Nt Week 1 Assignment

In: Computers and Technology

Submitted By cpatin00
Words 1525
Pages 7
Courtney Patin Week 1 Telecommunications Exercise

1) Local Loop
a. The local loop is the physical wiring that connects you to the public switched telephone network (PSTN). This line can be a voice line, or it can be a data line. The physical wiring for the local loop consists of a pair of twisted copper wires that run from the telephone company's central office (CO) to the subscriber’s premise and another pair of twisted copper wires that run back to the telephone company’s CO.
2) Central Office
a. In telephone communication in the United States, a central office (CO) is an office in a locality to which subscriber home and business lines are connected on what is called local loop. The central office has switching equipment that can switch calls locally or to long-distance carrier phone offices. In other countries, the term public exchanges is used.
3) Local Exchanges
a. A local exchange carrier (LEC) is the term used in the U.S. for describing the telephone company which operates within a local area and provides telecommunication services within that area.
a.i. Local exchange carriers started across the U.S. following the breakup of the Bell system due to antitrust regulations. Local exchange carriers are allowed only to handle local calls, and not any long-distance traffic.
4) POP
a. Point of presence (POP) is the point at which two or more different networks or communication devices build a connection with each other. POP mainly refers to an access point, location or facility that connects to and helps other devices establish a connection with the Internet.
5) Long Distance System
a. A long-distance System is a telephone company that provides connections between local exchanges in different geographic areas. Referred to in the U.S. as interexchange carriers (IXCs), long-distance carriers provides interlocal access and transport area (interLATA)…...

Similar Documents

Week 1 Assignment 1

...get online. Once you are online and logged into your Phoenix website, you will have a few things you get graded on from discussion questions, to assignments, to participation grade. In order to achieve your participation grade you need to go to the electronic forum are of your Phoenix website. This is your discussion area and it list different forums for you to choose from and participate in. When you are able to communicate with your teacher and fellow classmates that is asynchronous communication. It is important that you keep in constant contact with your classmates and teachers and to stay organized when doing it which is where the threaded discussions come in. Each new thread will list the subject of the thread so that everyone can group there same conversations together. In these threaded discussions is where us as classmates can offer feedback to one another and also receive feedback from our teachers. Main Forum, chat room, individual forum A message intended for your instructor concerning feedback you received on an assignment ( would go in individual forum) A message responding to a classmates bio ( would go in chat room) A message replying to a discussion question ( would go in main forum) A message about a classmates hobby or outside interest (would go in chat room) A message about clarifying assignment instructions (would go in main forum)...

Words: 273 - Pages: 2

Capstone Week 1 Assignment 1

...Week 1 Assignment 1 My firm is a security service provider that started with only 4 employees in 2002 that services mostly state and federal agencies of various sizes. The firm’s annual gross sales are currently at 1.6 million U.S. dollars. When our firm first started, we focused on database performance tuning and security services for database applications. 4 years later, our firm improved to provide complete security services such as, penetration testing, policy creation, regulatory compliance assistance and assessments. Currently our firm looks to operate in a more secure manner by addressing security related issues of government and mid-sized organizations. We currently have our headquarters and only office in a different state from the RFP state. We are now up to 22 full-time employees. 8 Employees that will be working on the new prospective products and services are certified professionals. 5 have a CISSP certifications, 4 hold a CISM certification, 4 hold a GIAC and GSEC certifications and 6 hold other GIAC certifications. We have won four major contracts in the last four years for vulnerability assessments and penetration tests. We do not offer source code review to assess security and do not employ development security specialists. Positive Gaps: • Been in business for 5 consecutive years • Reported annual gross sales of more than one million dollars • Presented 4 references in last four years similar to requirements of this document. ...

Words: 290 - Pages: 2

Nt 1230 Unit 10 Assignment 1

...My hypothetical company is a small online gaming company called Game Zone. Seeing as how this is an online company, backing up of data and applications is crucial. The follow is the backup plan I would suggest. * The company should back up all online users profiles and gaming applications. I would also suggest redundant servers. * The rotation should be done every day due to the constant change of user profiles and the fact that new material is always being added to keep games up to date. Full backups should be done weekly with differential backups done daily. The full backup should be done at the start of every week at the lowest peak of online use and the next 6 days done with differential. * Seeing how this data is the life blood of the company it should be taken offsite daily. * If data on the current server is lost only that day’s activities is lost. * If they have redundant servers then down time will be minimal depending on configuration, minutes. If all servers lose their data then recover time may exceed hours. There is no paper trail to recover non-backed up data as all information is online. * Since the company exists only online restore time would be long due to the need to reload all gaming apps and user profiles. Contingency plan must be drawn up for all possibilities. Compile a list of all eventualities then create procedures to recover the data. All procedures are to be tested to make sure they work. * Data should......

