Unit 4 Labs

In: Computers and Technology

Submitted By flj9392
Words 491
Pages 2
Unit 4 Labs
Introduction to Programming
Mr. Nguyen

Lab 4.1 – Pseudocode and Modules
Module main ( ) //Declare local variables 1. Declare String clientName 2. Declare Real feetUTP 3. Declare Real subtotal 4. Declare Real taxCost 5. Declare Real totalCost

//Module calls 6. Module inputData ( ) 7. Module calcCosts ( ) 8. Module displayBill ( )

End Module

//this module takes in the required user input There will
//be a display and input for each variable
Module inputData (Real Ref feetUTP, String Ref clientName)

9. Display “What is your name? “ 10. Input clientName 11. Display “How many feet of UTP do you need? “ 12. Input feetUTP

End Module

//this module calculates subTotal, taxCost, and totalCost
//you also need feetUTP passed in to calculate subTotal
Module calcCosts (13. subTotal, taxCost, and totalCost)

14. subTotal = feetUTP * 0.21 15. taxCost = 0.06 * subTotal 16. totalCost = taxCost + subTotal

End Module

//this module displays clientName and totalCost
Module displayBill (17. clientName, and totalCost) ` 18. Display “clientName” 19. Display “totalCost”

Lab 4.2 - Flowcharts and Modules

Lab 4.3 – Visual Basic and Modules
Module Module1

Sub Main() Dim clientName As String = "NO VALUE" Dim feetUTP As Double = 0 Dim subTotal As Double = 0 Dim taxCost As Double = 0 Dim totalCost As Double = 0

inputData(clientName, feetUTP) calcCosts(feetUTP, subTotal, taxCost, totalCost) finalBill(clientName, totalCost)

Console.Write("Press enter to continue...") Console.ReadLine() Console.Write("The client is: " & clientName) Console.WriteLine(" Total: $" & totalCost) Console.ReadLine()

End Sub Sub inputData(ByRef clientName As…...

Similar Documents

Biology Lab Unit 4 Ip

...Name: Date: November 10, 2013 Instructor’s Name: Assignment: SCIE207 Phase 4 Lab Report Title: Exploring Endocrine, Circulatory, and Respiratory Systems Instructions: Your lab report will consist of the completed tables. Label each component of the endocrine, cardiovascular (circulatory), and respiratory systems and their functions in the following tables. When your lab report is complete, post it in Submitted Assignment files. 1. Endocrine System: Observe the diagram showing the major organs of the endocrine system. Using the textbook and Virtual Library resources, fill in the following table: Endocrine System Note: Some organs support the system, but may not produce or secrete hormones. |Number |Name of the Organ or Part |Hormone(s) Produced or Secreted | |1 |Parathyroid glands  |Parathyroid hormone  | |2 |Thyroid gland  |Thyroxine, calcitonin  | |3 |Trachea  |No hormone secreted  | |4 |Pineal gland  |Melatonin  | |5 |Hypothalamus  |Produces ADH and oxytocin, regulatory hormones......

Words: 676 - Pages: 3

Lab 4

...In this lab, you explored all five phases of hacking using Zenmap GUI for Nmap, Nessus®, BackTrack4, and the Metasploit Framework application. Lab Assessment Questions & Answers 1. What are the five steps of a hacking attack? Footprinting- acquiring information about target Scanning - use acquired information from footprinting to gain more detailed information Enumeration- Extracting more-detailed and useful information System hacking- attack a system using a method that deems useful Covering Tracks – Covering tracks to avoid detection 2. During the reconnaissance step of the attack, describe what task Zenmap GUI performs to do passive OS fingerprinting. sends commands to the platform-specific nmap executable and pipes the output back 3. What step in the hacking attack process uses Zenmap GUI? System Hacking 4. What step in the hacking attack process identifies known vulnerabilities and exploits? enumeration 5. During the scanning step of the hacking attack process, you identified known software vulnerabilities in a Windows XP Professional Workstation. List the name and number of the critical Microsoft® vulnerabilities identified. What is vulnerability “MS08-067”? MS08-067: Vulnerability in Server service could allow remote code execution. 6. Which tool and application were used to exploit the identified vulnerability on the targeted Microsoft® Windows 2003 XP server? Microsoft Server Service Relative Path Stack Corruption and Metasploit 7. If......

