Notes, summaries, assignments, exams, and problems for Technology

Sort by
Subject
Level

Ccna3

Classified in Technology

Written on in English with a size of 16.01 KB

1. Refer to the exhibit. The network administrator needs to setup Switch1 for remote access from HostA. Theshow ip interface brief is issued on Router1 and the show interfaces trunk command is issued on theSwitch1 to verify the current status. The administrator applies the additional configuration shown in theexhibit to Switch1. However, the telnet from HostA fails. What additional commands need to be appliedto the switch?
Switch(config)# interface vlan 10
Switch(config-if)# ip address 10.1.1.250 255.255.255.0
Switch(config-if)# no shutdown
Switch(config-if)# ip default-gateway 10.1.10.254

2. Refer to the exhibit. On the basis of the configuration shown, how will an Ethernet frame on port GigabitEthernet0/1 be modified?
802.1Q encapsulation inserts

... Continue reading "Ccna3" »

Cloud Computing Types and Aneka Platform Capabilities

Classified in Technology

Written on in English with a size of 3.76 KB

Understanding Cloud Computing Fundamentals

In Cloud Computing, the term "cloud" refers to a network of remote servers accessed over the internet. These servers provide various computing resources such as storage, processing power, and applications to end-users. The cloud infrastructure is owned and maintained by a cloud service provider, allowing users to access resources on-demand without managing or maintaining the underlying physical infrastructure.

Types of Cloud Deployments

There are three main types of clouds in Cloud Computing:

  • Public Cloud

    A public cloud is a cloud infrastructure owned and operated by a third-party cloud service provider. Its resources are shared across multiple customers, who access services over the internet. Public clouds

... Continue reading "Cloud Computing Types and Aneka Platform Capabilities" »

Hydro-Electric Power Plants: Classification, Components, and Operation

Classified in Technology

Written on in English with a size of 149.18 KB

Hydro-Electric Power Plant

Classification of Hydro-Electric Power Plants

According to the Availability of Head:

  1. Low head plants - head below 30 m
  2. Medium head plants - head between 30 m to 180 m
  3. High head plants - head 180 m and above.

According to the Nature of Load:

  1. Base load plant
  2. Peak load plant.

According to the Quantity of Water Available:

  1. Run-off river plant without pondage.
  2. Storage reservoir plant
  3. Pump storage plant.

Such a plant has a large storage capacity of water; therefore, water collected in the rainy season is utilized during the dry period of the year.

The collection of water is done on a yearly basis; therefore, the capacity of the reservoir required is extremely large compared with the other types of hydroelectric power plants.

Elements of

... Continue reading "Hydro-Electric Power Plants: Classification, Components, and Operation" »

Cybersecurity Fundamentals: Threats, Attacks, and Defenses

Posted by Anonymous and classified in Technology

Written on in English with a size of 7.65 KB

Threat Actors: Who Are the Attackers?

Threat ActorMotivationTraitsExamples
Nation-State HackersEspionage, cyber warfareHighly skilled, stealthy, well-fundedFancy Bear (Russia), APT Groups
Organized Crime GroupsFinancial gain (ransomware, theft)Professional, use Ransomware-as-a-ServiceConti ransomware gang
HacktivistsIdeological or political disruptionVaried skill levelsAnonymous
Insider ThreatsRevenge, profit, carelessnessAlready have access, dangerousDisgruntled employees stealing data
Script KiddiesFun, curiosity, fameUnskilled, use pre-made hacking toolsIndividuals using automated exploit kits
Shadow ITConvenience, speedEmployees using unauthorized techUnapproved cloud apps in a workplace

Threat Vectors: How Attacks Occur

Threat VectorHow It WorksExamples
Message-
... Continue reading "Cybersecurity Fundamentals: Threats, Attacks, and Defenses" »

Cloud & Web Services: Essential Concepts for Modern IT

Classified in Technology

Written on in English with a size of 46.53 KB

What is a Web Service?

A Web Service allows two applications or systems to communicate with each other over the internet. It’s like one program calling another program to request data or instruct it to perform an action.

Even if these applications are developed with different programming languages or run on different computers, they can still work together using Web Services.

Key Things to Know

  • Works Anywhere: Web Services use common standards (like HTTP, XML, JSON), ensuring compatibility across various systems and platforms.
  • Communicates Over Internet: Most Web Services transmit and receive data using HTTP or HTTPS — the same protocols websites use.
  • Shares Data in Common Formats:
    • XML: Often used in older or more structured systems (e.g., SOAP)
... Continue reading "Cloud & Web Services: Essential Concepts for Modern IT" »

FIR Low-Pass Filter Design with Window Method

Classified in Technology

Written on in English with a size of 3.63 KB

Load Signal and Parameters

We load the signal we need.

load('tecla_piano.mat');

We calculate the sampling period and the number of samples.

