Chapter 2 NT1230 10/3/2014
1. When was the first major standard describing a structured cabling system released? c. 1995
2. What doe EIA and TIA stand for? i. EIA – Electronics Industries Alliance ii. TIA – Telecommunications Industry Association 3. What are the three parts of the EIA/TIA 568-B standard? i. EIA/TIA-568-B.1: Commercial Cabling Standard, Master Document ii. EIA/TIA-568-B.2: Twisted-pair Media iii. EIA/TIA-568-B.3: Optical Fiber Cabling Standard
4. Identify the six subsystems of a structured cabling system. i. Building Entrance (Also called (EF) Entrance Facilities) ii. Equipment Room (ER) iii. Telecommunications Closet (Also
…show more content…
ii. Most manufacturers are recommending the use of UTP cable for cabling computer networks except for very noisy environments.
-------------------------------------------------------------------------------------------------------
Section 2-4
21. What are the color maps and pin # assignments for T568A and T568B? i. T568A – White-Green/Green/White-Orange/Blue/White-Blue/Orange/White-Brown/Brown a. 1 2 3 4 5 6 7 8 ii. T568B – White-Orange/Orange/Blue/White-Blue/Green/White-Green/White-Brown/Brown a. 1 2 3 4 5 6 7 8
22. What is the difference between T568A and T568B? i. They are just two different manufacturer standards used to wire the modular connector hardware. a. There is no performance improvement with either, just a color order choice. b. Industry tends to favor T568A wiring order; however, either order can be used as long as the order is maintained throughout the network.
23. How many wires are in a CAT6 twisted-pair cable? i. 8
24. How many wire pairs are in a CAT6 twisted-pair cable? i. 4
25. In regards to a CAT6 cable, what pin numbers in an RJ-45 connecter are used to carry data in a FastEthernet network?
26. What does an “X” on
Lab 8 Purpose Using sodium borohydride as the reducing agent, to convert a ketone (camphor) to a mixture of secondary alcohols (isoborneol or borneol). The product mixture will be characterized by melting point and functional group tests (TLC and IR spectrum). Pre Lab 1. Structure of Camphor NaBH4 used as reducing agent to produce isborneol from camphor Structure of isoborneol Isoborneol with wedged and dashed lines 2. Isoborneol can be produced by reduction of camphor by using the NaBH4 in Methanol.
This one is called cost/benefits. I have to describe how it supports our and neighboring districts and that it is advantageous compared to the cost.
The objective of this lab was to observe the behavior of a capacitor while charging through a resistor. Overall, the objective of the lab was achieved since an exponential curve was obtained from a charging capacitor.
The following results helped obtain the haplogroup that in which the sequence of mtDNA would identify. The PCR reaction worked, and this can be determined by looking at the agarose gel in figure 1. If the PCR reaction was successful, than a band should appear around 550bp. Individual AC displays a band around 550bp, this means the PCR reaction was successful. The band for individual AC, depicts a low concentration of product, because the band faint. After the purification process the concentration, A260/280 ratio, and A260/A230 ratio were determined by using the nanodrop. The concentration of mtDNA in the product was 60.9 ng/uL. The ratio for A260/280 was 1.79 and the ratio for A260/230 was 0.77. The A260 and 280 are a spectrometer measurement that measure absorbance at wavelengths of
In quadrants 1 and 2 how the amount and constituents of the fingerprint residue on the substrate affects the fingerprint image, is determined. In quadrant 1, excess sebum and moisture is first removed from the finger tips with the help of a clean cloth. In quadrant 2, fingertip is first wiped around the nose or forehead to create excess sebum. Quadrant 3 and 4 were used to compare the details between untreated and dusted fingerprint residues.
We use Multiple items tool to create a customizable form that displays multiple records from a source table or query in a datasheet format.
When first thinking of fixed line networks they think of the coaxial cable (coax) which connects to their television and twisted pair terminated with a RG-11 plug for their phones and faxes. There two variation of coax that are used in networking, thicknet (RG8) and thinnet
Good work on it. I agree with your points. Here I am adding some more points to it. If you run an automated build and test process, JMeter testing is normally not included in the daily build, because application performance does not change from day-to-day. Instead, JMeter tests are normally run through the JMeter application once a large part of the application is complete. Preferably, your stress/performance tests should be executed on a dedicated test environment similar to the production environment. The Team Productivity Center Server is a Java application offering a number of services that the client uses. It contains a password vault storing credentials for third-party repositories, so the user can seamlessly connect to different products
Heartbleed is a name that security researchers have given to a serious bug found in a very common piece of software used by many websites. The software name was OpenSSL which is used to encrypt the information that we send to and from websites. Heartbleed vulnerability in OpenSSL allowed attackers to get sensitive data i.e. user’s authentication credentials (login name, password) and secret keys through incorrect memory handling in TLS (Transport layer security) heartbeat extension.
Patients records are confidential. BHO can adopt the Need-to-know security principle so that there are certain restrictions in accessing patient records. BHO may want to implement certain rights to be given to their doctors, nurses, healthcare assistants and administrative staff and this may prevent unauthorised access to other patient’s records. For example, administrative staff are only granted to access in booking new appointment and collection payment but it’s restricted to access other information such as medical records. Doctors are granted to view patient’s medical records but it is not allowed to make any amendments.
In this lab, many more options were explored with Windows servers. The topics covered were Group Policies and Password Settings Objects. Both of these features of Windows Active Directory allow for very granular settings to be set across the network. These include a wide range of settings that one most likely would not even think of. I have personally worked with both Active Directory and Group Policies quite extensively so neither of these were new topics for me to learn. However, I had never worked with Password Setting Objects before so that was a learning experience. All of these features are useful in any enterprise production network and are highly valuable skills to have.
Servers often contain sensitive data. Employee information, customer information, and proprietary business data are just a few examples of the types of sensitive data often secured on company servers. Thus, it is critical that servers are secure from infiltration and attack. One of the best ways to secure a server from attack is to maintain system updates and patches.
The mail server is like an computerized mail man that capable to delievers or handles e-mails across a internet or network. It can deliver e-mails from client computer to other mail servers or client computers. The client computer are the computer that you use to read or send mails across the networks. The example would be your computer at school or home. Furthermore, Smartphone or other mobile devices that have e-mail capbilities also can categorize as a client computers. The mail server uses Simple Mail Transfer Protocol(SMTP) for mail server to send email. SMTP is an application protocol that uses to store and forward emails. It will transfer your emails across the network and mail server will uses Post Office Protocol Version 3 (POP3) or Internet Message Access Protcol Version 4(IMAP) to receive the emails at the reciving ends.
Although handwritten records are still the mainstay of clinical record keeping, many medical professionals believe that the increased use of information technologies has the potential to effect healthcare for the better. For example, Dr. Daniel R. Masys said, “Against a background of an explosively growing body of knowledge in the health sciences, current models of clinical decision making by autonomous practitioners, relying upon their memory and personal experience, will be inadequate for effective twenty-first-century health care delivery.” While keeping in mind how far manual records have gotten us, we need to realize that information technologies result in better data correlation and management.
Treatment and medical management can both be high tech or low tech and include CPR, diagnosing and treating with medications, and controlling symptoms over the long-term and continuing to try to find a cure. Also have a support system.