Describe where your main firewalls are

Assignment Help Basic Computer Science
Reference no: EM131086207

Setting up a wireless network

Check the attachments below. Having read the articles below, "Myths and Truths of Wireless Security" and "Setting up a wireless network"(link provided), create an appropriate network map diagram of YOUR home network. You may refer to Textbook, Data Communications and Networking by White(author) for diagrams.

1. Show wired and wireless connections.

2. Indicate the CAT x (i.e., CAT 5, CAT 5e, CAT 6, etc) cable in use and the wireless speed of your wireless router and all of your wireless computers and other devices that are in use (i.e., 802.11b, g, a, n, ac, etc).

3. Indicate what devices are being used to connect, for example motherboard, USB, network interface card, Bluetooth, etc.

4. Include all peripherals, iPods, tablets and phones (show all IP Addresses).

5. If you have your TV hooked up to the Internet (Smart TV) then show that as well.

6. Describe where your main firewalls are (both hardware-based and software-based).

7. Do NOT show the status of your ports.

8. Show the IP addresses for all of your connected computers/devices/peripherals, except for your router's public IP address.

9. Do NOT show MAC addresses.

The paper will consist of the diagram plus an explanation pages

LINK below for Setting up home network

https://windows.microsoft.com/en-us/windows/setting-wireless-network#1TC=windows-7

Reference no: EM131086207

Questions Cloud

Advertising regulations in foreign market : What steps should be considered with advertising regulations in that foreign market?" Use examples to illustrate and consider culture, religion, tradition, and form of government.
Broad range of talent management efforts : Describe the broad range of talent management efforts that use software applications by reading The User's Voice: Understanding the Impact of Talent Management Software by Dr. K. Jones and hosted at IHRIM.org.
Can higher percentage of women have high blood pressure : Survey on Inevitability of War A sample of 200 teenagers shows that 50 believe that war is inevitable, and a sample of 300 people over age 60 shows that 93 believe war is inevitable. Is the proportion of teenagers who believe war is inevitable dif..
Describe the set of actions that survive the elimination : In the following game, Describe the set of actions that survive the iterated elimination of strictly dominated actions. Describe the set of actions that survive the iterated elimination of weakly dominated actions
Describe where your main firewalls are : Describe where your main firewalls are (both hardware-based and software-based). Indicate what devices are being used to connect, for example motherboard, USB, network interface card, Bluetooth, etc.
What will is an immediate concern and what can wait : What will is an immediate concern and what can wait? What additional types of assistance (other than initial 1st responders) would be helpful here? How would they be used?
What happens if the two-sample t test is used : Does it appear that the true average difference between intake values measured by the two methods is something other than zero? Deter- mine the P-value of the test, and use it to reach a conclusion at signi cance level .05.
Define a business or management problem : This week, you will define a problem or risk and provide objectives (this problem will be used in future weeks). Define a business or management problem and provide objectives.
Provide an access point for backdoor trojan horses : By doing so, instant messengers can transfer worms and other malware, and also provide an access point for backdoor Trojan horses.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Loss of generality in private-key encryption

Prove that, in the context of private-key encryption, we can assume without loss of generality that keys are chosen uniformly at random (and so Gen is trivial).

  Explain professional responsibility to complete installation

You are an engineer involved in the development of a financial system. During installations, you discover that this system will make a significant number of people redundant. It is your professional responsibility to complete the installation as..

  Write pseudo code for a replace function at the client level

write pseudo code for a replace function at the client level that replaces the dictionary item whose search key is x with another item whose search key is also x .

  Mini case: k-mart

Mini Case: K-Mart

  Write a main function, and the following functions

Write a main function, and the following functions to compute the stress and strain oa a steel rod(D) (in inches) and length(L) in inches subject to the compression load(P) of 10,000 to 1,000,000 pounds

  Probability p[w] that the operation is successfull

Sketch a block diagram for this operation similar to those of Figure 1.3 on page 38. What is the probability P[W] that the operation is successful?

  What screen enables you to customize files

Which of the following menu commands would you select to make a copy of an open file and rename it. What screen enables you to customize how files will be saved on your computer

  Part of your first project

On completion of this course you are hired by the company Tickets R Us. Part of your first project is to develop an application to assist with the selling of tickets. After discussing with your client

  Explain hacktivism includes cracking for higher purpose

And "hacktivism" includes cracking for "higher purpose". Is it feasible to crack systems and still be ethical? Support the position.

  Write an essay about basic of computer science

Write an essay about basic of computer science.

  Use the class date type to store the date of birth

Use the class date type to store the date of birth, admit date, discharge date, and class doctorType, to store attending physicians name. Add appropriate constructors and member functions to initialize, access and manipulate the data members.

  Explain data by state of computer-s electrical switches

Differentiate between computer data represented by the state of computer's electrical switches and meaningful information which is displayed to user.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd