Networking I Home Learning Home Learning Policy: Students will bring home learning assignments in on the date due for full credit, and put it in the “Assignments” box at the front of the class on the way in. All written work is to be the student’s own words, not text that is copied and pasted from other sources (Plagiarized). Any assignment with text that is copied without proper citation will receive an automatic “0.” Home Learning Turned in Late: Any student not having the home learning assignment at the beginning of class on the day due will hand in a written excuse that will receive a Zero. To receive credit for late work, the student must turn in the assignment the very next class period, and the assignment will not receive a Zero. An assignment turned in late, the next class after the due date, will receive a two (2) letter grade drop (to a C, if it was an A paper.) No home learning assignments will be accepted after one class period after the due date, without a valid excused absence and admit to class. The teacher is not responsible for collecting late home learning assignments or excuse papers. It is the responsibility of the student to make up their work. All assignments are located here, on the class website 24/7. Written assignments are to be printed by the student. No assignments will be accepted by email. If a printer is unavailable at home, at a friend’s, neighbors, relative’s or media center, students may use my printer by appointment as a last resort, before or after school, or during lunch #2, but NOT during class. FOURTH NINE WEEKS 2011/2012 Home Learning #4 Quia Final Exam Review #1 Go to Quia.com and take the Final Exam Review #1 to prepare you for the 400+ question Final exam, if you do not pass the CIW certification test. Due: next class – Block B Monday 5/21/2012 Home Learning #3 CIW Practice NTA Certification Test Worth Four (4) Grades Go to the CIW website at : CIW Certified Internet Web Professional This is the link to get your CIW certification. http://education.certification-partners.com/ciw/ Take the CIW Practice Certification Test until you get a 75% or above. Network Technology Associate (NTA) Exam (50 questions) Due: next class – Block B Friday 5/11/2012 Home Learning #2 Chapter 16 quiz Home Learning #1 Chapter 15 quiz THIRD NINE WEEKS 2011/2012 Home Learning #2 Review Chapter 11 on Advanced Personal Computers and read, and be prepared to complete, Lab 11.2.2 Lab: Using a Multimeter and a Power Supply Tester , and Lab 11.4.1 Lab: Install a NIC in Windows XP. Then choose any of the remaining labs that we have not done, and complete the Lab of your choice to turn in at the beginning of next class. Due: next class – Block B Tuesday 1/31/12 Home Learning #1 Finish Chapter 11 on Advanced Personal Computers and complete the Lab 11.6.3 handout on troubleshooting to turn in at the beginning of next class. Due: next class – Block B Friday 1/27/12 SECOND NINE WEEKS 2011/2012 Home Learning #8 Additional Review and Study for Networking Midterm If you failed the Cisco Networking Midterm on Chapters 1-10. As stipulated before you started the exam, you will now hand write the Cisco Chapter 1-10 Practice questions AND the correct answers over the long weekend. DUE Next class – Wednesday, January 18. NO late assignments will be accepted. An F will be given and a Saturday detention will be issued if the assignment is not completed satisfactorily and turned in at the beginning of the next class. No exceptions. Practice Final Exam for Chap. 1-10 - IT Essentials: PC Hardware and Software 1 Refer to the exhibit. Which two port types are shown in the graphic? (Choose two.) modem network parallel serial USB This item references content from the following areas: IT Essentials: PC Hardware and Software 2 6.2.1 Describe the components found on the outside of the laptop What should always be done prior to replacing components that are not hot-swappable in a laptop? Discharge all power that remains in the battery. Place the laptop in hibernate mode. Unplug the laptop and remove the battery. Remove all PC cards and expansion cards. This item references content from the following areas: IT Essentials: PC Hardware and Software 6.4.2 Describe the safe installation and removal of laptop components 3 Which power mode should be used by a laptop so that all the data is saved, all the applications the user was working on are left open, and there is no power used by the laptop? Hibernate Suspend Left on with no power mode Soft shutdown This item references content from the following areas: IT Essentials: PC Hardware and Software 4 6.4.2 Describe the safe installation and removal of laptop components What characterizes a DDoS attack? Many hosts participate in a coordinated attack. Infected computers are called Daemons. It is easy to identify the source of the attack. All hosts must be in the same geographic area. This item references content from the following areas: IT