Familiarize students with few networking concepts

Assignment Help Basic Computer Science
Reference no: EM132437027

The purpose of this assignment is to familiarize students with a few networking concepts that are frequently utilized by IT professionals.

1. Download/install the Fing application on your mobile device, smartphone, or tablet. If you do not have any of these devices, use Google to identify and install a similar application on your computer. Perform a scan of your home and/or business network. Take note of the results. Perform the test several times throughout the day, and note any differences. Use the application to determine additional information on the results.

2. Download and install the Nmap application on your PC. Use Nmap to scan your home and/or business network. Take note of the results. Perform the test several times throughout the day, and note any differences. Use the application to determine additional information on the results.

Research and write a paper (250-500 words) on the reasons why these applications (Fing application and Nmap Application) might be valuable in troubleshooting and securing networks. Provide details on your results from Steps 1 and 2 and how those results can specifically be used to troubleshoot and secure your network in the future.

Be sure to cite your research, as well as the tools you used to perform actions related to the research.

Prepare this assignment according to the guidelines in Student Success Center.

This assignment uses a rubric. Refer to the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.

Reference no: EM132437027

Questions Cloud

What is a clinical trial : What is a clinical trial? What is a double-blind experiment and why is double-blinding important?
Create step-by-step it security policy for handling : Create a step-by-step IT security policy for handling user accounts/rights for a student who is leaving prematurely
Monitoring of critical control points in the manufacture : To prevent foodborne illnesses, the food industry and restaurants currently follow _____ guidelines, which emphasize careful monitoring of critical control
Discuss the Latinos as proffered by Samuel Huntington : How does Sal Osio counter the argument that Hispanics are a threat to American culture?Discuss the Latinos as proffered by Samuel Huntington?
Familiarize students with few networking concepts : The purpose of this assignment is to familiarize students with a few networking concepts that are frequently utilized by IT professionals.
What are dietary supplements : What are dietary supplements? and how do they differ from a pharmaceutical drug?
Protein recommendations and drinks : Discuss a topic on healthy nutrition practices for a high school physical education class and include specific ideas such as healthy snacking, nutrition choices
What is the Ontological Argument for the existence of God : According to Hobbes, justice is a concept created by society since people must have rules to get along. What does his position imply about way people naturally
Replace legacy system-categories of compression algorithms : A company that is looking to replace a legacy system. Lossless and lossy are the two universally known categories of compression algorithms.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Examine the behaviour of the mpk

The marginal product of capital is given by a Y/K. Setting TFP and L 1, examine the behaviour of the MPK as it varies between 0.3 and 1.

  Important to protect organizational assets against malware

Chapter 5 covered malware concepts and how Microsoft Windows protects against malware. Why is it important to protect organizational assets against malware?

  Write a program to display a simplified bill

Suppose automobile repair customers are billed at the rate of $35 per hour for labor. Also, suppose costs for parts and supplies are subject to a 5% sales tax.

  About three different views of simulation quality

Discusses methods to assess the quality of simulations. You learned about three different views of simulation quality.

  How could the strategy be legitimately reused

How did they work together? How could the strategy be legitimately reused? Provide all references and methodology used.

  Prevent a user from having access to any files

In linux how could you automatically prevent a user from having access to any files or directories that you create?

  State the null and alternate hypotheses

You want to see if there is a difference among juniors and seniors at your university in ownership of the latest version of the iPad.  You conduct a study of 300 juniors and 300 seniors, and you discover the following: 45 of the juniors have the l..

  Convert the total impedance back to polar form

A series circuit contains two sources of impedance, one of 10(cos 0.7 + j sin 0.7) ohms and the other of 16(cos 0.5 + j sin 0.5) ohms.

  What is the conclusion of researcher b

Using the same data and the same method of analysis, the following hypotheses are tested about whether mean height is 72 inches.

  Write a program to assign any number at random

Write a program to assign any number at random to an integer variable k and display the same through pointer.

  Market in order to maximize profits

Suppose you are employed at a monopolistic company as a research (pricing) economist and you are deriving the behavior of two markets based on demand curves

  How standards may be used to capture organizational wisdom

Suggest four types of knowledge that might be captured in organizational standards.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd