Preview

Nt1330 Unit 7

Good Essays
Open Document
Open Document
465 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Nt1330 Unit 7
Matching page 429
1. e 2. i 3. d 4. h 5. b 6. c 7. j 8. g 9. a 10. f

Multiple Choice page 429-430
1. c 2. c 3. a 4. d 5. a 6. c 7. a 8. b 9. d 10. d

Review Questions page 430
1) List four steps involved in deploying DRM-protected content in the correct order

a) Packaging b) Distribution c) Licensing d) Playback 2) List and explain five limitations that you can apply to a DRM license to control client access to a protected content file. a) Time limits – You can restrict the content to play back only between a specific start and end time or specify a license duration limit. b) Copy limit – Users can freely copy the content files to other computers, but each computer requires its own license. c) Multiple License – You can create licenses
…show more content…
a) In: UDP ports 1024 through 5000 i) The Windows Media server uses UDP In ports 1024-5000 to receive data from another server. b) Out: TCP on port 80 and 554 i) The Windows Media server uses the TCP Out ports to establish an HTTP connection (port 80) or RTSP connection (port 554) to another server or encoder. c) Out: UDP on port 5005 i) When RTSPU distribution is used, the Windows Media server uses UDP Out port 5005 to send resend requests to another server.

2) What is the recommended security method for running the Windows Media Administration site? a) Integrated Windows authentication provides a means of authorizing users of the administration site, but does not allow credentials to be transmitted over the network. When you enable integrated Windows authentication, the browser running the administrative interface initiates a cryptographic exchange with the Web server using either NTLM or Kerberos authentication to validate the user. This method provides a great deal of security, but does not allow IIS to delegate user names and passwords to remote servers 3) Does using basic authentication offer any advantages? If so, what? a) Basic authentication is widely used on networks for collecting user credential information. The advantage of basic authentication is that it is simple to use and works with most browsers, proxy servers, and firewalls.

You May Also Find These Documents Helpful

  • Good Essays

    Nt1310 Unit 5

    • 368 Words
    • 2 Pages

    the ratio of resistors on one side of the bridge is one while the ratio of resistors on the other side is infinity…

    • 368 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Nt1310 Unit 6

    • 297 Words
    • 2 Pages

    8. The reactance offered by a capacitor to alternating current of frequency 50 Hz is 20 Q. If frequency is increased to 100 Hz, then reactance becomes -----------------.…

    • 297 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Nt1310 Unit 4

    • 3614 Words
    • 15 Pages

    The program is trying to collect the value of a "void" function into an integer variable.…

    • 3614 Words
    • 15 Pages
    Better Essays
  • Satisfactory Essays

    Nt1310 Unit 4

    • 1317 Words
    • 6 Pages

    WWW.SPEEDOMETERMASTER.COM PRICELIST $4,199.00 Ask a question about this product FCN1: 2F 01 40 00 00 13 0C 0C FCN2: 4F DC F6 FA 51 D0 90 00 FCN3: 5F FF FF FF FF FF FF FF To see vehicles covered click on FCN Numbers above This software package includes: Software: Updates FREE. Accessories: OBD2 Adapter.…

    • 1317 Words
    • 6 Pages
    Satisfactory Essays
  • Powerful Essays

    Port 6839 (tcp/udp) - Online TCP UDP port finder - adminsub.net. (2014, August 26). Retrieved October 10, 2014, from http://www.adminsubnet.net/tcp-udp-port-finder/6839…

    • 1578 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Nt1430 unit 1

    • 468 Words
    • 2 Pages

    1) Users have the freedom to run, copy, distribute, study, change and improve the software.…

    • 468 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Stream type: UDP unicast stream Protocols used: UDP and TCP Ports used: TCP-1755 and a UDP port within the following range: 1024 - 5000 Special notes: When using UDP streams, the client first makes a connection to the Windows Media server using TCP port 1755. After this connection is established, the client and the server choose the UDP port that will be used by the server to stream the Windows Media content down to the client.…

    • 317 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Genetics Exam Study Guide

    • 2765 Words
    • 14 Pages

    will be a. HH & hh b. Hh & hH c. hH & Hh d. H & h e. h & H…

    • 2765 Words
    • 14 Pages
    Good Essays
  • Good Essays

    a) b) c) d) e) f) g) h) i) j) k) l) m) n) o) p) Eligibility…

    • 13439 Words
    • 54 Pages
    Good Essays
  • Powerful Essays

    Apple Ipad Marketing Plan

    • 10272 Words
    • 42 Pages

    Big Apple Table of Contents Executive Summary 5 Marketing Strategy 6 Background 6 Company 6 Products 7 Situational Analysis 7 Market Share 8 Goals 8 Strategy 9 SWOT Analysis 9 Strengths 10 Weaknesses 11 Opportunities 11 Threats 12 Customers 12 Competitors 14 Positioning 14 Competitor Market Share 15 Collaborators 15 Role of Partnerships 15 Complimentary Businesses 16 Climate 16 Political/Legal 16 Economic 16 Technological 17 Social/Cultural 17 Issues Analysis 17 Personal Computer Market 17 New Products 17 International Operations 18 Digital rights management system (DRM) 18 eBusiness Models 18 Market Research and Market Intelligence 20 Marketing Strategy 25 Tactical e-Marketing and Communications Planning 28 Tactical Approach 28 Product 28 Promotion 29 Price 31 Place 31 Use of Technology 31 Delivery Mechanism 34 Flexible manufacturing plants 34 Supplier Relationship Management. 35 Channel Management 36 Marketing Communications 37 Developing an Integrated Marketing Communications Plan 37 Overarching Goals of the Plan 38 Message Development 38 Communication Media, Venues, and Campaign Elements 39 Tactical Marketing Plan Elements 40 Regulation and Ethics Issues 45 Responding to Regulation and Ethics Issues 46 Assessing E-Marketing Effectiveness 47 Conclusion 50 References 51 List of Figures Figure 1 - Porter's Five Forces Analysis Framework 22 Figure 2 - Comparative Competitor Specifications 23 Figure 3 ' Online Advertising Tracking Sample 30 Figure 4 - Shop Floor Hierarchy 35 Figure 5 - Collaborative Marketplaces and E-Hubs 36 Figure 6 - Demand Management 37 Figure 7 - Transactional and Relationship Marketing 38 Figure 8 - Example of iPod Shuffle Messaging 39 Figure 9 - Adoption Curves for Various Media 40 Figure 10 ' Integration of the Product Lines 41 Figure 11 ' eCommerce Access 41 Figure 12 ' Uses for the Product 43 List of Tables Table 1 ' Apple SWOT Analysis 9 Table 2 ' iPod/MP3 Player…

    • 10272 Words
    • 42 Pages
    Powerful Essays
  • Satisfactory Essays

    Critical Reading

    • 837 Words
    • 4 Pages

    1. Although the James brothers were criminals, they did not publicize their exploits, unlike their modern counterparts.…

    • 837 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Business Contract: Sample

    • 57159 Words
    • 229 Pages

    7) I h o p e y o u ’ l l s ee fro m u tm o s t 8) W 9) W…

    • 57159 Words
    • 229 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Bk3 Ch23 Sug Ans E

    • 442 Words
    • 3 Pages

    (Note: The overseas examination boards bear no responsibility for the suggested answers contained in this publication. Answers for HKCEE and HKALE questions are not available due to copyright restrictions.)…

    • 442 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Model Ques Paper

    • 461 Words
    • 2 Pages

    6. A,B,C,D and E are sitting on a bench. A is sitting next to B, C is sitting next to D, D is not sitting with E who is on the left of the bench. C is on the second position from the right. A is to the right of B and E. A and C are sitting together. In which position A is sitting? a. Between B and D b. Between B and C c. Between E and D d. Between C and E 7. Careful is to cautious as boastful is to ___________? a. Humble b. Arrogant c. Auspicious d. Joyful 8. What is the missing number? 1 4 9 ? 25 a. 15 b. 16 c. 18 d. None of these The rate of interest obtained is a. 12.5% b. 13.5% c. 15% d. 16 2/3% 10. The ozone layer restricts a. Visible light b. Infrared radiation c. X-rays and gamma rays d. Ultra violet radiation Ans: ( d ) Ans: ( c ) Ans: ( b ) 9. A man bought 20 shares of Rs 50 at 5 discount, the rate of dividend being 13 ½ . Ans: ( b ) Ans: ( b )…

    • 461 Words
    • 2 Pages
    Powerful Essays
  • Satisfactory Essays

    Questionnaire

    • 480 Words
    • 2 Pages

    a) CIBN [ ] (b) ICAN [ ] (c) ACA [ ] (d) CCNA [ ] (e) NIM [ ] (f) Others [ ]…

    • 480 Words
    • 2 Pages
    Satisfactory Essays