Thursday, 29 September 2016

CIST 1122 Hardware Installation & Maintenance Final Exam Answers

CIST 1122 Hardware Installation & Maintenance Final Exam Answers
 Follow Below Link to Download Tutorial

For More Information Visit Our Website (   https://homeworklance.com/  )


1. A HDMI cable is generally used for what computer functions?
2. Where does one go to verify correct hardware settings in a system?
3. What connectors from a power supply should be used with a graphics expansion card?
4. What MUST be performed when installing a Video card for use?
5. What expansion slots is characterized by having an x16 speed?
6. What types of Ethernet should be used if a technician has no choice but to run cable along fluorescent lighting arrays in a suspended ceiling?
7. What laptop accessories would MOST likely be used to support multiple expansion ports?
8. What connector types is used on a CAT5 cable?
9. What can be implemented on a WAP to ensure that only certain client machines can access it?
10. Secure web traffic uses what port?
11. What features can be configured with keyboards to assist users with disabilities?
12. What features makes logical processor cores appear as physical cores to the operating system?
13. What storage media would be used to build a cost-effective RAID 5 array?
14. A network consisting of numerous geographically dispersed networks that cover a large physical distance is referred to as a ______.
15. What connections has 9-pins?
16. What wireless standards is backwards compatible with 802.11g?
Hardware Installation & Maintenance Final Exam Study Guide
17. A technician needs to make several patch cables. What tools would the technician use to attach the RJ-45 ends to the cables?
18. What is the standard loopback address for IPv4?
19. What will provide the BEST protection against power failures and data loss?
20. What is a benefit of using ECC memory?
21. What are components of an “active” CPU cooling solution?
22. What features of a CPU socket is designed to make installation of a CPU easier?
23. What ports are commonly used to send/receive email?
24. What is an example of an IPv4 address?
25. What expansion slots can ONLY be found on a desktop computer?
26. A standard Internet mail account receives incoming messages on what ports?
27. What network devices would be MOST likely to perform Network Address Translation (NAT)?
28. What is MOST likely needed when installing a new POS thermal printer?
29. What network type’s BEST represents a network centered a city?
30. What is LEAST likely to be considered a consumer replaceable part in a laptop?
31. What is the speed limitation for CAT3 wiring?
32. What provides the LEAST network security?
33. What RAM types are compatible with PC2700 and maintain the same performance?
Hardware Installation & Maintenance Final Exam Study Guide
34. What media types is LEAST likely to be affected by electromagnetic interference?
35. A DVI-D cable is generally used for what computer functions?
36. What PC expansion cards need to be installed so you can have hard drive performance and redundancy?
37. What is the FIRST component to transfer heat away from a processor?
38. What BEST describes the function of DNS?
39. What printers is required when carbon paper is used?
40. A technician is looking to install a 3.5 inch desktop hard drive into an external enclosure. What input interfaces would provide the fastest speed for the drive?
41. What encryption methods is considered easily broken and should be avoided when configuring wireless security?
42. What cable types has a MAXIMUM transmission rate of 100 Mb?
43. A user on a wireless network has the IP address 169.254.155.2 but cannot connect to the Internet. What should the user check on the wireless router?
44. What types of RAM is used with the current i-Series CPUs?
45. Where does one go to verify correct hardware settings in a system?
46. What types of RAM can be used in a dual channel configuration?
47. What is representative of a public class B address type?
48. What memory form factors is MOST commonly found in laptops?
49. What describes the port with 3 rows and 15 pins?
50. What BEST describes the function of DNS?
Hardware Installation & Maintenance Final Exam Study Guide
51. What devices transmits data to only certain ports?
52. What connectors is used to connect a DSL modem to a wall outlet?
53. When unable to get an IP address from a server, what represents an APIPA address that a PC might receive?
54. What expansion slots would support the HIGHEST transfer speeds for high-end graphics cards today?
55. What media types is MOST likely to be affected by electromagnetic interference?
56. What cable types has the MAXIMUM transfer rate of 100Mbps?
57. What is referred to as the Hardware address?
58. What settings when used, is MOST likely to result in an IP address conflict on a local network?
59. What is the default subnet mask for a Class B address?
60. What encryption types is the LEAST secure?
61. A technician has just installed two memory modules on a motherboard that supports DDR3 RAM with the bus speed up to 1600 MHz. The specifications of memory are DDR3 1333 MHz for one module and DDR3 1666MHz for another. On What bus speeds will the system function?
62. The helpdesk technician has been tasked to reinstall the OS on a desktop and has already inserted the OS install disk in the CD-ROM. What would MOST likely need to be configured within the BIOS to continue reinstalling the OS?
63. What devices transmits data to only certain ports?
64. What voltages is MOST likely to be supplied from a PC power supply unit? .
65. What network types BEST represents a network centered on one individual?
66. What cable types uses a 4-wire connector?
Hardware Installation & Maintenance Final Exam Study Guide
67. What connection types has the LONGEST transmission limitation in terms of distance?
68. What is the MAXIMUM transfer speed of USB 3.0?
69. Basic web traffic uses what port?
70. What printer types needs to have ink cartridge replaced as part of the normal maintenance cycle?
71. What printers is required when carbon paper is used?
72. Why type of protocol is “connectionless”?
73. What should be considered when building a standard PC?
74. What connectors would terminate a POTS connection?
75. What connection types is MOST likely to be used to connect an internal hard drive to a computer?
76. What allows a user to use an operating system inside an operating system?
77. What devices converts digital signals to analog ones?
78. What should a technician configure to limit access to a small office home office (SOHO) wireless network by the computer’s NIC hardware identification?
79. What level of the OSI model does TCP and UDP operate at?
80. A customer states that since the new firewall has been installed, the customer has not been able to send webmail. What ports on the firewall should be checked?