Ts = 1/fs;
N = length(data);
n = 0:N-1;
nTs = n * Ts;

Set the number of frequency points which generate the spectrums. We also generate the frequency vector.

nFFT = 2 * fs;
f = (0:nFFT-1) * fs/(nFFT-1);

Time Domain Signal Representation

We represent the input signal in the time domain.

figure;
plot(nTs,data);
title('Input signal, TIME domain');
xlabel('nT_{S} (s)');
ylabel('data[nT_{S}] (V)');
grid on;

Signal Spectrum Analysis

We calculate and observe the spectrum of the signal. From the magnitude spectrum, we decide that we want to filter the signal up to 1000 Hz and we want to remove it completely from 1500 Hz up.... Continue reading "FIR Low-Pass Filter Design with Window Method" »

Object Instantiation and Code Examples

Classified in Technology

Written on in English with a size of 4.2 KB

Poodle Instantiation Example

B. The Poodle variable myDog is instantiated as a Poodle. The instance variable size is initialized to "toy". An implicit call to the no-argument Dog constructor is made, initializing the instance variable name to "NoName".

Book Instantiation Example

C. Object myBook is created using the one-argument Book constructor, which uses super to set myBook's title attribute to "Adventure Story". Object yourBook is created using super to call the Publication no-argument constructor to set yourBook's title attribute to "Generic".

Tree Instantiation Example

B. Object tree1 is created using the DeciduousTree constructor, which uses super to set tree1's treeVariety attribute to "Oak". Object tree2 is created using the EvergreenTree... Continue reading "Object Instantiation and Code Examples" »

Aircraft Identification Features and Aerospace Composites

Classified in Technology

Written on in English with a size of 2.12 MB

0x2tV7+WJthvnHKBJxetd6bDt4HGFRMUjKVYAkcpjUtUWL9j3gNmYqJno4oRbrQGEYppr6f6HxU4t1t6PHAAAAAElFTkSuQmCC dJX3ra+dx9QAAAAASUVORK5CYII= gAAAAASUVORK5CYII= h83gsXK+4otxAAAAABJRU5ErkJggg==

Aircraft Identification Features

Learn to distinguish different aircraft models by their key visual characteristics:

  • A330 vs B777: The B777 doesn’t have winglets, has three wheels per main landing gear strut, and the end of the fuselage is distinct.
  • A320 vs B737: Standard Airbus/Boeing differences; B737s have a distinct engine shape (flattened bottom).
  • B737 Series: Differences between -200, -300, -400, -500, -600, -700, -800, -900ER are primarily by size.
  • B747: All have 4 engines. -200 and -300 do not have winglets, but the -300 has a larger upper deck hump. The -400 has winglets. The SP variant has no winglets and is shorter than others.
  • B757: The -300 is significantly larger than the -200.
  • B767: The -200 has no winglets. The -400 and -300 have
... Continue reading "Aircraft Identification Features and Aerospace Composites" »

Cisco Router and Switch Configuration: PPP, DHCP, VLAN, RIP, OSPF, EIGRP

Classified in Technology

Written on in English with a size of 4.33 KB

Cisco Router and Switch Configuration

PPP Authentication

1. User Configuration (Matching Passwords on Both Routers)

router(config)# username <hostname_remote_router> password <password>

2. Interface Encapsulation Change

router(config-if)# encapsulation ppp

3.1 Enabling PAP Authentication

router(config-if)# encapsulation ppp
router(config-if)# ppp authentication pap
router(config-if)# ppp pap sent-username <local_username> password <password>

3.2 Enabling CHAP Authentication

router(config-if)# encapsulation ppp
router(config-if)# ppp authentication chap

DHCP Scope Configuration

router(config)# ip dhcp pool <POOL_NAME>
router(config-dhcp)# network <NETWORK_ADDRESS> <NETMASK>
router(config-dhcp)# default-router <GATEWAY_

... Continue reading "Cisco Router and Switch Configuration: PPP, DHCP, VLAN, RIP, OSPF, EIGRP" »

The Internet: A Comprehensive Overview

Classified in Technology

Written on in English with a size of 16.63 KB

The Internet: A Global Network

The Internet is a global network of interconnected computer networks, linking billions of devices worldwide using TCP/IP. It comprises millions of networks, including private, public, academic, business, and government, and provides extensive information resources.

The History of the Internet

The Internet, originating from ARPANet, an experimental network created in the 1960s by the US military, was launched online in 1969 under a contract by ARPA, connecting four US universities. The history of the Internet reflects the continuous growth of this network, connecting millions of people, businesses, governments, schools, and universities.

The ARPANet

The ARPAnet, created in 1969, began with four computers connecting.... Continue reading "The Internet: A Comprehensive Overview" »