Words: 357 - Pages: 2

Unit 4 Lab

...web server will need to access PDF documents are for customers to view their personal account information only. What mounting option would be: temp/ - Temporary storage directories to provide storage space for malicious executables. ext4 - An advanced level of the ext3 filesystem incorporating scalability and reliability enhancements for supporting large filesystems in keeping with increasing disk capacities and state-of-the-art feature requirements. ro - Mounts the file system for reading only. 0 0? - 3. Describe the process to create a quota hard limit of 2Gigs for a user To configure the quota for a user, execute the command: edquota username. Using the vi editor to change the hard column from 0 200000. Save and quit vi. 4. How do you install quota in Fedora 14? yum install quota 5. Why do you get error about 'cannot remount filesystem mounted'? Because you are already mounted on that file system and need to mount another filesystem. 6. What is the /etc/fstab file for? Editing disk quota 7. What is the mount command? Explain. Fedora 14 mount command is (mount -o remount <DIR>) 8. What is the name of the SW package management utility? Package management system, also called package manager 9. What is the code name for Fedora 14, and when was it released? Fedora 14, codename Laughlin Nov 2 2010 10. What is the repquota command in Linux used for? Explain. The repquota command prints a summary of quotas and disk usage for a file......

Words: 347 - Pages: 2

Lab 4

...Willie Harris ------------------------------------------------- is3230 lab 4.2 Implement Organizational-Wide Network and WLAN Access Controls 1. Each time you open a port or allow a program to communicate through a firewall, your computer becomes a bit less secure. The more allowed programs or open ports your firewall has, the more opportunities there are for hackers or malicious software to use one of those openings to spread a worm, access your files, or use your computer to spread malicious software to othersEach time you open a port or allow a program to communicate through a firewall, your computer becomes a bit less secure. The more allowed programs or open ports your firewall has, the more opportunities there are for hackers or malicious software to use one of those openings to spread a worm, access your files, or use your computer to spread malicious software to others. 2. 2. By going to start -> control Panel -> Select firewall there it gives you the options that are on Windows Firewall. 3. First if you’re sitting in a coffee shop and decide you want to check your Facebook page and your email to kill some time. You scan the available networks and see one that’s open and unsecured. You connect and start surfing. Coffee and free WiFi, what could be better, right? Wrong! A hacker is also fond of coffee shops and he is located within range of the router you connected to. He’s waiting for one or more people to connect to the network so he can start......

Words: 628 - Pages: 3

Unit 4 Lab Nt1110

...Bridge | i5 Mobile | 2.4 GHz | 3Mb Cache | 5 GT/s DMI | Nehalem | i3 | 2.13 GHz | 3Mb Cache | 5 GT/s DMI | Sandy Bridge | i3 Mobile | 2.27 GHz | 3Mb Cache | 5 GT/s DMI | Nehalem | vPro | 2.53 GHz | 6 Mb Cache | 1066 MHz | Sandy Bridge | vPro Mobile | 2.83 GHz | 6Mb Cache | 1333 MHz | Sandy Bridge | Xeon 7000 | 2.26 GHz | 2 Mb Cache | 800 MHz | NetBurst | Xeon 5000 | 2.2 GHz | 2Mb Cache | 667 MHz | Net Burst | Xeon 3000 | 2.13 GHz | 2Mb Cache | 1066 MHz | Core | Itanium 9000 | 1.6 GHz | 18 Mb Cache | 533 MHz | Core | Pentium | 1.53 GHz | 2Mb Cache | 66 MHz | Core | Celeron | 1.45 GHz | 2Mb Cache | 432 MHz | Core | 3b) Intel E5300 is the CPU’s name. Pentium Dual Core is a representation of the type of processor unit. The three units separated by forward slashes are the clock speed, internal cache, and bus speed in that order. 3c) The pins are located on the right side of the clear space in the middle of the CPU. This is a core package style....