Essentials: PC Hardware and Software 9.2.4 Explain Denial of Service 5 Refer to the exhibit. Which type of removable media is depicted? hard disk USB optical drive PC card flash drive This item references content from the following areas: IT Essentials: PC Hardware and Software 6 1.4.6 Identify the names, purposes, and characteristics of storage drives Which type of standard interface allows users to connect and disconnect peripheral devices while the computer is running without having to restart? IDE SATA PATA USB This item references content from the following areas: IT Essentials: PC Hardware and Software 7 1.5 Identify the names, purposes, and characteristics of ports and cables A technician has installed a new sound card in a PC but it is not operating correctly. Where should the technician look to investigate driver problems? Computer Management Device Manager My Computer System Tools This item references content from the following areas: IT Essentials: PC Hardware and Software 8 5.5.3 Explore administrative tools A computer can access devices on the same network but can not access devices on other networks. What is the probable cause of this problem? The cable is not connected properly to the NIC. The computer has an invalid IP address. The computer has an incorrect subnet mask. The computer has an invalid default gateway address. This item references content from the following areas: IT Essentials: PC Hardware and Software 9 8.9.2 Attach computer to existing network The technician has been asked to upgrade the printer driver for an old printer. What is the best source for a new driver? manufacturer's website Microsoft Update website printer installation disk Windows Device Manager Windows hardware profiles This item references content from the following areas: IT Essentials: PC Hardware and Software 7.2.3 Describe how to install and update the device driver, firmware, and RAM 10 A technician is troubleshooting a computer that is experiencing hardware failure detected by the BIOS. What is one way this failure is indicated? The computer automatically boots into Safe Mode and displays a warning on the screen. The screen flashes with a red background and displays a warning message. The computer emits a pattern of beeps indicating the failing device. The computer returns an error message indicating the I/O address of the failing device. This item references content from the following areas: IT Essentials: PC Hardware and Software 3.9.1 Identify beep codes 11 A technician wishes to boot a computer using a CD-ROM that contains a limited operating system and diagnostic utilities. Where would the technician set the boot order for the PC? My Computer Control Panel Device Manager BIOS Start Menu This item references content from the following areas: IT Essentials: PC Hardware and Software 3.9.2 Describe BIOS setup 12 A technician has replaced a failing floppy drive. While testing the new drive, the technician notices that the floppy drive light remains lit constantly. What is most likely the cause of the problem? The new floppy drive is faulty. The ribbon cable is installed incorrectly. The jumper settings are set incorrectly for the floppy drive. The floppy drive has been disabled in the BIOS. This item references content from the following areas: IT Essentials: PC Hardware and Software 3.7.2 Connect the data cables 13 A customer is upset and wants to speak to a specific technician to resolve a problem immediately. The requested technician is away from the office for the next hour. What is the best way to handle this call? Refer the angry customer to a supervisor. Advise the customer that the requested technician is out of the office and insist on trying to resolve the problem. Make an offer to help the customer immediately, and advise the customer that otherwise the requested technician will call the customer back within two hours. Ignore the request for the specific technician by walking through a step-by-step process with the customer in an attempt to refocus the customer and solve the problem. This item references content from the following areas: IT Essentials: PC Hardware and Software 10.2.3 Focus the customer on the problem during the call 14 A customer is angry and calls to complain that the service scheduled on his computer took longer than expected. The technician reviews the work order and notices that the service was performed by a new employee. How should the technician respond? Verify that the computer is working properly now. Listen to the complaint and then apologize for any inconvenience caused by the lengthy service on the computer. Explain that the repair technician sent to perform the repair is inexperienced. Put the customer on hold until a supervisor is available. This item references content from the following areas: IT Essentials: PC Hardware and Software 10.2.3 Focus the customer on the problem during the call 15 Which type of power connector is used to connect devices such as optical drives and hard drives? 20-pin 24-pin Berg Molex P8 P9 This item references content from the following areas: IT Essentials: PC Hardware and Software 1.3.2 Describe power supplies 16 When a Windows XP computer has completed the POST for each adapter card that has a BIOS, what is the next step during the boot sequence? BIOS reads the MBR. NTDETECT.COM is used to detect any installed hardware. NTDLR reads the registry files. The WINLOGON.EXE program is started. This item references content from the following areas: IT Essentials: PC Hardware and Software 5.4.7 Identify the boot sequence files and Registry files 17 Which protocol adds security to remote connections? FTP HTTP NetBEUI POP SSH This item references content from the following areas: IT Essentials: PC Hardware and Software 8.3.4 Describe Internet protocols and applications 18 Which network device uses a MAC address table to segment the network? concentrator hub PBX router switch This item references content from the following areas: IT Essentials: PC Hardware and Software 8.4.1 Identify names, purposes, and characteristics of network devices 19 In the event of a catastrophic system or hardware failure, which Windows XP utility provides a framework for saving and recovering the operating system? Emergency Repair Disk (ERD) Automated System Recovery (ASR) Windows Recovery Manager (WRM) Automated Windows Recovery (AWR) System Restore (SR) This item references content from the following areas: IT Essentials: PC Hardware and Software 5.6.2 Schedule a task 20 Which program checks for installed hardware during the Windows XP boot process? HALL NTLDR NTDETECT NTOSKRNL This item references content from the following areas: IT Essentials: PC Hardware and Software 5.4.7 Identify the boot sequence files and Registry files 21 Which Registry file contains information about all software that is installed on a Windows XP computer? HKEY_CLASSES_ROOT HKEY_CURRENT_USER HKEY_LOCAL_MACHINE HKEY_CURRENT_CONFIG This item references content from the following areas: IT Essentials: PC Hardware and Software 5.4.7 Identify the boot sequence files and Registry files 22 A technician is planning to convert a file system from FAT32 to NTFS. What step should be taken before doing the conversion? Create a complete system backup. Backup the registry. Set a System Restore Point. Create an Emergency Repair Disk. This item references content from the following areas: IT Essentials: PC Hardware and Software 5.4.9 Describe directory structures 23 A call center technician is on a call with a customer when a colleague indicates that there is something to discuss. What should the technician do? Interrupt the customer and ask whether the customer would mind going on hold for a few minutes. Tell the customer that the call will be put on hold for a few minutes. Signal to the colleague to wait. Mute the line to the customer while discussing the issue with the colleague. This item references content from the following areas: IT Essentials: PC Hardware and Software 10.2.2 Display professional behavior with the customer 24 Which two ports on a laptop allow connection or removal of external devices, such as hard drives or printers, without powering off the computer? (Choose two.) DVI FireWire serial USB VGA This item references content from the following areas: IT Essentials: PC Hardware and Software 6.3.4 Compare and contrast desktop and laptop expansion capabilities 25 A technician is designing a hardware preventive maintenance plan for a company. Which strategy should be included in the plan? Avoid performing maintenance operations on plug and play devices that are controlled by the operating system. Only clean equipment that is requested by the customer. Omit performing maintenance operations on components until the equipment malfunction. Schedule and document routine maintenance tasks. This item references content from the following areas: IT Essentials: PC Hardware and Software 4.1 Explain the purpose of preventive maintenance 26 A customer complains that a scanner has suddenly stopped producing clear images. Which preventive maintenance task has the customer most likely forgotten to do? update the firmware visually inspect the scanner glass remove dust from the fans inspect the scanner cables This item references content from the following areas: IT Essentials: PC Hardware and Software 7.5.2 Describe scanner maintenance 27 A user is experiencing slow print rates when printing files that contain large complex graphics. What could be done to improve performance? Use better quality media. Add memory to the printer. Run regular self-tests and test pages. Change the printer cabling from parallel to serial. This item references content from the following areas: IT Essentials: PC Hardware and Software 7.2.3 Describe how to install and update the device driver, firmware, and RAM 28 A customer is considering an inkjet printer to print batches of colored documents that will be immediately stacked and packaged for shipping. What advice should a technician give the customer? The resolution of an inkjet printer is too low for this work. An inkjet printer has limited color capability. Immediately after printing, the ink is wet. An inkjet printer is a high cost option. This item references content from the following areas: IT Essentials: PC Hardware and Software 29 7.1.5 Describe inkjet printers Refer to the exhibit. What type of device is highlighted in white? touch pad mouse biometric authentication Bluetooth This item references content from the following areas: IT Essentials: PC Hardware and Software 6.2.2 Describe the components found on the inside of the laptop 30 A student wishes to buy a computer suitable for game playing. What CPU speed would be appropriate for game playing? 44.1 MHz 100 MB/s 3 GHz 1 TB This item references content from the following areas: IT Essentials: PC Hardware and Software 1.4.2 Identify the names, purposes, and characteristics of CPUs 31 What is the best way to fully ensure that data is unable to be recovered from a hard drive? formatting the drive deleting the partitions on the hard drive overwriting data multiple times, rendering the data unusable shattering the hard drive platters with a hammer This item references content from the following areas: IT Essentials: PC Hardware and Software 9.2.8 Explain data wiping, hard drive destruction and recycling 32 What guideline should be followed when establishing a password security policy? Passwords should be physically stored in a convenient location. Passwords should contain mainly numbers for better encryption. The system administrator should assign passwords to the users. Lockout policies should be avoided in order to increase user access. An expiration period should be established so that passwords frequently change. This item references content from the following areas: IT Essentials: PC Hardware and Software 9.3.3 Describe ways to protect data 33 A user believes that a data file on a Windows XP computer has been corrupted. Which utility can provide the best information about the data file? Defrag CHKDSK MSCONFIG REGEDIT.EXE This item references content from the following areas: IT Essentials: PC Hardware and Software 5.6.2 Schedule a task 34 A customer is experiencing repeated paper jams on a laser printer. Which quick solution might correct this problem? Power cycle the printer. Download and install a new printer driver. Replace the paper in the input tray with new paper. Remove and replace the primary corona wire. This item references content from the following areas: IT Essentials: PC Hardware and Software 7.6.1 Review the troubleshooting process 35 A network specialist has been hired to install a network in a company that assembles airplane engines. Because of the nature of the business, the area is highly affected by electromagnetic noise. Which type of network media should be recommended? Category 5e coaxial fiber optic UTP This item references content from the following areas: IT Essentials: PC Hardware and Software 8.4.2 Identify names, purposes, and characteristics of common network cables 36 When starting a computer, a customer can no longer select two of the operating systems that are installed. Which file may be corrupted and causing this error? BOOT.INI STARTUP.INI SYSTEM.INI WIN.INI This item references content from the following areas: IT Essentials: PC Hardware and Software 5.4.7 Identify the boot sequence files and Registry files 37 A customer used the convert.exe utility to take advantage of NTFS security features. The customer later discovered that the application on the computer can only read FAT32 files. After the hard drive was formatted back to FAT32, the customer noticed all of the data files are missing. What should the customer do next? Run convertFAT32.exe. Restore the data files that were backed up in preparation for the conversion. Reset the file attribute to show hidden files. Restart the computer after updating the hard drive to FAT32. This item references content from the following areas: IT Essentials: PC Hardware and Software 5.4.9 Describe directory structures 38 A technician installed Windows XP on a 20 GB SCSI drive but when the computer is started a NTLDR error message is displayed. Based on this information which file was most likely corrupted during installation? NTBOOTDD HAL NTSCSILDR NTWINHAL This item references content from the following areas: IT Essentials: PC Hardware and Software 5.4.7 Identify the boot sequence files and Registry files 39 A technician is explaining the differences between inkjet printers and laser printers to a customer. Which two comparisons should the technician make? (Choose two.) Inkjet printers are less expensive than laser printers. A laser printer is significantly slower than an inkjet printer. Both laser and inkjet printers produce