Free Essay

Unit 9 Lab Security Basics

In: Computers and Technology

Submitted By surfingtitan
Words 1359
Pages 6
Unit 9 Lab Security Basics
Task 1: Features of Hardware and Software Firewalls * Hardware Firewall – Cisco ASA 5505 Firewall 1) Usually purchased as a stand-alone product typically found in routers or other networking equipment. 2) Usually a minimum of 4 network ports (the Cisco unit has 8) 3) Usually used in businesses or large networking systems 4) Intended for network security * Software Firewall – 2014 Trend Micro Instant Security and Antivirus 1) Usually purchased by individual users 2) Usually an installable form of software 3) Protects from outside attempts to control or gain access to your computer 4) Protects against Trojan programs or email worms 5) Only protects individual computer, not a network
Task 2:
Part 1: Which anti-virus program is free and which provide trial versions * Panda – No free trial or free version; yearly prices : $31.99, $49.99, $35.00 * Norton – No free product ,free trial version for 30 days; yearly prices : $49.99, $79.99, $49.99 * McAfee – No free or trial versions; yearly prices : $79.99, $49.99, $44.99 * AVG – No freeware, trial for 30 days; yearly prices : $39.99, $54.99 * Kaspersky – Offers a free anti-virus software and 30 trial; yearly prices : $69.95, $64.95, $59.95, $59.95
Part 2: Define malicious code terms
Term – Trojan horse Program
Definition – generally non-self-replicating type of malware program containing malicious code that, when executed, carries out actions determined by the nature of the Trojan, typically causing loss or theft of data and possible system harm.
How it works – A Trojan often acts as a backdoor, contacting a controller which can then have unauthorized access to the affected computer. A computer may hosts a Trojan via a malicious program a user is duped into executing or by drive-by download.

Term – Malicious Email attachments
Definition – Email attachments are a way for a sender to transmit files to another user via email. In a similar way to junk mail coming in your mailbox, email users regularly receive unsolicited emails from unknown senders. These emails can often contain links to malicious web sites or have attachments containing malicious software.
How it works – If you open a malicious attachment it could do a number of undesirable things such as installing a key logger to record your keystrokes, installing a virus, or even providing an intruder with remote access to your computer.
Term – Drive-by download
Definition – means 2 things, each concerning the unintended download of computer software from the internet: 1. Downloads which a person authorized but without understanding the consequences 2. Any download that happens without a person’s knowledge, often a computer virus, spyware, malware, or crimeware.
How it works – Drive-by downloads may happen when visiting a website, viewing an email message or by clicking on a deceptive pop-up window. By clicking on the window in the mistaken belief that, for instance, an error report from the computer operating system itself is being acknowledged, or that an innocuous advertisement pop-up is being dismissed. In such cases, the “supplier” may claim that the user “consented” to the download, although actually the user was unaware of having started an unwanted or malicious software download.

Part 3 * 3.1
Full Backup – A complete backup of everything you want to backup
Differential Backup – The backup software looks at which files have changed since you last did a full backup and then creates copies of all the files that are different from the ones in the full backup. If you do a differential backup more than once, it will copy all the files that have changed since the last full backup, even if you already have identical copies of those files in a previous differential backup. For restoring all the data, you will need the last full backup and the last differential back up.
Incremental Backup – The backup software creates copies of all the files, or parts of the files that have changed since previous backups of any type (Full, Differential, or Incremental). For example, you do a full backup on Sunday. An incremental backup made on Monday would only contain files changed since Sunday and so forth. * 3.2
Backups should be stored off-site and periodically tested to ensure that the data is in a place in case the original is lost in fire, flood, stolen etc. It should be tested regularly to ensure it is in working condition. Your backup is only good if it is actually working. * 3.3
Cold Site – A cold site is the least expensive type of backup site for an organization to operate. It does not include backed up copies of data and information from the original location of the organization, nor does it include hardware already set up. The lack of hardware contributes to the minimal start-up costs of the cold site, but requires additional time following the disaster to have the operation running at a capacity close to that prior to the disaster.
Hot Site – A duplicate of the original site of the organization, with full computer systems as well as near-complete backups of user data. Real time synchronization between the two sites may be used to completely mirror the data environment of the original site using wide area network links and specialized software. Following a disruption to the original site, the hot site exists so that the organization can relocate with minimal losses to normal operations. Ideally, a hot site will be up and running within a matter of hours if not less. This is the most expensive type of off-site backup. These sites are popular with financial institutions, government agencies, and Ecommerce providers.
Warm Site - A warm site is a compromise between hot and cold sites. These sites will have hardware and connectivity already established, though on a smaller scale than the original production site or even a hot site. Warm sites will have backups on hand, but they may not be complete and may be between several days to a week to get back to normal operations. An example would be backup tapes sent to the warm site by courier.
Task 4 – 1. Mi$$i$$ippi - Fr00gie! - $k8teR! - $urf1ng! 2. Tomorrow is not promised today, what would Jesus do
TinptWwJd
Does a bear sh** in the woods?
Dabsitw?
Does a one legged duck swim in circles?
Da1ld$ic?
Aren’t you a chip off the old block
AuAcotob
Momma told me, my only son, come site beside me
MtMm0sc$bm
3.

