesharing and
the graphical user interface." [1]
In the batch era, computing power was very expensive. The larger computers of that era needed less
logic cycles per second. User interfaces were, very repetitive and basic. Users were doing most of
the work for their computers rather than the other way around. User interfaces became overhead and
software was designed to keep the processor a going like a
... Get more on HelpWriting.net ...
49.
50. Centos 7 Essay
Task 3
Short Description of Task
Editing network settings on an existing CentOS 7 Linux system.
Long Description of Task
Using the existing CentOS 7 Linux system with a network connection created and set, edit the
settings for the NIC by using nmtui and nmcli commands as well as /etc/sysconfig/network–scripts/
directory. The both commands are used for network configuration, but nmtui has a GUI mode and it
is easier to use. On the other hand, nmcli has more advanced options. The directory
/etc/sysconfig/network–scripts/ keeps all network interface files that start with the name ifcfg– and
can be used to edit network settings.
Pre–Implementation Test Plan
Ensure that the user is the root user or can use root privileges for commands.
... Show more content on Helpwriting.net ...
By using keyboard keys, choose Edit a Connection. Select the name of the network connection and
on the right pane select Edit button.
To change the profile name, delete the existing name and type a new one.
Select IP configuration Automatic for DHCP or Manual for static IP address.
For static IP address, type IP addresses with format (–– removed HTML ––) /CIDR (Figure 3).
Type Default Getaway address.
Type DNS servers IP addresses.
Select (–– removed HTML ––) , if the configuration requires several IP addresses.
Choose Automatically connect for IPv6 configurations.
Select OK to save the network configurations.
Select Back to go back Network Manager TUI.
Select OK or Quit to go back to the terminal.
Edit network settings by using etc/sysconfig/network–scripts/ directory:
In the terminal, open etc/sysconfig/network–scripts/ directory by using command cd
etc/sysconfig/network–scripts
List the files of the directory with the command ll. For more precise search, use pipes and grep
filter: ll | grep "ifcfg".
Open the network configuration file with editor with root privileges sudo vi ifcfg– (–– removed
HTML ––) (Figure 4).
For DHCP find the lines BOOTPROTO=none and ONBOOT=no and change them to
BOOTPROTO=dhcp ONBOOT=yes and restart the network by using command with root privileges
systemctl restart network.
53. What Is An Operating System Essay
Operating Systems What is an operating system The operating system is responsible for controlling
all of the tasks and processes. Operating systems consists of a collection of programs, with each
having a specific task allocated to it. These programs are designed to make the computer system run
as efficiently as possible. The most commonly used operating systems are Mac OS, Windows and
Linux. What Operating systems do · Allow users to interact with the machine (e.g. selecting
programs). · Allocate space in memory for programs. · Run programs (transfer instructions for
memory to processor then executing them). · Manage the storing of data. · Management of
input/output devices. Difference Operating Systems Windows Windows is the most widely used
Operating System in the world, It's initial introduction was in 1981 as a command–line interface; the
GUI (graphical user interface) was introduced in 1985 and has seen 26 different versions. Mac OS
In 1984 Apple released its first OS, which became known as "Mac OS" as of 1997. The original OS
was a fork of Apples older OS "Lisa" which was, at the time, extremely advanced. Linux Linux
began in 1991 as a personal project by Lines Torvalds, he set out to create a new, free Operating
System. Since then it has grown from an OS containing a few C files to having over 18 million lines
of source code and available under the GNU General Public License. The GNU license guarantees
that
... Get more on HelpWriting.net ...
54.
55. Program that creates a shell and executes some shell commands
/* myshell.c
Description: Program that creates a shell and executes some shell commands
*/
#include <stdio.h>
#include <unistd.h>
#include <sys/types.h>
#include <errno.h>
#include <string.h>
#include <stdlib.h>
#include <sys/wait.h>
extern char **getln();
// Function used to check the file input direction command int inputFile(char **args, char **fileIn) {
int i,j; //go thorough the command line arguments for(i=0;args[i] != NULL;i++) {
// check for the input direction symbol if(args[i][0] == '<') {
// save the filename command if(args[i+1] != NULL) { *fileIn = args[i+1]; }
/*for(j=i;args[j–1] != NULL;j++) { args[j] = args[j+2]; }*/ ... Show more content on Helpwriting.net
...
