A transmission system operates at 16 MHz. The power output is 1 W and .1 Watt is required at the receiver. The receiver is located 100 meters from the transmitter. What types of twisted pair cabling can be used to support this transmission system?
1. What is the rang of usable IP addresses for the following IP subnet? What is the bradcast address for the subnet? 10.150.100.96/27 2. For the following IP routing protocols: spwlol out their acronym as distance-vector or link-state routing protocol,and as classful or classless routing protocol. OSPF EIGRP RIPV2 ISIS
Six months ago a toy company began to sell their products on the internet. Over this time period traffic to the website has increased substantially but few customers have made online purchases. The company decided to survey their customers to identify the reasons for the lack of online purchases. The results of the survey found
Compare the characteristics of various WAN technologies, including throughput, security, and reliability.
Given five jobs in the ready to run state waiting to be scheduled, with the following run times: 19, 16, 13, 15, & X. Determine the runtime order of the jobs such that it minimizes average response time.
Consider a particular system that does not have an interrupting clock. The only way a process can lose the processor is to voluntarily surrender it. Additionally, the operating system does not support a dispatcher. a) How can a group of user processes control dispatching? b) What advantages exist in this scheme?
1. How has the telephone service changed over the last 60 years? How has regulation of the telecommunications industry changed and what are some of the outcomes of that change? 2. What are the convergent technology trends in telecommunications? I need an example of some that have been involved with VoIP or IP Telephony?
What are the fundamental differences between Windows? Mac OS, UNIX, and Linux operating systems for personal computers? What unique characteristics do mainframe operating systems have?
Assume that you are the network security officer of one company, what will be your plan to enhance your network security (firewall? VPN? Content level protection? Or combination of them?) More details about your security infrastructure design will be welcome. * 500 minimum words with citing and referencing.
Consider the following scenarios: 1. Saguaro Federal has mainframes for all of its banks and businesses. Should the company use the Ethernet or Token Ring protocol? Explain your choice. Why is this choice appropriate? 2. XYZ Technology Consultants has offices on the second, third, and fourth floors of the office building it oc
List the steps and sub steps needed to start an e-business. Assume the Idea (company's new product and services) is already approved and the viability is already established through e-business plan. Please list the sequence of steps and sub steps that are needed to launch e-business.
How does an organization weigh the need to share data to the maximum extent to fully utilize this resource (data) for productivity across an organization (by insuring that the needed data is available to the users) with the opposing need to protect this data (from corruption and theft) that typically means controlling access to
1. What are some of the disadvantages to living in an Information Age? 2. Today more and more people rely on computers to create, store, and manage critical information. Thus, it is important that computers and the data they store are accessible and available when needed and also that the systems work in the manner they are d
Describe the telecommunication systems used at your workplace.
I need some help with writing a program. Your program should output a title similar to "Welcome to Ken's Grading Program", using your own name of course. Your program should prompt the user if they will be entering numbers or letters for grades. See example below. If the user enters 'numbers': Get input for the gr
I was asked to choose a type of communication technology and then research its history, uses and any controversy surrounding it. My group chose RFID (Radio Frequency Identification Technology).
Scenario: You are a network administrator for a small LAN with 12 computers connected via a hub. A DSL router provides a connection to the Internet for this network. Briefly describe the steps you would take to prevent attacks from the Internet.
You will calculate the total distance that a disk arm moves to satisfy pending requests, for different disk scheduling algorithms. Steps 1. Suppose that a disk drive has 5,000 cylinders, numbered 0 to 4,999. The drive is currently serving a request at cylinder 143, and the previous request was at cylinder 125. The queue of
This solution provides the learner with an understanding of management's role in the development and enforcement of information security policies, standards, practices, procedures and guidelines. In particular, the solution describes how an organization institutionalizes policies, standards, and practices using education, traini
(HW1) What is the effect of reading up and writing down restrictions imposed by the Bell-LaPadula model? And what is the effect of reading down and writing up restrictions imposed by the Biba model? (HW2) Choose one of your favourite operating systems (e.g. Windows 2000/XP/Vista or UNIX) and compare its security policy wi
Develop and run a shell script to input number of hours worked and pay rate and calculate the total pay, then the social security amount (assume 5%), then the net pay. Do this as a loop until the number of hours worked is zero.
Develop a Unix shell script to input number of hours worked and pay rate and calculate the total pay, then the social security amount (assume 5%), then the net pay.
Develop a Unix shell script to input number of hours worked and pay rate and calculate the total pay, then the social security amount (assume 5%), then the net pay. Do this as a loop until the number of hours worked is zero.
I need to research 2 different specific viruses (e.g., the iloveyou virus) and describe the following: a. How can an individual machine get infected with the virus you are researching and how does it spread to other machines? b. What damage might the virus do? c. Give the complete web addresses of where you found this inf
I need information on criminals using todays technology (computers) to steal identities. Criminals Using Today's Technology to Steal Identities I. Introduction II. Understanding the Concept of Identity Theft A. Types of Information Used in Identity Theft B. Typical Victims of Identity Theft C. The Magnitude of the Dama
What is physical security? What are the primary threats to physical security? How are they manifested in attacks against the organization?
Describe ISO 27001's value in managing security and risk. What are the advantages and/or disadvantages for obtaining ISO 27001 certification? Why security is not either physical or information based; it is a combination of both?
The 2005 article "Under Pressure: Issues Challenging Every CIO" Refers to Sarbanes-Oxley Act of 2002. What is the purpose of the Sarbanes-Oxley Act, and which businesses are impacted by it? What business events was this Act in response to by Congress? Do you think this will help or hurt the business environment?
Go back 15 years from today to discover what operating system advances were taking place. Describe how these advances were revolutionizing the business world. Compare these advances to the ones we are experiencing today. Use the Library and other Internet sources to find historical information. Please include references.
Choice Hotels International wants to set up Internet access for their customers... they are thinking about all options including wireless, hard wired LAN; a fiber connection to their ISP and possibly a sat link. They are also discussing security, backup plans for failures, and trying to identify the unknown unknowns and develop
Scavenger Hunt You have learned a great deal of important information about the Windows operating system so far. However, we have not even scratched the surface of the capabilities of Windows XP. This scavenger hunt is designed to let you explore many of the features of Windows XP and discover many of the other tools which ha