Words: 341 - Pages: 2

Assignment 1 Week 1

...Associate Level Material Six Dimensions of Health Worksheet Part 1 For each of the following six dimensions of health, list at least one characteristic, activity, belief, or attitude that reflects that dimension in your life. Provide a brief explanation with each example. Refer to Ch. 1 in the text for explanations of these dimensions. Physical health: Exercise at least five days a week. Physical fitness has to be up to par to stay in the military. I usually watch my diet because I am not as young as I use to be. Social health: Right now I really do not have a social life. It might not be healthy but I guess I do it to protect myself. Having to move around a lot does not allow me to build the friendships that I am looking for. Intellectual health: Being in the military sometimes requires critical thinking to complete a mission. Many times it’s accomplishing a mission that you have already done. I usually refer back to those past missions and put together the pieces that I need to accomplish the new one. I take to account failures and successes of my past missions and use it for the current one. I also take in to account other people’s failures and successes. Environmental health: I try to surround myself with people I can learn from. At the beginning of my career I use to hang out with soldiers who were not looking to approve themselves and just got into trouble. Once my son was born, I knew the life had to change. I decided to work on bettering......

Words: 609 - Pages: 3

Nt 2670 Unit 1 Assignment 1

...Installing Server Roles with a Batch File 1. What does the /w switch do? Why is it used? “¹/W switch specifies the warning level of the MIDL compiler.” 2. What is the goal of port scanning? ServerManagerCmd.exe command-line tool can be utilized to install or remove Server 2008 Roles and Features. “Type the following, in which name represents the command name of the role, role service, or feature that you want to remove, and then press Enter. The -restart parameter restarts the computer automatically after removal is complete, if a restart of the computer is required. ” ServerManagerCmd.exe -remove name –restart”² 3. What is the command to start the DHCP Server service? “To start the DHCP service, use the command/sbin/service dhcpd start. To stop the DHCP server, use the command /sbin/service dhcpd stop.”³ 4. What command is used to configure a DNS zone? “dnscmd [ServerName] /zoneadd ZoneName ZoneType [/dp FQDN| {/domain|/enterprise|/legacy}] /load”⁴ References 1. /W switch. (n.d.). (Windows). Retrieved March 20, 2014, from http://msdn.microsoft.com/en-us/library/windows/desktop/aa367383(v=vs.85).aspx 2. Dnscmd Syntax. (n.d.). : Domain Name System(DNS). Retrieved March 20, 2014, from http://technet.microsoft.com/en-us/library/cc756116(v=ws.10).aspx#BKMK_22 3. Removing Server Roles and Features. (n.d.). Removing Server Roles and Features. Retrieved March 20, 2014, from http://technet.microsoft.com/en-us/library/cc732257.aspx 4. Start or......

Words: 274 - Pages: 2

Nt 1110 Unit 3 Assignment 1

...Unit 3 Assignment 1 Video Clip 1.07 Serial Parallel & Game Ports * Serial ports – 9 or 25 pins (male) * Parallel ports – 25 pins (female) * Game ports – 15 pins (female) Mouse – serial connector (old), PS/2, or USB/wireless Keyboard – 5-pin DIN (old), PS/2 or USB/wireless Network Inteface card – converts parallel communication to serial (RJ-45 connector) Modem – connects to phone line (56k), converts analog to digital & vice versa (RJ-11 connector). Video – VGA, DVI, or S-video SCSI – narrow (50-pin Type A), wide (68-pin, type P) IEEE 1394 (firewire) – serial, fast, hot swappable, used for streaming media, expected to replace SCSI Multimedia – Microphone, speakers, earphones, color coded. Video 1.09 CRT Monitor (old) & LCD Monitor (new) CRT – Cathode Ray Tube LCD – Liquid Crystal Display Contrast Ratio – Ratio of purest white to purest black Dot pitch – CRT – Distance between phosphorescent dots Pixel Pitch – LCD – Addressable pixels on screen, same as resolution. Resolution – Both CRT & LCD – Addressable points on screen. PCI Express – twice as fast as AGP Video 1.10 RAID – Redundant Array of Independent Disks Fault tolerance – real time copies of data, and data is not lost if hard drive fails. RAID – protect data in real time. RAID 0 – Striped Volume – faster speeds, no fault tolerance. Requires two or more drives, max 32 drives, CPU writes data evenly among drives, each disk has partial copy. RAID 1 – Mirrored......

Words: 487 - Pages: 2

Nt 2640 Unit 7 Assignment 1

...Scenario 1: End user complains of lack of connectivity to any resource not on the directly connected network. The host cannot ping its default gateway. The output of the “ipconfig /all” command is below. Also the IP address assigned to the router for that segment is also displayed below. What do you think the problem is with the configuration of this host? PC “ipconfig /all” output (summarized) Ethernet adapter Local Area Connection: Physical Address. . . . . . . . . : 00-AB-C5-00-00-00 DHCP Enabled. . . . . . . . . . . : No IPv4 Address. . . . . . . . . . . : 192.168.40.9 Subnet Mask . . . . . . . . . . . : 255.255.255.128 Default Gateway . . . . . . . . . : 192.168.40.254 DNS Servers . . . . . . . . . . . : 8.8.8.8 Router “show ip interface brief” Router# show ip interface brief Interface IP-Address OK? Method Status Protocol GigabitEthernet0/0 192.168.40.254 YES NVRAM up  up Answer: The problem is that either the IP address is wrong or the subnet mask is wrong. That is because the 192.168.40.9 IP address is not in the same subnet as the default gateway IP address (192.168.40.254). Changing the subnet mask to 255.255.255.0 or changing the IP address to 192.168.40.129 – 192.168.40.253 would resolve the problem. The ping command can be used to check for connectivity, and it was. The tracert command could have been used to see where the ping failed. Scenario 2: One user complains of lack of......

Words: 1499 - Pages: 6

Nt Unit 6 Assignment 1

...Unit 6. Assignment 1. AD User/Group Design Scenario Dear Junior Admin, I received your E-mail and in response I recommend that you do the following. Since there is a domain for each department, such as Marketing, accessing one printer is rather easy. To start off you will need to create a group that allows access to the one printer within each department in your company. After creating each group you must then assign it to a domain local group, global group and then to a universal group. Then you will need to add it to the marketing domain local group. For HR, you will need to take all of the users within the forest and add them to a global then universal group. Proceed to take the universal group and add it to the domain local group within their domain. These users will then have access to whatever is in that universal group, therefore you must make sure that you assign the printer for them to print vacation requests to the HR department. You must take a slightly different approach for R&D. To allow access to only the server, you must first create a domain local group that has some administrative rights. Add them to a customized admins group that you have control of. You can assign these rights and permissions as you create and assign them. Remember to limit their access to their local machines only. You can do all of this through the desktop local user account settings. You may also take a different route if you choose to. This is one of the approaches you may......

Words: 288 - Pages: 2

Nt 1430 Unit 1 Assignment 1

...Unit 1 assignment 1 Unit 1 Chapter 1 1. What is free software? List three characteristics of free software. Free software is software that users have the freedom to distribute and change. The three main characteristics of free software are: The source code has to be distributed with the program, you cannot restrict people from redistributing/modifying/using the software, and users must be allowed to redistribute modified versions under the same terms/licensing. 4. What is the Free Software Foundation/GNU? What is Linux? Which parts of the Linux operating system did each provide? Who else has helped build and refine this operating system? GNU stands for "GNU'S Not Unix", and it was designed to be a UNIX-like operating system developed by Richard Stallman. Linux is the name of operating system kernel developed by Linus Torvalds. GNU's tools aside the Linux kernel make the operating system known as “Linux” aka “GNU/Linux”. Thousands of people helped refine the operating system online. Chapter 2 1. Briefly, what does the process of installing an operating system such as Fedora/RHEL involve? Installing Fedora/RHEL is the process of copying operating system files from a CD, DVD, or USB flash drive to hard disk(s) on a system and setting up configuration files so Linux runs properly on the hardware. Several types of installations are possible, including fresh installations, upgrades from older releases of Fedora/RHEL, and dual-boot installations Chapter 3......