Works Cited
AVG. (n.d.). Retrieved May 29th, 2014, from http://www.avg.com/us-en/av_buy_2014_ppc
Backup Info. (n.d.). Retrieved May 29th, 2014, from http://www.backup.info/difference-between-full-differential-and-incremental-backup
Google. (n.d.). Retrieved May 29th, 2014, from http://www.google.com/#q=hardware+firewalls&tbm=shop&spd=16774847306006198780
Google. (n.d.). Retrieved May 29th, 2014, from http://www.google.com/webhp?sourceid=chrome-instant&ion=1&espv=2&es_th=1&ie=UTF-8#q=software+firewall&tbm=shop&spd=9132287006925228420
Kaspersky. (n.d.). Retrieved May 29th, 2014, from http://usa.kaspersky.com/store/kaspersky-store#creativeID1199creativeID1232
Make it Secure. (n.d.). Retrieved May 29th, 2014, from http://www.makeitsecure.org/en/malicious-email-attachments.html
McAfee. (n.d.). Retrieved May 29th, 2014, from http://promos.mcafee.com/offer.aspx?id=664617&lqmcat=SEM:Google:US:44953998122:mcafee:Brand:g&gclid=COGMzdqv0r4CFavm7Aod4WUAWA
Norton. (n.d.). Retrieved May 29th, 2014, from http://buy-static.norton.com/norton/ps/3up_us_en_navnis360_nort.html?om_sem_cid=hho_sem_sy:us:ggl:en:e|kw0000004480|32004403276|c&country=US
Panda Security. (n.d.). Retrieved May 29th, 2014, from http://www.pandasecurity.com/security-promotion/antivirusoffer/usa/?track=109089&gclid=CP-Ut5yu0r4CFTBk7Aod5A8AzA
Password Meter. (n.d.). Retrieved May 29th, 2014, from http://www.passwordmeter.com/
Webopedia. (n.d.). Retrieved May 29th, 2014, from http://www.webopedia.com/DidYouKnow/Hardware_Software/firewall_types.asp
Wikipedia. (n.d.). Retrieved May 29th, 2014, from http://en.wikipedia.org/wiki/Drive-by_download
Wikipedia. (n.d.). Retrieved May 29th, 2014, from http://en.wikipedia.org/wiki/Trojan_horse_(computing)
Wikipedia. (n.d.). Retrieved May 29th, 2014, from http://en.wikipedia.org/wiki/Backup_site…...

Similar Documents

Free Essay

Is3230 Unit 9 Lab 9

...1. If you are using corporate e-mail for external communications that contain confidential information, what other security countermeasures can you employ to maximize the confidentiality of e-mail transmissions through the Internet? Encrypt email, email policy, security software, content checking tool, anti-spam tool, and secure firewall configurations. 2. Explain the role of a Certificate Authority and its obligations in authenticating the person or organization and issuing digital certificates. Certificate Authority or Certification Authority (CA) is an entity, which is core to many PKI (Public Key Infrastructure) schemes, whose purpose is to issue digital certificates to use by other parties. It exemplifies a trusted third party. 3. What would a successful Subversion Attack of a CA result in? An attacker can create a certificate for any domain. This certificate will appear to be signed by a trusted CA. Thus, you will see that the site's cert is trusted and you will never get any notification to the contrary. Normally, a trusted CA will issue and sign a certificate and then if the browser trusts the signing CA, you will see a padlock in the GUI and you will often times see a message that lets you know that the certificate of the web site is trusted. If the CA is not trusted, you are shown a message that the certificate is not signed by a trusted party and you are given the option to leave or continue. This is PKI in a nutshell. The entire system relies on trust......

Words: 804 - Pages: 4

Free Essay

Security Basics

...Identity theft is the crime of using someone else's personal information for self-gain. According to an article in USA Today, identity theft is surpassing traditional theft and is becoming the leading form of property crime (Anderson). The Federal Trade Commission estimates that more than 9 million individuals are victims of identity theft each year. The Justice Department puts the figure at more than 3.5 million households (Anderson). Anyone can become a victim of identity theft and it is not limited to the financial activities of one’s life. People’s identity is also stolen in order to commit criminal activities. Both activities are defined as fraud and are punishable by law if caught. Financial identity theft or fraud includes bank fraud, credit card fraud, computer and telecommunications fraud, social program fraud, tax refund fraud, and mail fraud. In fact, a total of 25 types of financial identity fraud are listed and investigated by the United States Secret Service (Obringer). In 1997, Secret Service agents made approximately 10,000 financial crime arrests which 94 percent involved identity theft (Obringer). Fifteen years later, Javelin Strategy & Research reports that over 12 million financial identity theft cases were reported (Javelin Strategy & Research). Other types of identity theft usually involve financial elements as well but are typically committed to fund some sort of criminal enterprise. Criminal activities include......

Words: 752 - Pages: 4

Premium Essay

Web Application Security Unit 9 Assignment

...Unit 9 Discussion 1: Business anywhere-Security and the mobile User The need for employees to check their emails and keep in touch with customers is becoming more and more of a frequent need to keep business moving. National Express Packaging’s employees are in need of using end point devices such as mobile phones, tablets, laptops and USB devices to access company information. There have been various requests upon this subject per department and it is necessary to provide specific end point devices to the various departments only depending on what they need. The sales team only needs to check email and their work contacts frequently. A mobile device such as a cell phone can be used in this case for this department. The sales employees will be able to check their email at any time providing they have an encrypted connection to go along with their email. This device can be provided by the company or they can use their own device but a policy must be in place if the personal mobile device will be used. The Service team needs to be able to check online for packaging rates and be able to chat with users. In this department, it is best to use a tablet in the case that the tablet will have internet access and will use a specific application to be able to chat with customers. For the IT department, users should have the ability to use a laptop as they will be doing more rigorous activities. The laptop must be secured and hardened to prevent remote attacks. In order to connect to to...

Words: 493 - Pages: 2

Premium Essay

Unit 9 Lab Recommend It Security Policies to Help Mitigate Risk

...Unit 9 Lab Recommend IT Security Policies to Help Mitigate Risk IS3350 1. Which IT assets did you prioritize as critical to administrative or student computing? I prioritize the file servers and the teachers’ notebook as critical to administrative and student computing. 2. List your top five (5) risk exposures for which you believe this school should have specific risk mitigation strategies. - No firewall - Unauthorized access to school computers - Open connections on the WLAN. - The principals traveling notebook can carry a virus - wireless access security 3. Given the potential risks that you identified, what IT security policies would you recommend be created by the school to help mitigate each of the identified risk exposures you listed in #above? I would say create an AUP and a policy that implements the encryption of the file servers. First and foremost a comprehensive security policy that takes into consideration the variables and factors at the school. This includes students, teachers, physical access, layout of the school and property, security measures as defined by FERPA, HIPAA, etc. A password policy needs to be in place that stresses complexity, minimum length (recommendations) and recycling or expiring passwords. This could be accomplished with a minimum length of 8 characters, one being a capital letter, one being a number, and one being a special character. Physical security should be setup in a way that there are......

Words: 350 - Pages: 2

Free Essay

Tb143 Lab 7 Security Basic

...Task 1: Firewall is software or hardware based network security system to protect between your computer network and the internet. Hardware firewalls are best suited to business and large networks, whereas Software firewalls are best suited for home use. Hardware firewalls is a small metal box so one could hook up to a computer network just like if you were to add a printer etc. Software firewalls gives you a level of protections from hackers and unwanted intrusions. Software firewalls packages has anti spam, antivirus, even anti-popup ads. There are also parental controls to manage what or certain websites your minor can visit. Barracuda Firewall is the newest Hardware. It has email, web, and network security. Barracuda provides intrusion prevention, virus scanning, content filtering, and reporting. Barracuda Firewall is perfect fit for small and medium sized businesses. Zone Alarm protect your PC from viruses and spyware, also has internet firewall, internet browser security and theft prevention, and email virus scan. This is example of a software firewall, great for home use. Task 2: Avg, and Panda offer Free anti-virus programs to protect your computer. Norton and Kaspersky offer trial run versions for a number of months then thereafter one could purchase the anti-virus program. Trojan horse programs is a type of file converters, but also it could install harmful programs such as spyware and rootkits. Malicious email attachments are a way for a sender to transmit......

