Network Admin Essay

837 words - 4 pages

In this lab, you will demonstrate the ability to work with decimal and hexadecimal numbers.
Required Setup and Tools
In this lab, you will need only paper and pencil to do the required work. However, the use of a calculator is permitted to verify the results of a calculation. The Windows calculator may be used for this purpose.
Recommended Procedures
Task 1: Convert Decimal Number into Binary
1. Convert the decimal number 125 into binary. Use the division-by-two method shown in the following example below. Answer is: 1111101
2. Convert your binary result back into decimal to prove your answer is correct. This is also shown in the following example. Solution: 64 + 32 ...view middle of the document...

Click View on the toolbar and then choose Programmer.

To enter a binary number, first click the Bin radio button. Then, enter all the binary bits by clicking the 0 and 1 buttons.

To convert the binary number in the display into decimal, click the Dec radio button.

Task 3: Convert Decimal Number into Hexadecimal
1. Convert the decimal number 210 into hexadecimal. Use the division-by-sixteen method shown in the following example. Solution: 210 /16 = 13 r=2
13 /16 =0 r=13
2. Convert your hexadecimal result back into decimal to prove your answer is correct. This is also shown in the following example. Solution: Weight = 16 1
Digit = 13 2
(16*13)+(1*2) = 210
Convert the decimal number 50 into hexadecimal using the division-by-sixteen method.
50/16= 3 remainder 2 (least significant digit [LSD])
3/16= 0 remainder 3 (most significant digit [MSD])
Read the answer from bottom (MSD) to top (LSD): 32
Convert 32 hexadecimal into decimal. Solution: (32)16 = (50)10
Weights 16 1
Digits 3 2
Multiply each weight by its corresponding digit and add the two products together:
(16 * 3) + (1 * 2) = 48 + 2 = 50
Alternatively, you can also convert the decimal number into binary and then convert the binary number into hexadecimal:
50 = 110010
Break the binary number up into groups of four bits, beginning with the LSB:
11 0010
Pad the group with only two bits...

Other Essays Like Network Admin

Any Thing Essay

3957 words - 16 pages : February 26, 2007 Auxmis\admin\policy\remote access Last updated 3/28/2011 3:37 PM California State University, Fresno Association Inc Remote Access Policy Remote access is a generic term used to describe the accessing of the California State University, Fresno Association, Inc. (“the Association”) computer network by employees not located at a company office, such as those who travel, those who regularly work from home, or those who work

Project Part 1 Nt2580 Essay

1207 words - 5 pages to start implementing firewalls. The most secure measure you can have is to put a firewall on the back end and on the front end of your network. Another security measure at this level is to implement and intrusion prevention system (ISP). The difference between an ISP and an IDP, that was previously mentioned, is that an IDP only detects a threat and alerts the admin. An ISP on the other hand, detects and prevents the threats. The WAN domain is

Netw206 W4

904 words - 4 pages configure vlans. I also learned how to assign ports to the created vlans. As well as how to use the ip default gateway command and no ip routing command. These things will help me a lot in my field as computer network admin. ------------------------------------------------- ------------------------------------------------- Copy and paste the following screenshots from your VTP and VLANs lab below. Preliminary Discussion Most of the objectives

Linux Security Technologies

1105 words - 5 pages done by preventing a file from being read or tampered with. SELinux will assign a string that states the role, user name, and domain type. If you are not configured by this policy to access certain files you will be denied access. It will let the Admin know what security threats have been made, such a Joe Bob trying to hack into your system to get some personal laughs. SELinux runs on three different states (modes): enforcing-which is the

Computer and Network Security

1798 words - 8 pages , 2013), and the domain user or admin have a guessable password in Windows NT (CVE, 2013). In the first article it discusses the use of USB devices in the workplace. USB’s are used for transporting data from one computer to another. These allow for business requirements to be reached at a faster pace but they also pose a number of security challenges. Those challenges may be “disgruntled workers, careless users and malicious individuals” (Couture

Inventory System

1055 words - 5 pages store information and data gathered. 4. The admin can access all the transactions. 5. The system will have SMS notifications when the supplies are in critical level and when the deliveries are on their way to the branch. 6. The system will have four users: admin, owner, staffs and the supplier. 7. Allowing the owner, staffs and the supplier to see if their stocks are already in a critical level so the supplier will know when will they send

Are Closed Digital Training Networks Vulnerable to Hackers?

2364 words - 10 pages do their job” (2002). A written policy or memo which informs users of the different accounts available and the reasoning behind an individual person’s level of access should be standard practice. Currently, in this student’s digital training network it has been found to be sufficient to utilize the deployment of Windows standard user accounts on all the systems that the Air Force student’s access and admin accounts on the lesson developer

Feasibility Study

1533 words - 7 pages to support network administrators, so that the entire network can be managed at a single point along with effective GUI. ELIMS provides the administrator an extra hand to manage the clients. Network servers contain data and software applications that can be accessed by the clients in the network.  Description of current situation In this generation business has been grown rapidly and countless as they compete each other for rich and good

It-109 Final Review

4608 words - 19 pages connect to a specialized distributed system of data, you get a ___________. Client-server system 17.) _____________ systems gather together multiple CPUs to accomplish computational work and are closely connected by a high-speed network. Clustered 18.) An operating system provides an environment for the execution of ___________. Programs 19.) In a GUI, users employ a mouse-based windows-and-menu system characterized by a

Online Retail System

4749 words - 19 pages . For example, <Project Name> will be replaced with either ‘Smart Home’ or ‘Sensor Network’. Italicized text is included to briefly annotate the purpose of each section within this template. This text should not appear in the final version of your submitted SRS. This cover page is not a part of the final template and should be removed before your SRS is submitted. Acknowledgements: Sections of this document are based

Possible Risks of Outsourcing

1560 words - 7 pages that someone that is not working for the company and that will have the access to the network through the admin login can have direct access to all the data in that network of systems. Also that you cannot ask any questions about their risk assessment methods. This can be a major risk that can cost the company a fortune if the vendor is not chosen the right way. Risk mitigation strategy If the company would install a service for

Related Papers

Sad Inventory System Essay

1756 words - 8 pages TABLE OF CONTENTS Chapter 1: Introduction 1.1 Background of the Study 1.2 Statement of the problem 1.3.1 General Problem 1.3.2 Specific Problem 1.3 Objective of the Study 1.4.3 General Objective 1.4.4 Specific Objective 1.4 Significance of the Study 1.5 Scope and Limitation 1.6 HIPO 1.7 Network Diagram 1.8 Definition of Terms 1.1

Business Impact Analysis

622 words - 3 pages ) and Chief Information Officer * Primary IT personal for the entire organization * Deputy Director, DLA Information Operations (J6) * Deputy General Counsel * Chief of Staff, Defense Logistics Agency * Will report any information that is important to the Director of DLA * J6 of DLIS * Network Admin * System Admin * Service Desk External Contacts * Vendors, we need to make sure our

Netw410 Week2 Lab Essay

544 words - 3 pages controlled wireless access for the students in each classroom 4. Provide open wireless access for the students and the local population in the areas outside of each building 5. Provide a high-speed wired network connection to each faculty office 6. Provide a centralized online backup of all data designated for backup 7. Replace the PBX based telephone system with a VOIP based system 4. What are the technical constraints? (10

Integrative Network Design Essay

3985 words - 16 pages program that could better a process or provide information to increase productivity, they must fill out a program installation request form. Once the program has been check by the security team and is found to be safe for the network then approval will be granted. The program will be downloaded on to a thumb drive that will have a onetime use admin password for the users system. The drive will then be given to the employee so they can install the