= 'x')) { convert = strtol(args[i],NULL,16); printf("The number is %ld n", convert); sum = sum +
convert; } // check if it is a valid integer or not num = atoi(args[i]); if (num == 0) { //printf("Number
is: %i n", num); } else { sum = sum + num; } } } // check to see if there is arg or args command, if
there is then print // number of arguments and list them on the screen if((strcmp(args[0],"arg") == 0)
|| strcmp(args[0],"args") == 0) { for(j=1;args[j] != NULL;j++) { count++; }
printf("Output: argc = %d, ", count); printf("args = ");
for(j=1;args[j] != NULL;j++) { printf("%s, ", args[j]); } printf("n"); }
// check the error messages for the addition command and print the total sum
if(strcmp(args[0],"add") == 0) { if(sum == 0 && num ==0) { printf("Invalid integer/ String Error
56. n"); } else { printf("Output: "); for(k=1;args[k] != NULL;k++) { printf("%s + ", args[k]); }
printf("= %d n", sum); } }
// check if there is a multilplication command, if there is then multiply all the // valid arguments and
print the product // Accepted inputs: Only ints, Invalid Inputs: 0,Strings // Details and cases are
explained in readme file int zeroCheck=0; if(strcmp(args[0],"mul") == 0) { int product=1;
for(counter=1;args[counter] != NULL;counter++) {
... Get more on HelpWriting.net ...
57.
58. MATLAB: A High-Performance Language For Technical Computing
The name MATLAB stands for Matrix Laboratory. MATLAB is a high–performance language for
technical computing. It integrates computation, visualization, and programming in an easy–to–use
environment where problems and solutions are expressed in familiar mathematical notation. Typical
uses include:
Math and computation
Algorithm development
Modelling, simulation, and prototyping
Data analysis, exploration, and visualization
Scientific and engineering graphics
Application development, including Graphical User Interface building
MATLAB is an interactive system whose basic data element is an array that does not require
dimensioning. This allows you to solve many technical computing problems, especially those with
matrix and vector formulations, ... Show more content on Helpwriting.net ...
Editor window Creates and debugs script and function files.
Help window Provides help information.
Command history Window & logs commands entered in the command window.
Workspace window Provides information about the variables that are used.
Current Folder Shows the files in the current directory. 4.2.7 Working on the Command Window
To type a command the cursor must be placed next to the command prompt (>>).
Press Enter key to execute the command.
Several commands can be typed in the same line. This is done by typing a comma (,) between the
commands.
If a semicolon (;) is typed at the end of a command, the output of the command is not displayed. It is
useful when the result is obvious or the output is very large.
A previously typed command can be recalled to the command prompt with the upper arrow key. The
down–arrow key can be used to move down the previously typed commands.
If a command is too long to fit in one line, it can be continued to the next line by typing three
periods (...) and press the Enter key.
The symbol %, when it is typed in the beginning of a line, the line is designated as a comment.
4.3 Working on Matlab
... Get more on HelpWriting.net ...
59.
60. A Brief Look at Scilab
Scilab with dynamically typed objects it is a interpreted language . Scilab runs is available in binary
format, for the platforms: Unix/Linux workstations MacOSX. MacOSX and Windows, users can
also be installed using Scilab. Compilation of source code is also possible in Scilab. Scilab was
named Basil, developed at INRIA as part of the Meta2project. It was developed in the name of
Scilab by the Scilab group, which comprised of a team of INRIA Metal au and ENPC. Since 2004,
Scilab development was been coordinated by a consortium .Scilab is used as a scripting language to
test algorithms and to perform computations numerical. Scilab is a programming language, and
around 2000 Scilab coded functions are available in library . The Scilab syntax is very simple, and
also which are the fundamental object of scientific calculus the uses the matrices, and it is provided
with specific functions and operators. Matrices are of different types which includes real, complex,
string, polynomial, and rational. Scilab programs are very quiet compact and they are smaller than
their counterparts in C, C++, or Java. Scilab is mainly a combination of scientific computing,
numerical libraries from such areas as numerical library such as linear algebra, optimization and
numerical integration it is a easy access . It is also simple to expand Scilab environment in a
computer. Using static or dynamic links, one can easily import new functionalities from external
libraries into Scilab . New
... Get more on HelpWriting.net ...
61.
62. Week 3 iLab
Student Name: Rolando Salas Date: 7/26/14
Database Server Security Demands – iLab3
Objectives
In this lab, the students will examine the following objectives.
Become familiar with well–known and ephemeral ports
Create ACL to meet requirements on database security demands
Learn best practices to create and apply ACLs.
Scenario
A small company is using the topology shown below. The Public Server is actually an off–site
Database Server that contains company records. Assume that the 200.100.0.0/16 network represents
the Internet. The Dallas and Chicago Servers and hosts need to access the database server securely.
Only users in the Dallas and Chicago LANs should be able to access the database ... Show more
content on Helpwriting.net ...
The ephemeral UDP/TCP ports range from 49152 to 65535.
#4. What is wrong with ACL 105? access–list 105 permit tcp any any access–list 105 deny tcp host
201.141.0.3 any
On this ACL you listing first to permit all TCP traffic from any source IP address to any destination
IP address before putting first the hosts IP address except you don't want. In other words, the second
line should have been first and the first line secondly to specify that to deny all TCP packets from
the host 201.141.0.3 from any source IP addresses.
#5. What well–known TCP port does Oracle Database (sql net) server use?
Oracle uses 1521 as a standard default port but doesn't outright own the port since the port lies
within the registered port number range.
#6. A company is managing an Oracle Database located in a Public Server to support day–to–day
operations in Dallas and Chicago networks. The company has requested its Internet Access Provider
(ISP) to create the necessary ACL at the ISP router securing that only responses from Oracle server
63. to certain hosts are allowed to enter Dallas and Chicago LANs.
ISP network engineers decided to use extended ACL, and applies it to F0/0 interface in ISP router.
Why did they decide to create an extended ACL and apply it in interface F0/0 for inbound traffic?
An extended ACL was created to filter traffic closer to the source and so traffic coming from the
Host will be filtered.
... Get more on HelpWriting.net ...
64.
65. Essay On Graphical And Command Line Interface
5. Evaluation The creation of our graphical and Command Line interface came about as a means of
testing our algorithms. Since we were attempting to mine associations from large datasets, it made
sense to test our mining algorithms on artificially created datasets so as to check whether or not our
algorithms were successful. Therefore, we devised the graphical interface to allow us to create
sufficiently large datasets based upon association rules. This allowed us to plant specific rules with
set supports and confidence with in our test datasets. We were then able to run our test datasets
through our association mining algorithms to verify whether or not the algorithms correctly
identified the rules which we had planted with the correct ... Show more content on Helpwriting.net
...
6. Conclusion and Future Extensions This project was one of our top choices specifically because it
approached a very interesting problem while giving us the opportunity to work with a renowned
company. We had the chance to expand our machine learning knowledge, enhance our technical
abilities and get an insight into what it is like to work with a real client from industry. This
experience was challenging as we found out clients can be difficult to work with and sometimes
unreliable. Therefore, one of our main gains from this project is that we learned how to overcome
non ideal situations that arise due to uncooperative clients. We also strengthened our team work
skills as well as our time management aptitudes, due to using the Scrum methodology. As we were
very fond of the idea that stood behind our project, we tried to implement it at the best of our
abilities. We wanted to make it accessible to everyone, not only companies in the financial sector
and we had multiple thoughts on how to achieve this. Unfortunately, due to the limited time we
could not put all of them into practice. One of the future extensions that we considered was
changing the internal representation of association rules and the associated values such as support
and confidence. We
... Get more on HelpWriting.net ...
66.
67. What Is A Operating System?
What is a operating system? An operating system is the most essential software that is placed in a
computer. It achieves the computer 's memory and procedures, and the software and hardware. Also,
it importantly allows you to interact with the computer itself even if you cant speak the computers
language. It provides mutual services for computer programs. Some examples of operating systems
are Windows (vista, 7), Mac OS, Haiku, Linux, BSD. Command line operating systems Some
examples of command line operating systems are Linux and DOS. DOS, also known as disc
operating system is a user interface where you can command the computer difficult but basic tasks
to be done quickly. LINUX is a public/ open–source operating system based by UNIX. ... Show
more content on Helpwriting.net ...
A great example of a GUI that uses a control panel is Windows 7. What is machine and peripheral
management? The Peripheral management manages peripheral device by conveying them
commands in the devices own code. Every peripheral device has its own specific code. One
language is binary. For example, in Linux OS, it is the process of turning inputs into outputs. Some
peripheral devices are keyboards, mouse, webcams etc. What is file management? File management
consists of files that are placed in an area of storage and where you can name your file regarding its
content and place it where ever you want. It is the way toward looking after files, reports into
classifications and subcategories as wanted by a client. Essential parts of file management are
arranging, naming and grouping PC information. What is meant by customising the desktop?
Operating systems allow you to customise your desktop which means you can adapt specific
features on the user interface. This means the look can be changed to your preference. Also, it is a
handy way to organise/ navigate your work whilst adding your own look. For example, you can
change your background picture to your preference. It could be your national flag, your favourite
colour or even favourite car. On the picture to the left my favourite car is a Lamborghini in green.
What is device driver? Every
... Get more on HelpWriting.net ...
68.
69. Color And Its Effect On The Human Eye
Colour When designing GUIs you need to be conscious of the colours. Microsoft office uses grey as
the main colour, blue for the title bar, highlighting, drop down lists and some text. Many uses feel
grey is dull and boring colour to use, however if the colour bright red or black was used it would be
uncomfortable eyes. Trichromatic System and luminance (Red, Green, Blue) Trichromatic system
uses a combination of three colours that are the basis of 3D vision, which are red, blue and green.
The human eye has a trichromatic system. The three colours of the trichromatic are detected by three
different types of cells on the retina of the eye, these are known as receptors. There has been much
work on developing the theory of this system into ... Show more content on Helpwriting.net ...
Proximity is the way we view things which are close together as a group or look closer than they
actually are. Continuity is taking more of an interest in a straight smooth lines rather than rigid and
rapidly changing lines. Symmetry is when a shape or object is repeated on both sides to make it a
mirror image. We see symmetrical shapes easily than unsymmetrical shapes. Similarity is objects
and shapes placed together as they look similar, where as dissimilar objects are likely to be viewed
individually. There are also laws that relate to common groupings. Fate is when we see objects that
move together as a group. Region is when objects are enclosed together somehow as a group. And
connected is when we see objects connected by continuous lines. Objects GUI is built using a
number of separate objects. Each object is used in a clear order. So images are layered. It is
important that images appear in order and overlay the first image, or else an interface may look as
an incomplete object to the user. If images are positioned behind or in front of text, then the whole
interface will not be able to be seen. Therefore GUI should appear in front of text on the desktop and
not behind existing images on the desktop. Furthermore if the positioning of the objects has not been
precisely arranged then the GUI or parts of the GUI may not appear behind the main screen. This
leads to the user not being able to access the full range of commands. Another thing is the
... Get more on HelpWriting.net ...
70.
71. Activity 5
Activity 5.2.2.4
Documentation Table
Problems
Solutions The G0/1 physical interface is up but G0/1.10 is administratively down. Implement the no
shutdown command to enable the G0/1.10 PC3 is configured with the wrong default gateway
address. Change the default gateway on PC3 from 172.17.10.1 to 172.17.30.1 Subinterface VLAN
assignments are switched on R1. Issue the no encapsulation dot1q command to remove the incorrect
configuration. Then configure the subinterfaces with the correct encap dot1q command command.
Reenter the correct IP address information.
========================================
Step 1: Calculate a summary route on R1 to reach LANs on R3.
172.22.1.128: ... Show more content on Helpwriting.net ...
a. Can PC1 ping PC4? No
b. Can PC2 ping PC5? No
c. Can PC3 ping PC6? No
Step 2: Document the problem and the solutions.
List the problems and the solutions that will allow these PCs to ping each other. Keep in mind that
there could be more than one problem or more than one solution.
PC1 to PC4
a. Explain the connectivity issues between PC1 and PC4.
Answer: PC1 is on VLAN 30 instead of VLAN 10. The G1/1 port on S1 is configured as an access
port.
b. Record the necessary actions to correct the issues.
Answer: Issue the switchport access vlan 10 command on F0/11 interface on S2. Issue the
switchport mode trunk command on G1/1 interfaces for S1 and
... Get more on HelpWriting.net ...
72.
73. Windows Vista and Server Essay
Lab 2
Configuring Servers
–––––––––––––––––––––––––––––––––––––––––––––––––
This lab contains the following exercises and activities: Exercise 2.1Exercise 2.2Exercise 2.3Lab
Challenge | Completing Post–Installation Tasks
Adding Roles and Features Converting the GUI Interface to Server Core
Using the Server Core Interface
|
Exercise 2.1 | Completing Post–Installation Tasks | Overview | In this exercise, you complete the
tasks necessary to set up a server on which Windows Server 2012 has just been installed. | Mindset
... Show more content on Helpwriting.net ...
Migrate Roles and Features with Windows Server Manager | * Question3 | How would the
installation of the roles and features selected in this exercise differ if the server was running
Windows Server 2008 R2?You would NOT be using powershell to do it. So, the process would be a
lot more lengthy. |
Question 4 | How can you prove that the Web Server (IIS) role is installed on the server? You will
see that it is checked off in roles and features And If you try to install it again with powershell it will
tell you no changes need to be made if it's already installed. |
Exercise 2.3 | Converting the GUI Interface to Server Core | Overview | Windows Server 2012, for
the first time, enables you to convert a server installed using the full graphical user interface to one
that uses Server Core. This enables administrators who are less familiar with the Windows
PowerShell interface to install and configure a server using the familiar GUI tools, and then convert
it to Server Core to minimize hardware resource utilization. | Mindset | What advantages does Server
Core provide over the full Windows Server 2012 interface? | Completion time | 10 minutes |
* 13. Take a screen shot of the Server Core interface by pressing Alt+Prt Scr and then paste it into
your Lab 2 worksheet file in the page provided by pressing
... Get more on HelpWriting.net ...
74.
75. Unit 14 Event-Driven Programming (P1, M1, D1)
Contents P1 – Identify the key features of event driven programming such as events, event loops
and event handlers 2 P2 – Explain how development environment components (e.g. Solution
Explorer, Forms, Toolbox, Code Editor, Debugger, and Property Window) simplify the
development. 3 M1 – Describe the features of an event driven language that make it suitable for
creating a GUI 5 D1 – Evaluate the suitability of event driven programs for non–graphical
applications 6 References 7 P1 – Identify the key features of event driven programming such as
events, event loops and event handlers Events – An event occurs when the user interacts with a
object. * Usually this means a mouse movement or click * Keyboard actions are also ... Show more
content on Helpwriting.net ...
* There are numerous non–graphical applications that make use of event driven programs, an
example of this is a smoke alarm: when it sense smoke and the density of smoke reaches a certain
level, the alarm goes off. An event has taken place there; a smoke alarm is non–graphical application
but it's very useful for event driven programming. Text – Microsoft DOS: An ms Dos operating
system makes use of no graphical interface; it doesn't make use of wimp when it's interacting with
the user. The user uses/enters computer commands into the computer to give instructions such as
saving files, opening new documents other than using a mouse to do these actions. A keyboard is
used to enter these commands and "key down" events occur when this happens. Non–graphical
applications compared to graphical applications ten to be out of date/old and harder to understand.
Of course this is not true in some cases, but with programs such as Ms Dos it is harder to remember
all the command lines. But with graphical applications that have an interaction interface are simpler
to understand and function. Summary In this task I have described procedural programming and its
structure with examples. I've described also what IDE is and how it simplifies the development
process and I've chosen Visual Basic as an IDE example and I described its components. For merit
task I have described GUI with advantages and also I have
... Get more on HelpWriting.net ...
76.
77. Ccna
1. Refer to the exhibit. What three statements are true about the IP configuration that is shown?
(Choose three.)
The address that is assigned to the computer represents private addressing.
The computer is unable to communicate outside of the local network.
The network of this computer can have 126 hosts.
The prefix of the computer address is /27.
The IP address that is assigned to the computer is routable on the Internet.
The IP address that is assigned to the computer is a broadcast address. 2. As network administrator,
what is the subnet mask that allows 510 hosts given the IP address 172.30.0.0?
255.255.0.0
255.255.248.0
255.255.252.0
255.255.254.0
255.255.255.0
255.255.255.128 3. Which OSI layers ... Show more content on Helpwriting.net ...
Refer to the exhibit. Assume all devices are using default configurations. How many subnets are
required to address the topology that is shown?
1
3
4
5
7
13. Refer to the exhibit. Which two statements describe the information that is represented in the
header? (Choose two)
This is a server response.
The UDP protocol is being used.
The destination port indicates a Telnet session.
The return segment will contain a source port of 23.
The next session originated from the client of this session will use the source port number 13358.
14. Refer to the exhibit. The command that is shown was issued on a PC. What does the IP address
192.168.33.2 represent?
IP address of the host default gateway of the host
IP address of the homepage for the host primary domain name server for the host
IP address of the website resolver1.mooki.local 15. Refer to the exhibit. A router, whose table is
78. shown, receives a packet that is destined for 192.168.1.4. How will router treat the packet?
The packet will be dropped.
The packet will be forwarded via FastEthernet 0/0.
The packet will be forwarded to the destination host.
The packet will be forwarded to the 192.168.1.3 next–hop
... Get more on HelpWriting.net ...
79.
80. Ls Command Questions And Answers
Chapter 1 1. Use the whatis command to determine the purpose of the ls command. Command:
whatis ls Explanation: ls displays the content of a directory 2. Use the man program to find out what
the –R option does when used with the date command. output date and time in RFC 2822 format.
Example: Mon, 07 Aug 2006 12:34:56 –0600 3. Use the man program to determine what other
commands you should also see in relation to the clear command tput(1), terminfo(5) This describes
ncurses version 5.7 (patch 20100109). 4. Use the cal command to determine on what day of the
week you were born. cal [[day] month] year] 5. Use the cal command to determine which year
between 2005 and 2010 is a leap year. ... Show more content on Helpwriting.net ...
man who > who_info less who_info tail –12 who_info head –12 who_info 14. Create a file called
favorite_foods, and list your favorite foods, entering five or six or more. Press Enter after each
favorite food so it appears on its own line (make certain you also press Enter after the final food
item). After the file is created, add two more foods you like that are not on the list (press Enter after
the final food item). View the list of foods to make certain the two items you added appear at the end
of the list. cat> food fish putin sheperd pie ^C Cat >>food Chiken wings Hamburger ^C 15. View
the documentation for who and then view the documentation for w. How are these commands
similar?. who – show who is logged on w – Show who is logged on and what they are doing. 16.
Run the who –uH and w commands using one command–line sequence to compare the results. who
–H NAME LINE TIME COMMENT student :0 2015–09–16 13:16 (console) student pts/2 2015–
09–16 13:17 student pts/3 2015–09–16 13:18 ––––––––– student@linux–6c76:~> who –u student :0
2015–09–16 13:16 ? 2696 (console) student pts/2 2015–09–16 13:17 00:17
... Get more on HelpWriting.net ...
81.
82. Week 4 B IP Subnetting Lab Essay
Introduction
Assignment
Develop a subnetting plan and implement it in the lab. Configure RIP as a routing protocol.
Conditions
NYEDGE1 is the hub router. The two remote office routers NYEDGE2 and NYWAN1 connect to
NYEDGE1 through serial connections. Each router has a locally attached Ethernet network.
The serial line data rates and DTE/DCE settings have already been configured on all three routers.
You only need to assign the IP address to the interfaces.
Notes
The routers are connected directly to each other in this lab and do not actually connect through any
leased line services.
Diagram
Gi0/0
Ethernet
NYWAN1
Serial0/1/0
Serial0/0/1
DCE
NYEDGE1
Serial0/0/0
Serial0/0/0
DCE
Gi0/0
Ethernet
Task Index
83.
Task 1 – Create a subnet ... Show more content on Helpwriting.net ...
You are not encouraged to use this subnetwork because it specifies the wire address.
Nor should you use the last subnet, 192.50.6.224, because it is considered the major network
broadcast address. Therefore you can only use subnets 32, 64, 96, 128, 160 and 192. With this
design requirement, you only need to use five of the six usable subnetworks, leaving one for any
additional segments in the future. Likewise, for each subnet, you cannot use the first and last
address. For example, subnet 192.50.1.32 extends all the way to 192.50.1.63. But you cannot use
these two IP addresses (.32 and .63) because they are the wire and the broadcast addresses for this
subnetwork. But you can use any of the 30 IP addresses in between.
Task 3 – Configure the interfaces in each router Step 1: Configure Gi0/0, s0/0/0, and S0/0/1 for
NYEDGE1.
Action:
ip address <ip address> < subnet mask>
Result:
NYEDGE1>enable
NYEDGE1#config t
Enter configuration commands, one per line.
End with CNTL/Z.
NYEDGE1(config)#int g0/0
NYEDGE1(config–if)#ip address 192.50.6.33 255.255.255.224
NYEDGE1(config–if)#no shut
NYEDGE1(config–if)#
NYEDGE1(config–if)#int s0/0/0
NYEDGE1(config–if)#ip address 192.50.6.65 255.255.255.224
NYEDGE1(config–if)#no shut
NYEDGE1(config–if)#
NYEDGE1(config–if)#int s0/0/1
NYEDGE1(config–if)#ip address 192.50.6.129 255.255.255.224
NYEDGE1(config–if)#no shut
NYEDGE1(config–if)#
NYEDGE1(config–if)#end
Explanation:
Subnet 192.50.6.32 is assigned to g0/0. Subnet 192.50.6.128 is
... Get more on HelpWriting.net ...
84.
85. Course Materials
Lab 5.1 Connect the Internetwork Lab Review Questions 1. For what purpose is a transceiver used?
A transceiver can be used for converting one type of Ethernet connector to another or by converting
one type of I/O port to an Ethernet port. 2. This lab connects routers directly to each other via serial
cables. Is this a typical configuration? No, By default, Cisco routers are DTE (Data Terminal
Equipment)/ DCE (Data Circuit–Terminating Equipment) If not, to what equipment does the DCE
end of the serial cable usually connect? If Router A is connected to the DTE end of the cable, Router
B must be connected to the DCE end 3. What does a rollover (console) cable look like? Rollover
cable is often used to connect a computer terminal to a ... Show more content on Helpwriting.net ...
Refer to Figure 5–2. What will the host name of your router be? lab–a 2. Which interfaces is your
router using? F0/0, F0/1, and S0/3/0 3. What are the IP addresses and subnet masks for those
interfaces? 192.5.5.1 and 255.255.255.0, 205.7.5.1 and 255.255.255.0, 201.100.11.1 and
255.255.255.0 4. What is the enable secret password? class 5. What is the enable password? cisco 6.
What is the VTY password? cisco 15. There is another way to access the initial configuration dialog
other than being prompted for it automatically as a consequence of having erased the contents of
NVRAM. You can use the setup command at the privileged EXEC mode prompt. Press Enter if
necessary to reach the user EXEC mode prompt. What does this prompt look like? Greater than
symbol (>) 16. Type enable and press Enter to access privileged EXEC mode, which is also known
as enable mode. You should be prompted for the enable secret password you configured in the
system configuration dialog. How do you know you are being prompted for the enable secret
password and not the enable password? Because the secret password was set during the initial setup
process 17. Type class and press Enter. How did the prompt change? lab–a> to lab–a# Review
Questions 1. When configuring a router, when would you choose basic management setup rather
than extended setup? You would use basic management setup when you only need to configure
... Get more on HelpWriting.net ...
86.
87. Essay on Cmit 350 Final Project
WAN Implementation with SOHO Skills Configuration Prepared for: University of Maryland
University College Prepared by: Nathan Poole Table of Contents I. Springfield Site Device and STP
Configurations II. Worchester Site Subnetting Configurations III. Boston Site Routing Protocol,
Route Summarization and Topology Improvements IV. Sacramento Site VLAN, Routing on a Stick
(ROS) and DHCP Implementation V. Los Angeles Site Management Technologies VI. xACME
WAN – WAN Implementation and Secure Communications VII. Bibliography WAN
Implementation with SOHO Skills Configuration I. Springfield Site Device and STP Configurations
Problem Statement: The device hostnames on each switch are generic and ... Show more content on
Helpwriting.net ...
End with CNTL/Z SpringfieldSwitch1(config)#Banner motd #Make sure you get an A on this
paper!# SpringfieldSwitch1(config)#exit LOGIN Banner (Displayed after the MOTD banner before
the login prompt.) SpringfieldSwitch1(config)#Banner login # Enter TEXT message. End with the
character '#'. *** Login Required. Unauthorized use is prohibited ***# Problem Statement:
Implement device passwords on both console port and VTY. All passwords should be encrypted.
Console Port Password SpringfieldSwitch1#config t Enter configuration commands, one per line.
End with CNTL/Z. SpringfieldSwitch1(config)#enable secret 1qazZAQ! VTY Password
SpringfieldSwitch1#config t Enter configuration commands, one per line. End with CNTL/Z.
