Premium Essay

Network Itt

In: Computers and Technology

Submitted By erodz1892
Words 383
Pages 2
Homework 1
Network class

1- The transmitter is i=the device that converts the voice sounds waves into electrical waves. Consisting of a metal cup filled with carbon granules, a metal diagraph covering the cup a cap that holds the lid over the carbon granules and a metal lining that helps complete the circuit to the outside world. 2- At the center of a paper or plastic diaphragm is a coil of wire. This coil is suspended by the diaphragm or cone, into a circular slot formed by a permanent magnet. The current containing the audio is passed through the coil, which is then repelled and attracted by the magnet, causing the diaphragm to move and moving air as it does so. Early receivers used a thin steel plate as a diaphragm. The coil was wrapped around a laminated core and placed very close behind the plate. As the current passed through the coil it attracted the diaphragm, causing air to move and sound produced. 3- The transmitter, the receiver, the dial pad, the switch hook, and the ringer.
Transmitter, source that produce a signal such as a telephone transmitter or an optical laser
Receiver, device that receives the signal
Dial Pad device to input the numbers
Switch hook used to open the circuit when the hand set is returned to the cradle or to close the circuit.
Ringer use to alert when incoming transmissions
4-A dial pad is used o notify the other party, a switch hook open or closes the circuit that circuit connects the telephone to central office the circuit is now connected until someone closes it by placing the phone back into the switch hook.
5-when a switch receives the call, it first determines whether or not the telephone number belongs to one of the customers served by the switch or if it needs to travel to a different local or long distance switch. With this information, the switch is able to route the call. There are three…...

Similar Documents

Free Essay

Itt Tech

...were less games, less teams. Now that there are more teams and more games per season the averages are different. IV. Look Back i) What method, if any, do you believe would be more effective than using a graph to summarize this type of data? Answer: A spreadsheet showing the data in an organized file. j) What types of problems might be most receptive to graphing as a problem solving technique? Answer: Calculating the differences in the data. Skill Level II Answer: Skill Level III Answer: Hints: Research the Internet and/or the ITT Tech Virtual Library for the information required in the assignment. Summarize your data in a table, and then build a graph. Remember: you must provide your references (the format of your reference list is to be determined by your instructor). ----------------------- Problem Acquire the necessary data, and compile it in an effective format, to compare the batting careers of Babe Ruth, Hank Aaron, and Mark McGwire. Problem Whereas batters are often judged by the number of home runs they hit, pitchers are judged by statistics such as the number of games they win, their earned run average (ERA), and the number of no-hitters they throw. 1. Execute the necessary research to identify the winning pitcher in the......

Words: 719 - Pages: 3

Free Essay

Itt 221 Research Paper

...brought us? ITT 221 ITT Technical Institution What has Windows Server 2008 brought us? With the growth of businesses, we see the need for technology in the workspace increase as well. Businesses now acquire the use of networks based on servers, more so than in the past. Many aspects of a business are now electronic as we are attempting to become a “paperless” society. Microsoft understands the needs of these corporations and growing companies, technology wise. In 2008 they launched a product that would assist in the securing and proper sharing of the needed information. One February 28, 2008, Microsoft released Windows Server 2008. This hit the market in different editions as well as with vast improvements from its predecessor Windows Server 2003. The editions that Server 2008 comes in are; Web, Standard, Enterprise, and Datacenter. The main differences we can compare between these have to do with the number of processors, amount of physical memory, and the features supported. To begin with the Web edition is for computers that are serving as Internet or intranet Web servers. Although it is comparable to the other editions; it cannot function as an Active Directory domain controller and you are not allowed to run client/server applications that are not web based. The maximum amount of processors that Web Edition can support is four. This would be suitable for a small Web based business, which doesn’t need the high-end additional features for their......

