It 220 Finals Reviewer

In: Computers and Technology

Submitted By MarkMetal
Words 823
Pages 4
Networking Final Study Guide

1. What is a up-link port? Allows the connection of hub to hub or switch without having to use a special cable

2. What is the max cable length for Cat 5E/6? 100 meters

3. Link lights on hub or switch represent. Indicates that the transmit and receive pairs are properly aligned

4. Link lights on NIC. Same as above

5. Echo request. Part of the ICMP protocol that request a reply from a computer

6. How do you display MAC address/find out MAC address? Ip/config/all

7. Max length of horizontal cable that you can use? 90 meters

8. How does Network Admin check for connectivity? Ping

9. What is campus area network? A collection of two or more interconnected LAN's in a limited geographic area

10. Difference between fast Ethernet and gigabit Ethernet? 100Mbps and 1000Mbps

11. What is bottlenecking? Another term for network congestion

12. CIDR notation. IP address is represented as A.B.C.D /n, where "/n" is called the IP prefix or network prefix. The IP prefix identifies the number of significant bits used to identify a network

13. 3 packet handshake deal for TCP? SYN, SYN ACK, ACK

14. Who assigns IP address? Network Admin

15. What is the connection called from router to pc?

16. What is help command for Cisco IOS? ?

17. What does AUI stand for? Attachment unit interface, the port is a routers 10 Mbps Ethernet port

18. What is interface called to connect a router to a LAN? Network Interface Card

19. How do you connect router to a WAN? Serial Interface

20. Which needs clocking, DTE or DCE? DCE

21. Purpose of gateway? Describes the networking device that enables hosts in a LAN to connect to networks (and hosts) outside the LAN.

22. What is command to copy the running configs into spot up config? copy run start

23. Admin…...

Similar Documents

Bis/220 Final

...BIS/220 Intro to Computer Application and Systems Progress: (0/30) 1) Two information systems that support the entire organization are A. enterprise resource planning systems and dashboards B. transaction processing systems and office automation systems C. enterprise resource planning systems and transaction processing systems D. expert systems and office automation systems 2) _______ is the direct use of information systems by employees in their work. A. Transaction processing systems B. End-user computing C. Decision support systems D. Management information systems 3) ______ attempt to duplicate the work of human experts by applying reasoning capabilities. A. Expert systems B. Dashboards C. Business intelligence systems D. Decision support systems 4) ______ issues involve who may obtain information and how much they should pay for this information. A. Privacy B. Accessibility C. Property D. Transferability 5) _____ issues involve collecting, storing, and disseminating information about individuals. A. Privacy B. Accuracy C. Property D. Accessibility 6) Your company’s computers have been taken over by an attacker and used to attack another organization’s information systems. Your problem is which of the following? A. Poor security policies and procedures B. Lack of due diligence C. Downstream liability D. ...

Words: 371 - Pages: 2

Bis 220 Final Exam

...BIS/220 Final Exam 1) Two information systems that support the entire organization are A. enterprise resource planning systems and dashboards B. transaction processing systems and office automation systems C. enterprise resource planning systems and transaction processing systems D. expert systems and office automation systems 2) _______ is the direct use of information systems by employees in their work A. Transaction processing systems B. End-user computing C. Decision support systems D. Management information systems 3) ______ attempt to duplicate the work of human experts by applying reasoning capabilities A. Expert systems B. Dashboards C. Business intelligence systems D. Decision support systems 4) ______ issues involve who may obtain information and how much they should pay for this information A. Privacy B. Accessibility C. Property D. Transferability 5) _____ issues involve collecting, storing, and disseminating information about individuals. A. Privacy B. Accuracy C. Property D. Accessibility 6) Your company’s computers have been taken over by an attacker and used to attack another organization’s information systems. Your problem is which of the following? A. Poor security policies and procedures B. Lack of due diligence C. Downstream liability D. Poor service-level agreements 7) You are the only person in your office to upgrade to Microsoft® Word 2010. Before you share documents with coworkers, you should do which of the following? A. Print......