SpringfieldSwitch1(config)#line vty 0 15 SpringfieldSwitch1(config–line)#password TELNET1234
SpringfieldSwitch1(config–line)#end SpringfieldSwitch1#service password–encryption Problem
Statement: Create Server VLANs, Faculty VLANs, Instructional VLANs and Administrative
VLANs on all switches. SpringfieldSwitch1>en Password: SpringfieldSwitch1#config t Enter
configuration commands, one per line. End with CNTL/Z. SpringfieldSwitch1(config)#vlan 11
SpringfieldSwitch1(config–vlan)#name faculty SpringfieldSwitch1(config–vlan)#vlan 12
SpringfieldSwitch1(config–vlan)#name server SpringfieldSwitch1(config–vlan)#vlan 14
SpringfieldSwitch1(config–vlan)#name
... Get more on HelpWriting.net ...
88.
89. New204
NETW204: Assignment 1 (50 points) Each answer is worth 1 point each, 50 questions = 50 total
points. Type answers in the appropriate cell; text will automatically wrap. Post your completed
assignment to the dropbox. NAME | Manuel Crail | Router Configuration Exercise (5 points) When
configuring a router, there are certain basic tasks performed, * Naming the router * Setting
passwords * Configuring interfaces * Configuring a banner * Saving changes on a router * Verifying
basic configuration and router operations | Question | Answer | 1 | The first prompt is _______ mode
and will allow you to view the state of the router. | User Mode | 2 | What major limitation does this
mode have? | Does ... Show more content on Helpwriting.net ...
Create a summary static route for R1 in figure 1 for the 3 LANs it has attached. Use the steps from
your text Chapter 2 page 125: Calculating a Summary Route. 192.168.20.0/24 Binary
form=11000000.10101000.00010100.00000000=/22 192.168.21.0/24 Binary
form=11000000.10101000.00010101.00000000=/22 192.168.22.0/24 Binary
form=11000000.10101000.00010110.00000000=/22 Summarized into one route=192.168.0.0
/22=255.255.252.0 Write the networks in binary form. Check work above please | | | | | | | | | |
Question | Answer | 48 | Find subnet mask by counting Bits matching from left to right: ____. This is
your subnet mask for the summary route. | 22 or 255.255.252.0 | 49 | Find summary address by
putting 0s (zeros) in remaining address positions after the left to right matching ends (For example if
the first 21 bits match from the left, put 0s (zeros) in the remaining 11 positions of the 32 bit address
to find address for the summary). | 11000000.10101000.00010100.00000000 | 50 | Summary Route
(Address and subnet mask found above combined) for routing table | 192.168.0.0 and 255.255.252.0
... Get more on HelpWriting.net ...
90.
91. Questions with Explanation
Q1: If an Ethernet port on router was assigned an IP address of 172.16.112.1/20, what is the
maximum number of hosts allowed on this subnet? A. 1024 B. 2046 C. 4094 D. 4096 E. 8190
Answer: C Explanation: Given IP address of 172.16.112.1 / 20, subnet mask: 255.255.240.0 max.
num of hosts =(( 2^12) –2 ) = 4096–2 = 4094 Q2.:An access list was written with the four
statements shown in the graphic. Which single access list statement will combine all four of these
statements into a single statements that will have exactly the same effect?
A. access–list 10 permit 172.29.16.0 0.0.0.255 B. access–list 10 permit 172.29.16.0 0.0.1.255 C.
access–list 10 permit 172.29.16.0 0.0.3.255 D. access–list 10 permit 172.29.16.0 0.0.15.255 E.
access–list 10 ... Show more content on Helpwriting.net ...
A host in an Ethernet network can communicate with another host,only if it knows the Ethernet
address (MAC address) of that host.The higher level protocols like IP use a different kind of
addressing scheme like (IP address) from the lower level hardware addressing scheme like MAC
address.ARP is used to get the Ethernet address of a host from its IP address.ARP is extensively
used by all the hosts in an Ethernet network.In this case there is already an entry for this IP
address,Meaning this host already knows the MAC to IP address mapping for this destination so
there is no need to send out an ARP request instead it will send the ICMP packet directly to
192.168.1.254 via unicast. Q7.An internetwork has been configured as shown in the diagram, with
both routers using EIGRP routing for AS 44.Users on the Branch router are unable to reach any of
the subnets on the HQ router.Which of the following commands is necessary to fix this problem.?
A. Branch(config–router)# version 2 B. Branch(config–router)# no auto–summary C.
Branch(config–router)# redistribute eigrp 44 D. Branch(config–router)# EIGRP log–neighbor–
changes E. Branch(config–router)# default–information originate Explanation:By default, EIGRP
... Get more on HelpWriting.net ...