CIS 515 Week 10 Technical Paper: Database Administrator for Department Store

CIS 515 Week 10 Technical Paper: Database Administrator for Department Store

CIS 515 Week 10 Technical Paper: Database Administrator for Department Store

The Strayer Oracle Server may be used to test and compile the SQL Queries developed for this assignment. Your instructor will provide you with login credentials to a Strayer University maintained Oracle server.
Imagine that you have been hired as the database administrator for a local department store. The department store has recently expanded by opening five (5) stores within your local region. They have also launched a series of marketing campaigns to attract new customers and increase sales. For your hired role, you will be responsible for creating and maintaining an enterprise-wide database system that will hold the sales and inventory data for the organization. The designed database will help operations in supporting its new business marketing strategy. Using the concepts presented throughout the course, you will develop a plan to create this database and establish a design that aligns with the product sales initiatives of the organization.
Write a twelve to fifteen (12-15) page paper in which you:
  1. Identify the potential sales and department store transactions that can be stored within the database.
  2. Design a database solution and the potential business rules that could be used to house the sales transactions of the department store.
  3. Evaluate all relationships of each entity within your database solution using the Crow’s Foot notation. Include all data elements, entities, relationships (such as 1:M, 1:1, M:N), and cardinalities for the department store database in your diagram. Note:The graphically depicted solution is not included in the required page length.
  4. Research the Internet for best practices of how retail stores use databases for retaining customers and increasing sales and complete the following:
    1. Justify how Big Data tools could be used for forecasting sales and inventory of the department store.
    2. Propose two (2) SQL Stored Procedures that use SQL functions to help sales associates perform explanatory or predictive analytics.
    3. Give your opinion on which of the two (2) ways you proposed in Question four (4) b provide greater value to expanding their business within the region.
    4. Provide a copy of your working SQL code as part of the paper.
  5. Research the Internet for database vendors that provide cloud computing services and complete the following:
    1. Estimate the types of costs involved or the pricing structure required when implementing a cloud-hosted solution for a database.
    2. Analyze security considerations and pricing of the different cloud implementation types.
    3. Rank the cloud services options of Software as a Service, Platform as a Service and Infrastructure as a Service in terms of functionality, mobility, and ability to provide distributed transaction concurrency. Compare how these cloud-based services fit within an environment where users are mobile. Determine the technical provisions that would be required to ensure data integrity.
  6. Evaluate whether the use of a distributed DBMS structure is appropriate and identify the optimization techniques that should be factored in to enhance the operations of the database in your design.
  7. Provide at least two (2) examples of how lost updates and uncommitted data may occur, keeping in mind that five (5) stores will be generating transactions.
  8. Determine the concurrency control factors that can be used to ensure valid execution of transactions within the current multiuser environment.
  9. Research the Internet for backup and restoration recovery solutions and database security threats that could be applicable to the department store. Upon your research, complete the following:
    1. Suggest at least two (2) options that could be made available to provide disaster management functions for the database system within the retail environment.
    2. Assess the types of security threats that may exist when managing the department store database and suggest measure(s) that can be performed to minimize these threats that are particular to retail.
  10. Use at least six (6) quality resources in this assignment. Note:Wikipedia and similar Websites do not qualify as quality resources.