Words: 639 - Pages: 3

Lab 4

...Sandra Guzman 01/22/2015 Lab 4 Deliverables Note: Screenshots will be provided at the end. Q: From your local computer, use your favorite Internet browser to research the threat identified on this screen and the possible remediation steps and document your findings in your Lab Report file. Viruses found: 1. Win32/DH{eR4UTxVzG3U} 2. Win32/DH{eR4UTxVzG3U} 3. Win32/DH{HhMXFE8Vcxt1} 4. Trojan horse Dropper.Generic4.BVMA 5. Trojan horse Hider.BNG 6. Trojan horse PSW.Generic11.NYJ 7. Potentially harmful program Logger.IAC 8. Potentially harmful program RemoteAdmin.IH 9. Potentially harmful program Tool.IT Assessment: 1. It seems that the first three are all the same type of virus. A “Win/DH is a malicious software that once it is executed has the capability of replicating itself and infect other files and programs”( Win/DH). They “can steal hard disk space and memory that slows down or completely halts your PC, corrupt or delete data, erase your hard drive, steal personal information, hijack your screen and spam your contacts to spread itself to other users” (Win/DH). To avoid the possibility of one, you should be careful of e-mail attachments especially if they are from an outside source, as well as download links on websites. Having a virus removing application such as AVG is essential to being able to remove these viruses before they spread. AVG is capable of detecting this virus while surfing the web and...

Words: 1494 - Pages: 6

Nt1210 Unit 5 Lab 5.1-2-3-4

...Networking Lab Manual Page: 96. No part of any book may be reproduced or transmitted by any means without the publisher's prior permission. Use (other than qualified fair use) in violation of the law or Terms of Service is prohibited. Violators will be prosecuted to the full extent of the law. http://itt.coursesmart.com/print?__displaygrbooks=1&xmlid=9781269219389%2F96&__pagestoprint=17 1/17 2/24/2015 ITT Technical Institute ­ Print User name: Cordoba, Fabian Cordoba, Fabian Book: Introduction to Networking Lab Manual Page: 97. No part of any book may be reproduced or transmitted by any means without the publisher's prior permission. Use (other than qualified fair use) in violation of the law or Terms of Service is prohibited. Violators will be prosecuted to the full extent of the law. The 802.1 standards provide LAN/MAN management. The 802.1 standards where created by the close of the 1970’s. IEEE 802.1 handles the architecture, security, management and internetworking of local area networks (LAN), metropolitan area networks (MAN) and wide area area networks (WAN) standardized by IEEE 802. 802.3af is the standard that originally defined PoE functionality. The standard was enhanced in 2009 and was called 802.3at. http://itt.coursesmart.com/print?__displaygrbooks=1&xmlid=9781269219389%2F96&__pagestoprint=17 2/17 2/24/2015 ITT Technical Institute ­ Print User name: Cordoba, Fabian Cordoba, Fabian Book: Introduction to Networking Lab Manual......

Words: 2482 - Pages: 10

Unit 4 Lab 2

...Security and Web Applications Unit 4 Vlab 2 Assessment 1. Injection, Broken Authentication and Session Management, XSS, Insecure Direct Object References, Security Misconfiguration, Sensitive Data Exposure, Missing Function Level Access Control, Cross-Site Request Forgery, Using Components with Known Vulnerabilities, Unvalidated Redirects and Forwards. 2. A Brute force attack in an attack that uses force instead of vulnerabilities to make its way into a site. Usually trying to crack username and password combinations. The risks of these attacks can be mitigated by strengthening password requirements, introducing lockouts when let’s say 3 attempts are made. That would unmotivated and attacker. 3. A user has established a level of privilege with Amazon. AN attacker uses CSRF to exploit the trust of that user. The attacker is posing as the user and is performing actions to get the latest porn film sent to his house. Boom, free porn. 4. SQL Injection, Brute Force, CSRF. 5. Hackers will use web applications with uploading options to upload files that are malicious. 6. A successful SQL injection exploit can read sensitive data from the database, modify database data execute administration operations on the database (such as shutdown the DBMS), recover the content of a given file present on the DBMS file system and in some cases issue commands to the operating system. (http://www.owasp.org/index.php/SQL_Injection) 7. That user information pertaining to...

Words: 285 - Pages: 2

Unit 4 Lab 4 Analysis and Comparison of Glba and Hipaa

...Unit 4 Lab 4 Analysis and Comparison of GLBA and HIPAA 1. Which US government agency acts as the legal enforcement entity for businesses and organizations involved in commerce? a. The FTC Its principal mission is the promotion of consumer protection and the elimination and prevention of anticompetitive business practices, such as coercive monopoly 2. Which US government agency acts as the legal enforcement entity regarding HIPAA compliance and HIPAA violations? b. The “American Recovery and Reinvestment Act of 2009”(ARRA), established a tiered civil penalty structure for HIPAA violations 3. List three (3) similarities between GLBA and HIPAA. c. Both require technical safeguards to protect or guarantee the veracity of critical information. d. GLBA protects personal financial information of an organization's customers. And HIPAA protects and guarantees the privacy of an individual's Personal Health Information (PHI). e. Both have a requirement for specific IT controls. 4. List five (5) examples of privacy data elements for GLBA as defined in the privacy rule. f. Name, Address, City State Zip, Account Number, and Social Security Number are five examples of privacy data elements for GLBA as defined in the privacy rule. 5. List five (5) examples of privacy data elements for HIPAA as defined in the privacy rule. g. Name, Address, City State Zip, Ailments/Conditions, and Social Security Number are five examples......