poor quality images. The laser printer output is dry after printing, but an inkjet printer may still have wet ink on the paper after printing. Inkjet printers use plain paper to make economical prints, but laser printers require more expensive thermal paper. This item references content from the following areas: IT Essentials: PC Hardware and Software 7.1.3 Describe laser printers 40 At which TCP/IP model layer would a MAC address be found? application transport internet network access This item references content from the following areas: IT Essentials: PC Hardware and Software 8.8.1 Define the TCP/IP model 41 A technician powers on a computer and opens a web page. A message that the web page could not be found appears. After checking the URL, the technician verifies that this is the problem that was reported by the computer owner. What would be the next step in the troubleshooting process for the technician? Replace the NIC. Replace the network cable. Verify user permissions. Verify the computer IP address information. This item references content from the following areas: IT Essentials: PC Hardware and Software 8.12.2 Identify common network problems and solutions 42 The current IP configuration of a small company is done manually and is time-consuming. Because of increased network growth, a technician needs a simpler way for IP configuration of workstations. Which service would simplify the workstation IP configuration task? APIPA DHCP DIPS ICMP This item references content from the following areas: IT Essentials: PC Hardware and Software 8.3.3 Define DHCP 43 A customer requests advice about the type of storage device to use for 20 new computers. For which two conditions should SSDs be recommended as replacements for magnetic hard drives? (Choose two.) locations that require low power usage workplaces that use Blu-ray storage media external flash drives that are required to be connected by USB workplaces with harsh workplace conditions where the computers are subject to dust and vibration locations where redundant disks are required to appear as one logical disk to the operating system This item references content from the following areas: IT Essentials: PC Hardware and Software 1.4.6 Identify the names, purposes, and characteristics of storage drives 44 A customer wants to produce video recordings to sell to the public. Which two types of media should be used to accomplish this type of recording? (Choose two.) DVD+/-RW DVD+/-R CD-RW BD-RE BD-R This item references content from the following areas: IT Essentials: PC Hardware and Software 1.4.6 Identify the names, purposes, and characteristics of storage drives 45 A user cannot log in to the network with a computer that worked yesterday. Other computers on the same network are working fine. Which troubleshooting process would be most logical to try first? Look at the NIC lights. Use a cable tester to check the network cable. Use Device Manager to check for a resource conflict. Verify the status of the Windows firewall ports that are enabled. Activate the drive error checking tool to check for damaged areas on the hard disk. This item references content from the following areas: IT Essentials: PC Hardware and Software 8.12.2 Identify common network problems and solutions 46 What are two functions of a VPN gateway? (Choose two.) establish secure VPN connections provide remote user access to the VPN client software manage VPN tunnels ensure low latency connections to VPN clients establish high bandwidth WAN connections to the Internet This item references content from the following areas: IT Essentials: PC Hardware and Software 8.10.5 Define VPN 47 A technician is repairing Windows XP and wants to keep all of the application settings in the operating system. The technician is using the Repair XP option and has rebooted the computer. A message appears on the screen stating "Press any key to boot from the CD or DVD." What should the technician do? The technician should press the space bar so that the installation can continue. The technician should ignore the message and allow XP to repair the operating system without deleting any of the applications. The technician should press the F8 key so that the restore options can be displayed on the screen. The technician should press the windows key so that the operations can continue and the XP CD can be removed. This item references content from the following areas: IT Essentials: PC Hardware and Software 5.4.3 Install the operating system using default settings 48 Which three tasks should a computer preventive maintenance plan contain? (Choose three.) the defragmentation of the hard drive the addition or removal of new applications the identification of probable causes of the problem an update of the operating system and applications an update of antivirus and other protective software an evaluation of the methods for gathering information about problems and the solutions