LAS-432-62512 Truitt | Professional Portfolio | Network and Telecommunication Technician | | Jennifer Weiland | 8/24/2012 | | Table of Contents Statement of Authenticity 3 Mission Statement 4 30-second Commercial 5 Degree Plan 6 DeVry Course Descriptions 7 Class History 8 Resume 10 Letters of Reference 12 References 14 Work Examples 15 Statement of Authenticity I‚ Jennifer Weiland‚ hereby certify that I have compiled and written the attached portfolio
Premium Academic degree United States Navy United States Department of Defense
the deployment of PCs‚ workstations‚ and servers‚ or troubleshooting an operating system while it is offline. 5.) User profile In a Windows environment‚ a user profile is a record of user-specific data that define the user’s working environment. The record can include display settings‚ application settings‚ and network connections. 6.) Upgrade Advisor A downloadable Web application that helps Windows users identify which edition of Windows meets their needs‚ whether their PCs are ready for an upgrade
Premium Microsoft Windows Windows 2000 Windows Vista
ESwitching Final Exam CCNA 3 4.0 2012 100% January 20‚ 2012 By HeiseR Take Assessment – ESwitching Final Exam – CCNA Exploration: LAN Switching and Wireless (Version 4.0) – Answers – 2011 – 2012 Update Apr 2012 >80% 1. Refer to the exhibit. What happens when a frame from a source MAC address different from 00a8.d2e4.ba27 reaches switch port 0/5? The frame is dropped. The port is shut down. An error message is displayed. FastEthernet port 0/5 will show an err-disabled message. 2. Refer
Premium Ethernet IP address
A computer is not an acronym and is sometimes abbreviated as comp or ’puter. The term "computer" was originally given to humans who performed numerical calculations using mechanical calculators such as the abacus and slide rule. The term was later given to a mechanical device as they began replacing the human computers. Today’s computers are electronic devices that accept data (input)‚ process that data‚ produces output‚ and then store (storage) the results. The first computer was called the ENIAC
Premium Computer Personal computer Hard disk drive
.................................................. 17 3.2 WIDTH ADJUSTMENT ..................................................................... 19 4 ADJUSTMENT OF STACKING LIMITER ......................................... 20 5 GENERAL TROUBLESHOOTING................................................... 22 6 PERIODIC MAINTENANCE ........................................................... 23 6.1 NF MAINTENANCE
Premium Trigraph
ThinkStation User Guide Machine Types: 4105‚ 4157‚ and 4217 Note: Before using this information and the product it supports‚ be sure to read and understand the ThinkStation Safety and Warranty Guide that came with this product and Appendix C “Notices” on page 51. Sixth Edition (June 2012) © Copyright Lenovo 2009‚ 2012. LIMITED AND RESTRICTED RIGHTS NOTICE: If data or software is delivered pursuant a General Services Administration “GSA” contract‚ use‚ reproduction‚ or disclosure is subject
Premium Operating system Windows Vista Serial ATA
communication is conceived B. The arrangement and interconnection of devices in a network C. A list of devices connected to media that creates the network D. The communication protocols used in a WAN network 9. What is a node on a network? A. Only PCs that people use to access a network B. Only the switches and routers on a network C. Any device in the Internet cloud D. Any device connected to a network 10. Which of the following physical topologies has the inherent weakness of a single point
Premium IP address Internet Protocol Internet
health and safety requirements and setting standards for user documentation. So‚ I am going to start describing white box testing and black box testing‚ and then I will produce a Windows XP user guide‚ along with a security policy for the stand-alone PCs. 1 DESCRIPTION OF WHITE BOX TESTING AND BLACK BOX TESTING 1.1 About white box testing Any security testing method is supposed to ensure that the system is robust enough to face malicious attacks or regular software
Premium Software testing
way to classify end users is by whether they use a computer occasionally‚ frequently‚ or extensively in their work. ____ 14. A computer professional in an organization‚ such as a programmer‚ is generally considered to be an external user. ____ 15. PCs that are advertised in newspapers are usually complete end-user systems. ____ 16. Computer hardware sold today is so reliable it rarely needs repairs or replacement. ____ 17. A digital camera is an example of a computer
Premium Computer Personal computer Problem solving
Exercise 4.1. Why are standards so important for NICs‚ connectors‚ and media? The NIC works at the physical and Data Link Layer only and does not use TCP or IP those are programs that are on your computer. Standards are put in place to make everything work good and ease. They are also developed to allow teaching. Without having standards there is chaos‚ in the computer world chaos means everyone goes back to using typewriters and mailing things through the post office. Exercise 4.1.2 The voltage
Premium Ethernet Computer network Computer