Words: 687 - Pages: 3

Free Essay

Security Basics

...Task 1: Procedure 1. Firewalls may be hardware devices or software programs. Examples of these types of firewalls and compare their features are noted below. NETGEAR ProSAFE N300 WiFi 8-Port Gigabit VPN Firewall FVS318N Key Technologies: • Securely connects up to 5 remote office or traveling users • True firewall using stateful packet inspection (SPI) and intrusion detection • Initiates up to 12 VPN tunnels simultaneously • NAT routing and VPN pass-through for extra security • IPV4/IPV6 support • Application layer gateway support (SIP and FTP) • Smart Wizard® connects to your ISP quickly and easily • Windows®, UNIX®, Macintosh® and Linux compatible • Integrated 8-port 10/100/1000 Gigabit Ethernet switch • 5 SSL VPN connections • 64 VLAN support Norton by Symantec Internet Security for Mac Key Technologies: • Online identity protection • Antivirus • Antispyware • Browser protection • Antiphishing technology • Smart firewall • Vulnerability protection • Daily protection updates • Email and Instant Message monitoring • Location awareness • Confidential file guard • Free support 24x7 A firewall device is a protective system that provides a layer of protection between your computer network and the Internet. When used correctly a firewall prevents unauthorized use and access to your network. The firewall carefully analyzes data entering and exiting the network based on your configuration. It ignores information that comes from......

Words: 1033 - Pages: 5

Free Essay

Unit 9 Lab 1

...Task 1 1. The Cisco RV220W Firewall is a hardware firewall that doubles as a router. It has VPN security to allow safe access from remote computers and offices. It also protects against cloud based threats. ZoneAlarm is a software two-way firewall and also comes with backup software. It monitors your programs constantly and should a virus or malicious program make it through it catches it immediately. Task 2 1. Panda, Norton, and Kapersky all offer free trial versions of their products. AVG is the only full-fledged free anti-virus software in the group. McAfee does not offer trial versions or a free version, only purchasable options. 2. A Trojan horse is an application that appears benign but is really a destructive program. A user will think they are downloading something beneficial to their computer and when they do the Trojan horse begins to corrupt their system. Phishing is when a person receives an email that directs them to a false website that appears to be legit and then has the user enter sensitive personal information such as credit card numbers, social security number, etc. A drive-by download occurs when a user visits a website, doesn’t have to click any links or anything, and malicious software automatically begins to download in the background without the users knowledge. Task 3 1. A full backup backs up all the files and folders on a specific drive every time you use that file set. It takes longer and uses up more file space. An incremental......

Words: 586 - Pages: 3

Free Essay

Unit 9

...Unit 9 Lab Security Basics Task 1: Features of Hardware and Software Firewalls * Hardware Firewall – Cisco ASA 5505 Firewall 1) Usually purchased as a stand-alone product typically found in routers or other networking equipment. 2) Usually a minimum of 4 network ports (the Cisco unit has 8) 3) Usually used in businesses or large networking systems 4) Intended for network security * Software Firewall – 2014 Trend Micro Instant Security and Antivirus 1) Usually purchased by individual users 2) Usually an installable form of software 3) Protects from outside attempts to control or gain access to your computer 4) Protects against Trojan programs or email worms 5) Only protects individual computer, not a network Task 2: Part 1: Which anti-virus program is free and which provide trial versions * Panda – No free trial or free version; yearly prices : $31.99, $49.99, $35.00 * Norton – No free product ,free trial version for 30 days; yearly prices : $49.99, $79.99, $49.99 * McAfee – No free or trial versions; yearly prices : $79.99, $49.99, $44.99 * AVG – No freeware, trial for 30 days; yearly prices : $39.99, $54.99 * Kaspersky – Offers a free anti-virus software and 30 trial; yearly prices : $69.95, $64.95, $59.95, $59.95 Part 2: Define malicious code terms Term – Trojan horse Program Definition – generally non-self-replicating type of malware program containing malicious code that,......

