Preview

Unit 5 Exercise 1

Satisfactory Essays
Open Document
Open Document
98 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unit 5 Exercise 1
Baldeo Persaud
NT 1230
Unit 5 Exercise 1
FROM: Systems Admin
TO: Manager
You are absolutely correct about Windows 7 including protection and having a firewall in the OS. However I would still purchase hardware firewalls and internet security software. The internet protection and firewall that come with the Windows 7 OS are not the best against threats. You will be better protected by purchasing internet security software. Please keep in mind you should only use one security software. Having more than one will cause them to go back-and-forth to see who will handle the protection and any threat can easily slip through.

You May Also Find These Documents Helpful

  • Good Essays

    Nt1330 Unit 7 Exercise 1

    • 489 Words
    • 2 Pages

    The proposed method is illustrated as a flow chart in Fig 3. First, the source node broadcast the RREQ to neighbor nodes. The neighbor nodes forward the Route Request (RREQ) to the destination node. Destination node stores the neighbor RREQ in a table and checks the RREQ. If RREQ is from the true Source node address, then the system is regular and begins to transmit test data packets otherwise repeat the process. Next, it will check the packet delivery ratio if packet delivery ratio drops to threshold then Send Bait RREQ. The source node randomly chooses one-hop neighbor node (nr) as a destination node. The Source node selects one-hop neighbor node nr as the destination node and sends the RREQ to that node. First, if nr had not launched black hole attack, then after the source node had sent the RREQ, then other nodes in addition to nr node also reply with RREP. It indicates that there is an Attacker in Reply routing. If the only nr sent RREP then…

    • 489 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    NT1310 Unit 6 Exercise 1

    • 419 Words
    • 2 Pages

    On a TWISTED PAIR CABLE I chose to install an RJ-45. This is the standard Ethernet connector for most systems used today. I would first measure out the length of cable that I would need. I would then use a wire cutter to cut the length that I need, leaving enough room for corrections and to open the wire. I would then use wire strippers to remove a small piece of the outer most jacket. I would then choose what connection I wanted to make (568A or 568B). I would then untwist the wires and put them in the correct color order that I need. Then I would flatten out the wires and in one hand hold my RJ-45 connector and then with the other hand feed the wires into the connector. This is usually pretty simple with the way the connectors are made, and they are also usually clear. After I’m sure that the wires are in the connector all the way, and in the right order, I would use a wire crimper to clamp the wires securely into the connector.…

    • 419 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Now regarding your dilemma with deciding over buying hardware firewalls and antivirus applications… stop. There is no need to go and shill extra money to buy hardware for any sort of countermeasures, no matter how noble your goals may seem. Windows 7 already has user-friendly security, so discrepancies such as viruses and spyware will be dealt with more efficiently. The Action Center in your Control Panel will make sure your Firewall is on, and BitLock Drive Encryption makes sure your passwords,…

    • 190 Words
    • 1 Page
    Satisfactory Essays
  • Best Essays

    Nt1310 Unit 4 Exercise 1

    • 1486 Words
    • 6 Pages

    As it is evident from the related work discussed in the section 2, when small files are stored on HDFS, disk utilization is not a bottleneck. In general, small file problem occurs when memory of NameNode is highly consumed by the metadata and BlockMap of huge numbers of files. NameNode stores file system metadata in main memory and the metadata of one file takes about 250 bytes of memory. For each block by default three replicas are created and its metadata takes about 368 bytes [9]. Let the number of memory bytes that NameNode consumed by itself be denoted as α. Let the number of memory bytes that are consumed by the BlockMap be denoted as β. The size of an HDFS block is denoted as S. Further assume that there are N…

    • 1486 Words
    • 6 Pages
    Best Essays
  • Satisfactory Essays

    802.3 is the IEEE working group and it provides standards and recommendations in architecture and internetworking in LANs and MANs…

    • 545 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 7 Exercise 1

    • 593 Words
    • 3 Pages

    11. Sample Rate: Typically expressed in samples per second, or hertz (Hz), the rate at which samples of an analog signal are taken in order to be converted into digital form. A PCs sound card typically will sample a received analog signal, such as through a microphone, and digitize it for use by the computer. A higher sampling rate provides a better quality reproduction than a lower sampling rate.…

    • 593 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Equation 4 represents the intersection area between two circles whether the circumference of each circle passes through the centre of the other one and vice versa. Equation 5 is used to the area between two circles. With Equation 6, we formulate the difference between a quarter circle area and a half of A1 area.…

    • 88 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 5 Exercise 1

    • 322 Words
    • 2 Pages

    1. List the patients that you took care of this week (one initial only); their age; gender; and primary diagnosis.…

    • 322 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Attached are the results from last weeks performance for those accounts that are past due with a past due balance 30+ days or older. As a unit, we reduced the number of these accounts this week by 1,043 and the past due balance by $2,200,318.…

    • 83 Words
    • 1 Page
    Good Essays
  • Satisfactory Essays

    Nt1330 Unit 5 Exercise 1

    • 595 Words
    • 3 Pages

    • Create an activity diagram and a set of use case descriptions for an online university registration system. • The system should enable the staff of each academic department to examine the courses offered by their department, add and remove courses, and change the information about them (e.g., the maximum number of students permitted).…

    • 595 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Thank you for helping set up our new US office. There are some additional issues that we need help addressing.…

    • 208 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Exercise 8.5-1

    • 487 Words
    • 2 Pages

    How do hormone levels regulate the female menstrual cycle? Use the following experimental data to analyze hormone levels during the menstrual cycle.…

    • 487 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    HLT 362 Exercise 18

    • 352 Words
    • 2 Pages

    Did the patient in Question 2 have more of a memory performance decline than average on the CVLT Retrieval? Provide a rationale for your answer.…

    • 352 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Starting with the first action, installing firewalls and anti-virus, the article "Firewalls" goes in-depth about how these are important here "While firewalls filter and limit incoming transmission of data that tries to access the system, anti-virus software looks at how the data affects your system". This shows why it's critical to have both a firewall and anti-virus software installed. If you install only a firewall then as soon as its been breached, whoever invaded your system has access to all of your files and personal info with no anti-virus to stop them. It's the same for firewalls, if you are without one, the virus can access your device much easier than a device with both anti-virus and a firewall installed. It's very important to have both installed for maximum security to deter hackers, scammers, and spy…

    • 601 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Exercise 1

    • 849 Words
    • 4 Pages

    3. Describe the results of the attempts to diffuse glucose and albumin through the 200 MWCO membrane. How well did the results compare with your prediction?…

    • 849 Words
    • 4 Pages
    Good Essays