Chapter 1 review questions 1. Which of the following is true about 1 bit? a. Can represent decimal values 0 through 9 b. Can be used to represent one character in the lowercase English alphabet c. Represents one binary digit d. Represents four binary digits 2.
a) 255.255.255.128 b) 255.255.255.224 c) 255.255.255.0 d) 255.255.128.0 7. What is equivalent of the decimal number 127 in hexadecimal? a) A7 b) 7F c) 9A d) F2 8. Which of the following Cisco IOS commands copies the current running configuration to a TFTP server? a) write memory b) copy tftp startup-config c) configure terminal d) copy running-config tftp 9.
Exercise 1.3.1 What is the decimal value of Byte 1 by itself? What is the decimal value of Byte 2 by itself? -6400 -233 Exercise 1.3.2 What is the decimal equivalent of the binary sequence in Figure 1- 12 (the combined sequence of Byte 1 and Byte 2 as a single decimal value)? How does this compare to the individual values of Byte 1 and Byte 2? -6633 -There is an increase of bits.
Windows authorization mechanism C. Passwords plus smartcards D. Stored in a digital certificate E. Standard for smart card support F. Decrypts data encrypted with a certificate G. Firewall exceptions H. Standard for fingerprint scanners and other devices I. Potentially destructive software J. Firewall rule requiring IPsec 1. Multifactor authentication = C 2. Malware = I 3. Brute force =A 4.
Assignment #2 1) Improve the result from problem 4 of the previous assignment by showing that for every e> 0, no matter how small, given n real numbers x1,...,xn where each xi is a real number in the interval [0, 1], there exists an algorithm that runs in linear time and that will output a permutation of the numbers, say y1, ...., yn, such that ∑ ni=2 |yi - yi-1| < 1 + e. (Hint: use buckets of size smaller than 1/n; you might also need the solution to problem 3 from the first assignment!) 2) To evaluate FFT(a0,a1,a2,a3,a4,a5,a6,a7) we apply recursively FFT and obtain FFT( a0,a2,a4,a6) and FFT(a1,a3,a5,a7). Proceeding further with recursion, we obtain FFT(a0,a4) and FFT(a2,a6) as well as FFT(a1,a5) and FFT(a3,a7). Thus, from bottom up, FFT(a0,a1,a2,a3,a4,a5,a6,a7)
Hands-On Labs, Inc. LabPaq: CK-S Page 117 The National Academy of Science reports that the Average Daily Intake (ADI) of Blue #1 dye is 16 mg. Its chemical formula is: C37H34N2Na2O9S3, and its molecular weight is: 792.84. The formal chemical name is: Disodium alpha -(4-(N-ethyl-3-sulfonatobenzylamino) phenyl)-alpha-(4-N-ethyl-3- sulfonatobenzylamino, cyclohexa-2,5-dienylidene) toluene-2-sulfonate Typically, the concentration of the FD&C Blue #1 is approximately 0.026 M. You will need to dilute it to make a series of standard solutions of known concentrations. Your starting dilution should be 1:1000 (i.e., 1 part dye and 999 parts water). PROCEDURE: Completely read all instructions and assemble all equipment and supplies before beginning work on this experiment. 1.
| No | 6a. IQ question. The first mean (the mean for N=100): | 100 | 6b. IQ question. The second mean (the mean for N=400): | 100 | 6c.
Randy Michael NT 1210 Lab 1.1 Professor Chibuzo Onukwufor 4/1/15 Lab 1.1 1: Convert the decimal value 127 to binary. Explain the process of conversion that you used. Decimal Number | Binary Number | Remainder | 127 - | 64 | 63 | 63 - | 32 | 31 | 31 - | 16 | 15 | 15 - | 8 | 7 | 7 - | 4 | 3 | 3 - | 2 | 1 | 1 - | 1 | 0 | Binary | 27 | 26 | 25 | 24 | 23 | 22 | 21 | 20 | Decimal | 128 | 64 | 32 | 16 | 8 | 4 | 2 | 1 | Conversion | 0 | 1 | 1 | 1 | 1 | 1 | 1 | 0 | I took the decimal and divided it by two giving 1 for the remainders and 0 if it did not have a remainder. 2: Explain why the values 102 and 00102 are equivalent. They are equivalent because they represent the powers of 10 3: Based on the breakdown of the decimal and binary systems in this lab, describe the available digit values and the first four digits of a base 5 numbering system.
110 (network ID), 10.10.1 (host) What are the binary values of the host ID and the network ID? Hint: You should use decimal-to- binary conversion skills on each octet of the address separately and chain the bytes together for the answer. 1101110.00001010.00001010.00000001 Exercise 8.1.2 Use your textbook and the Internet to complete Table 8- 1. Class | Range of 1st byte (octet) in decimal | Network ID | Host ID | Possible Networks | Possible Hosts per Network | A | 0-127 | A | b,c,d | 2^7 | 2^24 | B | 128-191 | a,b | c,d | 2^14 | 2^16 | C | 192-223 | a,b,c | D | 2^21 | 2^8 | Why is the number of possible networks for each class not equal to 2 raised to the power of the number of bits used for the network ID? It would require more bits Exercise 8.1.3 Would the IP address in Figure 8- 1 be valid as a class C address?
Crypto isakmp enable Crypto isakmp policy 110 Authentication pre-share Encryption des Group 1 Hash md5 Lifetime 43200 Exit Crypto isakmp key cisco1234 address 200.100.20.2 crypto ipsec transform-set TSet esp-des esp-md5-hmac mode tunnel exit access-list 102 permit tcp any any crypto map CMap 10 ipsec-isakmp match address 102 set transform-set TSet set peer 200.100.20.2 exit interface s0/1 crypto map CMap exit Task 2—Configure a Site-to-Site IPSec VPN on the Chicago Router • After you have completed typing in the Chicago IPSec configuration commands, highlight the commands you typed in using your mouse (click and drag) or the keyboard ( + Arrow keys) use A to select all of the commands in the Chicago configuration file. Use C to put the commands in the clipboard. Use V to paste these commands into the table cell provided in the lab report