Words: 1470 - Pages: 6

Premium Essay

Itt 255

... Ken Schmid Unit 3 Assignment 1 Remote Access Control Policy for Richman Investments Authorization- Richman Investments must define rules as to who has access to which computer and network resources. My suggestion is that RI implements either a group membership policy or an authority-level policy to achieve this. Group policy would allow the administrator to assign different privileges to different groups. The admin would then assign different individual users to those different groups. So the users permissions would depend on the permissions of the group they were a member of. With authority-level policy the admin would assign different permissions to individual users based on their position and authority level within the company and what access that position requires. Identification- Richman Investments needs to assign a unique identifier to each user in order to have accurate records of who is accessing, or trying to access, what applications, which network resource, and what data. The most common ID is the username, account number, or PIN Authentication- In order to keep the remote access to Richman Investments secure, there must be proof that the person trying to gain access to the network remotely is the same person who has been granted access by identification. To do this RI can choose one of the following knowledge type authentications: PIN, password, or passphrase along with one of the following ownership type of authentication:......

Words: 312 - Pages: 2

Premium Essay

Yasuni Itt

...This article is a copy of the one published in New Society Magazine No.237, January-February 2012, ISSN 0251-3552, A major transition for a great transformation Reflections from the Yasuní-ITT Initiative René Ramírez Gallegos1 When discussing the development of a political project from the Left there are two opposing positions or aspects: those which promote the idea of better managing and regulating capitalism – that is, striving for “good capitalism” – and those who hold anticapitalist positions. The author of this article argues that a Left that does not give up on the generation of alternatives to capitalism but at the same time is responsible for governing, should think about a “great transition” without losing sight of the horizon of a “great transformation”. This article analyzes the Yasuní-ITT Initiative and presents it as an example of how to merge concrete and innovative proposals (transition) and utopias which go beyond capitalist development (transformation). Key words: Left, Capitalism, Good Living/Sumak Kawsay, Yasuní-ITT The world does not need alternatives for development, but alternatives to development. The world does not need to “better” use capitalism, but to transform it. That is the great historical challenge that the Left should take on, both intellectually and politically. The concept of “development” has been recycled and reborn again and again for all its critics and detractors. However, in a strict sense it has never been......

Words: 7238 - Pages: 29

Free Essay


...Get Rich or Die Tryin’ ITT Technical Institute Michael Sheldon 10-30-13 Get Rich or Die Tryin’ The IT security breach, caused by one Albert Gonzalez and his accomplices, is one of the most expensive lessons in corporate data security policies. For TJX this is more so as it is not only just that, it’s a black spot on the companies security record and has earned quite the problem as people no longer trust the company due to just how many security issues came to light with Albert’s breach. The TJX stores were foolishly using the relatively weak Wired Equivalent Privacy (WEP) protocol instead of updating to the stronger Wi-Fi Protected Access (WAP) protocol, making it much easier for the breaches to occur. However, the real damage came from the fact that the intruders were able to access the TJX internal systems, being able to move around freely for almost two years. The breaches occurred from the middle of the year 2005 and ran through December 2006, while an estimated 47.5 million records were stolen during that time period. TJX’s other security problem was because they allowed the hackers free roam for pretty much 18 months, showing the company didn’t keep proper traffic logs for their system, the company being unable to find them due to the need to look through all of their systems to try and determine just who it was that took what data, from where, where it was sent, and so on. Because of this, the investigation into the matter......

Words: 625 - Pages: 3

Premium Essay

Itt Nt1330

...1. What is the primary means of identifying network devices and services in a Windows Server 2008 network? A) DHCP B) TCP/IP C) DNS D) IP Feedback: In a Windows Server 2008 network, the primary means of identifying network devices and services is through the use of DNS. Correct Answer(s): C 2. The process of obtaining an IP address for a computer name (for example, “ComputerA”) is called __________. A) name resolution B) address controlling C) address resolution D) name controlling Feedback: The process of obtaining an IP address for a computer name (for example, “ComputerA”) is called name resolution. Correct Answer(s): A 3. Which of the following is not a top-level domain name? A) .aero B) .coop C) .museum D) .corp Feedback: The available generic top-level domain names include .aero, .biz, .com, .coop, .edu, .gov, .info, .int, .mil, .museum, .name, .net, .org, and .pro. Correct Answer(s): D 4. The routing service included with Windows Server 2008 is better suited for __________. A) a smaller network B) a larger network C) a mid-size network D) large amounts of traffic Feedback: The routing service included with Windows Server 2008 is better suited for a smaller network or one with a small amount of network traffic that needs to pass between subnets. Correct Answer(s): A 5. Which feature is an integral part of IPv6, whereas it was an optional feature under IPv4? A) IP security B) subnetting C) DNS security D) name resolution Feedback: IP security through the use of IPSec...