Words: 945 - Pages: 4

Bis 220 Final Exam Guide

...BIS 220 Final Exam Guide http://homeworklance.com/downloads/bis-220-final-exam-guide/ For More Tutorials Visit Our Website: Homeworklance.com For Any Other Inquiry Email US: Lancehomework@gmail.com BIS 220 Final Exam Guide 1) Two information systems that support the entire organization are 2) _______ is the direct use of information systems by employees in their work. 3) ______ attempt to duplicate the work of human experts by applying reasoning capabilities. 4) ______ issues involve who may obtain information and how much they should pay for this information. 5) _____ issues involve collecting, storing, and disseminating information about individuals. 6) Your company’s computers have been taken over by an attacker and used to attack another organization’s information systems. Your problem is which of the following? 7) You are the only person in your office to upgrade to Microsoft® Word 2010. Before you share documents with coworkers, you should do which of the following? 8) Which of the following is detected by the contextual spelling checker? 9) If your cursor is near the bottom of a page and you want to display the next paragraph you type at the top of a new page, you should use which of the following? 10) Your ______ is the collection of traceable data that is captured when you use various information technologies such as credit cards or the Internet. 11) No alphabetic characters in a social security number field is an......

Words: 536 - Pages: 3

Bis 220 Final Exam Guide

...BIS 220 Final Exam Guide http://homeworklance.com/downloads/bis-220-final-exam-guide/ For More Tutorials Visit Our Website: Homeworklance.com For Any Other Inquiry Email US: Lancehomework@gmail.com BIS 220 Final Exam Guide 1) Two information systems that support the entire organization are 2) _______ is the direct use of information systems by employees in their work. 3) ______ attempt to duplicate the work of human experts by applying reasoning capabilities. 4) ______ issues involve who may obtain information and how much they should pay for this information. 5) _____ issues involve collecting, storing, and disseminating information about individuals. 6) Your company’s computers have been taken over by an attacker and used to attack another organization’s information systems. Your problem is which of the following? 7) You are the only person in your office to upgrade to Microsoft® Word 2010. Before you share documents with coworkers, you should do which of the following? 8) Which of the following is detected by the contextual spelling checker? 9) If your cursor is near the bottom of a page and you want to display the next paragraph you type at the top of a new page, you should use which of the following? 10) Your ______ is the collection of traceable data that is captured when you use various information technologies such as credit cards or the Internet. 11) No alphabetic characters in a social security number field is an......

Words: 536 - Pages: 3

Bis 220 Final Exam Guide

...BIS 220 Final Exam Guide To Buy this Class Copy & paste below link in your Brower http://sourceofhomework.com/downloads/bis-220-final-exam-guide/ Or Visit Our Website Visit : http://sourceofhomework.com Email Us : sourceofhomework@gmail.com Type: BIS 220 Final Exam BIS 220 Final Exam Guide 1) Two information systems that support the entire organization are 2) _______ is the direct use of information systems by employees in their work. 3) ______ attempt to duplicate the work of human experts by applying reasoning capabilities. 4) ______ issues involve who may obtain information and how much they should pay for this information. 5) _____ issues involve collecting, storing, and disseminating information about individuals. 6) Your company’s computers have been taken over by an attacker and used to attack another organization’s information systems. Your problem is which of the following? 7) You are the only person in your office to upgrade to Microsoft® Word 2010. Before you share documents with coworkers, you should do which of the following? 8) Which of the following is detected by the contextual spelling checker? 9) If your cursor is near the bottom of a page and you want to display the next paragraph you type at the top of a new page, you should use which of the following? 10) Your ______ is the collection of traceable data that is captured when you use various information technologies such as credit cards or the......