to be implemented This item references content from the following areas: IT Essentials: PC Hardware and Software 5.6.1 Create a preventive maintenance plan 49 Which two security tasks should be included in a computer preventive maintenance plan? (Choose two.) an update of spyware removal tools a centralization of network administration an update of antivirus scanner software an update of network cable termination information documentation of network protocols such as DHCP and DNS This item references content from the following areas: IT Essentials: PC Hardware and Software 5.6.1 Create a preventive maintenance plan 50 A new application fails to install from a CD known to be virus-free and compatible with the operating system. What is a possible solution to this problem? Use the Last Known Good Configuration. Update the operating system from the Windows Update website. Close all other running programs before installing the new application. Run the installation application under Windows XP compatibility mode. This item references content from the following areas: IT Essentials: PC Hardware and Software 5.7.2 Identify common problems and solutions Home Learning #7 Finish Chapter 10 on Communication Skills and take the Cisco Quiz (11 questions). Write down your answers only on paper to turn in at the beginning of next class. Due: next class – Block B Monday 1/9/12 Home Learning #6 Finish Chapter 9 on Computer Security and take the Cisco chapter 9 test. Have a Happy Holiday, relaxing winter break, and a great year in 2012! Due: next class – Block B Tuesday 1/3/12 Home Learning #5 Finish Chapter 8 on Networks and take the Cisco chapter test. Download the Aspire application and work through the first set of problems. Also, download the Packet Tracer program and practice the two labs we did on the Smartboard in class. Home Learning #4 Finish Chapter 8 – Write the Chapter Quiz (answers only) on paper to turn in, and be prepared to take the Chapter 8 Cisco Test next class Due: next class – Block B Wednesday 11/23/11 Home Learning #3 Finish Chapter 7 – Write the Chapter Quiz (answers only) on paper to turn in, and be prepared to take the Chapter 7 Cisco Test next class – Tuesday. Due: next class – Block B Tuesday 11/15/11 Home Learning #2 Finish Chapter 6 – Laptops Write the Chapter Quiz (answers only) on paper to turn in, and be prepared to take the Chapter 6 Cisco Test next class – Thursday. Due: next class – Block B Thursday 11/10/11 Home Learning #1 Finish Chapter Five and take the Cisco chapter 5 Test online. Finish the PowerPoint presentation to present next class. Due: next class – Block B Monday 10/31/11 FIRST NINE WEEKS 2011/2012 Home Learning #4 Finish reading the PARADE.com article, “Born To Be Wired.” Write a one page informative essay describing the insights that you have into the WIRED GENERATION, according to the article. Provide real world examples of your experiences with family and friends about addiction to computers, without using real names. Due: next class – Block B Friday 10/14/11 Home Learning #3) Finish reading Chapter I in the Cisco online curriculum. Then take the Chapter One test. If you did not finish the Skills Test, complete it as well. Deadline: next class – Block B Wednesday 9/7/11 Home Learning #2) Create a Student Planner cover DRAFT on a piece of 8.5” x 11” paper, using any computer program or drawing tools (crayons, markers, colored pencils, etc.) Be sure to include the following in your Draft: Planner Cover Contest Requirements 1. Use One color, with black, white, & gray 2. Print out in 8.5” x 11” 3. Include a slogan for school spirit 4. Include the years 2012-2013 5. Include the School name 6. Include Your name 7. Include a graphic / artwork Deadline: In class 9/2/11 Home Learning #1) “Computer Literacy” Using a computer, write a one page, informative essay about your past experience using computers, and what knowledge you have gained from classes you have taken over the years. Be sure to include all classes you have taken. Your essay should exhibit proper writing techniques you have learned, including proper spelling, grammar, content and organization. Your essay should be created with a computer writing program such as M.S. Word, using a 12 point font and double spacing. Print your paper to hand in on the due date. If you do not have a working computer and printer, find one to use at a library, at a neighbor’s, a friend’s, a fellow classmate’s, or in my class by appointment. Proofread and use the spell check and grammar check programs to avoid errors. This assignment will help me get to know your experience level in computers, as well as your writing level and ability to follow directions. Deadline: next class – Block B Monday 8/29/11 , Block A Tuesday 8/30/11, Put your home learning assignment in the “Assignments” box at the front of the class as you come in. If you produce your home learning assignment after the bell rings, it is late.