Words: 9157 - Pages: 37

Premium Essay

Itt Tech

...this job is to obtain some people skills from interacting with the customers that come in and learn more about the phone industry, I’m currently a student at ITT Tech majoring in Network Systems Administration and thought this job would be a good start in the tech industry. | Skills & Abilities | | I have been working with Computers since the age of 13 so my computer tech skills are well refined, I can and will adjust to any environment when need be, I am a quick learner regardless of what it may be I can and will learn it as fast as I possibly can, I am extremely patient and have been known to work well with people. | Experience | | Dish washer, Minnesota misonic Homes North ridge March 2013 To May 2013 My duties as the dish washer goes beyond the title I not only made sure all the dishes were clean I also helped with serving the food, my job was a bit stressful at times because we was working with the elderly who’s immune system is much weaker because of aging. Pizza Maker, Pizza Ranch August 2014, Current employer My task are to make and prep the dough in the morning and also make quick but quality pizza’s as fast as possible keeping up with the orders and the Buffet line. | Education | | ITT TECHNICAL INSTATUTE – Brooklyn Center - BA I am currently a student at ITT Tech working on my BA in Network System Administration, I just finish with my first quarter in the summer and now moving on to the second quarter in the fall, I currently have a 3.5 GPA......

Words: 415 - Pages: 2

Premium Essay

Itt Tech

...t113 Chapter 11 Chapter 11 Master It 1. What is the active component that a patch cord is plugged into when it is attached to a network connected device, such as a desktop computer? 2. What type of switch, and over what type of cabling, are workstation connections funneled into in a hierarchical star network? 3. What type of switch, and over what type of cabling, are workgroup switches connected? Solution 1. Patch cords are plugged into workstation ports. These are either part of the motherboard or part of a network interface card. 2. All workstation connections are connected to workgroup switches using horizontal cabling. 3. Workgroup switches are connected to core switches using backbone cabling. Master It 1. You are asked to specify a pluggable module for 850nm transmission over multimode fiber at 1Gbps with an LC connector interface. What module do you need to order? 2. You are asked to specify a pluggable module for 1310nm transmission over single-mode fiber at 10Gbps from one building to another. The IT manager wants you to order the smallest possible form factor. What module do you need to order? Solution 1. 1000Base-SX SFP mini-GBIC supports operation at 1Gbps over multimode fiber with an LC connection. 2. 10GBase-LR SFP+ module would provide you the smallest form factor transceiver for 1310nm operation over single-mode fiber. Master It You have nine users who have 100Base-T NIC cards on their computers. The 12-port......

Words: 329 - Pages: 2

Premium Essay

Itt Work

...Explain why all of these elements are necessary for allowing one device to communicate with another. What happens if one of them is not present? Explain this circumstance for all five elements. a. All of these elements work in a sequence with each other and help and branch off each others work, to begin work for itself. 2. Most modern computers have device drivers for network interfaces that manage most of these elements automatically. What characteristics of modern computer networks allow this type of integration? Use your textbook and Internet research to support your answer. b. 3. For this exercise, you will enable peer-to-peer communication on your Windows XP machine. Complete the steps that follow to enable this service. What other networking services are available for installation? c. 4. Briefly explain why wireless connections between peer devices do not need specialized equipment like a crossover cable to connect to each other. Use your textbook and Internet research to support your answer d. 5. For this exercise, you will be creating a new network connection on your Windows PC. List the types of connections that are available to choose. Record the settings that you choose in each step. e....

Words: 514 - Pages: 3

Free Essay

Itt It222

...purchased a new printer that the owner wants all employees to be able to use. You currently have only one domain with two servers running Windows Server 2003. All users have accounts to authenticate daily to the network. As the administrator, what is the simplest and most secure way to assign permissions to all of the users in your domain? d 3. You work for a local school district as the district wide network administrator. Currently the district has a UNIX database that contains all student records. The district board of educators would like you to use the Same user names on the Windows Server 2003 network that are currently are being used on the UNIX server. They have asked you how you intend to accomplish this task. What will you tell them? The best strategy for this is to export the UNIX database information to a file. This file can be edited and used either with CSVDE, LDIFDE, or WSH. 4. Having just hired a new employee to help you with some administrative tasks, you would like this person to be responsible for network backups. Without giving more access than is necessary to perform this task, to which group should you add the new employee’s user account? d 5. Your company network consists of four domains that include Windows NT Server 4.0, Windows 2000, and Windows Server 2003 servers. Each domain has a group of managers that need access to the same resource. You are trying to create a......

Words: 446 - Pages: 2

Premium Essay

Itt Syllabus

...information processing, Internet research, other skills used by the technical professionals and techniques that can be used for independent technical learning. MAJOR INSTRUCTIONAL AREAS 1. Getting Started at ITT Technical Institute 2. Productivity Software 3. Overview of Technology Tools 4. Microsoft Word 5. Microsoft PowerPoint 6. Microsoft Excel 7. Microsoft Access 8. Communication Tools 9. Exploring Career Goals 21st-century skills o Changes in work and the workplace o Building marketable proficiencies o Projecting professionalism ITT Technical Institute Career Services Resources o Targeting job descriptions  o Transferable skills Crafting a Resume 10. Skills and Techniques of a Successful Student Strategies for independent learning Learning styles Note-taking strategies Test-taking techniques © ITT Educational Services, Inc. All Rights Reserved. [2] 10/29/2013 GS1145 Strategies for the Technical Professional Syllabus Critical thinking Problem solving Basic research skills o ITT Tech Virtual Library o Web searches o Citing sources Time management Working in teams COURSE LEARNING OBJECTIVES By the end of this course, you should be able to: 1. Gather relevant information using ITT Technical Institute resources, such as student email, ITT Tech Virtual Library, and ITT Tech Student Portal. 2. Perform self-analysis on the areas that impact success in academic and professional life. 3. Apply strategies that help achieve success in academic and......

Words: 14113 - Pages: 57

Premium Essay

Itt Student

... Accomplishments Increased sales revenue by [1500] Achieved agent of the month Succeeded to be number [1] on the company Assembler B Pierce Manufacturing Inc. - July 2011 to May 2013 Improved Customer Satisfaction, productivity and efficiency Initiated new ways and job solutions to solve problems Motivated a work team and saved time and money Identified better ways to accomplish customer goals Assistant Manager Rent King - Bradenton, FL - March 2006 to May 2011 Compiled and analyzed sales and marketing reports Created expense reports, budgets and filing systems Maintain accurate records, inventory and collections Investigated customer complaints, problems and errors EDUCATION A.S in Computer Science/Network System Administrator ITT Technical Institute - Tampa, FL 2015 to 2016 SKILLS Data Entry, Inventory, Sales, Customer Service, Account Management (8 years) ADDITIONAL INFORMATION Skills •Customer service expert •Willingness to Learn •Critical Thinking •Positive/Attitude/Motivation/Energy •Analytical/Research Skills •Excellent communication skills •Software installation •Operating Systems •Adaptability/Flexibility •Accurate and detailed •Active Listening •Networking Basics ...