Words: 298 - Pages: 2

Free Essay

Lab 7 Security Basics

...Lab 7: Security Basics Task 1: Procedure 1. An example of hardware firewall is Belkin, and an example of software is Norton 360. Task 2: Procedure 1. Almost all anti-virus programs offer some sort of trial period for first-time users. McAfee is the only one that I know for sure offers free protection. 2. A Trojan Horse is an email virus usually released by an email attachment. If opened, it will scour your hard drive for any personal and financial information such as your social security, account, and PIN numbers. Once it has collected your info, it is sent to a thief’s database. A malicious email message is one which had been deliberately crafted to cause problems on the server or on the client. Drive- by downloads are downloads which a person authorized but without understanding the consequences (e.g. downloads which install an unknown or counterfeit executable program, ActiveX component, or Java applet). .Any download that happens without a person's knowledge, often a computer virus, spyware, malware, or crime ware. Task 3: Procedure 1. Full backup is a complete backup of everything you want to backup. Differential backup software looks at which files have changed since you last did a full backup. Then creates copies of all the files that are different from the ones in the full backup. Incremental backup software creates copies of all the files, or parts of files that have changed since previous backups of any type (full, differential or......

Words: 432 - Pages: 2

Premium Essay

Lab Basics

...OHM'S LAW EQUIPMENT: • • • • • • Ammeter (0-0.5 A) Voltmeter (0-10 V dc) Decade resistance box (0.1 to 100 Ω) Rheostat (200 Ω) Unknown resistance Battery (6 V) THEORY: The basic idea of an electrical CIRCUIT is that the power supply "pushes" electrical charges around the circuit similar to the way a pump pushes water in a fountain. The resulting flow of charges is called the CURRENT (I ≡ Δq/Δt). The power supply supplies potential energy to each of the charges that flow through it. We can measure this energy per charge with a voltmeter where we define VOLTAGE as the electrical potential energy per charge (V ≡ PE/q). Note in particular that the power supply (sometimes called the voltage supply) does NOT supply the current, it only supplies the energy to move the current, just as the water pump does not supply the flowing water, only the pressure to make the water flow. Just as in the water in a water fountain, the current must be allowed to leave the power supply and then eventually return to the power supply. Hence an electrical circuit starts at the (positive terminal of the) power supply and must eventually end at the (negative terminal of the) power supply - hence the name circuit. The individual circuit elements are connected in such a way that the current flows through them, usually giving up energy in the process. As the charges give up energy, the potential energy of the charges (and hence the voltage) will decrease as they traverse the circuit. OHM'S LAW states......

Words: 890 - Pages: 4

Free Essay

Unit 9 Security Basics

...Kaspersky Total Security Free Trial Kaspersky Total Security Paid Version Real Time Blocking of Spyware Multiple PC management from one PC, data back-up & encryption, & password management Always current cloud based protection Real-time antivirus & anti-theft protection for your Android smartphone Proactive detection of Malware Advanced anti-theft & Internet threat protection for your Android tablet Safe Money, two-way firewall, award-winning parental control, & advanced identity theft protection Real-time Protection against Mac & PC malware, Safemoney technology, and parental control Privacy protection including webcam protection, security notifications on Wi-Fi networks, & additional tools to protect personal information Mcafee Total Protection Free Trial Mcafee Total Protection Paid Version Protect against viruses and malware Secure your Macs Optimize your PC Safeguard your smartphones and tablets Protect your family Manage all your devices from one place Block spam and dangerous email Password manager Protect against hackers and thieves Protects Multiple PCs Protect your social network Free Anti-Virus Software Paid Anti-Virus Software Malwarebytes Anti-Malware Mcafee Total Protection Panda Free Antivirus Norton Anti- Security Comodo Cleaning Essential 6 Kaspersky Total Security Norton Power Eraser AVG Anti-Virus Programs Trojan Horse Program: A Trojan horse, or Trojan, in computing is a generally non-self-replicating type of malware......

Words: 495 - Pages: 2

Free Essay

Basic Security

...Phoenix. AMI 6 Beeps: Keyboard controller / gate A20 failure The keyboard controller is a chip on the motherboard that communicates with your keyboard. It also controls the A20 gate that provides access to the high memory area (HMA). This component is indicating a failure. This is a problem with either the keyboard or the motherboard. Phoenix 1-3-4-1 Test 512 base address lines. Sometimes a memory stick can become loose causing the computer to be unable to read the memory or get errors as it's reading it. Try fixing this issue by opening the computer removing each of the memory sticks you have in the computer and then placing them back into the slots, reset the memory and restart the computer. If this doesn’t work replace the memory. Basic Security Hardware Network address translation: Every system on the Internet needs an IP address--like a phone number for computers--which is used to forge links with other systems across the network. NAT foils unauthorized connections by giving PCs behind the firewall a set of private addresses, while presenting to the world a single, public address. This switch makes it difficult for others to reach through the firewall to an individual PC. Port management: By default, most hardware firewalls close unsolicited access to all ports (like doors in a hallway) on your connected PC. So if a piece of software locks onto your IP address and tries to form a connection with TCP port 80 (used for Web connections) or TCP port 25 (used for......