Words: 879 - Pages: 4

Lab 4

...Leando Henderson Jr NT1210 Lab Exercise 4.1.1 On page 107 the book explains that standards exist for the NIC and the cabling so that all networks and equipment would match up if not then you might buy a computer and it not fit your cabling on your network or vice versa. These standards exist so that all equipment would match up and networks could be simplified. Exercise 4.1.3 Shielded copper cable is currently best known for POE equipment. Security systems, Microphones, and other high end audio cables would be my best examples for a clear visual. This super expensive cabling is used for these types of applications because the shielding help to prevent the Electro Magnetic Interference to be more specific on a security system this shielding and braiding eliminates the false alarms that would occur if not for the shielding. Exercise 4.1.10 Multimeter : The purpose of a multimeter is to measure how much voltage or electrical signal that is currently being transmitted thru a cable or medium. A basic tool for any electrician or IT personnel Tone Generator: This equipment generates audio pulses to components. In the case of audio equipment testing, frequency response and sound evaluation are recorded. Pair Scanner: A Pair Scanner is used to find faults on cabling in a network. Time domain reflector (TDR): Used to locate faults in metallic cables (for example, twisted pair wire or coaxial cable). It can also be used to locate discontinuities in a connector,......

Words: 320 - Pages: 2

Nt1210 Unit 4 Labs

...Unit 4 Labs SJR Exercise 4.1.1 So that each piece of equipment work together on a network work to together properly. Exercise 4.1.2 Because the voltage uses to transmit data only needs to be high enough for the receiver to detect it. Exercise 4.1.3 Shielded copper cables would be used where there is a possibility of more electric interference. To help prevent this interference with the cables. Exercise 4.1.4 Category | Maximum Speed | Application | 1 | - | Telephone cabling (POTS) | 2 | 4Mbps | Token Ring | 3 | 4Mbps | Can be used for telephones | 4 | 16Mbps | Fast Token Ring | 5 | 1Gbps | Desktop cabling | 5e | 1Gbps | Gigabit Ethernet | 6 | 10Gbps | Multi gigabit Ethernet | 6a | 10Gbps | Multi gigabit Ethernet | Exercise 4.1.5 Exercise 4.1.6 Coaxial cable has a copper core with an inner dielectric insulator, a woven copper shield, and an outer plastic sheath for protection. Exercise 4.1.7 Not to go over the length of 85-90 meters between any given connection. Exercise 4.1.8 Straight through cabling. Exercise 4.1.9 No, S1-S2 and S2-G. Fiber Optics should be used in these cases. Exercise 4.1.10 Multimeter – Measures voltage, current, and resistance. Tone Generator - A signal generator used to generate an audio-frequency signal suitable for signaling purposes or for testing audio-frequency equipment. Pair Scanner – An Ethernet cable tester Time Domain Reflectometer - An electronic instrument that uses time-domain......

Words: 636 - Pages: 3

Nt1210 Unit 4 Labs

...Unit 4 Labs SJR Exercise 4.1.1 So that each piece of equipment work together on a network work to together properly. Exercise 4.1.2 Because the voltage uses to transmit data only needs to be high enough for the receiver to detect it. Exercise 4.1.3 Shielded copper cables would be used where there is a possibility of more electric interference. To help prevent this interference with the cables. Exercise 4.1.4 Category | Maximum Speed | Application | 1 | - | Telephone cabling (POTS) | 2 | 4Mbps | Token Ring | 3 | 4Mbps | Can be used for telephones | 4 | 16Mbps | Fast Token Ring | 5 | 1Gbps | Desktop cabling | 5e | 1Gbps | Gigabit Ethernet | 6 | 10Gbps | Multi gigabit Ethernet | 6a | 10Gbps | Multi gigabit Ethernet | Exercise 4.1.5 Exercise 4.1.6 Coaxial cable has a copper core with an inner dielectric insulator, a woven copper shield, and an outer plastic sheath for protection. Exercise 4.1.7 Not to go over the length of 85-90 meters between any given connection. Exercise 4.1.8 Straight through cabling. Exercise 4.1.9 No, S1-S2 and S2-G. Fiber Optics should be used in these cases. Exercise 4.1.10 Multimeter – Measures voltage, current, and resistance. Tone Generator - A signal generator used to generate an audio-frequency signal suitable for signaling purposes or for testing audio-frequency equipment. Pair Scanner – An Ethernet cable tester Time Domain Reflectometer - An electronic instrument that uses time-domain......

Words: 636 - Pages: 3

Lab 4

...Lab 4 Daniel Torres NT1410 Mr. Kay 1/28/2016 Virtual Lab Tour The first difference I did take notice was the entirely different look that it brought up. With Windows 10, we have the start menu, which in my case, is a reason I love Windows and its OS. Ubuntu doesn’t have one, but it is still manageable. The office applications it comes with is pre-installed and works just as fine as it would with Windows. Spreadsheets to Word, it is all in there with no hassle. The office suite that really makes the difference in both configurations is the look and feel. With icons being changed and a different feel about it. The windows landscape of it changing the closing current window bugs me because it is on the left rather than the normal right I am used to. Although Ubuntu office software is limited and only most used applications for that suite would be used on everyday uses, it doesn’t compare to that of Windows 10. The dash home environment from Ubuntu brings up limited content that you would use immediately, but not the essentials in Windows 10. I would like to implement the Start Menu to Ubuntu as many users in the Windows 8 community did not like the fact that Microsoft took the number one feature out. The installation of Ubuntu differed on the fact that it took quite some time to install and the student next to me had a problem himself though. It sent him into terminal rather than the GUI interface of the desktop. I had no issues on my part, other than......

Words: 278 - Pages: 2

Unit 1 Labs

...ITT TECHNICAL INSTITUTE NT1210 Introduction to Networking Onsite Course GRADED ASSIGNMENTS Graded Assignment Requirements Retain all handouts issued in every unit, as well as any assignment, research, or lab documents you prepare as part of assignments and labs. Some may be used more than once in different units. NOTE: Always check with your instructor for specific due dates of assignments. Graded Assignments Unit 1 Assignment 1: Computer Basics Review Course Objectives and Learning Outcomes Identify the major needs and major stakeholders for computer networks and network applications. Describe how digital devices store data. Describe the differences between input and output devices. Assignment Requirements In the Chapter Review Activities at the end of Chapter 1 in the Odom textbook (answers can be found in the textbook): Respond to the multiple-choice questions. Complete the List the Words inside Acronyms table. Required Resources Odom textbook Computer with word processing software Internet access Printer Submission Requirements: Submit your responses as a typed document using Arial or Times New Roman 12-point font, double-spaced. Label your assignment Unit 1 Assignment 1. Unit 2 Assignment 1: Identifying Network Topologies Course Objectives and Learning Outcomes * Identify the major needs and major stakeholders for computer networks and network applications. * Identify the classifications of networks and how they......

Words: 16182 - Pages: 65

Lab 4

...Lab 1 – Introduction to Science Exercise 1: The Scientific Method Dissolved oxygen is oxygen that is trapped in a fluid, such as water. Since many living organisms require oxygen to survive, it is a necessary component of water systems such as streams, lakes, and rivers in order to support aquatic life. The dissolved oxygen is measured in units of parts per million (ppm). Examine the data in Table 4 showing the amount of dissolved oxygen present and the number of fish observed in the body of water the sample was taken from and then answer the questions below. QUESTIONS 1. Make an observation – Based on the data in Table 4, describe the relationship between dissolved oxygen content and fish populations in the body of water. Discuss the pattern observed in the data set. Answer = as the Dissolved Oxygen goes up the greater the survival rate is for the fishes. The pattern for the Dissolved Oxygen goes up by two’s and the number of fish has a unique pattern when matched with the dissolved oxygen. Pattern (2, 4 ppm)…..the fishes decrease by one. (6, 8 ppm)……the fishes increase by 4 (10, 12 ppm)…the fishes increase by 3 (14, 16 ppm)….the fishes decreases by 4 18 ppm…..the fishes decreases by 5 2. Do background research – Utilizing at least one scholarly source, describe how variations in dissolved oxygen content in a body of water can affect fish populations. Answer = According to research the dissolved...

Words: 888 - Pages: 4

Black Lagoon | Kriminalistički | BrainDead