ITM 301 Lab & Assignment 2 Deqa Yusuf Student #:500566949 Part A: Both CAT5 and CAT5e are UTP cables but the difference between these 2 cables is the quality. CAT5 has a 100 MHz signaling while CAT5e can have a signaling rate of up to 350 MHz. Not only that but the wiring is different as well, the CAT5 has simple wiring while the CAT5e has copper wiring. In short the CAT5e is a much more advanced cable compared to the CAT5.…
Homework 4 Elaine Le Hawaii Pacific University Part A: Textbook p293 Exercises 9.4 Consider the interrupt that occurs at the completion of a disk transfer. a. Direct memory access (DMA) is an alternative method that avoids the use of the CPU by allowing direct data transfers between memory and I/O devices or peripherals. Once the data is transferred the CPU is notified of the transfer completion and able to resume access of the main memory. It is able to do this with interrupts; are signals that are generated once an action is completed. Normally it suspends the execution of the running program and jumps to a special interrupt service routine.…
There are numerous reasons why there is a need for every home cook to own stainless steel bowls. The bowl made from stainless steel has a very durable built and it can even be your partner for a lifetime. These bowls can also keep all your cold items in its cool state as it insulates the items. If you have noticed in parties and social events, there are bowls made from stainless steel used for keeping items such as water, lemonade, soda and others, in order to keep it cool. Placing the bowl on the freezer for only very few minutes will allow it to keep those items placed on it for longer period.…
Installing a custom recovery replaces the stock recovery on your Samsung smartphone. If you are not an advanced Android user, it doesn't matter which recovery you have on your device. However, people who want to install custom ROMs must replace the stock recovery for a custom recovery. Installing a new custom recovery on a Samsung device is usually easy thanks to the Odin flashing tool. You can just install the file as you would any other official software update for upgrading or downgrading the operating system.…
THE DEFERENCES OF HANDLING SOCKET AND SERVERSOCKET First of all what is a socket? A socket is the one end –point of two-way communication link between two programs running over the network. This means the programs run on different computers, usually referred as the local and the remote computer.…
The following are the top 10 types of packets: IPv4: Internet Protocol version 4 (IPv4) is the standard version of the internet protocol, that acts as the platform for standard internet protocols and existing internet models (ISP). Extensive use of this protocol led to exhaustion of IP addresses. Therefore, we are bound to use IPv6, in the near future. A feature called as sub-netting is used for IP address allocation. It is defined in RFC 791.…
Protocol for the Prohibition of the Use in War of Asphyxiating, Poisonous or Other Gases, and of Bacterial Methods of Warfare (Geneva Protocol) was penned and signed on 17 June, 1925. This was a treaty signed by the Allies at the close of World War I, which was actually just an extension and re-verification of the Treaty of Versailles (signed in 1919) prior to WWI. The Geneva Protocol furthered the Treaty of Versailles in that it expanded the weapons ban to include a ban on bacteriological warfare. In 1969, this protocol was further expanded to include CS gas agents and harassing agents (probably due to their use by the U.S. during the Vietnam War).…
Securing your Macintosh(Mac) OS computer Apple producing their computers with a lot of security features already in them. Mac OS X is one of the most secure operating systems in the market. Still a lot of people make mistakes while using their computers on their daily bases. These mistakes can notably weaken the security of their operation system. To be sure that you computer secure we will consider how to secure your user account, your web browsing, and we will maximize the privacy.…
Johnson 6 virus, worms, malware or spyware. It’s very interesting if one goes onto google play or the one from Apple, there are numerous applications created to do a phone scan and to check newly installed applications to ensure your phone is protected from viruses. The world wide web is like playing Russian roulette because of the possibility of contracting a virus or worm. Hackers across the globe will forever be a serious threat to citizens around the world and National Security. The Department of Defense along with the Department of Homeland Security oversee security measure to protect the United States from cyber-attacks.…
After leaving July Perrys house Mose Normand there is only a few accounts of anyone seeing him and one of which comes from Fred Maxwell, who was thirteen at the time of the massacre. According to Maxwell, Normand was good friends with his father and right after leaving July Perrys house Normand went straight to see Maxwells father. Allegedly Normand told the elder Maxwell that he spoke with judge Cheney and was informed that what the white men were doing was unconstitutional and he had a right to sue once he escaped town safely. Fred Maxwell stat that his father simple told Normand to leave town as fast as he could and start a new life, and according to Fred Maxwell that is exactly what Normand did, he went back into his convertible and drove…
Allowing kids under the age of fourteen to play tackle football can have severe consequences to their young minds. I personally do not like football but I’m sure there are other ways that younger kids can play football without tackling each other and getting hurt. “ Goldstein and his colleagues advocate for no tackle football before 14 because children’s bodies, particularly their necks and upper bodies, aren’t strong enough to counteract the bobbling of the head and shaking of the brain that occurs during tackles” (Kounang 1). Not only does that sound painful but why would a parent want that for their child.…
When dealing with change and progress in the early portion of the twentieth century in America, one organization and one event come to mind. In 1911, the Triangle Waist Company building caught fire and several of workers in the building didn’t make it out alive. The majority of the workers were young females who worked long hours for little pay and ruthless conditions. Those who had the ability to fight for the women and victims did, pursuing ideas such as unions, for workers’ rights. The owners of the company would be pardoned eventually but their reputation tarnished by the public opinion of them.…
The events that ended World War II in Japan are well known. Feelings about the choice made to drop atomic bombs on Japan are varied. Some feel that the destruction could have been avoid, while others feel that the choice was unavoidable and possibly saved more lives than it took. The scientists that built the atom splitting bombs dealt with many of the same ethical questions still posed about the bombs. Ultimately, the decisions made about the bombs would affect numerous generations beyond the current one.…
Aaron Alanis Mrs. Silva Honors English 12 07 April 2017 Todays Tech. vs. 1984’s Tech In terms of technology, current American society is to a certain extent to the potential of Big Brother and 1984. Many of the technologies used in 1984 are very similar to the technologies used today. The technology used in both today and in 1984 show major issues for personal privacy as well as government control over society.…
Being a candidate for the National Technical Honor Society is a huge achievement and honor. I feel as if I deserve this because of all the hard work I have done just to get here, and also the effort I have put into my school work to achieve this. My first year of highschool I decided to set a goal for myself. My goal was to get honor roll every nine weeks throughout my high school career. To achieve this so far I have had to be very determined about reaching my goal, and I have been.…