Topic 1 questions: Summary for topic 1:
This topic gives the introduction to Windows and Linux. It explains about Virtualization. Linux is used on virtual machine which actually doesn’t exist. Virtualization is creation of virtual version rather than the actual one, such as storage system, network server or virtual operating system. It also defines the host OS and Guest OS. On which the virtualization software runs is Host OS and the one we want to play with is the Guest OS. The host operating system is the primary or actual operating installed on the computer 's hard drive. The guest OS is the secondary OS installed under the host for the purpose of partitioning the disk. The guest operating system is either a part of partitioned
…show more content…
for example 01. 02 . 03 . 04 The format of IPv6 is y : y : y : y : y : y : y : y : y : , where 'y ' is considered as segment seperated by colons ' : '. It must contain eight segments. however a short form of IPv6 can be written using specific notations. for example 2014 : bd8 : 1232 : 0000 : 0000 : 0001 : C0A8 : 1020 can be written as 2014 : bd8 : 1232 : : 1 : :C0A8 : 1232 ; where : : is considered as 0000. These IP address is nothing but he exact address of the computer just like a phone number. Consider a phone number like +61 3 53 232323 this shows where this number belong to like +61 3 53 means /Australia/Victoria/Ballarat and 232323 says to which person exactly it belongs to. Similar is the IP address.
IPv4 address uses 4 bytes first shows the network shows where in whole world and the last two bytes shows where exactly. Similarly in IPv6 of 16 bytes firts 8 bytes are netwrok and last 8 are nodes.
IP IPv4 address have three classes in it Class A : few big networks
1 byte network and 3 byte node
Class B: Medium sized networks 2 bytes are network and 2 bytes are nodes
Class C: A lot of small networks
3 bytes networks and only 1 byte node.
Task 1.2
Using pen and paper complete the following table. Once completed you may use a calculator (Windows calc for instance) to check that your answers are correct. Note – In the theory test and exam you will not be permitted to use a calculator.
Decimal Binary Octal
135.46.52.2. In binary this is 10000111.00101110.00110100.00000010. Again, we are looking at one of the Interfaces, so we take the 22 MSB’s, which
In CIDR notation, the IP address and subnet mask 191.9.205.22 255.255.192.0 are written as. B
IPv6 uses a128-bit address size compared with the 32-bit system used in IPv4 and will
Internet Protocol version 4 (IPv4) IPv4 is a connectionless protocol for use on packet-switched networks. It is the fourth version of the Internet Protocol (IP), that is one of the core protocols of standards-based internetworking methods in the Internet. It was the first version deployed for production in the ARPANET in 1983. It still used to routing most Internet traffic today, eventhough we have the next version of it,IPv6.
pieces. The data packet is sent to a gateway computer which either recognizes the address
4. Which feature is an integral part of IPv6, where as it was an optional feature under IPv4? IPSec
If you used the number of bytes instead you would get a whole different amount of possible networks which isn’t right.
Law enforcement agencies throughout the country look for ways to reduce response times in addressing citizens’ concerns and calls for service. In efforts to meet the demands of citizens wanting officers to respond to their being victimized, agencies are looking for alternative ways to prioritize calls needed for police to make the location requested by the citizen. The additional time that officers spend answering minor calls for service (alarms not monitored, thefts, burglary, barking dog etc.) the reduction of time police have accessible for pro-active problem solving. Although, the greater parts of dispatched calls have nothing to do with reportable wrongdoings, which demonstrate an over-dependence on the police, however responding to calls establishes a relationship between the citizen and officer. In addressing ways to minimize police response to minor calls, departments are using advance information technology to enhance ways citizens can report crime without the presence of an officer. Above all, people use online services to shop, pay bills and do their banking. Online reporting has made it easier for citizens to report crime faster, reducing time waiting for police to manually take the report. Additionally, citizens assessing the computerized systems create a service number which can be given to their insurance company.
Should America make Trump’s dream of a wall along the Southern border come true? This has been a highly debated topic ever since Trump became a presidential candidate. What started as a mere pipe dream, or maybe even a joke to the American people has now become a possible reality to both the people and now President Elect Donald Trump. America has become somewhat divided over this issue. Some, like myself, argue that a wall is not necessary or practical while others feel their individual and national security is at risk.
Physicians are apprehensive about the validity of data entered by patients. Thus, “…existing medical information should not be reentered into a PHR but rather that medical records, should be shared, with PHRs being one access point” (Witry, Doucette, Daly, Levy, & Chrischilles, 2010). Hence, a solution may be installing a health information exchange system to achieve this. Fictitious health data in a PHR might imply the need for narcotics when a patient visits an emergency department. However, this is the wrong call. According to Witry, Doucette, Daly, Levy and Chrischilles (2010), “…PHRs should draw verified information from the patient’s medical record”. This will prevent erroneous errors from occurring.
Both Windows and Linux come in many different forms. All the different forms of Windows come from Microsoft, the various distributions of Linux come from different companies (ex. Red Hat, SuSE, Linspire, Ubuntu, Mandriva, Knoppix, etc). Windows has two main lines: “Win9x”, which is consists of Windows 95, 98, 98SecondEdition and ME, and “NT class” which consists of Windows NT, 200 and XP. On a side note, Windows first had version 3.x which was made before Windows 95 by a couple of years. The various types of Linux are called distributions. All the Linux distributions released around the same time frame will use the same kernel, which are the guts of the OS. They will differ with the add-on software provided,
The operating system is an extremely crucial type of system software. It is the backbone of a computer. Without an operating system, our computers will not function properly. Operating systems are highly skilled software that includes programs with an ample amount of information. This information provided from these programs makes it easier for applications to communicate with the hardware. Linux and Windows are two operating systems that dominate in our society today. They are not only dominating in our society, but also in the business world. Windows and Linux are the two most popular
In Windows, you can run lots of different program programs. There are customized programs and off-the-shelf (common) programs. These allow you to do everything from running your bowling league to typing up a correspondence.
IPv4 addressing is the next method, it’s is split up into two main parts as well Network I.D and Host I.D which are split over four octets which are written as four decimal numbers which have 32 bits, it only contains 4.3billion different IPs. For example, you sent an IP to a website and it sends its IP back, which means you can communicate. Whereas IPv6 addressing has 128 bits and is written as
Linux is a trademark owned by Linus Torvalds [1]. It is an operating system which is powerful, free and inexpensive to own based on UNIX [1]. It is a POSIX-compliant with versions available to install in cell phones, supercomputers and most computing systems [1]. Linux is an open source program as its source code is available to the general public for use and the right to modify from its original design without any charges [1]. New code will be added to the next version made available with Linux if it is accepted as a universal improvement [1]. The code will continue to exist and developed by the user even if the company fails [1]. Moreover, updates for Linux are available every six months [1]. Nowadays, Linux is in constant development by