CIS 510 Reliable Pharmaceutical Service Final Project Plan

CIS 510 Reliable Pharmaceutical Service Final Project Plan

CIS 510 Reliable Pharmaceutical Service Final Project Plan

Imagine you are the head administrator at Well Being Hospital, a hypothetical local health care facility. Your task is to communicate with Get Well Drugs, a major U.S. pharmaceutical manufacturer, in order to determine if the drugs supplied by this manufacturer are within benchmark standards set forth by the United States Food and Drug Administration (FDA) and are thus suitable for use at your hospital. Specifically, you have to report your findings to the health care professionals who use these medications.
Note: You may create and / or make all necessary assumptions needed for the completion of this assignment.
Write a three to four (3-4) page paper in which you:
Recommend a strategy for communication with Get Well Drugs in order to determine if the drugs supplied by this manufacturer are within benchmark standards set forth by the FDA.
Outline a plan for asking questions directed toward Get Well Drugs about any FDA regulations which may be applicable to your local hospital.
Outline a plan for communicating these findings to a local consortium of nurses and physicians at your hospital. This plan must include, at a minimum, the cost of the drugs, as well as the types of drugs for use in mental, behavioral, and general services.
Conclude your findings, in which you suggest the pros and cons of using Get Well Drugs.
Use at least four (4) quality academic resources in this assignment. Note: Wikipedia and other Websites do not qualify as academic resources.

CIS 499 Project Deliverable 2: Business Requirements

CIS 499 Project Deliverable 2: Business Requirements

CIS 499 Project Deliverable 2: Business Requirements

Due Week 4 and worth 120 points
This assignment consists of two (2) sections: a business requirements document and a project plan. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for. Additionally, you may create and / or assume all necessary assumptions needed for the completion of this assignment.
Documenting the existing IT network and system is an important first step, but you, the CIO, know that capturing the needed changes can be critical to your success as an executive. You know that procuring and documenting quality business requirements is an important step toward the design of quality information systems. Completion of a quality requirements document allows user needs and expectations to be captured, so that infrastructure and information systems can be designed properly. Using the requirements document provided in the course shell as a part of the requirements gathering process, you are to assess the needs of the company as it prepares to become a multinational organization. You must consider current and future trends and requirements; however, assumptions should be realistic and carefully considered. The needs of the organization should be documented. Later deliverables will focus on specifics of all requirements.
Section 1: Business Requirements Document
Write a four to six (4-6) page original business requirements document for the project plan using the template provided here. Note: The template can also be found in the Student Center of the online course shell.
Describe the project needs, including the following:
Describe the scope and analyze how to control the scope.
Speculate and give justifications for how to control scope.
Identify possible risks, constraints, and assumptions.
Describe the needed integration with other systems and infrastructure. Note: Database and Data Warehousing, Cloud Technology and Virtualization, and Network Infrastructure and Security.
Assess the human capital that may be needed to complete the project, ensuring that necessary skill sets are identified.
Speculate on possible outsourcing or offshoring needs that may be required to accomplish project.
Define relevant terms that will be used throughout the project.
Include cost projections for staffing, infrastructure, and other resources.
Use at least two (2) quality resources in this assignment. Note: Wikipedia and similar
Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
Section 2: Revised Project Plan
Use Microsoft Project to:
Update the project plan (summary and detail) template, from Project Deliverable 1: Project Plan Inception, with three to five (3-5) new project tasks, each consisting of five to ten (5-10) subtasks.
The specific course learning outcomes associated with this assignment are:
Describe the integrative functions and activities within the information systems area, including the role of the CIO and technologies managed within the organization.
Evaluate how information technology (IT) is aligned with the strategy of the organization, and how to make appropriate choices about architecture in relationship to overall organization goals.
Use technology and information resources to research issues in information systems.
Write clearly and concisely about leadership issues and strategic insight of the Information systems domain using proper writing mechanics and technical style conventions.


CIS 462 Case Study 2: SCADA Worm

CIS 462 Case Study 2: SCADA Worm
 Follow Below Link to Download Tutorial

For More Information Visit Our Website (   https://homeworklance.com/  )


Case Study 2: SCADA Worm

Due Week 6 and worth 100 points
Protecting the nation’s critical infrastructure is a major security challenge within the U.S.  Likewise, the responsibility for protecting the nation’s critical infrastructure encompasses all sectors of government, including private sector cooperation. Search on the Internet for information on the SCADA Worm, such as the article located at http://www.theregister.co.uk/2010/09/22/stuxnet_worm_weapon/.
Write a three to five (3-5) page paper in which you:
  1. Describe the impact and the vulnerability of the SCADA / Stuxnet Worm on the critical infrastructure of the United States.
  2. Describe the methods to mitigate the vulnerabilities, as they relate to the seven (7) domains.
  3. Assess the levels of responsibility between government agencies and the private sector for mitigating threats and vulnerabilities to our critical infrastructure.
  4. Assess the elements of an effective IT Security Policy Framework, and how these elements, if properly implemented, could prevent or mitigate and attack similar to the SCADA / Stuxnet Worm.
  5. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
The specific course learning outcomes associated with this assignment are:
  • Identify the role of an information systems security (ISS) policy framework in overcoming business challenges.
  • Compare and contrast the different methods, roles, responsibilities, and accountabilities of personnel, along with the governance and compliance of security policy framework.
  • Describe the different ISS policies associated with the user domain.
  • Analyze the different ISS policies associated with the IT infrastructure.
  • Use technology and information resources to research issues in security strategy and policy formation.
  • Write clearly and concisely about Information Systems Security Policy topics using proper writing mechanics and technical style conventions.
Click here to view the grading rubric for this assignment.