Words: 422 - Pages: 2

Free Essay


...Network Technology and Service Integration Unit 1 Homework The following homework is designed to cover the course objectives for this unit. Assignment 1.1: Textbook/Workbook Assignments • Complete the following exercises and questions from Routers and Routing Basics: CCNA 3 Labs and Study Guide: Vocabulary Exercise: Matching on page 3 VLSM Subnetting a Subnet Exercises on pages 9-11 VLSM Addressing Design Scenarios 1-6 on pages 15-20 Summary Route Exercises on pages 21-24 Concept Questions on pages 25-27 VLSM Case Study on page 27 Internet Research on page 29 (Use the ITT Tech Virtual Library.) • Complete Chapter 9 Review Questions 2-7, 10, 14, 20-22 on pages 258-259 of Introduction to Telecommunications. Submit your written answers to your instructor at the beginning of Unit 2. . Assignment 1.2: Virtual Labs • Complete Virtual Labs 6, 7, and 8 from the CCNA 640-802 CCNA Simulator, which you can find by clicking through these paths: ICND1 Troubleshooting Scenarios Lab 6: IP Addressing and Routing. ICND1 Troubleshooting Scenarios ICND1 Part 4: Troubleshooting Labs Lab 7: IP Routing I ICND 2 Troubleshooting Scenarios Lab 13: IP Routing II Submit your written answers to your instructor at the beginning of Unit 2. ©ITT Educational Services, Inc: Date: 03/13/09 Network Technology and Service Integration Unit 2 Homework The following homework is designed to cover the course objectives for this unit. Assignment 2.1: Textbook/Workbook Assignments • Complete the following......

Words: 2825 - Pages: 12

Free Essay

Syllabus for Itt

...communication, critical thinking and group process techniques. Quarter Credits 4 Instructional Contact Hours 40 Instructional Methods Prerequisite Courses Co-requisite Courses 40 hours theory 0 hour lab GE117 Composition I or equivalent None Objectives 1. 2. 3. 4. 5. 6. Explain the importance of group dynamics. Critique the performance of groups/teams in a variety of scenarios. Evaluate the use of problem-solving and decision-making techniques for virtual groups/teams. Apply theories of small group communication during small group activities. Apply ethical standards while participating in groups/teams. Apply critical-thinking and analysis skills to overcome obstacles and improvise solutions as a leader within small groups. 7. Use the ITT Tech Virtual Library for research and information necessary to complete assignments and projects. SCANS Objectives SCANS is an acronym for Secretary's Commission on Achieving Necessary Skills. The committee, created by the National Secretary of Labor in the early 1990's, created a list of skills and competencies that the committee feels are necessary for employees to function in a high technology job market. 1. Select relevant, goal-related activities, rank them in order of importance, allocate time to activities, and understand, prepare, and follow schedules. 2. Assess knowledge, skills, and talent and distribute work accordingly, evaluate performance and provide feedback. 3. Monitor performance actively and provide constant......

Words: 1858 - Pages: 8

Free Essay

Network Administrator

...trained professional seeking a challenging position in the information technology field with an opportunity to utilize my experiences and networking skills. EDUCATION Associate of Applied Science Degree in Computer Network Systems ITT Technical Institute, Orland Park Chicago (June 2010 - JUNE 2012) ACADEMIC FOCUS * Computer hardware * Python (Programming) * Windows Server 2008/Active Directory * Linux System Administration * Database Development * Network Standards and Protocols * Network Application Services and Security * Network Technology and Service Integration * Fundamental of Information System and Security SUMMARY OF QUALIFICATIONS * Operating Systems: DOS, Fedora LINUX. Windows NT,Windows Server 2008, Windows XP/7 * Implementing and Supporting the Functions and Administration of Network Information Systems: Included planning, configuring and Installing file server, work station and print servers in the local area environment. Configured and installed Active Directory (Parent/Child DC, RODC, OUs, Group Policy, User Groups, DNS, DHCP) Configured and installed Fedora Linux (Create, Add or Delete users, Web Server, SAMBA Server, DHCP, IP Tables) * Network Background:Peer-to-Peer and server-based network connections using NetBEUI, TCP/IP Configuredand installed Cisco Routers: ( 1700, 2600, 3600)and Cisco Switches (2950, 2960 series and 2948-GL3) Configured and installed communication Radio and WIFI System s......

Words: 317 - Pages: 2

portrait pro | Women's Clothing | Clear Pumps Heels