What is the link speed of your network

Assignment Help Basic Computer Science
Reference no: EM133399287

Assignment:

Scenario:

As the Computer Systems Analyst for AMCE Small Kitchens, you want to test the performance and network activity using Windows built-in tools.

Instructions:

Complete the following instructions using a Windows computer.

Windows Task Manager

  1. Open a browser and access the YouTube website à start playing any YouTube video. While the video is still playing complete the following steps.
  2. Open Windows Task Manager à click on Performance tab à click on the Wi-Fi (or Ethernet) Local Area connection to see the network throughput.
  3. Take a screenshot showing the results and copy it here

Based on the parameters recorded in the screenshot above answer the following questions:

  1. What is the name of your network?
  2. What is the connection type?

Right click anywhere on moving network Throughput graph (from step b) and select View Network Details.

Take a screenshot showing the results and copy it here.

Based on the parameters recorded in the screenshot answer the following questions:

  1. What is the Link Speed of your network?
  2. How many total Byte sent?
  3. How many total Byte Received?

Resource Monitor.

Make sure that the browser is still playing any YouTube video. Or simply restart another video.

To access Resource Monitor, first access the Task manager. Then from the Performance tab à click on Resource Monitorà select Network tab à Expand the Process with Network Activity View.

Take a screenshot showing the Process with Network Activity View expanded and copy it here.

Based on the parameters recorded in the screenshot answer the following questions:

  1. What is the name of the application or process that sent the most bytes?
  2. What is the name of the application or process that received the most bytes?

Reference no: EM133399287

Questions Cloud

Mapping as key part of six sigma process : How did the team use process mapping as a key part of the Six Sigma process? What value did process mapping have for the hospital?
Foreign corrupt practices act : The Foreign Corrupt Practices Act (FCPA), enacted in 1977, generally prohibits the payment of bribes to foreign officials to assist in obtaining
How do pronouns support queer identities : Should we expand our thinking about them? Should we reimagine their use and our relationship with them? How do pronouns support queer identities?
Should we expand our thinking about them : Do pronouns really matter? Think about your use of pronouns and the impact they have on language and life. Is it possible to live without them?
What is the link speed of your network : What is the Link Speed of your network? How many total Byte sent? How many total Byte Received?
Discuss the 5 tips to manage test anxiety : Make a challenging question regarding the 5 Tips To Manage Test Anxiety. Make note of something surprising about the 5 Tips To Manage Test Anxiety.
Do you think that any society will ever achieve communism : Do you think that any society will ever achieve Communism? What will have to happen for Communism to exist in a society? Defend your position broadly
Do you think that corporations contributing positively : Do you think that corporations contributing positively to social and environmental causes is a trend that should continue, or should alleviating social
What does a physical store do for the shopping experience : What does a physical store do for the shopping experience? How can firms create brand awareness and acquire new customers besides advertising

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What is access control

What is access control? How do cyber operators like you manage their users' access to company resources?

  Mitigation measure and a response

What are three threats to Information Security and how each threat can impact an organization. What is a mitigation measure and a response

  Troubleshooting computers

Describe what you learned from the topic you chose and how it can help you with troubleshooting computers.

  Generating tax revenue as do tariffs

Rather than generating tax revenue as do tariffs, subsidies require tax revenue. Therefore, they are not an effective protective device for the home economy.

  Testing methodology policy and procedure

Testing Methodology Policy and Procedure (individual submission). Research and document preferred remediation cycles for the in scope systems

  Void function that receives an integer passed to it

Write the function prototype for the divide By Two function from Pencil and Paper Exercise 1. (The answers to TRY THIS Exercises are located at the end of the chapter.)

  Information systems and database

What problem are you solving for the organization? Information Systems. Database.

  Michael porter five forces model

Please watch the following videos on Michael Porter's Five Forces model:

  Find the transfer function of the simple amplification

Find the transfer function of the simple amplification circuit shown using this model.

  Classification of haptic interactions with real environments

Classification of haptic interactions with real environments. Haptic interfaces for Body-based devices for mobile healthcare applications

  Visual symbolic and iconic communication

Discuss why having visual symbolic and iconic communication in a logo may be a good strategy to communicate visually with your targeted audience.

  Why did they use 90 days rather than 180 days

They set the lifetime of each password at a maximum of 90 days. After 90 days, a password must be changed. Why did they use 90 days rather than 180 days?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd