Week 6 Rubric:
After completing the IT Guru 12 Web Reporting tutorial take a screen shot using ctrl -> prtsc or another screen capture utility. Arrange the screen so that all items can be seen. The screen should contain the following:
Main screen of the
After completing the IT Guru 12 LAN Modeling tutorials take a screen shot using ctrl -> prtsc or another screen capture utility. Arrange the screen and resize windows so that all items can be seen. The screen shot should contain the following:
Chap 1. 18. What is the purpose of a data communication standard? The use of standards makes it much easier to develop software and hardware that link different networks because software and hardware can be developed one layer at a time. The software or h
Chap 3 3. Describe three types of guided media. Guided media are those in which the message flows through a physical media such as a twisted pair wire, coaxial cable, or fiber optic cable; the media guides the signal. One of the most commonly used types o
Week 3 ungraded questions answer key Chap 4. 6. Define two fundamental types of errors. There are two fundamental types of errors: human errors and network errors. Human errors, such as a mistake in typing a number, usually are controlled through the appl
Week 4 ungraded answer key
3. What are the parts of TCP/IP and what do they do? Who is the primary
user of TCP/IP?
TCP performs packetizing: breaking the data into smaller packets, numbering t hem, ensuring each packet is reliably delivered, and p
Week 5 not graded answer key.
2. What are the distinguishing features of a LAN?
The distinguishing features of a LAN are:
a. the small confined area in which it operates b. very high speed transmissions c. LANs operate outside the government-regul
Week 6 not graded answer key.
1. What are common carriers, local exchange carriers, and interexchange carriers? A common carrier is a private company that sells or leases communication services and facilities to the public. Common carriers are pro
Week 7 not graded answer key.
Chap 11. 2. B riefly outline the steps required to complete a risk assessment. 1. Develop a control spreadsheet in which you prioritize assets, specify threats, and i dentify and document controls 2. Evaluate adequacy of exis
1. (TCO B)_ is not a function of a data link protocol. (Points: 5) Media access control Message delineation Amplitude shift keying Indicating when a message starts and stops Error control 802.11g
2. (TCO B)With contention: (Points: 5) computers wait until
After completing the IT Guru 12 Small Internetworks tutorial take a screen shot using ctrl -> prtsc or another screen capture utility. Arrange the screen so that all items can be seen. The screen should needs to contain the following:
Final network config
RUBRIC -Discussions In the Discussion areas of the course, you, as a student, can interact with your instructor and classmates to explore questions and comments related to the content of this course. Discussions will always close Sunday, 11:59 P.M. Mounta