SlideShare a Scribd company logo
1 of 60
Download to read offline
Week 3 iLab
Student Name: Rolando Salas Date: 7/26/14
Database Server Security Demands – iLab3
Objectives
In this lab, the students will examine the following objectives.
Become familiar with well–known and ephemeral ports
Create ACL to meet requirements on database security demands
Learn best practices to create and apply ACLs.
Scenario
A small company is using the topology shown below. The Public Server is actually an off–site Database Server that contains company records. Assume
that the 200.100.0.0/16 network represents the Internet. The Dallas and Chicago Servers and hosts need to access the database server securely. Only
users in the Dallas and Chicago LANs should be able to access the database ... Show more content on Helpwriting.net ...
The ephemeral UDP/TCP ports range from 49152 to 65535.
#4. What is wrong with ACL 105? access–list 105 permit tcp any any access–list 105 deny tcp host 201.141.0.3 any
On this ACL you listing first to permit all TCP traffic from any sourceIP address to any destination IP address before putting first the hosts IP address
except you don't want. In other words, the second line should have been first and the first line secondly to specify that to deny all TCP packets from
the host 201.141.0.3 from any source IP addresses.
#5. What well–known TCP port does Oracle Database (sql net) server use?
Oracle uses 1521 as a standard default port but doesn't outright own the port since the port lies within the registered port number range.
#6. A company is managing an Oracle Database located in a Public Server to support day–to–day operations in Dallas and Chicago networks. The
company has requested its Internet Access Provider (ISP) to create the necessary ACL at the ISP router securing that only responses from Oracle
server to certain hosts are allowed to enter Dallas and Chicago LANs.
ISP network engineers decided to use extended ACL, and applies it to F0/0 interface in ISP router. Why did they decide to create an extended ACL
and apply it in interface F0/0 for inbound traffic?
An extended ACL was created to filter traffic closer to the source and so traffic coming from the Host will be filtered.
... Get more on HelpWriting.net ...
Program that creates a shell and executes some shell commands
/* myshell.c
Description: Program that creates a shell and executes some shell commands
*/
#include <stdio.h>
#include <unistd.h>
#include <sys/types.h>
#include <errno.h>
#include <string.h>
#include <stdlib.h>
#include <sys/wait.h>
extern char **getln();
// Function used to check the file input direction command int inputFile(char **args, char **fileIn) { int i,j; //go thorough the command line arguments
for(i=0;args[i] != NULL;i++) {
// check for the input direction symbol if(args[i][0] == '<') {
// save the filename command if(args[i+1] != NULL) { *fileIn = args[i+1]; }
/*for(j=i;args[j–1] != NULL;j++) { args[j] = args[j+2]; }*/ ... Show more content on Helpwriting.net ...
= 'x')) { convert = strtol(args[i],NULL,16); printf("The number is %ld n", convert); sum = sum + convert; } // check if it is a valid integer or not num
= atoi(args[i]); if (num == 0) { //printf("Number is: %i n", num); } else { sum = sum + num; } } } // check to see if there is arg or args command, if
there is then print // number of arguments and list them on the screen if((strcmp(args[0],"arg") == 0) || strcmp(args[0],"args") == 0) { for(j=1;args[j] !=
NULL;j++) { count++; }
printf("Output: argc = %d, ", count); printf("args = ");
for(j=1;args[j] != NULL;j++) { printf("%s, ", args[j]); } printf("n"); }
// check the error messages for the addition command and print the total sum if(strcmp(args[0],"add") == 0) { if(sum == 0 && num ==0) {
printf("Invalid integer/ String Error n"); } else { printf("Output: "); for(k=1;args[k] != NULL;k++) { printf("%s + ", args[k]); } printf("= %d n",
sum); } }
// check if there is a multilplication command, if there is then multiply all the // valid arguments and print the product // Accepted inputs: Only ints,
Invalid Inputs: 0,Strings // Details and cases are explained in readme file int zeroCheck=0; if(strcmp(args[0],"mul") == 0) { int product=1;
for(counter=1;args[counter] != NULL;counter++) {
... Get more on HelpWriting.net ...
Color And Its Effect On The Human Eye
Colour When designing GUIs you need to be conscious of the colours. Microsoft office uses grey as the main colour, blue for the title bar,
highlighting, drop down lists and some text. Many uses feel grey is dull and boring colour to use, however if the colour bright red or black was used
it would be uncomfortable eyes. Trichromatic System and luminance (Red, Green, Blue) Trichromatic system uses a combination of three colours that
are the basis of 3D vision, which are red, blue and green. The human eye has a trichromatic system. The three colours of the trichromatic are detected
by three different types of cells on the retina of the eye, these are known as receptors. There has been much work on developing the theory of this
system into... Show more content on Helpwriting.net ...
Proximity is the way we view things which are close together as a group or look closer than they actually are. Continuity is taking more of an
interest in a straight smooth lines rather than rigid and rapidly changing lines. Symmetry is when a shape or object is repeated on both sides to
make it a mirror image. We see symmetrical shapes easily than unsymmetrical shapes. Similarity is objects and shapes placed together as they
look similar, where as dissimilar objects are likely to be viewed individually. There are also laws that relate to common groupings. Fate is when we
see objects that move together as a group. Region is when objects are enclosed together somehow as a group. And connected is when we see
objects connected by continuous lines. Objects GUI is built using a number of separate objects. Each object is used in a clear order. So images are
layered. It is important that images appear in order and overlay the first image, or else an interface may look as an incomplete object to the user. If
images are positioned behind or in front of text, then the whole interface will not be able to be seen. Therefore GUI should appear in front of text on
the desktop and not behind existing images on the desktop. Furthermore if the positioning of the objects has not been precisely arranged then the GUI
or parts of the GUI may not appear behind the main screen. This leads to the user not being able to access the full range of commands. Another thing is
the
... Get more on HelpWriting.net ...
Essay On Graphical And Command Line Interface
5. Evaluation The creation of our graphical and Command Line interface came about as a means of testing our algorithms. Since we were attempting
to mine associations from large datasets, it made sense to test our mining algorithms on artificially created datasets so as to check whether or not our
algorithms were successful. Therefore, we devised the graphical interface to allow us to create sufficiently large datasets based upon association rules.
This allowed us to plant specific rules with set supports and confidence with in our test datasets. We were then able to run our test datasets through our
association mining algorithms to verify whether or not the algorithms correctly identified the rules which we had planted with the correct... Show more
content on Helpwriting.net ...
6. Conclusion and Future Extensions This project was one of our top choices specifically because it approached a very interesting problem while
giving us the opportunity to work with a renowned company. We had the chance to expand our machine learning knowledge, enhance our technical
abilities and get an insight into what it is like to work with a real client from industry. This experience was challenging as we found out clients can be
difficult to work with and sometimes unreliable. Therefore, one of our main gains from this project is that we learned how to overcome non ideal
situations that arise due to uncooperative clients. We also strengthened our team work skills as well as our time management aptitudes, due to using the
Scrum methodology. As we were very fond of the idea that stood behind our project, we tried to implement it at the best of our abilities. We wanted to
make it accessible to everyone, not only companies in the financial sector and we had multiple thoughts on how to achieve this. Unfortunately, due to
the limited time we could not put all of them into practice. One of the future extensions that we considered was changing the internal representation of
association rules and the associated values such as support and confidence. We
... Get more on HelpWriting.net ...
Activity 5
Activity 5.2.2.4
Documentation Table
Problems
Solutions The G0/1 physical interface is up but G0/1.10 is administratively down. Implement the no shutdown command to enable the G0/1.10 PC3 is
configured with the wrong default gateway address. Change the default gateway on PC3 from 172.17.10.1 to 172.17.30.1 Subinterface VLAN
assignments are switched on R1. Issue the no encapsulation dot1q command to remove the incorrect configuration. Then configure the subinterfaces
with the correct encap dot1q command command. Reenter the correct IP address information.
========================================
Step 1: Calculate a summary route on R1 to reach LANs on R3.
172.22.1.128: ... Show more content on Helpwriting.net ...
a.Can PC1 ping PC4? No
b.Can PC2 ping PC5? No
c.Can PC3 ping PC6? No
Step 2:Document the problem and the solutions.
List the problems and the solutions that will allow these PCs to ping each other. Keep in mind that there could be more than one problem or more than
one solution.
PC1 to PC4
a.Explain the connectivity issues between PC1 and PC4.
Answer: PC1 is on VLAN 30 instead of VLAN 10. The G1/1 port on S1 is configured as an access port.
b.Record the necessary actions to correct the issues.
Answer: Issue the switchport access vlan 10 command on F0/11 interface on S2. Issue the switchport mode trunk command on G1/1 interfaces for S1
and
... Get more on HelpWriting.net ...
MATLAB: A High-Performance Language For Technical Computing
The name MATLAB stands for Matrix Laboratory. MATLAB is a high
–performance language for technical computing. It integrates computation,
visualization, and programming in an easy–to–use environment where problems and solutions are expressed in familiar mathematical notation. Typical
uses include:
Math and computation
Algorithm development
Modelling, simulation, and prototyping
Data analysis, exploration, and visualization
Scientific and engineering graphics
Application development, including Graphical User Interface building
MATLAB is an interactive system whose basic data element is an array that does not require dimensioning. This allows you to solve many technical
computing problems, especially those with matrix and vector formulations, ... Show more content on Helpwriting.net ...
Editor windowCreates and debugs script and function files.
Help windowProvides help information.
Command historyWindow & logs commands entered in the command window.
Workspace windowProvides information about the variables that are used.
Current FolderShows the files in the current directory. 4.2.7Working on the Command Window
To type a command the cursor must be placed next to the command prompt (>>).
Press Enter key to execute the command.
Several commands can be typed in the same line. This is done by typing a comma (,) between the commands.
If a semicolon (;) is typed at the end of a command, the output of the command is not displayed. It is useful when the result is obvious or the output is
very large.
A previously typed command can be recalled to the command prompt with the upper arrow key. The down–arrow key can be used to move down the
previously typed commands.
If a command is too long to fit in one line, it can be continued to the next line by typing three periods (...) and press the Enter key.
The symbol %, when it is typed in the beginning of a line, the line is designated as a comment.
4.3 Working on Matlab
... Get more on HelpWriting.net ...
What Is User Interface?
What is User Interface? "User Interface (UI) Design focuses on anticipating what users might need to do and ensuring that the interface has elements
that are easy to access, understand, and use to facilitate those actions." [5] In this research paper I am going to take you through the history, basics, and
advances. These elements are very important to know because without them software designers would be lost.
To start, one of the biggest patterns in the history of software is the shift from computation design to presentation design. Since our machines have
become stronger more time has been spent on presantation. "The history of that progression can be conveniently broken into three eras: batch
(1945–1968), command–line (1969–1983) and graphical (1984 and after). The story begins, of course, with the invention[6] of the digital computer.
The opening dates on the latter two eras are the years when vital new interface technologies broke out of the laboratory and began to transform users '
expectations about interfaces in a serious way. Those technologies were interactive timesharing and the graphical user interface." [1]
In the batch era, computing power was very expensive. The larger computers of that era needed less logic cycles per second. User interfaces were,
very repetitive and basic. Users were doing most of the work for their computers rather than the other way around. User interfaces became overhead
and software was designed to keep the processor a going like a
... Get more on HelpWriting.net ...
Centos 7 Essay
Task 3
Short Description of Task
Editing network settings on an existing CentOS 7 Linux system.
Long Description of Task
Using the existing CentOS 7 Linux system with a network connection created and set, edit the settings for the NIC by using nmtui and nmcli
commands as well as /etc/sysconfig/network–scripts/ directory. The both commands are used for network configuration, but nmtui has a GUI mode and
it is easier to use. On the other hand, nmcli has more advanced options. The directory /etc/sysconfig/network–scripts/ keeps all network interface files
that start with the name ifcfg– and can be used to edit network settings.
Pre–Implementation Test Plan
Ensure that the user is the root user or can use root privileges for commands.
... Show more content on Helpwriting.net ...
By using keyboard keys, choose Edit a Connection. Select the name of the network connection and on the right pane select Edit button.
To change the profile name, delete the existing name and type a new one.
Select IP configuration Automatic for DHCP or Manual for staticIP address.
For static IP address, type IP addresses with format (–– removed HTML ––) /CIDR (Figure 3).
Type Default Getaway address.
Type DNS servers IP addresses.
Select (–– removed HTML ––) , if the configuration requires several IP addresses.
Choose Automatically connect for IPv6 configurations.
Select OK to save the network configurations.
Select Back to go back Network Manager TUI.
Select OK or Quit to go back to the terminal.
Edit network settings by using etc/sysconfig/network–scripts/ directory:
In the terminal, open etc/sysconfig/network–scripts/ directory by using command cd etc/sysconfig/network–scripts
List the files of the directory with the command ll. For more precise search, use pipes and grep filter: ll | grep "ifcfg".
Open the network configuration file with editor with root privileges sudo vi ifcfg– (–– removed HTML ––) (Figure 4).
For DHCP find the lines BOOTPROTO=none and ONBOOT=no and change them to BOOTPROTO=dhcp ONBOOT=yes and restart the network by
using command with root privileges systemctl restart network.
... Get more on HelpWriting.net ...
A Brief Look at Scilab
Scilab with dynamically typed objects it is a interpreted language . Scilab runs is available in binary format, for the platforms: Unix/Linux
workstations MacOSX. MacOSX and Windows, users can also be installed using Scilab. Compilation of source code is also possible in Scilab.
Scilab was named Basil, developed at INRIA as part of the Meta2project. It was developed in the name of Scilab by the Scilab group, which
comprised of a team of INRIA Metal au and ENPC. Since 2004, Scilab development was been coordinated by a consortium .Scilab is used as a
scripting language to test algorithms and to perform computations numerical. Scilab is a programming language, and around 2000 Scilab coded
functions are available in library . The Scilab syntax is very simple, and also which are the fundamental object of scientific calculus the uses the
matrices, and it is provided with specific functions and operators. Matrices are of different types which includes real, complex, string, polynomial,
and rational. Scilab programs are very quiet compact and they are smaller than their counterparts in C, C++, or Java. Scilab is mainly a combination
of scientific computing, numerical libraries from such areas as numerical library such as linear algebra, optimization and numerical integration it is a
easy access . It is also simple to expand Scilab environment in a computer. Using static or dynamic links, one can easily import new functionalities
from external libraries into Scilab . New
... Get more on HelpWriting.net ...
Computer Software : Operating System Software
Computer Software
Computer software is a program that enables a computer to perform a specific task. Computer is useless without a software. For example without
internet browser you cannot search anything on the internet. You need system software such as word processer, which enables a user to perform a
task, and system software such as an operating system, which enables software to run properly. Computer software has to be installed within the
computer storage (such as hard drive, memory, or RAM). Once the software is installed, the computer is able to execute the software.
Types of software's:
Operating System Software:
An operating system is a software that enable the computer hardware to communicate with the computer software. Without ... Show more content on
Helpwriting.net ...
It is a multitasking computer operating system. It was designed to be a small and flexible operating system.
DOS–command line:
Disk Operating System (DOS) was the first operating system used by IBM computers. It was originally available in two versions "PC–DOS" and
"MS–DOS"
Linux–command line:
Linux is a software that enables application and the computer operator to access the devices on the computer to perform desired functions.
Windows 95, NT, 98, ME, 2000, XP, Vista, and Windows 7:
These are the computer operating systems designed by the Microsoft.
Novell Netware:
Novell Netware is also a brand of operating system designed for networks or simply a local area network (LAN) operating system. Netware is a
product of the popular IT–centred company called Novell.
MAC OS:
Mac operating is series of graphical user interface (GUI). Mac operating system was developed by Apple Inc. It was first introduced in 1984.
MAC OS X:
This operating system was released in 2001. It is the latest version of Mac OS. It is a series of UNIX based graphical interface operating system.
Virus:
Virus is a software program that are designed to spreads from one computer to another and to interfere with computer operations. While using the
internet your computer may have come in contact with computer viruses. A computer virus might corrupt or delete data on the computer, or erase
everything on your hard disk. Viruses also spread ether by portable media, such as external
... Get more on HelpWriting.net ...
LAB 2 Essay
LAB
Network Documentation
2
Introduction
In this lab, you will learn how to use various tools and techniques to determine and document IP network design. You will use the Windows Command
Prompt to generate network traffic; Wireshark to capture and analyze the generated traffic; PuTTY to remotely access the Cisco Switch; and finally,
you will issue IOS commands on the Cisco Switch to understand its various interfaces and inner workings.
Learning Objectives
Upon completing this lab, you will be able to:
Develop a plan for identifying and documenting the logical IP network design and IP addressing schema based on data collected from Lab #1
Use PuTTY to establish Telnet and SSH to the IP addresses of the identified... Show more content on Helpwriting.net ...
You will use this information to complete the deliverables for this lab.
FIGURE 2.3
Windows Command
Prompt window
7.Repeat step 6 for the following IP addresses to create a packet stream for Wireshark.
172.30.0.2
172.16.8.1
172.17.0.2
172.16.0.2
172.19.0.1
172.19.0.2 8.Minimize the Windows Command Prompt window. 9. Double–click the PuTTY icon on the desktop to start the PuTTY application.
Note:
The next steps use PuTTY, a terminal emulator program that you can use as a client to create a variety of secure connections to network resources.
This lab uses it to create Telnet and SSH sessions.
Hands–On Steps
21
10.In the PuTTY application window, type the IP address for LAN Switch 1, 172.16.8.5. Select the Telnet
radio button and click the Open button to start the connection.
FIGURE 2.4
PuTTY application window 2
a.Username: cisco
b.Password: cisco
FIGURE 2.5
PuTTY terminal console window Network Documentation
11.PuTTY will launch a terminal console window. At the login prompt, type the following:
22
LAB #2 | Network Documentation
Note:
The next steps involve using the Cisco IOS show command to obtain network documentation information from the interface you've connected to (LAN
Switch 1). Cisco IOS is a package of routing, switching, and networking commands integrated with a Cisco–specific operating system, of which the
show command
... Get more on HelpWriting.net ...
Lab Network+
Lesson 2 Lab Worksheet Lab Exercises Lab 1 How TCP/IP Protocols Work through the TCP/IP Model The purpose of this lab is to familiarize the
students with the TCP/IP Model and some of the protocols that are used in it. This lab is important to the student because it takes the student through a
thought experiment about how data would pass thorough the TCP/IP Model down from the computer and up through the destination computer. By
doing this thought experiment the student will come to better understand how different protocols work together to accomplish a specific task.
Materials Word processing document Textbook Do the Lab Follow... Show more content on Helpwriting.net ...
Take Note This lab uses Windows 7. If you are using Windows 8, Vista or Windows XP, you will need to make some slight variations to the lab.
Materials word processing document Computer running Windows 7 Professional Do the Lab The IPCONFIG Command 1.Click the Start button at the
bottom left of your Windows 7 Desktop Display in order to bring up the Windows 7 start menu (Figure 2–12). [pic] 2.Type CMD into the Search
Programs and Files box at the bottom of the Start Menu and press Enter. 3.The Command Line Interface (CLI) Window will come up (as shown in
Figure 2–13). The CLI is a window where you can enter commands into the computer in the form of text. This type of interface was how a person
interacted with DOS. It is also how a person is able to currently interact with Linux if they choose not to use one of several graphical interfaces
available for use with Linux. [pic] 4.Once you have opened the Command Line Interface (CLI), type in the command ipconfig. When the ipconfig
command is entered, the CLI changes to something similar to Figure 2–14. You should note that the
... Get more on HelpWriting.net ...
What Is An Operating System Essay
Operating Systems What is an operating system The operating system is responsible for controlling all of the tasks and processes. Operating systems
consists of a collection of programs, with each having a specific task allocated to it. These programs are designed to make the computer system run as
efficiently as possible. The most commonly used operating systems are Mac OS, Windows and Linux. What Operating systems do В· Allow users to
interact with the machine (e.g. selecting programs). В· Allocate space in memory for programs. В· Run programs (transfer instructions for memory to
processor then executing them). В· Manage the storing of data. В· Management of input/output devices. Difference Operating Systems Windows
Windows is the most widely used Operating System in the world, It's initial introduction was in 1981 as a command–line interface; the GUI (graphical
user interface) was introduced in 1985 and has seen 26 different versions. Mac OS In 1984 Apple released its first OS, which became known as "Mac
OS" as of 1997. The original OS was a fork of Apples older OS "Lisa" which was, at the time, extremely advanced. Linux Linux began in 1991 as a
personal project by Lines Torvalds, he set out to create a new, free Operating System. Since then it has grown from an OS containing a few C files to
having over 18 million lines of source code and available under the GNU General Public License. The GNU license guarantees that
... Get more on HelpWriting.net ...
Advantages And Disadvantages Of MATLAB
The name MATLAB stands for Matrix Laboratory. MATLAB is a high
–performance language for technical computing. It integrates computation,
visualization, and programming in an easy–to–use environment where problems and solutions are expressed in familiar mathematical notation. Typical
uses include:
Math and computation
Algorithm development
Modelling, simulation, and prototyping
Data analysis, exploration, and visualization
Scientific and engineering graphics
Application development, including Graphical User Interface building
MATLAB is an interactive system whose basic data element is an array that does not require dimensioning. This allows you to solve many technical
computing problems, especially those with matrix and vector formulations, ... Show more content on Helpwriting.net ...
Three principal elements required to create a MATLAB GraphicalUser Interface. The elements are components, figures, callbacks.
1. Components
Each item on a GUI is a graphical component. The types of components include graphical controls (pushbuttons, radio buttons, edit boxes, lists, sliders,
etc.), static elements (frames and text strings), menus, and axes. Graphical controls and static elements are created by the functions and axes are used
to display graphical data which is created by the function axes.
2. Figures
The components of a GUI must be arranged within a figure, which is a window on the computer screen.
3. Callbacks
Finally, there must be some way to perform an action if a user clicks on a button. A mouse click or a key press is an event, and the MATLAB
program must respond to each event if the program is to perform its function. The code executed in response to an event is known as a call back. There
must be a callback to implement the function of each graphical component on the
... Get more on HelpWriting.net ...
Disadvantages Of 2 User Interface
2 User Interface
User Interface is a function of the operating system that allows individuals to access and command the computer. It is the junction between a user and
a computer program. Task of the users are changing rapidly and even functionality of computer becomes more complex according to it user must adjust
their behavior and problem solving strategies to the system. This situation becomes worst as user do not have that proper experience and knowledge
[5], [6].
A well designed interface can provide much more helpful information in a more appropriate manner through interaction specially for those user who
have lack of knowledge. Therefore user interface is must so that it can give benet to both user and resource management. An interface is a set of
commands or ... Show more content on Helpwriting.net ...
Menu Driven Interface (MDI) This type of interface lets you interact with a computer or device through a series of screens or menus. Menu is
presented, make a choice and then the next menu appears on the screen.Then make another choice and so on. Example: Cash point machines (ATMs)
and iPod or mobile phone, they both use a menu driven interface [7].
В€ Advantages of MDI
{ There are no commands to learn or remember.
{ Each and every step are given so that the user doesn't have to re– member anything.
{ Even if don't know what to do, can usually guess way around the options. { Menu interfaces don't have to be visual, they can be spoken – good for
telephones or for visually impaired people.
{ They don't need huge amounts of processing power or memory.
В€ Disadvantages of MDI
{ A poorly designed menu interface may be slow to use.
{ It can be irritating if there are too many menu screens to work through. { If often can't go to the exact place then want right at the start. Then have to
work own way through the menu screens even if know where then want to get to.
Dept. of Computer Engg. 5 DYPCOE, Akurdi, Pune
Operating System Design User Interface to Operating
... Get more on HelpWriting.net ...
Cisco Activity
Task 3: Interpreting Debug Output.
Note: If you already configured IP addressing on R1, please remove all the interface commands now before proceeding. Furthermore, R2 and R3
should be configured through the end of "Task 2: Basic Router Configuration".
Step 1 – On R1 from privileged EXEC mode, enter the debug ip routing command.
R1# debug ip routing.
IP routing debugging is on.
The debug ip routing command will show when routes are added, modified and deleted from the routing table. For example, every time you
successfully configure and activate an interface, Cisco IOS adds a route to the routing table. We can verify this by observing output from the debug ip
routing command.
Step 2 – Enter interface configuration mode for R1's LAN ... Show more content on Helpwriting.net ...
End with CNTL/Z.
R1(config)# interface serial 0/0/0
Configure the ip address as specified in the Topology Diagram.
R1(config–if)# ip address 172.16.2.1 255.255.255.0 is_up: 0 state: 0 sub state: 1 line: 0 has_route: False
As soon as you press the enter key, Cisco IOS debug output informs you that there is now a route, but its state is "False". Since R1 is the DCE side
of our lab environment, we must specify how fast bits will be clocked between R1 and R2.
Step 6 Enter the clock rate command on R1.
You can specify any valid clocking speed. Use the ? to find the valid rates. Here, we used 64000 bps.
R1(config–if)# clock rate 64000
Step 7 Enter the command necessary to insure the interface is fully configured.
R1(config–if)# no shutdown
After you enter the correct command, you should see debug output similar to the following:
is_up: 0 state: 0 sub state: 1 line: 0 has_route: False
%LINK–3–UPDOWN: Interface Serial0/0/0, changed state to down
Unlike the LAN interface, fully configuring the WAN interface is not always enough to have the route entered in the routing table even if your cable
connections are correct. The other side of the WAN link must also be configured. /u&gt;
Step 8 If possible, establish a separate terminal session with R2. Click on R2
This will allow you to observe the debug output on R2 when you make changes on R1. You can also turn on debug ip routing on R2.
R2#debug ip routing
IP routing debugging is on
Enter
... Get more on HelpWriting.net ...
Essay on Cmit 350 Final Project
WAN Implementation with SOHO Skills Configuration Prepared for: University of Maryland University College Prepared by: Nathan Poole Table of
Contents I. Springfield Site Device and STP Configurations II. Worchester Site Subnetting Configurations III. Boston Site Routing Protocol, Route
Summarization and Topology Improvements IV. Sacramento Site VLAN, Routing on a Stick (ROS) and DHCP Implementation V. Los Angeles Site
Management Technologies VI. xACME WAN– WAN Implementation and Secure Communications VII. Bibliography WAN Implementation with
SOHO Skills Configuration I. Springfield Site Device and STP Configurations Problem Statement: The device hostnames on each switch are generic
and... Show more content on Helpwriting.net ...
End with CNTL/Z SpringfieldSwitch1(config)#Banner motd #Make sure you get an A on this paper!# SpringfieldSwitch1(config)#exit LOGIN Banner
(Displayed after the MOTD banner before the login prompt.) SpringfieldSwitch1(config)#Banner login # Enter TEXT message. End with the character
'#'. *** Login Required. Unauthorized use is prohibited ***# Problem Statement: Implement device passwords on both console port and VTY. All
passwords should be encrypted. Console Port Password SpringfieldSwitch1#config t Enter configuration commands, one per line. End with CNTL/Z.
SpringfieldSwitch1(config)#enable secret 1qazZAQ! VTY Password SpringfieldSwitch1#config t Enter configuration commands, one per line. End
with CNTL/Z. SpringfieldSwitch1(config)#line vty 0 15 SpringfieldSwitch1(config–line)#password TELNET1234
SpringfieldSwitch1(config–line)#end SpringfieldSwitch1#service password–encryption Problem Statement: Create Server VLANs, Faculty VLANs,
Instructional VLANs and Administrative VLANs on all switches. SpringfieldSwitch1&gt;en Password: SpringfieldSwitch1#config t Enter
configuration commands, one per line. End with CNTL/Z. SpringfieldSwitch1(config)#vlan 11 SpringfieldSwitch1(config–vlan)#name faculty
SpringfieldSwitch1(config–vlan)#vlan 12 SpringfieldSwitch1(config–vlan)#name server SpringfieldSwitch1(config–vlan)#vlan 14
SpringfieldSwitch1(config–vlan)#name
... Get more on HelpWriting.net ...
What Is An Operating System?
Unit 2 Assignment 1 P2/M1
What is an operating system?
An operating system is software that communicates with the hardware and it allows other programs to run it. Operating systems is the structure that
allows you to communicate with computer hardware in a communicating way , without an operating system you wouldn't be able to tell the computer to
do anything and it won't have any instructions to follow.
Purpose of an operating system:
Operating system controls the hardware and software properties of the system in a computer these properties include things like processer, memory
and disk space. Computers must have an operating system to run other programs also an operating system does basic tasks such as looking and
recognizing the input from the keyboard and also sending output to display on the screen , keeping track of files and directories on the disk and
controlling the disk drivers and printers.
The purpose of an operating system, a purpose of an operating system is memory management this process happens when a computer searches for a
memory to programs that run in the same time. Virtual memory is a data storage that will keep separate memory addresses accessed before by the
user, this process will increase the amount of RAM and transfer data to the secondary storage. Virtual memory can have an impact on how well
computer will work because of its storage.
An operating system manages the hardware and software resources of the system. A computer must have an
... Get more on HelpWriting.net ...
Guide to Unix Using Linux Fourth Edition Chapter 1 Review...
Guide to UNIX Using Linux Fourth Edition Chapter 1 Solutions
Answers to the Chapter 1 Review Questions
1. Your boss drops by your office in a hurry to ask you to attend a meeting at 10:30 on Friday morning and you can't find a pen to make a note as a
reminder. What Linux command can you use to make a quick note to store in a file called Meeting? Answer: b. cat > Meeting
2. Before you make the note in Question 1, you decide to determine Friday's date, so that you can include it in your note. What Linux command can you
use to quickly determine the Friday's date? Answer: a. cal
3. While you are typing a command, you misspell the name of a file you want to specify with the command. Which of the following ... Show more
content on Helpwriting.net ...
What key sequence can you use to repeat the last command, which was used to print the file? Answer: c. Press the up arrow key one time.
21. Your international company is scheduling a meeting among managers in Canada, the United States, Spain, Sweden, and Hong Kong on the basis of
Greenwich Mean Time (GMT). What command enables you to display the current time in GMT? Answer: b. date–u
22. How would you describe the purpose of the more command? Answer: The more command enables you to view a file's contents by scrolling down.
23. What is the purpose of Telnet? Answer: Telnet can be used to connect aUNIX , Linux, or Windows PC to a remote computer.
24. You enter Cal on the command line to view a calendar but only see an error message. Explain why you got the error message. Answer: UNIX and
Linux are case sensitive, so to display a calendar you must use the cal command and not Cal.
25. Explain how you can run more than one command on a single command line. Answer: To run more than one command on a single line, use the :
(semicolon) character to separate each command.
Hands–On Projects Tips and Solutions for Chapter 1
Project 1–1
In this project, students use Telnet in Windows 2000/XP/Vista to access a remote computer running UNIX/Linux. Students will need accounts on both
the Windows 2000/XP/Vista
... Get more on HelpWriting.net ...
Questions with Explanation
Q1: If an Ethernet port on router was assigned an IP address of 172.16.112.1/20, what is the maximum number of hosts allowed on this subnet? A.
1024 B. 2046 C. 4094 D. 4096 E. 8190 Answer: C Explanation: Given IP address of 172.16.112.1 / 20, subnet mask: 255.255.240.0 max. num of hosts
=(( 2^12) –2 ) = 4096–2 = 4094 Q2.:An access list was written with the four statements shown in the graphic. Which single access list statement will
combine all four of these statements into a single statements that will have exactly the same effect?
A. access–list 10 permit 172.29.16.0 0.0.0.255 B. access–list 10 permit 172.29.16.0 0.0.1.255 C. access–list 10 permit 172.29.16.0 0.0.3.255 D.
access–list 10 permit 172.29.16.0 0.0.15.255 E. access–list 10 ... Show more content on Helpwriting.net ...
A host in an Ethernet network can communicate with another host,only if it knows the Ethernet address (MAC address) of that host.The higher level
protocols like IP use a different kind of addressing scheme like (IP address) from the lower level hardware addressing scheme like MAC address.ARP
is used to get the Ethernet address of a host from its IP address.ARP is extensively used by all the hosts in an Ethernet network.In this case there is
already an entry for this IP address,Meaning this host already knows the MAC to IP address mapping for this destination so there is no need to send
out an ARP request instead it will send the ICMP packet directly to 192.168.1.254 via unicast. Q7.An internetwork has been configured as shown in the
diagram, with both routers using EIGRP routing for AS 44.Users on the Branch router are unable to reach any of the subnets on the HQ router.Which
of the following commands is necessary to fix this problem.?
A. Branch(config–router)# version 2 B. Branch(config–router)# no auto–summary C. Branch(config–router)# redistribute eigrp 44 D.
Branch(config–router)# EIGRP log–neighbor–changes E. Branch(config–router)# default–information originate Explanation:By default, EIGRP
... Get more on HelpWriting.net ...
Bt594 Final Project
TM1: Installing and using Linux operating systems BIT594 – Technologies in Practice Due date: 31/03/2016 Bobbi–jo Ataahua Paikea – 4203318
Question 1: Installing Ubuntu Task 1: Download the latest version of Ubuntu Download the latest version of Ubuntu (the recommended flavour is
32–bit, as not all software will run on a 64–bit). Take a screenshot while downloading the latest version and include this in the electronic file you
submit. You need to document the screenshot and describe accurately what the screenshot was about. Write no more than 50 words to explain the
screenshot. Figure 1: Download of Ubuntu 14.04.4 LTS (Trusty Tahr). Screenshot description: Captured in the screenshot as seen in figure 1 is the
download process of... Show more content on Helpwriting.net ...
Take three screenshots of relevant stages during the installation process. Write no more than 100 words for each screenshot to describe what was
accomplished. Include the screenshots in the word–processed document you submit. Marks will be awarded for the relevance of the screenshots
selected. It will be for you to decide and explain why the screenshots selected are relevant. Explanation for chosen screenshots: As question 2 is clearly
focused on terminal/command line, below are three screenshots that have relevance to the command–line environment. Instead of using the GUI
environment to install a new application on the Ubuntu desktop, the terminal/command line was used. Using the terminal/command line showcases a
different route of installing a new application. The command–line environment also allows the processors to do more precise task procedures. Users are
able to view a list of details and descriptions about applications before choosing one to install. Figure 1: Package names and short descriptions of the
three
... Get more on HelpWriting.net ...
It250 Linux Course Review and Hw Helper
IT250 Linux Operating System
S.No Question Points
1 What commands are used to create an ext2–second extended–filesystem? mke2fs or mkfs.ext2
2 Which of the following types of filesystems can the command e2fsck be used to check?
A. ext2
B. ext3
C. jfs
D. vfat
3 What command can be used to start a program with a lower scheduling priority? nice
____________
FINAL
Which of the following Linux utilities lists the names of files in a single directory? ls Which component of X Window allows customization of the user
interface?
Window manager
Which of the following control structures is a multiple–branch decision mechanism capable of more than three decisions?
The Case structure
What is the meaning of the DocumentRoot directive in the Apache ... Show more content on Helpwriting.net ...
yum
Which of the following symbols instructs the shell to redirect the output of a command to the specified file instead of the screen and overwrite the file?
You would use the > symbol
The special character that causes the shell to generate filenames that match any single character in the name of an existing file is _____.
The question mark
In vim, which of the following keystrokes is used to exit the editor and save the contents of the file being edited?
ZZ
Which of the following control structures is a multiple–branch decision mechanism capable of more than three decisions?
The Case structure
Which component of X Window allows customization of the user interface?
Window manager
Which of the following utilities is used to view a file one screen at a time? less What utility is used to search for a particular string within a file or a
group of files? grep The utility that can be used to copy a file, including text and executable program (binary) files, is ___________. cp Which of the
following partitions does Linux use when all the information that Linux is processing cannot be stored in RAM?
Swap
Which of the following keystrokes helps you undo the last change made in the vim editor? u What network utilities works only if a remote system
trusts your local computer? rsh What represents the root partition in Linux?
The forward slash /
The C compiler that Linux commonly uses is _________.
GNU gcc
What
... Get more on HelpWriting.net ...
Basic Device And Security Configuration Paper
Basic Device and Security Configuration
Kevin Kormylo, Okoma Mita, Dan O'Donnell
CIT/249
January 12, 2015 Steve Acklin
Basic Device and Security Configuration
When designing a network there are basic network and security configurations that one needs to consider. Choosing a hostname for each device is
very important, this allows the user to know what device they are working on. Configuring interfaces with a proper IP, subnet, and descriptions are part
of the basic configuration of a network device.
One needs to consider the security setting for the network devices. There are some basic configurations that one can choose to use in their
configuration. Passwords and a username should be used for consoling and remote access to any ... Show more content on Helpwriting.net ...
We were able to name the devices and create the banners as required. All passwords were encrypted and remote access was successful for SSH and
telnet. All interfaces were assigned a description that were being used and the others not being used, were shutdown. We secured remote access by a
username and password along with the rsa key. We verified our configuration by posting the running configuration in our team thread.
Team A's assignment
The assignment was broken up into two parts. Each member had a device to configure Dan configured Branch1 router, Adam was assigned Branch2
router, Okoma configured the switch, PC, ISP, and Kevin configured the Core router. We did not receive a config from Adam so, Kevin was able to
do that part too. Okoma and Dan provided a brief written summary of the work they performed and Kevin put the paper together.
Switch1 running configuration:
Current configuration : 3826 bytes
!
version 12.2 no service pad service timestamps debug uptime service timestamps log uptime service password–encryption
!
hostname Switch1
!
no logging console enable secret 5 $1$m1XN$lgDd.3R8lddprN/Z8Vxzu0 enable password 7 110A000712001E1F
!
username admin password 7 02051D590E141A32 no aaa new–model ip subnet–zero
!
ip domain–name mycompany.com
!
! crypto pki trustpoint TP–self–signed–1363906688 enrollment selfsigned subject–name cn=IOS–Self–Signed–Certificate–1363906688
... Get more on HelpWriting.net ...
Nt1330 Unit 3 Assignment 4 Command Line
CM 523 Homework 4: Command Line Bochao Sun Nov. 14, 2017 When I encountered command line during last week's class, I found it a little
confusing and "aloof". I was totally unfamiliar with its purpose and syntax, and the interface is merely characters of same font and size. I thought it
is something only for computer science students and does not have anything to do with web design and interaction. Things changed a lot as I learn to
use it. In fact, such flat interface excludes all graphical display formats in regular commands thus makes it clearer to find the target directory and file
by looking their names and types (e.g. style.css) returned after the "ls" command. It should occupy less RAM of the computer than Finder because it
does not "render" – figure out icons and thumbnails – for all files... Show more content on Helpwriting.net ...
When I am using graphical user interface, I can go back and forth to the last directory by simply clicking at arrow on the Finder window. However, I
need to type commands every time to change directory (cd) and know what is in the directory (pwd). Therefore, CLI both saves time and takes time. It
also takes time to learn and get used to the set of commands that make sense in CLI. What's more, contents are permanently deleted after the "rm" or
"rm –r" command, which may cause loss of important documents by mistake. Another detail that I pay attention to is that in Finder, I can preview
most files by pressing the Space button and switch the files with arrow buttons on keyboard, while previewing is not available on CLI. I need to
open it with an "open" command. In addition, CLI once surprised me by making reasonable suggestions. The first time I tried to open a website in
CLI, I typed the address without "http://" and it was actually regarded as a path (see below). When it could not found the folder and file on my
computer, it surprisingly asked "Perhaps you meant (suggested
... Get more on HelpWriting.net ...
Analyzing The Multi User Operating System With Li And Ci...
Q 2 Analyzing the multi user operating system with GUI and CLI
GUI with it's capacity to show content utilizing distinctive textual styles and in addition to show realistic, gives a greater number of abilities than
prohibitive character–based interface. In any case the character interface is truly essential and considered great from another perspective: it is more
programmable and more capable than any GUI can ever be. Additionally we have to recognize that thought of GUI interface from most regular
execution – mouse–based registration drop sort of interface that is frequently connected with this term. It is only one conceivable usage of GUI
interface. Different usage are conceivable as will be talked about beneath.
While noteworthy for ... Show more content on Helpwriting.net ...
User can use the GNOME desktop, panel, applications, and tool set to customize working environment and manager system tasks. GNOME also
provides an application set, including a word processor, a spreadsheet program, a database manager, a presentation tool, a Web browser, and an email
program.
Command Line Interface
A command line interface (CLI) enables users to write commands in a console window so as to interact with an operating system.
CLI FEW TASKS: Locate Managed objects in managed object topology Enable or Disable Modules. Acknowledge or delete Alarms.
CLI COMMANDS CAN BE DIVIDED INTO TWO TYPES:
a)BASIC COMMANDS: They are used to set parameter values, define command alias, check command status, login and logout of server.
b)EXTENDED COMMANDS: These are commands that changes the topology of managed objects, their properties & their attributes. They are used to
perform several Functions:
A Few CLI COMMANDS USED IN SOLARIS:
S.No.COMMANDDESCRIPTION
1.aliasthis allows the user view the current aliases
2.bdiffcompares two large files
3.cdchanges directories
4.datereturns the date and time
5.lncreates a link between two files
6.pwddisplays the name of the working directory
7.Rmremoves files
FreeBSD:
It supports three GUI:
GNOME
GNOME is a user–friendly desktop environment which makes it convenient for applications to synchronize as environment includes panel for starting
applications
... Get more on HelpWriting.net ...
Unit 2 TASK 1 Decoding the Jargon
TASK 1: Decoding the Jargon
a. Create a booklet which explain the function of hardware components and identify communication between components. The pages should include
photographs and diagrams to illustrate the information you include. (P1)
Components communication
The following diagram shows how components communicate each other's.
CPU
Also known as the processor, the CPU is the heart of the computer and has two part:
Control Unit
The control unit controls the flow of data through the processor.
Arithmetic/Logic unit (ALU)
The ALU performs mathematical, logical, and decision operations in a computer and is the final processing performed by the processor.
RAM
A computer can only run a program when it is in memory ... Show more content on Helpwriting.net ...
DOS is the basic system that people have to using Command line prompt to communicate with computer via simple interface which is not "friendly"
user interface.
The DOS can't run multitask on computer which can only load one program until it finished. But some of the features still quite useful that people still
use it. Such as:
5. CHKDSK
6. GBUPDATE
7. IPCONFIG
8. PING
9. FDISK
Comparison of two operating systems
We can see there are many different between those two computer operating system which the Windows 8 operating system have a lots of advance
features and higher performance that suit to nowadays. The DOS system usually used to be run a specific program which prevents any virus or hacker
attack in the solo computer such as sale program, data base in the hospital or council data base.
Features
Windows 8
DOS
Network
Yes
N/A
GUI
Yes
N/A
Multiuser
Yes
N/A
Server Administration
Yes
N/A
Command line interface
Yes
Yes
Entertain
Yes
N/A
Sound
Yes
Yes
Multitask
Yes
N/A
c. In your document explain the purpose of different software utilities which is available. Explain how software utilities can improve the performance
of computer systems (P3, D1)
Windows 8 Utility
Virus Protection
The specific program used to prevent viruses, worms and Trojans which attached in the email or website.
Every computer need to install an anti–virus software and
... Get more on HelpWriting.net ...
Week 4 B IP Subnetting Lab Essay
Introduction
Assignment
Develop a subnetting plan and implement it in the lab. Configure RIP as a routing protocol.
Conditions
NYEDGE1 is the hub router. The two remote office routers NYEDGE2 and NYWAN1 connect to NYEDGE1 through serial connections. Each router
has a locally attached Ethernet network.
The serial line data rates and DTE/DCE settings have already been configured on all three routers. You only need to assign theIP address to the
interfaces.
Notes
The routers are connected directly to each other in this lab and do not actually connect through any leased line services.
Diagram
Gi0/0
Ethernet
NYWAN1
Serial0/1/0
Serial0/0/1
DCE
NYEDGE1
Serial0/0/0
Serial0/0/0
DCE
Gi0/0
Ethernet
Task Index
п‚·
п‚·
Task 1 – Create a subnet ... Show more content on Helpwriting.net ...
You are not encouraged to use this subnetwork because it specifies the wire address.
Nor should you use the last subnet, 192.50.6.224, because it is considered the major network broadcast address. Therefore you can only use subnets
32, 64, 96, 128, 160 and 192. With this design requirement, you only need to use five of the six usable subnetworks, leaving one for any additional
segments in the future. Likewise, for each subnet, you cannot use the first and last address. For example, subnet 192.50.1.32 extends all the way to
192.50.1.63. But you cannot use these two IP addresses (.32 and .63) because they are the wire and the broadcast addresses for this subnetwork. But
you can use any of the 30 IP addresses in between.
Task 3 – Configure the interfaces in each router Step 1: Configure Gi0/0, s0/0/0, and S0/0/1 for NYEDGE1.
Action:
ip address <ip address> < subnet mask>
Result:
NYEDGE1>enable
NYEDGE1#config t
Enter configuration commands, one per line.
End with CNTL/Z.
NYEDGE1(config)#int g0/0
NYEDGE1(config–if)#ip address 192.50.6.33 255.255.255.224
NYEDGE1(config–if)#no shut
NYEDGE1(config–if)#
NYEDGE1(config–if)#int s0/0/0
NYEDGE1(config–if)#ip address 192.50.6.65 255.255.255.224
NYEDGE1(config–if)#no shut
NYEDGE1(config–if)#
NYEDGE1(config–if)#int s0/0/1
NYEDGE1(config–if)#ip address 192.50.6.129 255.255.255.224
NYEDGE1(config–if)#no shut
NYEDGE1(config–if)#
NYEDGE1(config–if)#end
Explanation:
Subnet 192.50.6.32 is assigned to g0/0. Subnet 192.50.6.128 is
... Get more on HelpWriting.net ...
New204
NETW204: Assignment 1 (50 points) Each answer is worth 1 point each, 50 questions = 50 total points. Type answers in the appropriate cell; text
will automatically wrap. Post your completed assignment to the dropbox. NAME| Manuel Crail| Router Configuration Exercise (5 points) When
configuring a router, there are certain basic tasks performed, * Naming the router * Setting passwords * Configuring interfaces * Configuring a
banner * Saving changes on a router * Verifying basic configuration and router operations | Question| Answer| 1| The first prompt is _______ mode
and will allow you to view the state of the router. | User Mode| 2| What major limitation does this mode have? | Does... Show more content on
Helpwriting.net ...
Create a summary static route for R1 in figure 1 for the 3 LANs it has attached. Use the steps from your text Chapter 2 page 125: Calculating a
Summary Route. 192.168.20.0/24 Binary form=11000000.10101000.00010100.00000000=/22 192.168.21.0/24 Binary
form=11000000.10101000.00010101.00000000=/22 192.168.22.0/24 Binary form=11000000.10101000.00010110.00000000=/22 Summarized into
one route=192.168.0.0 /22=255.255.252.0 Write the networks in binary form. Check work above please| | | | | | | | | | Question| Answer| 48| Find
subnet mask by counting Bits matching from left to right: ____. This is your subnet mask for the summary route.| 22 or 255.255.252.0| 49| Find
summary address by putting 0s (zeros) in remaining address positions after the left to right matching ends (For example if the first 21 bits match from
the left, put 0s (zeros) in the remaining 11 positions of the 32 bit address to find address for the summary).| 11000000.10101000.00010100.00000000|
50| Summary Route (Address and subnet mask found above combined) for routing table| 192.168.0.0 and 255.255.252.0
... Get more on HelpWriting.net ...
Linux: the Kernal and Shell Essay examples
Linux: The Kernel And Shell
Josh Harkey
AIU Online
Abstract
This manual has been written to explore the many distributions of Linux. It will define some of the components of the OS as they relate to the shell
and kernel. It will also go over some of the more popular distributions of Linux and the shells. Finally, it will give a brief overview of some useful
commands that can be used in the bash shell.
Linux: The Kernel and Shell It is important to know some the inner workings of an operating system to help better understand how they and why they
are beneficial. This is one of the reasons for this manual. It will also give a better understanding of some of the more popular distributions of Linux.
The Kernel And Shell As They... Show more content on Helpwriting.net ...
As a result, Linux offers the user a way to have an OS that comes with more functionality, and in an environment that can be customized for the task at
hand.
Five Common Distributions
Since Linux is allowed to be changed by its users there are more than 600 distributions available. Here is a list of five of the most commonly used.
FEDORA– fedoraproject.org (2013) states, "fedora is fast, stable, and powerful operating system for everyday use built by a worldwide community."
This distribution is most commonly used by developers and Linux enthusiast.
DEBIAN– debian.org (2013) states, "Debian provides more than a pure OS: it comes with over 37,500 packages, pre compiled software bundled up
in a nice format for easy installation on your machine." It is one of the oldest distributions still in active development, and is often the base for newer
distributions. People that have a passion for Linux enjoy Debian. openSUSE– according to opensuse.org (2013), " The openSUSE distribution is a
stable, way to use and complete multi–purpose distribution.it is aimed towards users and developers working on desktop or server." This distribution
is generally used in an enterprise environment, and is sponsored by Novell. It is known for its ease of use on the surface and advanced options further in.
LINUX MINT– linuxmint.com (2013) states, "The purpose of Linux mint is to produce a modern, elegant and comfortable operating system which is
both powerful
... Get more on HelpWriting.net ...
It320 Hmwk 4.1
IT320
IT320 Wan Technology/ Unit 4
Assignment: 4.1
1. At what layer of the OSI model does CDP operate?
Data Link layer
2. What is the primary use for CDP?
To discover information about directly connected Cisco devices
3. What network layer protocols can CDP provide information for?
IP, Internetwork Packet Exchange (IPX), and AppleTalk
4. When CDP is enabled on an interface, a router (or switch) sends CDP advertisements on a regular basis, which list information about the sending
router. Included in the packets are a series of
Type/Length/Value, or TLV, data structures.
5. The show cdp neighbors command can be used to display one line of information about each directly connected CDP–enabled device. List the six
pieces ... Show more content on Helpwriting.net ...
Compiled Thu 20–Feb–03 14:09 by pwade advertisement version: 2
RTC# show cdp interface
Ethernet0 is up, line protocol is up
122 Routers and Routing Basics CCNA 2 Labs and Study Guide
Encapsulation ARPA
Sending CDP packets every 60 seconds
Holdtime is 180 seconds
Serial0 is up, line protocol is up
Encapsulation HDLC
Sending CDP packets every 60 seconds
Holdtime is 180 seconds
Serial1 is administratively down, line protocol is down
Encapsulation HDLC
Sending CDP packets every 60 seconds
Holdtime is 180 seconds
16. List and briefly describe the debug options displayed after entering the following command:
RTB#debug cdp ? adjacency CDP neighbor info events CDP events ip CDP ip info packets CDP packet
–related information
17. Fill in the table that follows.
Command Description
... Get more on HelpWriting.net ...
Course Materials
Lab 5.1 Connect the Internetwork Lab Review Questions 1. For what purpose is a transceiver used? A transceiver can be used for converting one
type of Ethernet connector to another or by converting one type of I/O port to an Ethernet port. 2. This lab connects routers directly to each other via
serial cables. Is this a typical configuration? No, By default, Cisco routers are DTE (Data Terminal Equipment)/ DCE (Data Circuit–Terminating
Equipment) If not, to what equipment does the DCE end of the serial cable usually connect? If Router A is connected to the DTE end of the cable,
Router B must be connected to the DCE end 3. What does a rollover (console) cable look like? Rollover cable is often used to connect a computer
terminal to a... Show more content on Helpwriting.net ...
Refer to Figure 5–2. What will the host name of your router be? lab–a 2. Which interfaces is your router using? F0/0, F0/1, and S0/3/0 3. What are the
IP addresses and subnet masks for those interfaces? 192.5.5.1 and 255.255.255.0, 205.7.5.1 and 255.255.255.0, 201.100.11.1 and 255.255.255.0 4.
What is the enable secret password? class 5. What is the enable password? cisco 6. What is the VTY password? cisco 15. There is another way to
access the initial configuration dialog other than being prompted for it automatically as a consequence of having erased the contents of NVRAM.
You can use the setup command at the privileged EXEC mode prompt. Press Enter if necessary to reach the user EXEC mode prompt. What does
this prompt look like? Greater than symbol (>) 16. Type enable and press Enter to access privileged EXEC mode, which is also known as enable
mode. You should be prompted for the enable secret password you configured in the system configuration dialog. How do you know you are being
prompted for the enable secret password and not the enable password? Because the secret password was set during the initial setup process 17. Type
class and press Enter. How did the prompt change? lab–a> to lab–a# Review Questions 1. When configuring a router, when would you choose basic
management setup rather than extended setup? You would use basic management setup when you only need to configure
... Get more on HelpWriting.net ...
Ccna
1. Refer to the exhibit. What three statements are true about the IP configuration that is shown? (Choose three.)
The address that is assigned to the computer represents private addressing.
The computer is unable to communicate outside of the local network.
The network of this computer can have 126 hosts.
The prefix of the computer address is /27.
The IP address that is assigned to the computer is routable on the Internet.
The IP address that is assigned to the computer is a broadcast address. 2. As network administrator, what is the subnet mask that allows 510 hosts given
the IP address 172.30.0.0?
255.255.0.0
255.255.248.0
255.255.252.0
255.255.254.0
255.255.255.0
255.255.255.128 3. Which OSI layers ... Show more content on Helpwriting.net ...
Refer to the exhibit. Assume all devices are using default configurations. How many subnets are required to address the topology that is shown?
1
3
4
5
7
13. Refer to the exhibit. Which two statements describe the information that is represented in the header? (Choose two)
This is a server response.
The UDP protocol is being used.
The destination port indicates a Telnet session.
The return segment will contain a source port of 23.
The next session originated from the client of this session will use the source port number 13358. 14. Refer to the exhibit. The command that is shown
was issued on a PC. What does the IP address 192.168.33.2 represent?
IP address of the host default gateway of the host
IP address of the homepage for the host primary domain name server for the host
IP address of the website resolver1.mooki.local 15. Refer to the exhibit. A router, whose table is shown, receives a packet that is destined for
192.168.1.4. How will router treat the packet?
The packet will be dropped.
The packet will be forwarded via FastEthernet 0/0.
The packet will be forwarded to the destination host.
The packet will be forwarded to the 192.168.1.3 next–hop
... Get more on HelpWriting.net ...
Cisco Switch Configuration
Define hostname It is very useful define the name of your Cisco switch/router. To do it: Enable administrative privilege Router>en Enter the
configuration mode: Router#configure terminal Define the hostname (the name router is changed to Ciscozine) Router(config)#hostname Ciscozine
Ciscozine(config)# Assign the privileged level secret The enable secret password allows you to enter enable mode (sometimes referred to as privileged
mode or privileged–EXEC mode). To set a secret password: Enable administrative privilege Ciscozine>en Enter the configuration mode:
Ciscozine#configure terminal Define the privileged–EXEC mode password; remember to use a strong password (combine letters, numbers, nd
symbols). The enable secret... Show more content on Helpwriting.net ...
To "encrypt" it: Enable administrative privilege Ciscozine>en Enter the configuration mode: Ciscozine#configure terminal The actual encryption
process occurs when the current configuration is written or when a password is configured. Password encryption (it uses Vigenere algorithm) is
applied to all passwords, including username passwords, authentication key passwords, the privileged command password, console and virtual terminal
line access passwords, and Border Gateway Protocol neighbor passwords. This command is primarily useful for keeping unauthorized individuals from
viewing your password in your configuration file. Ciscozine(config)#service password–encryption REMEMBER:The Vigenere algorithm is used to
obfuscate the passwords (not really encrypt them as there is no encryption key) in order to prevent "shoulder surfing" from exposing passwords to
someone who briefly looks at a running configuration. If, however, someone gets hold of the configuration they can easily retrieve the passwords using
the reverse translation of the Vigenere algorithm. You could check your current configuration with the command "show running
–config".
Ciscozine#show running–config Building configuration... Current configuration : 782 bytes ! version 12.2 service timestamps debug datetime msec
service timestamps log datetime msec service
... Get more on HelpWriting.net ...
Unit 14 Event-Driven Programming (P1, M1, D1)
Contents P1 – Identify the key features of event driven programming such as events, event loops and event handlers2 P2 – Explain how development
environment components (e.g. Solution Explorer, Forms, Toolbox, Code Editor, Debugger, and Property Window) simplify the development.3 M1–
Describe the features of an event driven language that make it suitable for creating a GUI5 D1 – Evaluate the suitability of event driven programs for
non–graphical applications6 References7 P1 – Identify the key features of event driven programming such as events, event loops and event handlers
Events – An event occurs when the user interacts with a object. * Usually this means a mouse movement or click * Keyboard actions are also... Show
more content on Helpwriting.net ...
* There are numerous non–graphical applications that make use of event driven programs, an example of this is a smoke alarm: when it sense smoke
and the density of smoke reaches a certain level, the alarm goes off. An event has taken place there; a smoke alarm is non–graphical application but it's
very useful for event driven programming. Text– Microsoft DOS: An ms Dos operating system makes use of no graphical interface; it doesn't make
use of wimp when it's interacting with the user. The user uses/enters computer commands into the computer to give instructions such as saving files,
opening new documents other than using a mouse to do these actions. A keyboard is used to enter these commands and "key down" events occur when
this happens. Non–graphical applications compared to graphical applications ten to be out of date/old and harder to understand. Of course this is
not true in some cases, but with programs such as Ms Dos it is harder to remember all the command lines. But with graphical applications that have
an interaction interface are simpler to understand and function. Summary In this task I have described procedural programming and its structure with
examples. I've described also what IDE is and how it simplifies the development process and I've chosen Visual Basic as an IDE example and I
described its components. For merit task I have described GUI with advantages and also I have
... Get more on HelpWriting.net ...
M11Cde Skills-Based Assessment
School of Engineering & Computing Department of Computing Internet Information Security (M11CDE) Layered Security Student Name: BUSA
ABANG OBI SID:4560229 I certify that this is my own work yes/no and that I have read and understand the University Assessment regulations.
Signature: [pic] Submission Details The details below indicate what you should submit, when you should submit it and where is should be submitted
to. Submission Date and Method Deadline 11 January 2013 11:50pm online submission. Submission Format: 1. Fill the online quiz for the practical
test which will be available one week before the final fixed deadline. 2. Download an electronic copy of this document and... Show more content on
Helpwriting.net ...
If it is not immediately apparent subtract the last non–zero octet from 256. Edinburgh information The LAN for Edinburgh has been assigned an IP
network address of 192.168.5.0 Again, each subnet of the above network needs to
... Get more on HelpWriting.net ...
Unix Based Operating Systems System
UNIX–based operating systems are very popular, and they are being used everywhere from computer science research labs and universities to
technology firms like Google, Facebook, and IBM. There are many different types UNIX–based operating systems, some of them being Mac OS,
Ubuntu (Figure 1) and Solaris. When it comes to programming, many computer scientists, including myself, prefer UNIX–based operating systems
over Windows operating system, because it is the main operating system for many technology companies (2) and easy to use. Linux, a UNIX based
operating system, is the operating system used Google, Amazon and NASA. North Carolina State University has a great computer science program
that is made to prepare students for the workforce... Show more content on Helpwriting.net ...
Windows operating system is different from Mac OS or Ubuntu or any other operating system, and it takes a considerable amount of time for an
individual to get used to a different operating system. According to stackoverflow [3], an online community for programmers, 26% of programmers
use Mac OS as their operating system, and 21.7% use Linux as their operating system. Companies want to hire computer scientists familiar with the
technology stack of the company, and having experience in the company's operating system is a very valuable skill. Also, using a UNIX based
operating system build a certain set of skill sets, such as experience in using a UNIX terminal, that companies consider a must have skill for computer
scientists. By having Windows as the operating system for computer science labs, NCUS is not providing the opportunity for students to experience
using a different operating system, that might be operating system they use after graduation. Unfamiliarly with the work computer's operating system,
not knowing how to perform simple tasks fast enough could have a significant effect on the programmer's work and the overall productivity of the
company. Therefore, addressing this issue will make the transition between university and working at a technology firm smoother, and help students
build a skill set that will be useful in the future. Background Many companies are switching from Windows to UNIX based systems, especially Linux
... Get more on HelpWriting.net ...
What Is A Operating System?
What is a operating system? An operating system is the most essential software that is placed in a computer. It achieves the computer 's memory and
procedures, and the software and hardware. Also, it importantly allows you to interact with the computer itself even if you cant speak the computers
language. It provides mutual services for computer programs. Some examples of operating systems are Windows (vista, 7), Mac OS, Haiku, Linux,
BSD. Command line operating systems Some examples of command line operating systems are Linux and DOS. DOS, also known as disc operating
system is a user interface where you can command the computer difficult but basic tasks to be done quickly. LINUX is a public/ open–source
operating system based by UNIX.... Show more content on Helpwriting.net ...
A great example of a GUI that uses a control panel is Windows 7. What is machine and peripheral management? The Peripheral management
manages peripheral device by conveying them commands in the devices own code. Every peripheral device has its own specific code. One
language is binary. For example, in Linux OS, it is the process of turning inputs into outputs. Some peripheral devices are keyboards, mouse,
webcams etc. What is file management? File management consists of files that are placed in an area of storage and where you can name your file
regarding its content and place it where ever you want. It is the way toward looking after files, reports into classifications and subcategories as
wanted by a client. Essential parts of file management are arranging, naming and grouping PC information. What is meant by customising the
desktop? Operating systems allow you to customise your desktop which means you can adapt specific features on the user interface. This means the
look can be changed to your preference. Also, it is a handy way to organise/ navigate your work whilst adding your own look. For example, you can
change your background picture to your preference. It could be your national flag, your favourite colour or even favourite car. On the picture to the
left my favourite car is a Lamborghini in green. What is device driver? Every
... Get more on HelpWriting.net ...
Windows Vista and Server Essay
Lab 2
Configuring Servers
–––––––––––––––––––––––––––––––––––––––––––––––––
This lab contains the following exercises and activities: Exercise 2.1Exercise 2.2Exercise 2.3Lab Challenge| Completing Post–Installation Tasks
Adding Roles and Features Converting the GUI Interface to Server Core
Using the Server Core Interface
|
Exercise 2.1| Completing Post–Installation Tasks| Overview| In this exercise, you complete the tasks necessary to set up a server on which Windows
Server 2012 has just been installed.| Mindset ... Show more content on Helpwriting.net ...
Migrate Roles and Features with Windows Server Manager| * Question3 | How would the installation of the roles and features selected in this exercise
differ if the server was running Windows Server 2008 R2?You would NOT be using powershell to do it. So, the process would be a lot more lengthy.|
Question 4| How can you prove that the Web Server (IIS) role is installed on the server? You will see that it is checked off in roles and features And If
you try to install it again with powershell it will tell you no changes need to be made if it's already installed. |
Exercise 2.3| Converting the GUI Interface to Server Core | Overview| Windows Server 2012, for the first time, enables you to convert a server
installed using the full graphical user interface to one that uses Server Core. This enables administrators who are less familiar with the Windows
PowerShell interface to install and configure a server using the familiar GUI tools, and then convert it to Server Core to minimize hardware resource
utilization.| Mindset| What advantages does Server Core provide over the full Windows Server 2012 interface?| Completion time| 10 minutes|
* 13.Take a screen shot of the Server Core interface by pressing Alt+Prt Scr and then paste it into your Lab 2 worksheet file in the page provided by
pressing
... Get more on HelpWriting.net ...
Ls Command Questions And Answers
Chapter 1 1.Use the whatis command to determine the purpose of the ls command. Command: whatis ls Explanation: ls displays the content of a
directory 2.Use the man program to find out what the –R option does when used with the date command. output date and time in RFC 2822 format.
Example: Mon, 07 Aug 2006 12:34:56 –0600 3.Use the man program to determine what other commands you should also see in relation to the clear
command tput(1), terminfo(5) This describes ncurses version 5.7 (patch 20100109). 4.Use the cal command to determine on what day of the week
you were born. cal [[day] month] year] 5.Use the cal command to determine which year between 2005 and 2010 is a leap year.... Show more content on
Helpwriting.net ...
man who > who_info less who_info tail –12 who_info head –12 who_info 14.Create a file called favorite_foods, and list your favorite foods, entering
five or six or more. Press Enter after each favorite food so it appears on its own line (make certain you also press Enter after the final food item).
After the file is created, add two more foods you like that are not on the list (press Enter after the final food item). View the list of foods to make
certain the two items you added appear at the end of the list. cat> food fish putin sheperd pie ^C Cat >>food Chiken wings Hamburger ^C 15.View the
documentation for who and then view the documentation for w. How are these commands similar?. who – show who is logged on w – Show who is
logged on and what they are doing. 16.Run the who –uH and w commands using one command–line sequence to compare the results. who –H NAME
LINE TIME COMMENT student :0 2015–09–16 13:16 (console) student pts/2 2015–09–16 13:17 student pts/3 2015–09–16 13:18 –––––––––
student@linux–6c76:~> who –u student :0 2015–09–16 13:16 ? 2696 (console) student pts/2 2015–09–16 13:17 00:17
... Get more on HelpWriting.net ...

More Related Content

Similar to Database Security iLab Solutions

Mobile Developer Summit 2012, Pune
Mobile Developer Summit 2012, PuneMobile Developer Summit 2012, Pune
Mobile Developer Summit 2012, PuneBhuvan Khanna
 
The 90-Day Startup with Google AppEngine for Java
The 90-Day Startup with Google AppEngine for JavaThe 90-Day Startup with Google AppEngine for Java
The 90-Day Startup with Google AppEngine for JavaDavid Chandler
 
Your data is in Prometheus, now what? (CurrencyFair Engineering Meetup, 2016)
Your data is in Prometheus, now what? (CurrencyFair Engineering Meetup, 2016)Your data is in Prometheus, now what? (CurrencyFair Engineering Meetup, 2016)
Your data is in Prometheus, now what? (CurrencyFair Engineering Meetup, 2016)Brian Brazil
 
Application Security from the Inside - OWASP
Application Security from the Inside - OWASPApplication Security from the Inside - OWASP
Application Security from the Inside - OWASPSqreen
 
Integris Security - Hacking With Glue ℠
Integris Security - Hacking With Glue ℠Integris Security - Hacking With Glue ℠
Integris Security - Hacking With Glue ℠Integris Security LLC
 
Informatica Online Training
Informatica Online Training Informatica Online Training
Informatica Online Training saikirancrs
 
PowerPoint
PowerPointPowerPoint
PowerPointVideoguy
 
Ten practical ways to improve front-end performance
Ten practical ways to improve front-end performanceTen practical ways to improve front-end performance
Ten practical ways to improve front-end performanceAndrew Rota
 
ThoughtWorks Tech Talks NYC: DevOops, 10 Ops Things You Might Have Forgotten ...
ThoughtWorks Tech Talks NYC: DevOops, 10 Ops Things You Might Have Forgotten ...ThoughtWorks Tech Talks NYC: DevOops, 10 Ops Things You Might Have Forgotten ...
ThoughtWorks Tech Talks NYC: DevOops, 10 Ops Things You Might Have Forgotten ...Rosemary Wang
 
Why NBC Universal Migrated to MongoDB Atlas
Why NBC Universal Migrated to MongoDB AtlasWhy NBC Universal Migrated to MongoDB Atlas
Why NBC Universal Migrated to MongoDB AtlasDatavail
 
Automated Deployment using Open Source
Automated Deployment using Open SourceAutomated Deployment using Open Source
Automated Deployment using Open Sourceduskglow
 
Microservices and Prometheus (Microservices NYC 2016)
Microservices and Prometheus (Microservices NYC 2016)Microservices and Prometheus (Microservices NYC 2016)
Microservices and Prometheus (Microservices NYC 2016)Brian Brazil
 
Perl web programming
Perl web programmingPerl web programming
Perl web programmingJohnny Pork
 
Build Deep Learning Applications with TensorFlow & SageMaker: Machine Learnin...
Build Deep Learning Applications with TensorFlow & SageMaker: Machine Learnin...Build Deep Learning Applications with TensorFlow & SageMaker: Machine Learnin...
Build Deep Learning Applications with TensorFlow & SageMaker: Machine Learnin...Amazon Web Services
 

Similar to Database Security iLab Solutions (16)

Mobile Developer Summit 2012, Pune
Mobile Developer Summit 2012, PuneMobile Developer Summit 2012, Pune
Mobile Developer Summit 2012, Pune
 
The 90-Day Startup with Google AppEngine for Java
The 90-Day Startup with Google AppEngine for JavaThe 90-Day Startup with Google AppEngine for Java
The 90-Day Startup with Google AppEngine for Java
 
Activity 5
Activity 5Activity 5
Activity 5
 
Your data is in Prometheus, now what? (CurrencyFair Engineering Meetup, 2016)
Your data is in Prometheus, now what? (CurrencyFair Engineering Meetup, 2016)Your data is in Prometheus, now what? (CurrencyFair Engineering Meetup, 2016)
Your data is in Prometheus, now what? (CurrencyFair Engineering Meetup, 2016)
 
Akka.Net & .Net Core - .Net Inside 4° MeetUp
Akka.Net & .Net Core - .Net Inside 4° MeetUpAkka.Net & .Net Core - .Net Inside 4° MeetUp
Akka.Net & .Net Core - .Net Inside 4° MeetUp
 
Application Security from the Inside - OWASP
Application Security from the Inside - OWASPApplication Security from the Inside - OWASP
Application Security from the Inside - OWASP
 
Integris Security - Hacking With Glue ℠
Integris Security - Hacking With Glue ℠Integris Security - Hacking With Glue ℠
Integris Security - Hacking With Glue ℠
 
Informatica Online Training
Informatica Online Training Informatica Online Training
Informatica Online Training
 
PowerPoint
PowerPointPowerPoint
PowerPoint
 
Ten practical ways to improve front-end performance
Ten practical ways to improve front-end performanceTen practical ways to improve front-end performance
Ten practical ways to improve front-end performance
 
ThoughtWorks Tech Talks NYC: DevOops, 10 Ops Things You Might Have Forgotten ...
ThoughtWorks Tech Talks NYC: DevOops, 10 Ops Things You Might Have Forgotten ...ThoughtWorks Tech Talks NYC: DevOops, 10 Ops Things You Might Have Forgotten ...
ThoughtWorks Tech Talks NYC: DevOops, 10 Ops Things You Might Have Forgotten ...
 
Why NBC Universal Migrated to MongoDB Atlas
Why NBC Universal Migrated to MongoDB AtlasWhy NBC Universal Migrated to MongoDB Atlas
Why NBC Universal Migrated to MongoDB Atlas
 
Automated Deployment using Open Source
Automated Deployment using Open SourceAutomated Deployment using Open Source
Automated Deployment using Open Source
 
Microservices and Prometheus (Microservices NYC 2016)
Microservices and Prometheus (Microservices NYC 2016)Microservices and Prometheus (Microservices NYC 2016)
Microservices and Prometheus (Microservices NYC 2016)
 
Perl web programming
Perl web programmingPerl web programming
Perl web programming
 
Build Deep Learning Applications with TensorFlow & SageMaker: Machine Learnin...
Build Deep Learning Applications with TensorFlow & SageMaker: Machine Learnin...Build Deep Learning Applications with TensorFlow & SageMaker: Machine Learnin...
Build Deep Learning Applications with TensorFlow & SageMaker: Machine Learnin...
 

More from Tammy Mitchell

Thesis Statement In Analytical Essay - Thesis T
Thesis Statement In Analytical Essay - Thesis TThesis Statement In Analytical Essay - Thesis T
Thesis Statement In Analytical Essay - Thesis TTammy Mitchell
 
Sample Of Research Liter. Online assignment writing service.
Sample Of Research Liter. Online assignment writing service.Sample Of Research Liter. Online assignment writing service.
Sample Of Research Liter. Online assignment writing service.Tammy Mitchell
 
How To Write A Proposal And Get What You Want (Free
How To Write A Proposal And Get What You Want (FreeHow To Write A Proposal And Get What You Want (Free
How To Write A Proposal And Get What You Want (FreeTammy Mitchell
 
How To Write A Quote In An Essay Of Education Columbia
How To Write A Quote In An Essay Of Education ColumbiaHow To Write A Quote In An Essay Of Education Columbia
How To Write A Quote In An Essay Of Education ColumbiaTammy Mitchell
 
Free Printable Primary Handwriti. Online assignment writing service.
Free Printable Primary Handwriti. Online assignment writing service.Free Printable Primary Handwriti. Online assignment writing service.
Free Printable Primary Handwriti. Online assignment writing service.Tammy Mitchell
 
FREE Printable ValentineS Day Lined Stationery Fre
FREE Printable ValentineS Day Lined Stationery FreFREE Printable ValentineS Day Lined Stationery Fre
FREE Printable ValentineS Day Lined Stationery FreTammy Mitchell
 
How To Do A Proper Thesis Defense Using The Right PowerPoint ...
How To Do A Proper Thesis Defense Using The Right PowerPoint ...How To Do A Proper Thesis Defense Using The Right PowerPoint ...
How To Do A Proper Thesis Defense Using The Right PowerPoint ...Tammy Mitchell
 
Useful The Egyptian Hieroglyphs At O. Online assignment writing service.
Useful The Egyptian Hieroglyphs At O. Online assignment writing service.Useful The Egyptian Hieroglyphs At O. Online assignment writing service.
Useful The Egyptian Hieroglyphs At O. Online assignment writing service.Tammy Mitchell
 
How To Write A Strong Introduct. Online assignment writing service.
How To Write A Strong Introduct. Online assignment writing service.How To Write A Strong Introduct. Online assignment writing service.
How To Write A Strong Introduct. Online assignment writing service.Tammy Mitchell
 
Essay Writing Tools - Twinkl. Online assignment writing service.
Essay Writing Tools - Twinkl. Online assignment writing service.Essay Writing Tools - Twinkl. Online assignment writing service.
Essay Writing Tools - Twinkl. Online assignment writing service.Tammy Mitchell
 
Do You Think That Someone Write My Paper For Me In 12
Do You Think That Someone Write My Paper For Me In 12Do You Think That Someone Write My Paper For Me In 12
Do You Think That Someone Write My Paper For Me In 12Tammy Mitchell
 
Child Labour In India Essay - Chi. Online assignment writing service.
Child Labour In India Essay - Chi. Online assignment writing service.Child Labour In India Essay - Chi. Online assignment writing service.
Child Labour In India Essay - Chi. Online assignment writing service.Tammy Mitchell
 
How To Draw 3D Block Letters - Drawing 3 Dimens
How To Draw 3D Block Letters - Drawing 3 DimensHow To Draw 3D Block Letters - Drawing 3 Dimens
How To Draw 3D Block Letters - Drawing 3 DimensTammy Mitchell
 
The Wisdom Of The Federalist – Notes From Th
The Wisdom Of The Federalist – Notes From ThThe Wisdom Of The Federalist – Notes From Th
The Wisdom Of The Federalist – Notes From ThTammy Mitchell
 
Call For Papers Presentations Ideas. Online assignment writing service.
Call For Papers Presentations Ideas. Online assignment writing service.Call For Papers Presentations Ideas. Online assignment writing service.
Call For Papers Presentations Ideas. Online assignment writing service.Tammy Mitchell
 
The Most Influential Person In My Life Free Essay Exa
The Most Influential Person In My Life Free Essay ExaThe Most Influential Person In My Life Free Essay Exa
The Most Influential Person In My Life Free Essay ExaTammy Mitchell
 

More from Tammy Mitchell (16)

Thesis Statement In Analytical Essay - Thesis T
Thesis Statement In Analytical Essay - Thesis TThesis Statement In Analytical Essay - Thesis T
Thesis Statement In Analytical Essay - Thesis T
 
Sample Of Research Liter. Online assignment writing service.
Sample Of Research Liter. Online assignment writing service.Sample Of Research Liter. Online assignment writing service.
Sample Of Research Liter. Online assignment writing service.
 
How To Write A Proposal And Get What You Want (Free
How To Write A Proposal And Get What You Want (FreeHow To Write A Proposal And Get What You Want (Free
How To Write A Proposal And Get What You Want (Free
 
How To Write A Quote In An Essay Of Education Columbia
How To Write A Quote In An Essay Of Education ColumbiaHow To Write A Quote In An Essay Of Education Columbia
How To Write A Quote In An Essay Of Education Columbia
 
Free Printable Primary Handwriti. Online assignment writing service.
Free Printable Primary Handwriti. Online assignment writing service.Free Printable Primary Handwriti. Online assignment writing service.
Free Printable Primary Handwriti. Online assignment writing service.
 
FREE Printable ValentineS Day Lined Stationery Fre
FREE Printable ValentineS Day Lined Stationery FreFREE Printable ValentineS Day Lined Stationery Fre
FREE Printable ValentineS Day Lined Stationery Fre
 
How To Do A Proper Thesis Defense Using The Right PowerPoint ...
How To Do A Proper Thesis Defense Using The Right PowerPoint ...How To Do A Proper Thesis Defense Using The Right PowerPoint ...
How To Do A Proper Thesis Defense Using The Right PowerPoint ...
 
Useful The Egyptian Hieroglyphs At O. Online assignment writing service.
Useful The Egyptian Hieroglyphs At O. Online assignment writing service.Useful The Egyptian Hieroglyphs At O. Online assignment writing service.
Useful The Egyptian Hieroglyphs At O. Online assignment writing service.
 
How To Write A Strong Introduct. Online assignment writing service.
How To Write A Strong Introduct. Online assignment writing service.How To Write A Strong Introduct. Online assignment writing service.
How To Write A Strong Introduct. Online assignment writing service.
 
Essay Writing Tools - Twinkl. Online assignment writing service.
Essay Writing Tools - Twinkl. Online assignment writing service.Essay Writing Tools - Twinkl. Online assignment writing service.
Essay Writing Tools - Twinkl. Online assignment writing service.
 
Do You Think That Someone Write My Paper For Me In 12
Do You Think That Someone Write My Paper For Me In 12Do You Think That Someone Write My Paper For Me In 12
Do You Think That Someone Write My Paper For Me In 12
 
Child Labour In India Essay - Chi. Online assignment writing service.
Child Labour In India Essay - Chi. Online assignment writing service.Child Labour In India Essay - Chi. Online assignment writing service.
Child Labour In India Essay - Chi. Online assignment writing service.
 
How To Draw 3D Block Letters - Drawing 3 Dimens
How To Draw 3D Block Letters - Drawing 3 DimensHow To Draw 3D Block Letters - Drawing 3 Dimens
How To Draw 3D Block Letters - Drawing 3 Dimens
 
The Wisdom Of The Federalist – Notes From Th
The Wisdom Of The Federalist – Notes From ThThe Wisdom Of The Federalist – Notes From Th
The Wisdom Of The Federalist – Notes From Th
 
Call For Papers Presentations Ideas. Online assignment writing service.
Call For Papers Presentations Ideas. Online assignment writing service.Call For Papers Presentations Ideas. Online assignment writing service.
Call For Papers Presentations Ideas. Online assignment writing service.
 
The Most Influential Person In My Life Free Essay Exa
The Most Influential Person In My Life Free Essay ExaThe Most Influential Person In My Life Free Essay Exa
The Most Influential Person In My Life Free Essay Exa
 

Recently uploaded

GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 

Recently uploaded (20)

GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 

Database Security iLab Solutions

  • 1. Week 3 iLab Student Name: Rolando Salas Date: 7/26/14 Database Server Security Demands – iLab3 Objectives In this lab, the students will examine the following objectives. Become familiar with well–known and ephemeral ports Create ACL to meet requirements on database security demands Learn best practices to create and apply ACLs. Scenario A small company is using the topology shown below. The Public Server is actually an off–site Database Server that contains company records. Assume that the 200.100.0.0/16 network represents the Internet. The Dallas and Chicago Servers and hosts need to access the database server securely. Only users in the Dallas and Chicago LANs should be able to access the database ... Show more content on Helpwriting.net ... The ephemeral UDP/TCP ports range from 49152 to 65535. #4. What is wrong with ACL 105? access–list 105 permit tcp any any access–list 105 deny tcp host 201.141.0.3 any On this ACL you listing first to permit all TCP traffic from any sourceIP address to any destination IP address before putting first the hosts IP address except you don't want. In other words, the second line should have been first and the first line secondly to specify that to deny all TCP packets from the host 201.141.0.3 from any source IP addresses. #5. What well–known TCP port does Oracle Database (sql net) server use? Oracle uses 1521 as a standard default port but doesn't outright own the port since the port lies within the registered port number range.
  • 2. #6. A company is managing an Oracle Database located in a Public Server to support day–to–day operations in Dallas and Chicago networks. The company has requested its Internet Access Provider (ISP) to create the necessary ACL at the ISP router securing that only responses from Oracle server to certain hosts are allowed to enter Dallas and Chicago LANs. ISP network engineers decided to use extended ACL, and applies it to F0/0 interface in ISP router. Why did they decide to create an extended ACL and apply it in interface F0/0 for inbound traffic? An extended ACL was created to filter traffic closer to the source and so traffic coming from the Host will be filtered. ... Get more on HelpWriting.net ...
  • 3. Program that creates a shell and executes some shell commands /* myshell.c Description: Program that creates a shell and executes some shell commands */ #include <stdio.h> #include <unistd.h> #include <sys/types.h> #include <errno.h> #include <string.h> #include <stdlib.h> #include <sys/wait.h> extern char **getln(); // Function used to check the file input direction command int inputFile(char **args, char **fileIn) { int i,j; //go thorough the command line arguments for(i=0;args[i] != NULL;i++) { // check for the input direction symbol if(args[i][0] == '<') { // save the filename command if(args[i+1] != NULL) { *fileIn = args[i+1]; } /*for(j=i;args[j–1] != NULL;j++) { args[j] = args[j+2]; }*/ ... Show more content on Helpwriting.net ... = 'x')) { convert = strtol(args[i],NULL,16); printf("The number is %ld n", convert); sum = sum + convert; } // check if it is a valid integer or not num = atoi(args[i]); if (num == 0) { //printf("Number is: %i n", num); } else { sum = sum + num; } } } // check to see if there is arg or args command, if there is then print // number of arguments and list them on the screen if((strcmp(args[0],"arg") == 0) || strcmp(args[0],"args") == 0) { for(j=1;args[j] != NULL;j++) { count++; }
  • 4. printf("Output: argc = %d, ", count); printf("args = "); for(j=1;args[j] != NULL;j++) { printf("%s, ", args[j]); } printf("n"); } // check the error messages for the addition command and print the total sum if(strcmp(args[0],"add") == 0) { if(sum == 0 && num ==0) { printf("Invalid integer/ String Error n"); } else { printf("Output: "); for(k=1;args[k] != NULL;k++) { printf("%s + ", args[k]); } printf("= %d n", sum); } } // check if there is a multilplication command, if there is then multiply all the // valid arguments and print the product // Accepted inputs: Only ints, Invalid Inputs: 0,Strings // Details and cases are explained in readme file int zeroCheck=0; if(strcmp(args[0],"mul") == 0) { int product=1; for(counter=1;args[counter] != NULL;counter++) { ... Get more on HelpWriting.net ...
  • 5. Color And Its Effect On The Human Eye Colour When designing GUIs you need to be conscious of the colours. Microsoft office uses grey as the main colour, blue for the title bar, highlighting, drop down lists and some text. Many uses feel grey is dull and boring colour to use, however if the colour bright red or black was used it would be uncomfortable eyes. Trichromatic System and luminance (Red, Green, Blue) Trichromatic system uses a combination of three colours that are the basis of 3D vision, which are red, blue and green. The human eye has a trichromatic system. The three colours of the trichromatic are detected by three different types of cells on the retina of the eye, these are known as receptors. There has been much work on developing the theory of this system into... Show more content on Helpwriting.net ... Proximity is the way we view things which are close together as a group or look closer than they actually are. Continuity is taking more of an interest in a straight smooth lines rather than rigid and rapidly changing lines. Symmetry is when a shape or object is repeated on both sides to make it a mirror image. We see symmetrical shapes easily than unsymmetrical shapes. Similarity is objects and shapes placed together as they look similar, where as dissimilar objects are likely to be viewed individually. There are also laws that relate to common groupings. Fate is when we see objects that move together as a group. Region is when objects are enclosed together somehow as a group. And connected is when we see objects connected by continuous lines. Objects GUI is built using a number of separate objects. Each object is used in a clear order. So images are layered. It is important that images appear in order and overlay the first image, or else an interface may look as an incomplete object to the user. If images are positioned behind or in front of text, then the whole interface will not be able to be seen. Therefore GUI should appear in front of text on the desktop and not behind existing images on the desktop. Furthermore if the positioning of the objects has not been precisely arranged then the GUI or parts of the GUI may not appear behind the main screen. This leads to the user not being able to access the full range of commands. Another thing is the ... Get more on HelpWriting.net ...
  • 6. Essay On Graphical And Command Line Interface 5. Evaluation The creation of our graphical and Command Line interface came about as a means of testing our algorithms. Since we were attempting to mine associations from large datasets, it made sense to test our mining algorithms on artificially created datasets so as to check whether or not our algorithms were successful. Therefore, we devised the graphical interface to allow us to create sufficiently large datasets based upon association rules. This allowed us to plant specific rules with set supports and confidence with in our test datasets. We were then able to run our test datasets through our association mining algorithms to verify whether or not the algorithms correctly identified the rules which we had planted with the correct... Show more content on Helpwriting.net ... 6. Conclusion and Future Extensions This project was one of our top choices specifically because it approached a very interesting problem while giving us the opportunity to work with a renowned company. We had the chance to expand our machine learning knowledge, enhance our technical abilities and get an insight into what it is like to work with a real client from industry. This experience was challenging as we found out clients can be difficult to work with and sometimes unreliable. Therefore, one of our main gains from this project is that we learned how to overcome non ideal situations that arise due to uncooperative clients. We also strengthened our team work skills as well as our time management aptitudes, due to using the Scrum methodology. As we were very fond of the idea that stood behind our project, we tried to implement it at the best of our abilities. We wanted to make it accessible to everyone, not only companies in the financial sector and we had multiple thoughts on how to achieve this. Unfortunately, due to the limited time we could not put all of them into practice. One of the future extensions that we considered was changing the internal representation of association rules and the associated values such as support and confidence. We ... Get more on HelpWriting.net ...
  • 7. Activity 5 Activity 5.2.2.4 Documentation Table Problems Solutions The G0/1 physical interface is up but G0/1.10 is administratively down. Implement the no shutdown command to enable the G0/1.10 PC3 is configured with the wrong default gateway address. Change the default gateway on PC3 from 172.17.10.1 to 172.17.30.1 Subinterface VLAN assignments are switched on R1. Issue the no encapsulation dot1q command to remove the incorrect configuration. Then configure the subinterfaces with the correct encap dot1q command command. Reenter the correct IP address information. ======================================== Step 1: Calculate a summary route on R1 to reach LANs on R3. 172.22.1.128: ... Show more content on Helpwriting.net ... a.Can PC1 ping PC4? No b.Can PC2 ping PC5? No c.Can PC3 ping PC6? No Step 2:Document the problem and the solutions. List the problems and the solutions that will allow these PCs to ping each other. Keep in mind that there could be more than one problem or more than one solution. PC1 to PC4 a.Explain the connectivity issues between PC1 and PC4. Answer: PC1 is on VLAN 30 instead of VLAN 10. The G1/1 port on S1 is configured as an access port. b.Record the necessary actions to correct the issues. Answer: Issue the switchport access vlan 10 command on F0/11 interface on S2. Issue the switchport mode trunk command on G1/1 interfaces for S1 and
  • 8. ... Get more on HelpWriting.net ...
  • 9. MATLAB: A High-Performance Language For Technical Computing The name MATLAB stands for Matrix Laboratory. MATLAB is a high –performance language for technical computing. It integrates computation, visualization, and programming in an easy–to–use environment where problems and solutions are expressed in familiar mathematical notation. Typical uses include: Math and computation Algorithm development Modelling, simulation, and prototyping Data analysis, exploration, and visualization Scientific and engineering graphics Application development, including Graphical User Interface building MATLAB is an interactive system whose basic data element is an array that does not require dimensioning. This allows you to solve many technical computing problems, especially those with matrix and vector formulations, ... Show more content on Helpwriting.net ... Editor windowCreates and debugs script and function files. Help windowProvides help information. Command historyWindow & logs commands entered in the command window. Workspace windowProvides information about the variables that are used. Current FolderShows the files in the current directory. 4.2.7Working on the Command Window To type a command the cursor must be placed next to the command prompt (>>). Press Enter key to execute the command. Several commands can be typed in the same line. This is done by typing a comma (,) between the commands. If a semicolon (;) is typed at the end of a command, the output of the command is not displayed. It is useful when the result is obvious or the output is very large. A previously typed command can be recalled to the command prompt with the upper arrow key. The down–arrow key can be used to move down the previously typed commands. If a command is too long to fit in one line, it can be continued to the next line by typing three periods (...) and press the Enter key. The symbol %, when it is typed in the beginning of a line, the line is designated as a comment. 4.3 Working on Matlab
  • 10. ... Get more on HelpWriting.net ...
  • 11. What Is User Interface? What is User Interface? "User Interface (UI) Design focuses on anticipating what users might need to do and ensuring that the interface has elements that are easy to access, understand, and use to facilitate those actions." [5] In this research paper I am going to take you through the history, basics, and advances. These elements are very important to know because without them software designers would be lost. To start, one of the biggest patterns in the history of software is the shift from computation design to presentation design. Since our machines have become stronger more time has been spent on presantation. "The history of that progression can be conveniently broken into three eras: batch (1945–1968), command–line (1969–1983) and graphical (1984 and after). The story begins, of course, with the invention[6] of the digital computer. The opening dates on the latter two eras are the years when vital new interface technologies broke out of the laboratory and began to transform users ' expectations about interfaces in a serious way. Those technologies were interactive timesharing and the graphical user interface." [1] In the batch era, computing power was very expensive. The larger computers of that era needed less logic cycles per second. User interfaces were, very repetitive and basic. Users were doing most of the work for their computers rather than the other way around. User interfaces became overhead and software was designed to keep the processor a going like a ... Get more on HelpWriting.net ...
  • 12. Centos 7 Essay Task 3 Short Description of Task Editing network settings on an existing CentOS 7 Linux system. Long Description of Task Using the existing CentOS 7 Linux system with a network connection created and set, edit the settings for the NIC by using nmtui and nmcli commands as well as /etc/sysconfig/network–scripts/ directory. The both commands are used for network configuration, but nmtui has a GUI mode and it is easier to use. On the other hand, nmcli has more advanced options. The directory /etc/sysconfig/network–scripts/ keeps all network interface files that start with the name ifcfg– and can be used to edit network settings. Pre–Implementation Test Plan Ensure that the user is the root user or can use root privileges for commands. ... Show more content on Helpwriting.net ... By using keyboard keys, choose Edit a Connection. Select the name of the network connection and on the right pane select Edit button. To change the profile name, delete the existing name and type a new one. Select IP configuration Automatic for DHCP or Manual for staticIP address. For static IP address, type IP addresses with format (–– removed HTML ––) /CIDR (Figure 3). Type Default Getaway address. Type DNS servers IP addresses. Select (–– removed HTML ––) , if the configuration requires several IP addresses. Choose Automatically connect for IPv6 configurations. Select OK to save the network configurations. Select Back to go back Network Manager TUI. Select OK or Quit to go back to the terminal. Edit network settings by using etc/sysconfig/network–scripts/ directory: In the terminal, open etc/sysconfig/network–scripts/ directory by using command cd etc/sysconfig/network–scripts List the files of the directory with the command ll. For more precise search, use pipes and grep filter: ll | grep "ifcfg". Open the network configuration file with editor with root privileges sudo vi ifcfg– (–– removed HTML ––) (Figure 4). For DHCP find the lines BOOTPROTO=none and ONBOOT=no and change them to BOOTPROTO=dhcp ONBOOT=yes and restart the network by
  • 13. using command with root privileges systemctl restart network. ... Get more on HelpWriting.net ...
  • 14. A Brief Look at Scilab Scilab with dynamically typed objects it is a interpreted language . Scilab runs is available in binary format, for the platforms: Unix/Linux workstations MacOSX. MacOSX and Windows, users can also be installed using Scilab. Compilation of source code is also possible in Scilab. Scilab was named Basil, developed at INRIA as part of the Meta2project. It was developed in the name of Scilab by the Scilab group, which comprised of a team of INRIA Metal au and ENPC. Since 2004, Scilab development was been coordinated by a consortium .Scilab is used as a scripting language to test algorithms and to perform computations numerical. Scilab is a programming language, and around 2000 Scilab coded functions are available in library . The Scilab syntax is very simple, and also which are the fundamental object of scientific calculus the uses the matrices, and it is provided with specific functions and operators. Matrices are of different types which includes real, complex, string, polynomial, and rational. Scilab programs are very quiet compact and they are smaller than their counterparts in C, C++, or Java. Scilab is mainly a combination of scientific computing, numerical libraries from such areas as numerical library such as linear algebra, optimization and numerical integration it is a easy access . It is also simple to expand Scilab environment in a computer. Using static or dynamic links, one can easily import new functionalities from external libraries into Scilab . New ... Get more on HelpWriting.net ...
  • 15. Computer Software : Operating System Software Computer Software Computer software is a program that enables a computer to perform a specific task. Computer is useless without a software. For example without internet browser you cannot search anything on the internet. You need system software such as word processer, which enables a user to perform a task, and system software such as an operating system, which enables software to run properly. Computer software has to be installed within the computer storage (such as hard drive, memory, or RAM). Once the software is installed, the computer is able to execute the software. Types of software's: Operating System Software: An operating system is a software that enable the computer hardware to communicate with the computer software. Without ... Show more content on Helpwriting.net ... It is a multitasking computer operating system. It was designed to be a small and flexible operating system. DOS–command line: Disk Operating System (DOS) was the first operating system used by IBM computers. It was originally available in two versions "PC–DOS" and "MS–DOS" Linux–command line: Linux is a software that enables application and the computer operator to access the devices on the computer to perform desired functions. Windows 95, NT, 98, ME, 2000, XP, Vista, and Windows 7: These are the computer operating systems designed by the Microsoft. Novell Netware: Novell Netware is also a brand of operating system designed for networks or simply a local area network (LAN) operating system. Netware is a product of the popular IT–centred company called Novell. MAC OS: Mac operating is series of graphical user interface (GUI). Mac operating system was developed by Apple Inc. It was first introduced in 1984. MAC OS X: This operating system was released in 2001. It is the latest version of Mac OS. It is a series of UNIX based graphical interface operating system. Virus: Virus is a software program that are designed to spreads from one computer to another and to interfere with computer operations. While using the
  • 16. internet your computer may have come in contact with computer viruses. A computer virus might corrupt or delete data on the computer, or erase everything on your hard disk. Viruses also spread ether by portable media, such as external ... Get more on HelpWriting.net ...
  • 17. LAB 2 Essay LAB Network Documentation 2 Introduction In this lab, you will learn how to use various tools and techniques to determine and document IP network design. You will use the Windows Command Prompt to generate network traffic; Wireshark to capture and analyze the generated traffic; PuTTY to remotely access the Cisco Switch; and finally, you will issue IOS commands on the Cisco Switch to understand its various interfaces and inner workings. Learning Objectives Upon completing this lab, you will be able to: Develop a plan for identifying and documenting the logical IP network design and IP addressing schema based on data collected from Lab #1 Use PuTTY to establish Telnet and SSH to the IP addresses of the identified... Show more content on Helpwriting.net ... You will use this information to complete the deliverables for this lab. FIGURE 2.3 Windows Command Prompt window 7.Repeat step 6 for the following IP addresses to create a packet stream for Wireshark. 172.30.0.2 172.16.8.1 172.17.0.2
  • 18. 172.16.0.2 172.19.0.1 172.19.0.2 8.Minimize the Windows Command Prompt window. 9. Double–click the PuTTY icon on the desktop to start the PuTTY application. Note: The next steps use PuTTY, a terminal emulator program that you can use as a client to create a variety of secure connections to network resources. This lab uses it to create Telnet and SSH sessions. Hands–On Steps 21 10.In the PuTTY application window, type the IP address for LAN Switch 1, 172.16.8.5. Select the Telnet radio button and click the Open button to start the connection. FIGURE 2.4 PuTTY application window 2 a.Username: cisco b.Password: cisco FIGURE 2.5 PuTTY terminal console window Network Documentation 11.PuTTY will launch a terminal console window. At the login prompt, type the following: 22 LAB #2 | Network Documentation Note: The next steps involve using the Cisco IOS show command to obtain network documentation information from the interface you've connected to (LAN Switch 1). Cisco IOS is a package of routing, switching, and networking commands integrated with a Cisco–specific operating system, of which the
  • 19. show command ... Get more on HelpWriting.net ...
  • 20. Lab Network+ Lesson 2 Lab Worksheet Lab Exercises Lab 1 How TCP/IP Protocols Work through the TCP/IP Model The purpose of this lab is to familiarize the students with the TCP/IP Model and some of the protocols that are used in it. This lab is important to the student because it takes the student through a thought experiment about how data would pass thorough the TCP/IP Model down from the computer and up through the destination computer. By doing this thought experiment the student will come to better understand how different protocols work together to accomplish a specific task. Materials Word processing document Textbook Do the Lab Follow... Show more content on Helpwriting.net ... Take Note This lab uses Windows 7. If you are using Windows 8, Vista or Windows XP, you will need to make some slight variations to the lab. Materials word processing document Computer running Windows 7 Professional Do the Lab The IPCONFIG Command 1.Click the Start button at the bottom left of your Windows 7 Desktop Display in order to bring up the Windows 7 start menu (Figure 2–12). [pic] 2.Type CMD into the Search Programs and Files box at the bottom of the Start Menu and press Enter. 3.The Command Line Interface (CLI) Window will come up (as shown in Figure 2–13). The CLI is a window where you can enter commands into the computer in the form of text. This type of interface was how a person interacted with DOS. It is also how a person is able to currently interact with Linux if they choose not to use one of several graphical interfaces available for use with Linux. [pic] 4.Once you have opened the Command Line Interface (CLI), type in the command ipconfig. When the ipconfig command is entered, the CLI changes to something similar to Figure 2–14. You should note that the ... Get more on HelpWriting.net ...
  • 21. What Is An Operating System Essay Operating Systems What is an operating system The operating system is responsible for controlling all of the tasks and processes. Operating systems consists of a collection of programs, with each having a specific task allocated to it. These programs are designed to make the computer system run as efficiently as possible. The most commonly used operating systems are Mac OS, Windows and Linux. What Operating systems do В· Allow users to interact with the machine (e.g. selecting programs). В· Allocate space in memory for programs. В· Run programs (transfer instructions for memory to processor then executing them). В· Manage the storing of data. В· Management of input/output devices. Difference Operating Systems Windows Windows is the most widely used Operating System in the world, It's initial introduction was in 1981 as a command–line interface; the GUI (graphical user interface) was introduced in 1985 and has seen 26 different versions. Mac OS In 1984 Apple released its first OS, which became known as "Mac OS" as of 1997. The original OS was a fork of Apples older OS "Lisa" which was, at the time, extremely advanced. Linux Linux began in 1991 as a personal project by Lines Torvalds, he set out to create a new, free Operating System. Since then it has grown from an OS containing a few C files to having over 18 million lines of source code and available under the GNU General Public License. The GNU license guarantees that ... Get more on HelpWriting.net ...
  • 22. Advantages And Disadvantages Of MATLAB The name MATLAB stands for Matrix Laboratory. MATLAB is a high –performance language for technical computing. It integrates computation, visualization, and programming in an easy–to–use environment where problems and solutions are expressed in familiar mathematical notation. Typical uses include: Math and computation Algorithm development Modelling, simulation, and prototyping Data analysis, exploration, and visualization Scientific and engineering graphics Application development, including Graphical User Interface building MATLAB is an interactive system whose basic data element is an array that does not require dimensioning. This allows you to solve many technical computing problems, especially those with matrix and vector formulations, ... Show more content on Helpwriting.net ... Three principal elements required to create a MATLAB GraphicalUser Interface. The elements are components, figures, callbacks. 1. Components Each item on a GUI is a graphical component. The types of components include graphical controls (pushbuttons, radio buttons, edit boxes, lists, sliders, etc.), static elements (frames and text strings), menus, and axes. Graphical controls and static elements are created by the functions and axes are used to display graphical data which is created by the function axes. 2. Figures The components of a GUI must be arranged within a figure, which is a window on the computer screen. 3. Callbacks Finally, there must be some way to perform an action if a user clicks on a button. A mouse click or a key press is an event, and the MATLAB program must respond to each event if the program is to perform its function. The code executed in response to an event is known as a call back. There must be a callback to implement the function of each graphical component on the ... Get more on HelpWriting.net ...
  • 23. Disadvantages Of 2 User Interface 2 User Interface User Interface is a function of the operating system that allows individuals to access and command the computer. It is the junction between a user and a computer program. Task of the users are changing rapidly and even functionality of computer becomes more complex according to it user must adjust their behavior and problem solving strategies to the system. This situation becomes worst as user do not have that proper experience and knowledge [5], [6]. A well designed interface can provide much more helpful information in a more appropriate manner through interaction specially for those user who have lack of knowledge. Therefore user interface is must so that it can give benet to both user and resource management. An interface is a set of commands or ... Show more content on Helpwriting.net ... Menu Driven Interface (MDI) This type of interface lets you interact with a computer or device through a series of screens or menus. Menu is presented, make a choice and then the next menu appears on the screen.Then make another choice and so on. Example: Cash point machines (ATMs) and iPod or mobile phone, they both use a menu driven interface [7]. В€ Advantages of MDI { There are no commands to learn or remember. { Each and every step are given so that the user doesn't have to re– member anything. { Even if don't know what to do, can usually guess way around the options. { Menu interfaces don't have to be visual, they can be spoken – good for telephones or for visually impaired people. { They don't need huge amounts of processing power or memory. В€ Disadvantages of MDI { A poorly designed menu interface may be slow to use. { It can be irritating if there are too many menu screens to work through. { If often can't go to the exact place then want right at the start. Then have to work own way through the menu screens even if know where then want to get to. Dept. of Computer Engg. 5 DYPCOE, Akurdi, Pune Operating System Design User Interface to Operating ... Get more on HelpWriting.net ...
  • 24. Cisco Activity Task 3: Interpreting Debug Output. Note: If you already configured IP addressing on R1, please remove all the interface commands now before proceeding. Furthermore, R2 and R3 should be configured through the end of "Task 2: Basic Router Configuration". Step 1 – On R1 from privileged EXEC mode, enter the debug ip routing command. R1# debug ip routing. IP routing debugging is on. The debug ip routing command will show when routes are added, modified and deleted from the routing table. For example, every time you successfully configure and activate an interface, Cisco IOS adds a route to the routing table. We can verify this by observing output from the debug ip routing command. Step 2 – Enter interface configuration mode for R1's LAN ... Show more content on Helpwriting.net ... End with CNTL/Z. R1(config)# interface serial 0/0/0 Configure the ip address as specified in the Topology Diagram. R1(config–if)# ip address 172.16.2.1 255.255.255.0 is_up: 0 state: 0 sub state: 1 line: 0 has_route: False As soon as you press the enter key, Cisco IOS debug output informs you that there is now a route, but its state is "False". Since R1 is the DCE side of our lab environment, we must specify how fast bits will be clocked between R1 and R2. Step 6 Enter the clock rate command on R1. You can specify any valid clocking speed. Use the ? to find the valid rates. Here, we used 64000 bps. R1(config–if)# clock rate 64000 Step 7 Enter the command necessary to insure the interface is fully configured. R1(config–if)# no shutdown After you enter the correct command, you should see debug output similar to the following:
  • 25. is_up: 0 state: 0 sub state: 1 line: 0 has_route: False %LINK–3–UPDOWN: Interface Serial0/0/0, changed state to down Unlike the LAN interface, fully configuring the WAN interface is not always enough to have the route entered in the routing table even if your cable connections are correct. The other side of the WAN link must also be configured. /u&gt; Step 8 If possible, establish a separate terminal session with R2. Click on R2 This will allow you to observe the debug output on R2 when you make changes on R1. You can also turn on debug ip routing on R2. R2#debug ip routing IP routing debugging is on Enter ... Get more on HelpWriting.net ...
  • 26. Essay on Cmit 350 Final Project WAN Implementation with SOHO Skills Configuration Prepared for: University of Maryland University College Prepared by: Nathan Poole Table of Contents I. Springfield Site Device and STP Configurations II. Worchester Site Subnetting Configurations III. Boston Site Routing Protocol, Route Summarization and Topology Improvements IV. Sacramento Site VLAN, Routing on a Stick (ROS) and DHCP Implementation V. Los Angeles Site Management Technologies VI. xACME WAN– WAN Implementation and Secure Communications VII. Bibliography WAN Implementation with SOHO Skills Configuration I. Springfield Site Device and STP Configurations Problem Statement: The device hostnames on each switch are generic and... Show more content on Helpwriting.net ... End with CNTL/Z SpringfieldSwitch1(config)#Banner motd #Make sure you get an A on this paper!# SpringfieldSwitch1(config)#exit LOGIN Banner (Displayed after the MOTD banner before the login prompt.) SpringfieldSwitch1(config)#Banner login # Enter TEXT message. End with the character '#'. *** Login Required. Unauthorized use is prohibited ***# Problem Statement: Implement device passwords on both console port and VTY. All passwords should be encrypted. Console Port Password SpringfieldSwitch1#config t Enter configuration commands, one per line. End with CNTL/Z. SpringfieldSwitch1(config)#enable secret 1qazZAQ! VTY Password SpringfieldSwitch1#config t Enter configuration commands, one per line. End with CNTL/Z. SpringfieldSwitch1(config)#line vty 0 15 SpringfieldSwitch1(config–line)#password TELNET1234 SpringfieldSwitch1(config–line)#end SpringfieldSwitch1#service password–encryption Problem Statement: Create Server VLANs, Faculty VLANs, Instructional VLANs and Administrative VLANs on all switches. SpringfieldSwitch1&gt;en Password: SpringfieldSwitch1#config t Enter configuration commands, one per line. End with CNTL/Z. SpringfieldSwitch1(config)#vlan 11 SpringfieldSwitch1(config–vlan)#name faculty SpringfieldSwitch1(config–vlan)#vlan 12 SpringfieldSwitch1(config–vlan)#name server SpringfieldSwitch1(config–vlan)#vlan 14 SpringfieldSwitch1(config–vlan)#name ... Get more on HelpWriting.net ...
  • 27. What Is An Operating System? Unit 2 Assignment 1 P2/M1 What is an operating system? An operating system is software that communicates with the hardware and it allows other programs to run it. Operating systems is the structure that allows you to communicate with computer hardware in a communicating way , without an operating system you wouldn't be able to tell the computer to do anything and it won't have any instructions to follow. Purpose of an operating system: Operating system controls the hardware and software properties of the system in a computer these properties include things like processer, memory and disk space. Computers must have an operating system to run other programs also an operating system does basic tasks such as looking and recognizing the input from the keyboard and also sending output to display on the screen , keeping track of files and directories on the disk and controlling the disk drivers and printers. The purpose of an operating system, a purpose of an operating system is memory management this process happens when a computer searches for a memory to programs that run in the same time. Virtual memory is a data storage that will keep separate memory addresses accessed before by the user, this process will increase the amount of RAM and transfer data to the secondary storage. Virtual memory can have an impact on how well computer will work because of its storage. An operating system manages the hardware and software resources of the system. A computer must have an ... Get more on HelpWriting.net ...
  • 28. Guide to Unix Using Linux Fourth Edition Chapter 1 Review... Guide to UNIX Using Linux Fourth Edition Chapter 1 Solutions Answers to the Chapter 1 Review Questions 1. Your boss drops by your office in a hurry to ask you to attend a meeting at 10:30 on Friday morning and you can't find a pen to make a note as a reminder. What Linux command can you use to make a quick note to store in a file called Meeting? Answer: b. cat > Meeting 2. Before you make the note in Question 1, you decide to determine Friday's date, so that you can include it in your note. What Linux command can you use to quickly determine the Friday's date? Answer: a. cal 3. While you are typing a command, you misspell the name of a file you want to specify with the command. Which of the following ... Show more content on Helpwriting.net ... What key sequence can you use to repeat the last command, which was used to print the file? Answer: c. Press the up arrow key one time. 21. Your international company is scheduling a meeting among managers in Canada, the United States, Spain, Sweden, and Hong Kong on the basis of Greenwich Mean Time (GMT). What command enables you to display the current time in GMT? Answer: b. date–u 22. How would you describe the purpose of the more command? Answer: The more command enables you to view a file's contents by scrolling down. 23. What is the purpose of Telnet? Answer: Telnet can be used to connect aUNIX , Linux, or Windows PC to a remote computer. 24. You enter Cal on the command line to view a calendar but only see an error message. Explain why you got the error message. Answer: UNIX and Linux are case sensitive, so to display a calendar you must use the cal command and not Cal. 25. Explain how you can run more than one command on a single command line. Answer: To run more than one command on a single line, use the : (semicolon) character to separate each command.
  • 29. Hands–On Projects Tips and Solutions for Chapter 1 Project 1–1 In this project, students use Telnet in Windows 2000/XP/Vista to access a remote computer running UNIX/Linux. Students will need accounts on both the Windows 2000/XP/Vista ... Get more on HelpWriting.net ...
  • 30. Questions with Explanation Q1: If an Ethernet port on router was assigned an IP address of 172.16.112.1/20, what is the maximum number of hosts allowed on this subnet? A. 1024 B. 2046 C. 4094 D. 4096 E. 8190 Answer: C Explanation: Given IP address of 172.16.112.1 / 20, subnet mask: 255.255.240.0 max. num of hosts =(( 2^12) –2 ) = 4096–2 = 4094 Q2.:An access list was written with the four statements shown in the graphic. Which single access list statement will combine all four of these statements into a single statements that will have exactly the same effect? A. access–list 10 permit 172.29.16.0 0.0.0.255 B. access–list 10 permit 172.29.16.0 0.0.1.255 C. access–list 10 permit 172.29.16.0 0.0.3.255 D. access–list 10 permit 172.29.16.0 0.0.15.255 E. access–list 10 ... Show more content on Helpwriting.net ... A host in an Ethernet network can communicate with another host,only if it knows the Ethernet address (MAC address) of that host.The higher level protocols like IP use a different kind of addressing scheme like (IP address) from the lower level hardware addressing scheme like MAC address.ARP is used to get the Ethernet address of a host from its IP address.ARP is extensively used by all the hosts in an Ethernet network.In this case there is already an entry for this IP address,Meaning this host already knows the MAC to IP address mapping for this destination so there is no need to send out an ARP request instead it will send the ICMP packet directly to 192.168.1.254 via unicast. Q7.An internetwork has been configured as shown in the diagram, with both routers using EIGRP routing for AS 44.Users on the Branch router are unable to reach any of the subnets on the HQ router.Which of the following commands is necessary to fix this problem.? A. Branch(config–router)# version 2 B. Branch(config–router)# no auto–summary C. Branch(config–router)# redistribute eigrp 44 D. Branch(config–router)# EIGRP log–neighbor–changes E. Branch(config–router)# default–information originate Explanation:By default, EIGRP ... Get more on HelpWriting.net ...
  • 31. Bt594 Final Project TM1: Installing and using Linux operating systems BIT594 – Technologies in Practice Due date: 31/03/2016 Bobbi–jo Ataahua Paikea – 4203318 Question 1: Installing Ubuntu Task 1: Download the latest version of Ubuntu Download the latest version of Ubuntu (the recommended flavour is 32–bit, as not all software will run on a 64–bit). Take a screenshot while downloading the latest version and include this in the electronic file you submit. You need to document the screenshot and describe accurately what the screenshot was about. Write no more than 50 words to explain the screenshot. Figure 1: Download of Ubuntu 14.04.4 LTS (Trusty Tahr). Screenshot description: Captured in the screenshot as seen in figure 1 is the download process of... Show more content on Helpwriting.net ... Take three screenshots of relevant stages during the installation process. Write no more than 100 words for each screenshot to describe what was accomplished. Include the screenshots in the word–processed document you submit. Marks will be awarded for the relevance of the screenshots selected. It will be for you to decide and explain why the screenshots selected are relevant. Explanation for chosen screenshots: As question 2 is clearly focused on terminal/command line, below are three screenshots that have relevance to the command–line environment. Instead of using the GUI environment to install a new application on the Ubuntu desktop, the terminal/command line was used. Using the terminal/command line showcases a different route of installing a new application. The command–line environment also allows the processors to do more precise task procedures. Users are able to view a list of details and descriptions about applications before choosing one to install. Figure 1: Package names and short descriptions of the three ... Get more on HelpWriting.net ...
  • 32. It250 Linux Course Review and Hw Helper IT250 Linux Operating System S.No Question Points 1 What commands are used to create an ext2–second extended–filesystem? mke2fs or mkfs.ext2 2 Which of the following types of filesystems can the command e2fsck be used to check? A. ext2 B. ext3 C. jfs D. vfat 3 What command can be used to start a program with a lower scheduling priority? nice ____________ FINAL Which of the following Linux utilities lists the names of files in a single directory? ls Which component of X Window allows customization of the user interface? Window manager Which of the following control structures is a multiple–branch decision mechanism capable of more than three decisions? The Case structure What is the meaning of the DocumentRoot directive in the Apache ... Show more content on Helpwriting.net ... yum Which of the following symbols instructs the shell to redirect the output of a command to the specified file instead of the screen and overwrite the file? You would use the > symbol The special character that causes the shell to generate filenames that match any single character in the name of an existing file is _____. The question mark In vim, which of the following keystrokes is used to exit the editor and save the contents of the file being edited? ZZ Which of the following control structures is a multiple–branch decision mechanism capable of more than three decisions? The Case structure Which component of X Window allows customization of the user interface?
  • 33. Window manager Which of the following utilities is used to view a file one screen at a time? less What utility is used to search for a particular string within a file or a group of files? grep The utility that can be used to copy a file, including text and executable program (binary) files, is ___________. cp Which of the following partitions does Linux use when all the information that Linux is processing cannot be stored in RAM? Swap Which of the following keystrokes helps you undo the last change made in the vim editor? u What network utilities works only if a remote system trusts your local computer? rsh What represents the root partition in Linux? The forward slash / The C compiler that Linux commonly uses is _________. GNU gcc What ... Get more on HelpWriting.net ...
  • 34. Basic Device And Security Configuration Paper Basic Device and Security Configuration Kevin Kormylo, Okoma Mita, Dan O'Donnell CIT/249 January 12, 2015 Steve Acklin Basic Device and Security Configuration When designing a network there are basic network and security configurations that one needs to consider. Choosing a hostname for each device is very important, this allows the user to know what device they are working on. Configuring interfaces with a proper IP, subnet, and descriptions are part of the basic configuration of a network device. One needs to consider the security setting for the network devices. There are some basic configurations that one can choose to use in their configuration. Passwords and a username should be used for consoling and remote access to any ... Show more content on Helpwriting.net ... We were able to name the devices and create the banners as required. All passwords were encrypted and remote access was successful for SSH and telnet. All interfaces were assigned a description that were being used and the others not being used, were shutdown. We secured remote access by a username and password along with the rsa key. We verified our configuration by posting the running configuration in our team thread. Team A's assignment The assignment was broken up into two parts. Each member had a device to configure Dan configured Branch1 router, Adam was assigned Branch2 router, Okoma configured the switch, PC, ISP, and Kevin configured the Core router. We did not receive a config from Adam so, Kevin was able to do that part too. Okoma and Dan provided a brief written summary of the work they performed and Kevin put the paper together. Switch1 running configuration: Current configuration : 3826 bytes ! version 12.2 no service pad service timestamps debug uptime service timestamps log uptime service password–encryption !
  • 35. hostname Switch1 ! no logging console enable secret 5 $1$m1XN$lgDd.3R8lddprN/Z8Vxzu0 enable password 7 110A000712001E1F ! username admin password 7 02051D590E141A32 no aaa new–model ip subnet–zero ! ip domain–name mycompany.com ! ! crypto pki trustpoint TP–self–signed–1363906688 enrollment selfsigned subject–name cn=IOS–Self–Signed–Certificate–1363906688 ... Get more on HelpWriting.net ...
  • 36. Nt1330 Unit 3 Assignment 4 Command Line CM 523 Homework 4: Command Line Bochao Sun Nov. 14, 2017 When I encountered command line during last week's class, I found it a little confusing and "aloof". I was totally unfamiliar with its purpose and syntax, and the interface is merely characters of same font and size. I thought it is something only for computer science students and does not have anything to do with web design and interaction. Things changed a lot as I learn to use it. In fact, such flat interface excludes all graphical display formats in regular commands thus makes it clearer to find the target directory and file by looking their names and types (e.g. style.css) returned after the "ls" command. It should occupy less RAM of the computer than Finder because it does not "render" – figure out icons and thumbnails – for all files... Show more content on Helpwriting.net ... When I am using graphical user interface, I can go back and forth to the last directory by simply clicking at arrow on the Finder window. However, I need to type commands every time to change directory (cd) and know what is in the directory (pwd). Therefore, CLI both saves time and takes time. It also takes time to learn and get used to the set of commands that make sense in CLI. What's more, contents are permanently deleted after the "rm" or "rm –r" command, which may cause loss of important documents by mistake. Another detail that I pay attention to is that in Finder, I can preview most files by pressing the Space button and switch the files with arrow buttons on keyboard, while previewing is not available on CLI. I need to open it with an "open" command. In addition, CLI once surprised me by making reasonable suggestions. The first time I tried to open a website in CLI, I typed the address without "http://" and it was actually regarded as a path (see below). When it could not found the folder and file on my computer, it surprisingly asked "Perhaps you meant (suggested ... Get more on HelpWriting.net ...
  • 37. Analyzing The Multi User Operating System With Li And Ci... Q 2 Analyzing the multi user operating system with GUI and CLI GUI with it's capacity to show content utilizing distinctive textual styles and in addition to show realistic, gives a greater number of abilities than prohibitive character–based interface. In any case the character interface is truly essential and considered great from another perspective: it is more programmable and more capable than any GUI can ever be. Additionally we have to recognize that thought of GUI interface from most regular execution – mouse–based registration drop sort of interface that is frequently connected with this term. It is only one conceivable usage of GUI interface. Different usage are conceivable as will be talked about beneath. While noteworthy for ... Show more content on Helpwriting.net ... User can use the GNOME desktop, panel, applications, and tool set to customize working environment and manager system tasks. GNOME also provides an application set, including a word processor, a spreadsheet program, a database manager, a presentation tool, a Web browser, and an email program. Command Line Interface A command line interface (CLI) enables users to write commands in a console window so as to interact with an operating system. CLI FEW TASKS: Locate Managed objects in managed object topology Enable or Disable Modules. Acknowledge or delete Alarms. CLI COMMANDS CAN BE DIVIDED INTO TWO TYPES: a)BASIC COMMANDS: They are used to set parameter values, define command alias, check command status, login and logout of server. b)EXTENDED COMMANDS: These are commands that changes the topology of managed objects, their properties & their attributes. They are used to perform several Functions: A Few CLI COMMANDS USED IN SOLARIS: S.No.COMMANDDESCRIPTION 1.aliasthis allows the user view the current aliases 2.bdiffcompares two large files 3.cdchanges directories 4.datereturns the date and time 5.lncreates a link between two files 6.pwddisplays the name of the working directory 7.Rmremoves files
  • 38. FreeBSD: It supports three GUI: GNOME GNOME is a user–friendly desktop environment which makes it convenient for applications to synchronize as environment includes panel for starting applications ... Get more on HelpWriting.net ...
  • 39. Unit 2 TASK 1 Decoding the Jargon TASK 1: Decoding the Jargon a. Create a booklet which explain the function of hardware components and identify communication between components. The pages should include photographs and diagrams to illustrate the information you include. (P1) Components communication The following diagram shows how components communicate each other's. CPU Also known as the processor, the CPU is the heart of the computer and has two part: Control Unit The control unit controls the flow of data through the processor. Arithmetic/Logic unit (ALU) The ALU performs mathematical, logical, and decision operations in a computer and is the final processing performed by the processor. RAM A computer can only run a program when it is in memory ... Show more content on Helpwriting.net ... DOS is the basic system that people have to using Command line prompt to communicate with computer via simple interface which is not "friendly" user interface. The DOS can't run multitask on computer which can only load one program until it finished. But some of the features still quite useful that people still use it. Such as: 5. CHKDSK 6. GBUPDATE 7. IPCONFIG 8. PING 9. FDISK Comparison of two operating systems We can see there are many different between those two computer operating system which the Windows 8 operating system have a lots of advance
  • 40. features and higher performance that suit to nowadays. The DOS system usually used to be run a specific program which prevents any virus or hacker attack in the solo computer such as sale program, data base in the hospital or council data base. Features Windows 8 DOS Network Yes N/A GUI Yes N/A Multiuser Yes N/A Server Administration Yes N/A Command line interface Yes Yes Entertain Yes N/A Sound Yes Yes Multitask Yes N/A c. In your document explain the purpose of different software utilities which is available. Explain how software utilities can improve the performance of computer systems (P3, D1) Windows 8 Utility Virus Protection The specific program used to prevent viruses, worms and Trojans which attached in the email or website.
  • 41. Every computer need to install an anti–virus software and ... Get more on HelpWriting.net ...
  • 42. Week 4 B IP Subnetting Lab Essay Introduction Assignment Develop a subnetting plan and implement it in the lab. Configure RIP as a routing protocol. Conditions NYEDGE1 is the hub router. The two remote office routers NYEDGE2 and NYWAN1 connect to NYEDGE1 through serial connections. Each router has a locally attached Ethernet network. The serial line data rates and DTE/DCE settings have already been configured on all three routers. You only need to assign theIP address to the interfaces. Notes The routers are connected directly to each other in this lab and do not actually connect through any leased line services. Diagram Gi0/0 Ethernet NYWAN1 Serial0/1/0 Serial0/0/1 DCE NYEDGE1 Serial0/0/0
  • 43. Serial0/0/0 DCE Gi0/0 Ethernet Task Index п‚· п‚· Task 1 – Create a subnet ... Show more content on Helpwriting.net ... You are not encouraged to use this subnetwork because it specifies the wire address. Nor should you use the last subnet, 192.50.6.224, because it is considered the major network broadcast address. Therefore you can only use subnets 32, 64, 96, 128, 160 and 192. With this design requirement, you only need to use five of the six usable subnetworks, leaving one for any additional segments in the future. Likewise, for each subnet, you cannot use the first and last address. For example, subnet 192.50.1.32 extends all the way to 192.50.1.63. But you cannot use these two IP addresses (.32 and .63) because they are the wire and the broadcast addresses for this subnetwork. But you can use any of the 30 IP addresses in between. Task 3 – Configure the interfaces in each router Step 1: Configure Gi0/0, s0/0/0, and S0/0/1 for NYEDGE1. Action: ip address <ip address> < subnet mask> Result: NYEDGE1>enable NYEDGE1#config t Enter configuration commands, one per line. End with CNTL/Z. NYEDGE1(config)#int g0/0 NYEDGE1(config–if)#ip address 192.50.6.33 255.255.255.224 NYEDGE1(config–if)#no shut NYEDGE1(config–if)# NYEDGE1(config–if)#int s0/0/0 NYEDGE1(config–if)#ip address 192.50.6.65 255.255.255.224
  • 44. NYEDGE1(config–if)#no shut NYEDGE1(config–if)# NYEDGE1(config–if)#int s0/0/1 NYEDGE1(config–if)#ip address 192.50.6.129 255.255.255.224 NYEDGE1(config–if)#no shut NYEDGE1(config–if)# NYEDGE1(config–if)#end Explanation: Subnet 192.50.6.32 is assigned to g0/0. Subnet 192.50.6.128 is ... Get more on HelpWriting.net ...
  • 45. New204 NETW204: Assignment 1 (50 points) Each answer is worth 1 point each, 50 questions = 50 total points. Type answers in the appropriate cell; text will automatically wrap. Post your completed assignment to the dropbox. NAME| Manuel Crail| Router Configuration Exercise (5 points) When configuring a router, there are certain basic tasks performed, * Naming the router * Setting passwords * Configuring interfaces * Configuring a banner * Saving changes on a router * Verifying basic configuration and router operations | Question| Answer| 1| The first prompt is _______ mode and will allow you to view the state of the router. | User Mode| 2| What major limitation does this mode have? | Does... Show more content on Helpwriting.net ... Create a summary static route for R1 in figure 1 for the 3 LANs it has attached. Use the steps from your text Chapter 2 page 125: Calculating a Summary Route. 192.168.20.0/24 Binary form=11000000.10101000.00010100.00000000=/22 192.168.21.0/24 Binary form=11000000.10101000.00010101.00000000=/22 192.168.22.0/24 Binary form=11000000.10101000.00010110.00000000=/22 Summarized into one route=192.168.0.0 /22=255.255.252.0 Write the networks in binary form. Check work above please| | | | | | | | | | Question| Answer| 48| Find subnet mask by counting Bits matching from left to right: ____. This is your subnet mask for the summary route.| 22 or 255.255.252.0| 49| Find summary address by putting 0s (zeros) in remaining address positions after the left to right matching ends (For example if the first 21 bits match from the left, put 0s (zeros) in the remaining 11 positions of the 32 bit address to find address for the summary).| 11000000.10101000.00010100.00000000| 50| Summary Route (Address and subnet mask found above combined) for routing table| 192.168.0.0 and 255.255.252.0 ... Get more on HelpWriting.net ...
  • 46. Linux: the Kernal and Shell Essay examples Linux: The Kernel And Shell Josh Harkey AIU Online Abstract This manual has been written to explore the many distributions of Linux. It will define some of the components of the OS as they relate to the shell and kernel. It will also go over some of the more popular distributions of Linux and the shells. Finally, it will give a brief overview of some useful commands that can be used in the bash shell. Linux: The Kernel and Shell It is important to know some the inner workings of an operating system to help better understand how they and why they are beneficial. This is one of the reasons for this manual. It will also give a better understanding of some of the more popular distributions of Linux. The Kernel And Shell As They... Show more content on Helpwriting.net ... As a result, Linux offers the user a way to have an OS that comes with more functionality, and in an environment that can be customized for the task at hand. Five Common Distributions Since Linux is allowed to be changed by its users there are more than 600 distributions available. Here is a list of five of the most commonly used. FEDORA– fedoraproject.org (2013) states, "fedora is fast, stable, and powerful operating system for everyday use built by a worldwide community." This distribution is most commonly used by developers and Linux enthusiast. DEBIAN– debian.org (2013) states, "Debian provides more than a pure OS: it comes with over 37,500 packages, pre compiled software bundled up in a nice format for easy installation on your machine." It is one of the oldest distributions still in active development, and is often the base for newer distributions. People that have a passion for Linux enjoy Debian. openSUSE– according to opensuse.org (2013), " The openSUSE distribution is a stable, way to use and complete multi–purpose distribution.it is aimed towards users and developers working on desktop or server." This distribution is generally used in an enterprise environment, and is sponsored by Novell. It is known for its ease of use on the surface and advanced options further in. LINUX MINT– linuxmint.com (2013) states, "The purpose of Linux mint is to produce a modern, elegant and comfortable operating system which is both powerful
  • 47. ... Get more on HelpWriting.net ...
  • 48. It320 Hmwk 4.1 IT320 IT320 Wan Technology/ Unit 4 Assignment: 4.1 1. At what layer of the OSI model does CDP operate? Data Link layer 2. What is the primary use for CDP? To discover information about directly connected Cisco devices 3. What network layer protocols can CDP provide information for? IP, Internetwork Packet Exchange (IPX), and AppleTalk 4. When CDP is enabled on an interface, a router (or switch) sends CDP advertisements on a regular basis, which list information about the sending router. Included in the packets are a series of Type/Length/Value, or TLV, data structures. 5. The show cdp neighbors command can be used to display one line of information about each directly connected CDP–enabled device. List the six pieces ... Show more content on Helpwriting.net ... Compiled Thu 20–Feb–03 14:09 by pwade advertisement version: 2 RTC# show cdp interface Ethernet0 is up, line protocol is up 122 Routers and Routing Basics CCNA 2 Labs and Study Guide Encapsulation ARPA Sending CDP packets every 60 seconds Holdtime is 180 seconds Serial0 is up, line protocol is up Encapsulation HDLC
  • 49. Sending CDP packets every 60 seconds Holdtime is 180 seconds Serial1 is administratively down, line protocol is down Encapsulation HDLC Sending CDP packets every 60 seconds Holdtime is 180 seconds 16. List and briefly describe the debug options displayed after entering the following command: RTB#debug cdp ? adjacency CDP neighbor info events CDP events ip CDP ip info packets CDP packet –related information 17. Fill in the table that follows. Command Description ... Get more on HelpWriting.net ...
  • 50. Course Materials Lab 5.1 Connect the Internetwork Lab Review Questions 1. For what purpose is a transceiver used? A transceiver can be used for converting one type of Ethernet connector to another or by converting one type of I/O port to an Ethernet port. 2. This lab connects routers directly to each other via serial cables. Is this a typical configuration? No, By default, Cisco routers are DTE (Data Terminal Equipment)/ DCE (Data Circuit–Terminating Equipment) If not, to what equipment does the DCE end of the serial cable usually connect? If Router A is connected to the DTE end of the cable, Router B must be connected to the DCE end 3. What does a rollover (console) cable look like? Rollover cable is often used to connect a computer terminal to a... Show more content on Helpwriting.net ... Refer to Figure 5–2. What will the host name of your router be? lab–a 2. Which interfaces is your router using? F0/0, F0/1, and S0/3/0 3. What are the IP addresses and subnet masks for those interfaces? 192.5.5.1 and 255.255.255.0, 205.7.5.1 and 255.255.255.0, 201.100.11.1 and 255.255.255.0 4. What is the enable secret password? class 5. What is the enable password? cisco 6. What is the VTY password? cisco 15. There is another way to access the initial configuration dialog other than being prompted for it automatically as a consequence of having erased the contents of NVRAM. You can use the setup command at the privileged EXEC mode prompt. Press Enter if necessary to reach the user EXEC mode prompt. What does this prompt look like? Greater than symbol (>) 16. Type enable and press Enter to access privileged EXEC mode, which is also known as enable mode. You should be prompted for the enable secret password you configured in the system configuration dialog. How do you know you are being prompted for the enable secret password and not the enable password? Because the secret password was set during the initial setup process 17. Type class and press Enter. How did the prompt change? lab–a> to lab–a# Review Questions 1. When configuring a router, when would you choose basic management setup rather than extended setup? You would use basic management setup when you only need to configure ... Get more on HelpWriting.net ...
  • 51. Ccna 1. Refer to the exhibit. What three statements are true about the IP configuration that is shown? (Choose three.) The address that is assigned to the computer represents private addressing. The computer is unable to communicate outside of the local network. The network of this computer can have 126 hosts. The prefix of the computer address is /27. The IP address that is assigned to the computer is routable on the Internet. The IP address that is assigned to the computer is a broadcast address. 2. As network administrator, what is the subnet mask that allows 510 hosts given the IP address 172.30.0.0? 255.255.0.0 255.255.248.0 255.255.252.0 255.255.254.0 255.255.255.0 255.255.255.128 3. Which OSI layers ... Show more content on Helpwriting.net ... Refer to the exhibit. Assume all devices are using default configurations. How many subnets are required to address the topology that is shown? 1 3 4 5 7 13. Refer to the exhibit. Which two statements describe the information that is represented in the header? (Choose two) This is a server response. The UDP protocol is being used. The destination port indicates a Telnet session. The return segment will contain a source port of 23. The next session originated from the client of this session will use the source port number 13358. 14. Refer to the exhibit. The command that is shown
  • 52. was issued on a PC. What does the IP address 192.168.33.2 represent? IP address of the host default gateway of the host IP address of the homepage for the host primary domain name server for the host IP address of the website resolver1.mooki.local 15. Refer to the exhibit. A router, whose table is shown, receives a packet that is destined for 192.168.1.4. How will router treat the packet? The packet will be dropped. The packet will be forwarded via FastEthernet 0/0. The packet will be forwarded to the destination host. The packet will be forwarded to the 192.168.1.3 next–hop ... Get more on HelpWriting.net ...
  • 53. Cisco Switch Configuration Define hostname It is very useful define the name of your Cisco switch/router. To do it: Enable administrative privilege Router>en Enter the configuration mode: Router#configure terminal Define the hostname (the name router is changed to Ciscozine) Router(config)#hostname Ciscozine Ciscozine(config)# Assign the privileged level secret The enable secret password allows you to enter enable mode (sometimes referred to as privileged mode or privileged–EXEC mode). To set a secret password: Enable administrative privilege Ciscozine>en Enter the configuration mode: Ciscozine#configure terminal Define the privileged–EXEC mode password; remember to use a strong password (combine letters, numbers, nd symbols). The enable secret... Show more content on Helpwriting.net ... To "encrypt" it: Enable administrative privilege Ciscozine>en Enter the configuration mode: Ciscozine#configure terminal The actual encryption process occurs when the current configuration is written or when a password is configured. Password encryption (it uses Vigenere algorithm) is applied to all passwords, including username passwords, authentication key passwords, the privileged command password, console and virtual terminal line access passwords, and Border Gateway Protocol neighbor passwords. This command is primarily useful for keeping unauthorized individuals from viewing your password in your configuration file. Ciscozine(config)#service password–encryption REMEMBER:The Vigenere algorithm is used to obfuscate the passwords (not really encrypt them as there is no encryption key) in order to prevent "shoulder surfing" from exposing passwords to someone who briefly looks at a running configuration. If, however, someone gets hold of the configuration they can easily retrieve the passwords using the reverse translation of the Vigenere algorithm. You could check your current configuration with the command "show running –config". Ciscozine#show running–config Building configuration... Current configuration : 782 bytes ! version 12.2 service timestamps debug datetime msec service timestamps log datetime msec service ... Get more on HelpWriting.net ...
  • 54. Unit 14 Event-Driven Programming (P1, M1, D1) Contents P1 – Identify the key features of event driven programming such as events, event loops and event handlers2 P2 – Explain how development environment components (e.g. Solution Explorer, Forms, Toolbox, Code Editor, Debugger, and Property Window) simplify the development.3 M1– Describe the features of an event driven language that make it suitable for creating a GUI5 D1 – Evaluate the suitability of event driven programs for non–graphical applications6 References7 P1 – Identify the key features of event driven programming such as events, event loops and event handlers Events – An event occurs when the user interacts with a object. * Usually this means a mouse movement or click * Keyboard actions are also... Show more content on Helpwriting.net ... * There are numerous non–graphical applications that make use of event driven programs, an example of this is a smoke alarm: when it sense smoke and the density of smoke reaches a certain level, the alarm goes off. An event has taken place there; a smoke alarm is non–graphical application but it's very useful for event driven programming. Text– Microsoft DOS: An ms Dos operating system makes use of no graphical interface; it doesn't make use of wimp when it's interacting with the user. The user uses/enters computer commands into the computer to give instructions such as saving files, opening new documents other than using a mouse to do these actions. A keyboard is used to enter these commands and "key down" events occur when this happens. Non–graphical applications compared to graphical applications ten to be out of date/old and harder to understand. Of course this is not true in some cases, but with programs such as Ms Dos it is harder to remember all the command lines. But with graphical applications that have an interaction interface are simpler to understand and function. Summary In this task I have described procedural programming and its structure with examples. I've described also what IDE is and how it simplifies the development process and I've chosen Visual Basic as an IDE example and I described its components. For merit task I have described GUI with advantages and also I have ... Get more on HelpWriting.net ...
  • 55. M11Cde Skills-Based Assessment School of Engineering & Computing Department of Computing Internet Information Security (M11CDE) Layered Security Student Name: BUSA ABANG OBI SID:4560229 I certify that this is my own work yes/no and that I have read and understand the University Assessment regulations. Signature: [pic] Submission Details The details below indicate what you should submit, when you should submit it and where is should be submitted to. Submission Date and Method Deadline 11 January 2013 11:50pm online submission. Submission Format: 1. Fill the online quiz for the practical test which will be available one week before the final fixed deadline. 2. Download an electronic copy of this document and... Show more content on Helpwriting.net ... If it is not immediately apparent subtract the last non–zero octet from 256. Edinburgh information The LAN for Edinburgh has been assigned an IP network address of 192.168.5.0 Again, each subnet of the above network needs to ... Get more on HelpWriting.net ...
  • 56. Unix Based Operating Systems System UNIX–based operating systems are very popular, and they are being used everywhere from computer science research labs and universities to technology firms like Google, Facebook, and IBM. There are many different types UNIX–based operating systems, some of them being Mac OS, Ubuntu (Figure 1) and Solaris. When it comes to programming, many computer scientists, including myself, prefer UNIX–based operating systems over Windows operating system, because it is the main operating system for many technology companies (2) and easy to use. Linux, a UNIX based operating system, is the operating system used Google, Amazon and NASA. North Carolina State University has a great computer science program that is made to prepare students for the workforce... Show more content on Helpwriting.net ... Windows operating system is different from Mac OS or Ubuntu or any other operating system, and it takes a considerable amount of time for an individual to get used to a different operating system. According to stackoverflow [3], an online community for programmers, 26% of programmers use Mac OS as their operating system, and 21.7% use Linux as their operating system. Companies want to hire computer scientists familiar with the technology stack of the company, and having experience in the company's operating system is a very valuable skill. Also, using a UNIX based operating system build a certain set of skill sets, such as experience in using a UNIX terminal, that companies consider a must have skill for computer scientists. By having Windows as the operating system for computer science labs, NCUS is not providing the opportunity for students to experience using a different operating system, that might be operating system they use after graduation. Unfamiliarly with the work computer's operating system, not knowing how to perform simple tasks fast enough could have a significant effect on the programmer's work and the overall productivity of the company. Therefore, addressing this issue will make the transition between university and working at a technology firm smoother, and help students build a skill set that will be useful in the future. Background Many companies are switching from Windows to UNIX based systems, especially Linux ... Get more on HelpWriting.net ...
  • 57. What Is A Operating System? What is a operating system? An operating system is the most essential software that is placed in a computer. It achieves the computer 's memory and procedures, and the software and hardware. Also, it importantly allows you to interact with the computer itself even if you cant speak the computers language. It provides mutual services for computer programs. Some examples of operating systems are Windows (vista, 7), Mac OS, Haiku, Linux, BSD. Command line operating systems Some examples of command line operating systems are Linux and DOS. DOS, also known as disc operating system is a user interface where you can command the computer difficult but basic tasks to be done quickly. LINUX is a public/ open–source operating system based by UNIX.... Show more content on Helpwriting.net ... A great example of a GUI that uses a control panel is Windows 7. What is machine and peripheral management? The Peripheral management manages peripheral device by conveying them commands in the devices own code. Every peripheral device has its own specific code. One language is binary. For example, in Linux OS, it is the process of turning inputs into outputs. Some peripheral devices are keyboards, mouse, webcams etc. What is file management? File management consists of files that are placed in an area of storage and where you can name your file regarding its content and place it where ever you want. It is the way toward looking after files, reports into classifications and subcategories as wanted by a client. Essential parts of file management are arranging, naming and grouping PC information. What is meant by customising the desktop? Operating systems allow you to customise your desktop which means you can adapt specific features on the user interface. This means the look can be changed to your preference. Also, it is a handy way to organise/ navigate your work whilst adding your own look. For example, you can change your background picture to your preference. It could be your national flag, your favourite colour or even favourite car. On the picture to the left my favourite car is a Lamborghini in green. What is device driver? Every ... Get more on HelpWriting.net ...
  • 58. Windows Vista and Server Essay Lab 2 Configuring Servers ––––––––––––––––––––––––––––––––––––––––––––––––– This lab contains the following exercises and activities: Exercise 2.1Exercise 2.2Exercise 2.3Lab Challenge| Completing Post–Installation Tasks Adding Roles and Features Converting the GUI Interface to Server Core Using the Server Core Interface | Exercise 2.1| Completing Post–Installation Tasks| Overview| In this exercise, you complete the tasks necessary to set up a server on which Windows Server 2012 has just been installed.| Mindset ... Show more content on Helpwriting.net ... Migrate Roles and Features with Windows Server Manager| * Question3 | How would the installation of the roles and features selected in this exercise differ if the server was running Windows Server 2008 R2?You would NOT be using powershell to do it. So, the process would be a lot more lengthy.| Question 4| How can you prove that the Web Server (IIS) role is installed on the server? You will see that it is checked off in roles and features And If you try to install it again with powershell it will tell you no changes need to be made if it's already installed. | Exercise 2.3| Converting the GUI Interface to Server Core | Overview| Windows Server 2012, for the first time, enables you to convert a server installed using the full graphical user interface to one that uses Server Core. This enables administrators who are less familiar with the Windows PowerShell interface to install and configure a server using the familiar GUI tools, and then convert it to Server Core to minimize hardware resource utilization.| Mindset| What advantages does Server Core provide over the full Windows Server 2012 interface?| Completion time| 10 minutes| * 13.Take a screen shot of the Server Core interface by pressing Alt+Prt Scr and then paste it into your Lab 2 worksheet file in the page provided by pressing
  • 59. ... Get more on HelpWriting.net ...
  • 60. Ls Command Questions And Answers Chapter 1 1.Use the whatis command to determine the purpose of the ls command. Command: whatis ls Explanation: ls displays the content of a directory 2.Use the man program to find out what the –R option does when used with the date command. output date and time in RFC 2822 format. Example: Mon, 07 Aug 2006 12:34:56 –0600 3.Use the man program to determine what other commands you should also see in relation to the clear command tput(1), terminfo(5) This describes ncurses version 5.7 (patch 20100109). 4.Use the cal command to determine on what day of the week you were born. cal [[day] month] year] 5.Use the cal command to determine which year between 2005 and 2010 is a leap year.... Show more content on Helpwriting.net ... man who > who_info less who_info tail –12 who_info head –12 who_info 14.Create a file called favorite_foods, and list your favorite foods, entering five or six or more. Press Enter after each favorite food so it appears on its own line (make certain you also press Enter after the final food item). After the file is created, add two more foods you like that are not on the list (press Enter after the final food item). View the list of foods to make certain the two items you added appear at the end of the list. cat> food fish putin sheperd pie ^C Cat >>food Chiken wings Hamburger ^C 15.View the documentation for who and then view the documentation for w. How are these commands similar?. who – show who is logged on w – Show who is logged on and what they are doing. 16.Run the who –uH and w commands using one command–line sequence to compare the results. who –H NAME LINE TIME COMMENT student :0 2015–09–16 13:16 (console) student pts/2 2015–09–16 13:17 student pts/3 2015–09–16 13:18 ––––––––– student@linux–6c76:~> who –u student :0 2015–09–16 13:16 ? 2696 (console) student pts/2 2015–09–16 13:17 00:17 ... Get more on HelpWriting.net ...