Words: 13129 - Pages: 53

Com 220 Final Paper

...xxxxxx 05/20/2010 COM/220 Karen Moninger The life of a seven-year old girl tragically ends at the hands of a young boy. The court convicted Lionel Tate of first degree murder for beating the 48-pound girl, and sentenced him to life in prison. This punishment was a rather harsh judgment many in the community argue against today. Instead of incarcerating him for life, what other options are available? As teen violence continues to plague the nation, many people wonder if rehabilitation is an effective method for deterring future occurrences. Twelve-year old Lionel Tate took the life of a young girl named Tiffany Eunick. Lionel’s mother, a Florida Highway Patrol officer, was sleeping upstairs though she was responsible for babysitting Tiffany. The mother left the children watching television and playing together downstairs unattended. During horse play, Lionel begins to re-enact moves he saw watching wrestling. The 160-pound boy was responsible for cuts, bruises, fractured skull, lacerated liver, broken ribs and internal hemorrhaging on young Tiffany Eunick. Certainly the parents of the deceased child will want to see justice served for the loss of their loved one. Stories surface daily about a teen committing some sort of crime. A heart wrenching reality that many people will either themselves face, or know someone who has or will experience. The epidemic of teen violence is rapidly increasing; Statistics say youth under the age of 18 were arrested for......

Words: 2130 - Pages: 9

Bis 220 Final Exam Guide

...BIS 220 Final Exam Guide http://hwguiders.com/downloads/bis-220-final-exam-guide/ 1) Two information systems that support the entire organization are 2) _______ is the direct use of information systems by employees in their work. 3) ______ attempt to duplicate the work of human experts by applying reasoning capabilities. 4) ______ issues involve who may obtain information and how much they should pay for this information. 5) _____ issues involve collecting, storing, and disseminating information about individuals. 6) Your company’s computers have been taken over by an attacker and used to attack another organization’s information systems. Your problem is which of the following? 7) You are the only person in your office to upgrade to Microsoft® Word 2010. Before you share documents with coworkers, you should do which of the following? 8) Which of the following is detected by the contextual spelling checker? 9) If your cursor is near the bottom of a page and you want to display the next paragraph you type at the top of a new page, you should use which of the following? 10) Your ______ is the collection of traceable data that is captured when you use various information technologies such as credit cards or the Internet. 11) No alphabetic characters in a social security number field is an example of 12) In a database, the primary key field is used to 13) Search engines and metasearch engines are examples of which network......

Words: 8209 - Pages: 33

Bis 220 Final Exam

...BIS 220 Final Exam To Purchase this Tutorial Copy And Paste Below Link In Your Browser http://www.homework-bank.com/downloads/bis-220-final-exam/ For Any Information or Any Class Which you Did not find on Our Website , Just Hit US Email On below address Email Address: hworkbank@gmail.com Visit Our Website : http://www.homework-bank.com/ BIS 220 Final Exam 1) Two information systems that support the entire organization are 2) _______ is the direct use of information systems by employees in their work. 3) ______ attempt to duplicate the work of human experts by applying reasoning capabilities. 4) ______ issues involve who may obtain information and how much they should pay for this information. 5) _____ issues involve collecting, storing, and disseminating information about individuals. 6) Your company’s computers have been taken over by an attacker and used to attack another organization’s information systems. Your problem is which of the following? 7) You are the only person in your office to upgrade to Microsoft® Word 2010. Before you share documents with coworkers, you should do which of the following? 8) Which of the following is detected by the contextual spelling checker? 9) If your cursor is near the bottom of a page and you want to display the next paragraph you type at the top of a new page, you should use which of the following? 10) Your ______ is the collection of traceable data that is captured when you use various information technologies such as...

Words: 564 - Pages: 3

Bis 220 Final Exam

...A++PAPER;http://www.homeworkproviders.com/shop/bis-220-final-exam/ BIS 220 FINAL EXAM BIS 220 FINAL EXAM, 1) Two information systems that support the entire organization are BIS 220 final exam question 2) _______ is the direct use of information systems by employees in their work 3) ______ attempt to duplicate the work of human experts by applying reasoning capabilities 4) ______ issues involve who may obtain information and how much they should pay for this information Bis 220 final exam 5) _____ issues involve collecting, storing, and disseminating information about individuals. 6) Your company’s computers have been taken over by an attacker and used to attack another organization’s information systems. Your problem is which of the following? 7) You are the only person in your office to upgrade to Microsoft® Word 2010. Before you share documents with coworkers, you should do which of the following? BIS 220 Final Exam 8) Which of the following is detected by the contextual spelling checker? bis 220 final exam 9) If your cursor is near the bottom of a page and you want to display the next paragraph you type at the top of a new page, you should use which of the following? 10) Your ______ is the collection of traceable data that is captured when you use various information technologies such as credit cards or the Internet 11) No alphabetic characters in a social security number field is an example of 12) In a database, the primary key...