Words: 962 - Pages: 4

Free Essay

Nt1110 Lab 7 Security Basics

...Lab 7: Security Basics Lab 7: Security Basics Task 1: Software: We offer solutions to fit all of your security needs. | Free Antivirus + Firewall | Internet Security Suite | Extreme Security | Antivirus/Anti-Spyware EngineDetects and blocks viruses, spyware, Trojan horses, worms, bots, and rootkits. | | | | Two-Way FirewallMakes your PC invisible to hackers and stops spyware from sending your data out to the Internet. | | | | Advanced FirewallMonitors programs for suspicious behavior spotting and stopping new attacks that bypass traditional anti-virus protection. | | | | Privacy & Security ToolbarProvides site check, do not track, Facebook privacy scan, private browsing and more. | | | | Identity ProtectionMonitors your credit and alerts you of changes in your credit files. | | | | Advanced Real-Time AntivirusChecks files against an always-up-to-date cloud database of antivirus signatures. | | | | Enhanced Browser ProtectionProtects your computer by blocking web threats before they reach your browser. | | | | SupportCustomer service and technical support available 24/7 via live chat. | | | | Parental ControlsFilters and blocks inappropriate websites and limits time spent online. | | | | Threat EmulationAnalyzes downloads and warns you if a download is malicious--stopping it from infecting your PC. | | | | Find My LaptopLocates your lost or stolen laptop on a map, locks it down and recovers important......

Words: 1060 - Pages: 5

Premium Essay

Lab 9

...IS4560 Lab 9 1. When you are notified that a user’s workstation or system is acting strangely and log files indicate system compromise, what is the first thing you should do to the workstation or system and why? Inform the IT help desk to have the user cease all activity on the workstation and to wait for you to arrive at the physical desktop location. The workstation must first be physically disconnected from the network leaving it physically isolated but now powered off. It should be left in its steady-state. This isolates the contaminated workstation from the organization’s network and Internet, as well as preventing the contamination from spreading. Logs, memory forensics, footprints, and other malicious activity must be kept in its steady-state untouched. Forensic images of the logs should be performed along with a memory forensics scan. Anti-virus and anti-malicious software removal tools can be enabled from a CD-drive 2. When an anti-virus application identifies a virus and quarantines this file, does this mean the computer is eradicated of the virus and any malicious software? No, many times virus and trojans can leave residuals or wreak havoc on other processes. It is important to note that the quarantined file is never off the computer until cleaned out or deleted – it’s like putting the unknown file in a holding tank until you can assess what it is and how to eradicate. 3. Where would you check for processes and services enabled in the background of your......

Words: 712 - Pages: 3

Premium Essay

Unit 1 Labs

...ITT TECHNICAL INSTITUTE NT1210 Introduction to Networking Onsite Course GRADED ASSIGNMENTS Graded Assignment Requirements Retain all handouts issued in every unit, as well as any assignment, research, or lab documents you prepare as part of assignments and labs. Some may be used more than once in different units. NOTE: Always check with your instructor for specific due dates of assignments. Graded Assignments Unit 1 Assignment 1: Computer Basics Review Course Objectives and Learning Outcomes Identify the major needs and major stakeholders for computer networks and network applications. Describe how digital devices store data. Describe the differences between input and output devices. Assignment Requirements In the Chapter Review Activities at the end of Chapter 1 in the Odom textbook (answers can be found in the textbook): Respond to the multiple-choice questions. Complete the List the Words inside Acronyms table. Required Resources Odom textbook Computer with word processing software Internet access Printer Submission Requirements: Submit your responses as a typed document using Arial or Times New Roman 12-point font, double-spaced. Label your assignment Unit 1 Assignment 1. Unit 2 Assignment 1: Identifying Network Topologies Course Objectives and Learning Outcomes * Identify the major needs and major stakeholders for computer networks and network applications. * Identify the classifications of networks and how they......

Words: 16182 - Pages: 65

Jikulumessu saison 1 épisode 61 | Jason Statham | 80W Slim LED Light Bar w/ Hood Scoop Mount Bracket, Wiring For 16+ Toyota Tacoma