ITM 301 Lab & Assignment 2 Deqa Yusuf Student #:500566949 Part A: Both CAT5 and CAT5e are UTP cables but the difference between these 2 cables is the quality. CAT5 has a 100 MHz signaling while CAT5e can have a signaling rate of up to 350 MHz. Not only that but the wiring is different as well, the CAT5 has simple wiring while the CAT5e has copper wiring. In short the CAT5e is a much more advanced cable compared to the CAT5.…
With the numerous choices of countertop materials on the market, it's often difficult to determine which will be the best choice for your home and for prospective buyers. Granite has long been the top choice for homeowners for their kitchen countertops, however quartz is now taking the top spot, and for good reason. Appearance - Quartz, unlike other stone slabs, can be designed with a controlled appearance. The way quartz slabs are crafted allows the fabricator to provide you with the exact color, texture and pattern that you desire. Whereas with granite, you will have to hand select the pieces you want to use to make sure the patterns are similar and will match your color scheme once installed.…
1. Name two creatures that have been discovered since you were born. Titi Monkey and Dumbo Octopus have been discovered since I was born. 2. How tall would a redwood be compared to you right now?…
Homework 4 Elaine Le Hawaii Pacific University Part A: Textbook p293 Exercises 9.4 Consider the interrupt that occurs at the completion of a disk transfer. a. Direct memory access (DMA) is an alternative method that avoids the use of the CPU by allowing direct data transfers between memory and I/O devices or peripherals. Once the data is transferred the CPU is notified of the transfer completion and able to resume access of the main memory. It is able to do this with interrupts; are signals that are generated once an action is completed. Normally it suspends the execution of the running program and jumps to a special interrupt service routine.…
1. I have completed my survey for the Information Technology Infrastructure Library Course and have received my passing score 26\40. 2. Kim Rymsha’s computer is back in her office and both her personal and network printers have been connected to her Pc. 3. Docsvault has been completely installed on Lisa Cabrera.…
The Notorious B When you walk past the toy aisle at a store what do you see? Usually there are aisles that you look down and see nothing but a sea of pink. Why is this? Why do certain products lean toward certain genders? Companies often do this to target a certain audience and increase sales.…
Paragraph 3 - Identical twins are different in so many ways. Take for example the Bonnie and Brenda twins, they are identical twins, but different in so many ways. They were born as identical twins, and one became transgender. Another set of twins Anais and Sam they were raised from different parents, and raised in different countries. One of them was an actress and the other was a fashion designer.…
I have to agree with you that waterway ports are the busiest at the same time I do not believe that are the hardest to secure. Living here in Jacksonville, FL I have several ports around me. There is Jacksonville Port Authority (Jaxport) that controls three cargo terminals, a cruise terminal and an intermodal rail terminal. Blount Island (controlled by the Marines) is one terminal that I am familiar with because of the military. This facility has some of the tightest security even more than some operational bases.…
In this task I will be using a diagram to outline the relationship between the layers in an interface showing each other of the points in the corresponding layer in the TCP/IP protocol suite. I will also be describing the type and functions of entities and the service they provide. A) The way communications are done between a computers on a network is through protocol suits. The most used protocol suite and commonly available protocol suite is TCP/IP protocol suite.…
How to Configure a VPN Connection in Windows 8.1 A VPN is one common method of extending a private network across the Internet and gain access to network resources from a remote location in a secure manner. A virtual private network (VPN) is a private network that uses public telecommunications infrastructure, usually the Internet, to connect to a private network, such as a company's internal network infrastructure. A VPN remains private by using a secure tunneling protocol and other security mechanisms including encryption. This ensures that only authorized users can access the private network and that the data cannot be intercepted by anyone else. A virtual private network makes it possible to have the same privacy and protection when sharing network resources across WANs.…
ASSIGNMENT QUESTIONS: 1. What is the regulation or law that you would propose? Be very specific in the wording. (This will be your own idea and written in your own words). (20 points) Answer:…
Components: Components are all the parts that make up a computer. Components include software and hardware. Proxy server: A proxy server is basically an server that bridges the gap between you and the internet. When you have proxy up and running the other computers from the internet cannot see your IP address so it covers you in something known as an internet camouflage. The computers can only see the proxy's IP.…
Securing your Macintosh(Mac) OS computer Apple producing their computers with a lot of security features already in them. Mac OS X is one of the most secure operating systems in the market. Still a lot of people make mistakes while using their computers on their daily bases. These mistakes can notably weaken the security of their operation system. To be sure that you computer secure we will consider how to secure your user account, your web browsing, and we will maximize the privacy.…
1. Identify a city or area of a country within your new region: Seattle, Washington 2. Location: Describe the absolute and relative location of your city or area within your new region. Support your description with current examples in 2 to 3 sentences. Include citations for your resources using APA style guidelines as needed.…
What is OSAP? The Ontario Student Assistance Program or OSAP is an Ontario and federal government funded program aiding students with funding their post-secondary education. OSAP offers grants; free money that does not have to be paid back and student loans that have to be paid back. OSAP offers money to students attending any public or private postsecondary schools in the world, as long as OSAP recognizes it.…