Words: 537 - Pages: 3

Ph 220 Final Exam Solution

...PH 220 Final Exam Solution http://hwguiders.com/downloads/ph-220-final-exam-solution/ PH 220 Final Exam Solution Figure 1 is a “snapshot” of a wave at a given time. The frequency of the wave is 120 Hz. What is (a) the amplitude, (b) the wavelength, and (c) wave speed? A monatomic gas is cooled by 50 K at constant volume when 831 J of energy is removed from it. How many moles of gas are in the sample? A wheel of diameter of 68.0 cm slows down uniformly from 8.40 m/s to rest over a distance of 115 m. What is the angular acceleration? A 1.0- object floats in water with 20% of it above the waterline. What does the object weigh out of the water? On a 30°C day, there is an explosion. The sound is heard 3.4 s after seeing the flash. How far away was the explosion? A piece of aluminum with a mass of 1.0 kg and density of 2700 kg/m3 is suspended from a string and then completely immersed in a container of water. The density of water is 1000 kg/m3. (a) Determine the volume of the piece of aluminum.(b) Determine the tension in the string after the metal is immersed in the container of water. A gas is taken through the cycle illustrated here. During one cycle, how much work is done by an engine operating on this cycle? A 0.600-kg piece of metal is heated to 100°C and placed in an aluminum can of mass 0.200-kg which contains 0.500 kg of water initially at 17.3°C. The final equilibrium temperature of the mixture is 20.2°C, what is the specific heat of the......

Words: 302 - Pages: 2

Ph 220 Final Exam Solution

...PH 220 Final Exam Solution http://hwguiders.com/downloads/ph-220-final-exam-solution/ PH 220 Final Exam Solution Figure 1 is a “snapshot” of a wave at a given time. The frequency of the wave is 120 Hz. What is (a) the amplitude, (b) the wavelength, and (c) wave speed? A monatomic gas is cooled by 50 K at constant volume when 831 J of energy is removed from it. How many moles of gas are in the sample? A wheel of diameter of 68.0 cm slows down uniformly from 8.40 m/s to rest over a distance of 115 m. What is the angular acceleration? A 1.0- object floats in water with 20% of it above the waterline. What does the object weigh out of the water? On a 30°C day, there is an explosion. The sound is heard 3.4 s after seeing the flash. How far away was the explosion? A piece of aluminum with a mass of 1.0 kg and density of 2700 kg/m3 is suspended from a string and then completely immersed in a container of water. The density of water is 1000 kg/m3. (a) Determine the volume of the piece of aluminum.(b) Determine the tension in the string after the metal is immersed in the container of water. A gas is taken through the cycle illustrated here. During one cycle, how much work is done by an engine operating on this cycle? A 0.600-kg piece of metal is heated to 100°C and placed in an aluminum can of mass 0.200-kg which contains 0.500 kg of water initially at 17.3°C. The final equilibrium temperature of the mixture is 20.2°C, what is the specific heat of the......

Words: 302 - Pages: 2

Bis 220 Final Exam

...BIS 220 FINAL EXAM A+ Graded Tutorial Available At: http://hwsoloutions.com/?product=final-exam-7 Visit Our website: http://hwsoloutions.com/ Product Description BIS 220 FINAL EXAM, 1) Two information systems that support the entire organization are BIS 220 final exam question 2) _______ is the direct use of information systems by employees in their work 3) ______ attempt to duplicate the work of human experts by applying reasoning capabilities 4) ______ issues involve who may obtain information and how much they should pay for this information Bis 220 final exam 5) _____ issues involve collecting, storing, and disseminating information about individuals. 6) Your company’s computers have been taken over by an attacker and used to attack another organization’s information systems. Your problem is which of the following? 7) You are the only person in your office to upgrade to Microsoft® Word 2010. Before you share documents with coworkers, you should do which of the following? BIS 220 Final Exam 8) Which of the following is detected by the contextual spelling checker? bis 220 final exam 9) If your cursor is near the bottom of a page and you want to display the next paragraph you type at the top of a new page, you should use which of the following? 10) Your ______ is the collection of traceable data that is captured when you use various information technologies such as credit cards or the Internet 11) No alphabetic characters in a social security number......

