Unit 2. Assignment 1. Disk Redundancy Research 1. RAID (originally redundant array of inexpensive disks; now commonly redundant array of independent disks) 2. RAID would be used whenever there is a need to manage multiple hard drives.
These cables are cheap and the network interface cards are cheap as well compared to Fiber NIC cards. In that sense UTP cables are most preferred for patch panels and computer connections to the network. They are also the easiest to work with. Shielded-twisted pair is another type of copper cabling. This is used when you need to run cable through an area that has a lot of Electromagnetic Interference.
Patch cables are short distance, usually have connectors preinstalled on both ends, are used to connect equipment, and are generally between 3 and 6 meters long. Connector - With respect to cabling, a device attached to the end of a cable, receiver, or light source that joins it with another cable, device or fiber. A connector is a mechanical device used to align and join two conductors or fibers together to provide a means for attaching and decoupling it to a transmitter, receiver, or another fiber. Commonly used connectors include the RJ-11, RJ-45, BNC, FC, ST, LC MT-RJ, FDDI, Biconic, and SMA connectors. Conduit - A rigid or flexible metallic or nonmetallic raceway of circular cross section in which cables are housed for protection and to prevent burning cable from spreading flames or smoke in the event of a fire.
Exercise 2.1.5 The types of connections that are available are wired connection, wireless connection, and dial-up connection. Lab 2.1 Review 1. A network device is used to connect computers or other electronic devices together to share resources such as a router or switch. A peripheral device is an optional device that can be added to the computer to expand its functionality such as external hard drives or speakers. 2.
Which of the following answers best describes how a hard disk drive physically writes a binary 0 or 1?C. changing the disk’s surface 12. Which of the following answers are true about an internal hard disk drive (HDD) as it is normally used inside a personal computer (choose 2) B. used for long-term memory, D. connects to the CPU over a bus using a cable
Voice or data computers, network interfaces, and transmission medium C. Modems, transmission links, and wireless access points D. TCP/IP software, modems, and transmission links Correct! The correct answer is: B. âA network consists of two or more connected computersâ (Laudon & Laudon, 2011, p. 194). âBasic network components include computers, network interfaces, a connection medium, network operating system software, and either a hub or a switchâ (p. 225). Networking and telecommunications technology, consisting of both physical devices and software, links the various pieces of hardware and transfers data from one physical location to another. 2.
They are usually located in a LAN like a home or on the internet. Lab 2.1 Review 1. A network device is equipment used to connect two or more computers together, such as a router, network cable, and network cards. A peripheral device is any external device on a computer such as a mouse, keyboard, or a monitor. 2.
NT1210 Research Paper From what I gathered about “Layer 2 switches” is that the Layer 2 switches use a MAC address from a host NIC card. This makes it to decide where to “forward frames”. Also Layer 2 is a hardware-based control. It uses “application-specific integrated circuits”, which provides “wire speed, high speed, low latency”. OIS layer 7 packets are called “layer 4-7 switches” these are like content switches, content service switches and web switches or application switches… Content switches are normally used for “load balancing” among server groups like on TCP/IP.
On the other hand, a read and write tag is the tag that is programmed during manufacture and you can read as well as change the contents of its memory.Unlike bar code where only one can be read at a time, tags can be read many at ago. They can be read through a hard material like a book cover and they do not require direct reading. A tag gives specific identity to the item it is attached to despite the item being identical to many others. This gives the uniqueness of RFID concerning privacy.There are software that accompany the RFID technology. An example
The picture of a desktop or laptop PC - running some sorts of applications as media player, a word processor and a spreadsheet – quickly comes to one’s mind when the word microprocessor is heard. While this is a popular application for microprocessors, it is not the only one; in fact, most individuals use them indirectly in common objects and appliances without realizing it. Such trivial applications of microprocessors used in our day-to-day activities alongside with the applications in computer systems. Without the microprocessor, these products would not be as sophisticated or cheap as they are today. It would suffice to say that some of those common appliances could be seen as computer systems too.