Words: 524 - Pages: 3

Week 1 Assignment 1

...IS4550 Unit 1 Assignment 1 Internet-use policy for ABC Credit Union Purpose The purpose of this Acceptable Use Policy is to provide guidelines which will be applied in determining acceptable use of this Web site, and to notify you of the terms of this service. As a user of this service, you agree to comply with this policy, the stated acceptable uses and the terms of service. A signed Acceptable Use Policy must be signed by each faculty and staff. Online Conduct The intent of this policy is to make clear certain uses, which are and are not appropriate. ABC Credit Union will not monitor or judge all the content of information transmitted over this service, but will investigate complaints of possible inappropriate use. ABC Credit Union may at any time make determinations that particular uses are or are not appropriate with or without notice to you, according to the following guidelines. You must respect the privacy of others; for example: you shall not intentionally seek information on, obtain copies of, or modify files, other data, or passwords belonging to others, or represent themselves as another user unless explicitly authorized to do so by that user. You must respect the legal protection provided by copyright and license to programs and data. You must respect the integrity of computing and network systems; for example, you shall not intentionally develop or use programs that harass other users or infiltrate a computer, computing system or network and/or......

Words: 1035 - Pages: 5

Week 1 Assignment 1

...Week 1 Assignment 1 Michael Conley ITT Technical Institute Abstract This paper will be identifying, analyzing, and explaining five likely threat/vulnerabilities for the scenario given. I will go into detail on what you should do to lower the risk or vulnerability. The last thing I will talk about in this paper is what you should do to try and make it better and more secure. There are definitely some potential risks and vulnerabilities with the given scenario. The first one to point out would be that they are using Windows Vista. Another issue is the VPN connection with the laptops. Issue number three would be the servers. The fourth problem I foresee is back up. The final problem I see in the network is with the ISP. This is not a very old and outdated OS, since Microsoft is still supporting it, but there are more vulnerabilities with using Vista as opposed to Windows 7. Windows 7 is also more versatile, it is able to be run on more than just desktops unlike Vista. Windows 7 is able to be used on laptops, desktops, and netbooks which Vista cannot be used on all of those. Windows 7 puts all of the security notifications and other system problems in one place unlike Vista where you have to search through the control panel to find things. Windows 7 you just go to the action center. The likelihood of there being a serious security issue with windows Vista is low for right now.......

Words: 1019 - Pages: 5

Nt 2640 Week 1

...Chapter 1 Answer the following review questions. 1. Which of the following protocols are examples of TCP/IP transport layer protocols? (More than one answer could be correct.) Answer: D & F a. Ethernet b. HTTP c. IP d. UDP e. SMTP f. TCP 2. Which of the following protocols are examples of TCP/IP network access layer protocols? Answer: A & G g. Ethernet h. HTTP i. IP j. UDP k. SMTP l. TCP m. PPP 3. The process of HTTP asking TCP to send some data and make sure that it is received correctly is an example of what? Answer: B n. Same-layer interaction o. Adjacent-layer interaction p. The OSI model q. All the other answers are correct. 4. The process of TCP on one computer marking a TCP segment as segment 1, and the receiving computer then acknowledging the receipt of TCP segment 1, is an example of what? Answer: B r. Data encapsulation s. Same-layer interaction t. Adjacent-layer interaction u. The OSI Model v. None of these answers are correct. 5. The process of a web server adding a TCP header to the contents of a web page, followed by adding an IP header and then adding a data link header and trailer, is an example of what? Answer: A w. Data encapsulation x. Same-layer interaction y. The OSI model z. All of these answers are correct. 6. Which......

Words: 1515 - Pages: 7

Nt 1210 Unit 1 Assignment

...Unit 1 assignment 1. C 2. All of them are wrong the smallest measurement in the answers is a kilobyte and that is actually 1024 bytes not 106. 3. C 4. A,E 5. A 6. C 7. D 8. A 9. A,B,D 10. A 11. A 12. B,D 13. A,C 14. A,D 15. A 16. D 17. B 18. C 19. C,D 20. A,B Lab 1.1 Exercise 1.1.1 103 > 1000 x 2 = 2000 102 > 100 x 9 = 900 101 > 10 x 3 = 30 100 > 1 x 1 = 1 2931 Exercise 1.1.2 22 > 4 x 1 = 4 21 > 2 x 1 = 2 20 > 1 x 0 = 0 4+2+0= 6 Exercise 1.1.3 21 > 2 x 1 =2 20 > 1 x 1= 1 2+1= 3 Exercise 1.1.4 24 > 16 x 1 = 16 23 > 8 x 0 = 0 22 > 4 x 0 = 0 21 > 2 x 1 = 2 20 > 1 x 0 = 0 16+0+0+2+0=18 Exercise 1.1.5 11100010 27 > 128 x 1 = 128 26 > 64 x 1 = 64 25 > 32 x 1 = 32 24 > 16 x 0 = 0 23 > 8 x 0 = 0 22 > 4 x 0 = 0 21 > 2 x 1 = 2 20 > 1 x 0 = 0 128+64+32+0+0+0+2+0=226 > Exercise 1.1.6 156 156 > 27 > 128 x 1 = 128/ 156-128= 28 28 > 26 > 64 x 0 = 0 28 > 25 > 32 x 0 =0 28 > 24 > 16 x 1 = 16/ 28-16=12 12 > 23 > 8 x 1 = 8/ 12-8=4 4 > 22 > 4 x 1 = 4/ 4-4=0 0 > 21 > 2 x 0 = 0 0 > 20 > 1 x 0 =0 100111002 = 156 Exercise 1.1.7 255 255 > 27 > 128 x 1 = 128/ 255-128=127 127 > 26 > 64 x 1 = 64/ 127-64=63 63 > 25 > 32 x 1 = 32/ 63-32=31 31 > 24 > 16 x 1 = 16/ 31-16=15 15 > 23 > 8 x 1 = 8/ 15-8=7 7 > 22 > 4 x 1 =......

Words: 2960 - Pages: 12

Busn620 Week 1 Assignment

...BUSN620 Week 1 Assignment Click Link Below To Buy: http://hwcampus.com/shop/busn620-week-1-assignment/ Title: Week 1 Due Date: End of Week 1 1. Read weekly announcement 2. Participate in the weekly forum. 3. Review weekly assignments in the syllabus. 4. Please complete the following for your week 1 written assignment: Read Case #16- BMW of North America and answer the following questions (each question a subsection): 1. What is fueling BMW's Growth? 2. How is BMW Doing in the U.S? Compare the following 3 years (2012, 2013, & 2014) in terms of annual revenue, car sales, gross margins and end year stock sales (outside research required). 3. Is the "Dream It. Build It" program a sustainable advantage in the long term? Do you see any room for further improvement? (link to other companies to add depth; i.e. Ikea, etc.) 4. Do you think customers really need "millions of combinations" for their car? Can they be happy with available standard options? What are the downsides of mass customization? 5. How does this case study link to the topics presented in Chapter 1, Chapter 2 & Chapter 3? 6. submit your responses to the Weekly Assignment Folder: Additional resources for Case Study: • http://www.youtube.com/watch?v=8Ddq6O_QAz0 • http://www.anthonymonahan.com/BMW-Dream-It-Build-It-Drive-It Post/submit homework to the assignment folder for grading. Make sure you provide substantive graduate level answers. Review examples in resource section, grading rubric......

Words: 269 - Pages: 2

Week 1 Assignment 1

...Associate Level Material Appendix B Personal Financial Planning Worksheet Directions: Based on your readings and discussions in class this week, answer the following questions completely. 1. The process of creating a detailed plan to meet your financial needs and prepare for the future is called: B- Personal financial planning a. Developing goals. b. Personal financial planning. c. Collecting financial information. d. Personal finance. 2. Which of the following is not one of the five major steps of the financial planning process? C- Collect and organize your financial information a. Analyze your current finances. b. Establish and implement your plan. c. Collect and organize your financial information. d. Reevaluate and revise your plan as needed. 3. Which phase in life is commonly associated with focus on marriage, family, purchasing a home, and career development? C- Late 20’s through your 40’s a. Teenage years b. Between your 50s and 60s c. Late 20s through your 40s d. During retirement 4. Which of the following are some benefits of having a college degree that can affect your financial planning? D- All of the above a. The potential to make a higher salary b. Jobs with retirement plans and benefits c. The ability to receive promotions and wage increases d. All of the above 5. Which of the following elements of a comprehensive......

Words: 419 - Pages: 2