CIS 408 Week 8 Assignment 3 The Wild Frontier Part 3

CIS 408 Week 8 Assignment 3 The Wild Frontier Part 3

CIS 408 Week 8 Assignment 3 The Wild Frontier Part 3

Assignment 3: The Wild Frontier, Part 3
Due Week 8 and worth 80 points
Thanks to the great IT support the IT team provided, Wild Frontier is expanding even more. Each of the original four (4) satellite offices have doubled in size and four (4) more offices are being opened. The current licensing seats have managed to cover all of the existing personnel, without full utilization but the new demand will overtax them. The owner, Sam Yosemite, gets all fired up if he can’t allocate costs fairly according to use. You also need to make the existing printers cover the additional personnel use without buying new printers, even though the managers have to print off long documents several times each week to provide shooting targets for Sam.
Also, some users have been accessing applications and media services they do not need and the IT team needs to curtail this. The budget given for the increased staff is not sufficient for new desktops for each user. Additional storage needs have been identified in the original four (4) satellite offices, as well as some slowdowns in performance. These need to be addressed along with the consideration of Terminal Services Licensing.
Write a three to four (3-4) page paper in which you:
1. Analyze how using Windows SharePoint Services will help meet many of the criteria for providing support for the additional remote offices and help prevent duplication of work.
2. Create a plan to meet the printer requirements specified in the scenario.
3. Propose a solution that will address the:
a. Additional storage needs.
b. Slowdowns in performance.
c. Consideration of Terminal Services Licensing.
4. Use Visio or a similar tool to depict graphically the physical and logical layout of your plan. Note: The graphically depicted solution is not included in the required page length.
5. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
•Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
•Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
•Include charts or diagrams created in Excel, Visio, or one of their equivalents such as Open Project, Dia, and OpenOffice. The completed diagrams / charts must be imported into the Word document before the paper is submitted.
The specific course learning outcomes associated with this assignment are:
•Demonstrate the ability to plan, deploy, and configure Windows SharePoint Services.
•Demonstrate the ability to plan, deploy, and configure Windows Media Services.
•Use technology and information resources to research issues in application server development.
•Write clearly and concisely about application server development using proper writing mechanics and technical style conventions.
Top of Form
Bottom of Form


CIS 333 Case Study 1: The Officer and the Drug Arrest

CIS 333 Case Study 1: The Officer and the Drug Arrest
 Follow Below Link to Download Tutorial

For More Information Visit Our Website (   https://homeworklance.com/  )


Case Study 1: The Officer and the Drug Arrest

Due Week 2 and worth 100 points
Officer Jones is a veteran officer with the Smithville police department. He received information that a citizen living in the local housing project was selling drugs. This information was conveyed to Officer Jones by an anonymous caller to the officer on his personal cell phone. Officer Jones immediately went to the housing project and stopped the citizen as he was leaving his apartment. Officer Jones searched the citizen and found drugs.
Note: You may create and / or make all necessary assumptions needed for the completion of this assignment.
Write a one to two (1-2) page paper in which you:
  1. Identify the constitutional amendment that would govern Officer Jones’ actions. In your own opinion, discuss if you support his actions or not. Justify your answer using the appropriate case law and Supreme Court precedents.
  2. Analyze the validity and constitutionality of Officer Jones’ actions.
  3. Determine whether or not Officer Jones’ actions were justified by any of the three (3) ways whereby probable cause can be established. Provide a rationale for your response.
  4. Use at least two (2) quality references.Note: Wikipedia and other Websites do not qualify as academic resources.
Your assignment must follow these formatting requirements:
  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
The specific course learning outcomes associated with this assignment are:
  • Research and analyze procedures governing the process of arrest through trial.
  • Critically debate the Constitutional safeguards of key Amendments with specific attention to the 4th, 5th, 6th, and 14th Amendments.
  • Describe the difference between searchers, warrantless searches, and stops.
  • Write clearly and concisely about the criminal procedure using proper writing mechanics.