Words: 547 - Pages: 3

Cjs/220 Final

...Assignment: Final Project: Appeals Process Paper Tony Thomas CJS/220 Jerri Mauldin August 21, 2011 An appeal is when a person who is convicted of a crime or is told they can’t do a certain thing and the person submits questions in writing why this decision was made and wants the verdict and the case to be looked at another time. Most causes for an appeal is from people thinking they are innocent or have the right to do what they want where they want to do it. The way an appeals process can affect the overall criminal procedures or process is if the appeal gets looked at and the ruling from the previous judgment gets overturned. The reason the system is affected is it can set an innocent man free or let whoever continue on doing what they want to do. If someone is put in jail or prison for a crime they didn’t commit and they send up an appeal and it gets the ruling reversed it can mean that the case would be reopened because the person who actually committed the crime is still on the loose. It also interrupts the process of the system because everything that has been put in writing saying that this person was guilty has now got to be withdrawn from record. It also means that the person who is behind bars goes free. A good way to improve the appeals process is not letting them sit so long before being looked at. This is a big problem in some states and needs to be corrected. Even though forensic science has brought a lot of people to the surface that we......

Words: 758 - Pages: 4

Bis 220 Final Paper

...Wireless Technologies Proposal Keshia Smith, Joshua Crouch, Amber Kelly, JaLynn Coombs BIS 220 January 16, 2012 Michael Chu Wireless Technologies Proposal Mobile computing and mobile commerce in addition to a traditional computer system is what Party Plates will use to house information for the company at one location that could be accessible by a wireless device as well. If Party Plates want their services readily available, convenient to their customers, and to remain productive; then they may consider the use of wireless devices to compete with other businesses that supply the same services. Mobile services allow Party Plates as well as their customers to access information real-time while connecting from mobile devices and other computing environments. Whether Party Plates use mobile devices or remain in its current position, we are recommending mobile computing and mobile commerce as wireless services to move Party Plates into the future. The pros and cons of each service are listed within this proposal. Mobile computing refers to real-time wireless connection between a mobile device and other computing environments, such as the Internet. These days it is spreading everywhere, at work, at home, in education, health care, entertainment, and in so many other areas. The pros of mobile computing is its mobility to take a small hand held device and go anywhere and its broad reach to just about anywhere instantly [ (Rainer & Cegielski, 2011) ]. Mobile......

Words: 619 - Pages: 3

Com 220 Final

...Facebook, Friend or Foe What impact does Facebook have on our relationships? Patricia Fleming Com /220 March 28, 2012 Matt Turner “It has become appallingly obvious that our technology has exceeded our humanity.” – Albert Einstein Because of their growth and popularity social networking sites have in many ways, become a cultural phenomenal that has inched their ways into every facet of our lives, threatening to change the way in which we communicate both on and off line. If you are not convinced, take a look at what is going on the next time you visit your favorite restaurant. Look around at the other patrons; chances are the majority of them have a cell phone or some sort of mobile device lying next to their dinner plates. Instead of engaging in meaningful dialogue, they are sitting in a trance awaiting some sort of notification, tagging themselves in photographs, or “checking in” at the very restaurant you are sitting in; all the while socially “checking out”. Gone are conversations that used to contain the familiar catch phrase “how was your day?”, now if someone wants to know how a person’s day has gone, all they have to do is log onto Facebook and read about it. If that is not enough, consider some of the new words being added to our dictionaries. According to The Huffington Post (2011), words like “sexting”, “retweet”, and “cyberbully” have been added to the Concise Oxford English Dictionary, these words; which......

Words: 1770 - Pages: 8

Melissa Villaseñor | All the King’s Men essay | Bible Town