2015 HSC Information and Digital Technology Networking and hardware Marking Guidelines
|
|
|
- Colleen Maxwell
- 9 years ago
- Views:
Transcription
1 015 HSC Information and Digital Technology Networking and hardware Marking Guidelines Section I Multiple-choice Answer Key Question Answer 1 B C 3 B 4 A 5 B 6 D 7 D 8 A 9 A 10 C 11 D 1 A 13 C 14 B 15 B 16 D 17 C 18 A 19 C 0 B 1
2 Section II Question 1 (a) States what is meant by recommended requirements 1 The hardware requirements needed so that the OS can perform at its optimum. Question 1 (b) Outlines the differences between hibernate and suspend 3 Identifies features of hibernate and/or suspend Identifies a feature of hibernate or suspend 1 In a hibernate state, the computer saves data to the hard drive and stops drawing power. In a suspend state, the computer saves data to RAM and still maintains a low power connection. This means the computer will restart more quickly from a suspend position. Question 1 (c) Identifies the difference between batch and real-time systems Identifies a feature of batch or real-time systems 1 A real-time system handles events at the time as they occur. A batch system groups the tasks and then processes them at the same time at a later time.
3 Question (a) Identifies TWO relevant aspects of antivirus software Identifies ONE feature of antivirus software 1 Antivirus software compares files against its database to ascertain if the file is corrupted. It also provides alerts to show actions taken. Question (b) Outlines TWO relevant tasks 3 Identifies TWO relevant tasks OR Outlines ONE relevant task Identifies ONE relevant task OR 1 Shows a basic understanding of a routine maintenance schedule A routine maintenance schedule should include regular scanning to check for viruses and/or malicious software, and perform quarantine and removal if necessary. It should also regularly update security and performance scanning and checking for operating system, application software and firmware. Answers could include: Cleaning and repairing of equipment Regular optimisation of HDD 3
4 Question 3 Clearly explains the benefits of effective teamwork 4 Outlines benefits of effective teamwork OR 3 Identifies benefits of effective teamwork and explains at least one Identifies benefits of effective teamwork OR Outlines a benefit of effective teamwork Identifies a benefit of effective teamwork 1 ICT projects are usually complex requiring various areas of expertise. Each team member may contribute their specific skills, such as programming, authoring or graphic design. The project may be completed more quickly if team members work on different components and then bring their contribution to the team to complete the project. This may also allow team members to work from home or work flexible hours. Answers could include: Idea generation Area of expertise Sharing workload Improved efficiency Mutual support Question 4 (a) Outlines why motherboards have expansion slots using an example Shows an understanding of expansion slots 1 They allow additional hardware to be connected to the computer, such as Ethernet cards to allow connection to a network. 4
5 Question 4 (b) Shows a sound understanding of why the usable storage space on a magnetic hard drive differs from its physical size Shows a basic understanding of usable storage space or physical storage space of a magnetic hard drive 1 Space is required on the hard drive to store formatting type, file systems and boot data. Answers could include: Method of formatting Use of table allocation array Use of sectors and blocks Question 4 (c) Explains the advantages of using a separate graphic adapter card compared 4 to an inbuilt graphics chip on the motherboard Outlines advantages of using a separate graphics adapter card compared to an inbuilt graphics chip on the motherboard OR Identifies advantages of using a separate graphics adapter card compared 3 to an inbuilt graphics chip on the motherboard AND Explains at least one of the advantages Identifies features of a graphics adapter card and/or an inbuilt graphics chip Identifies a feature of a graphics card or an inbuilt graphics chip 1 A separate graphic adapter car has its own independent source of video memory and processing power leaving the RAM and the CPU in the system to do other tasks. It allows graphic intensive tasks to be performed without jeopardising the performance of the system. It is particularly valuable for professional graphic designers or serious gamers. With its own cooling system it can help with system cooling while allowing the use of more than one output monitor. Answers could include: Increased graphics speed Separate graphic processor Different output, eg DVI, HDMI Free up the CPU and RAM to do other work on the computer 5
6 Question 5 Shows substantial understanding of why it is important to document user support requests 3 Outlines a reason or identifies reasons for documenting user support requests Shows a basic understanding of user support requests 1 Keeps a record of who initiated the request Allows to track the time the requests were logged and how long it took to rectify the problem Traces patterns/trends with problem equipment Answers could include: Informs future equipment selection Assists with developing user manuals Question 6 Identifies the advantages of using a survey compared to using interviews AND outlines at least one advantage 4 Identifies some advantages of using a survey compared to using interviews 3 Identifies features of surveys and/or interviews Identifies a feature of a survey or an interview 1 Unlike an interview, a survey can be made available to many users very quickly and cost effectively. The same questions can also be asked consistently. Data can be efficiently captured without the need of an interviewer. Anonymity may also encourage more truthful responses, some users may not want to reveal their dissatisfaction fearing that they may be seen as incompetent in the use of technology. Users can also complete the survey at a time or at a location that is suitable to them without interrupting their work. 6
7 Section III Question 7 (a) Provides a clearly labelled network diagram that fulfils the requirements of the business 7 Includes all necessary components, and network and internet connections Provides relevant justification for the choice of components Provides a labelled network diagram that fulfils the requirements of the business 6 Includes additional components for network and internet connections Provides relevant justification for the choice of most of the components Provides a labelled network diagram that fulfils most of the requirements of the business 5 Includes additional components for network and internet connection Provides justification for the choice of the majority of the components Provides a network diagram that includes most of the business s hardware Includes additional components for network/internet connection 4 Provides justification for the choice of some components Provides a basic network diagram AND/OR 3 Identifies additional hardware component(s) and/or provides some justification for the choice of component(s) Identifies a feature of the network 1 7
8 Router/modem: Provides a connection to the internet and equal distribution of available bandwidth. Router acts as a gateway Firewall: Provides security by only allowing protocols that the company wants on certain ports. Allows the management of access control lists. Firewall may be both hardware and software. Server: Supplies the distribution of services such as printing and storage or the use of centralised applications. Switch: Allows managed wired connection to the hardware that requires it, such as: workstation/server/wap. Switches reduce risk of data packet collisions. WAP: Provides wireless access to the network/internet for wireless devices such as laptops/printers/tablets etc Answers could include: LAN v WAN Use of VPN Speed in the use of Optic Fibre cost is high Reliability of RJ45 relatively cheap and easy installation Cabled connections are more secure from a physical attack Wireless protocols such as WEP or WAP required for wireless Ethernet required for the cable connections Reliability of cable vs wireless Internet protocols required for internet connectivity Flexibility of wireless over cable for moving equipment, adding devices/equipment 8
9 Question 7 (b) Provides characteristics and features of the measures that could be implemented in the scenario to protect against security intrusion 8 Shows a thorough understanding of the security needs of the new network Outlines relevant measures against security intrusion providing some characteristics and/or features 7 Shows a detailed understanding of the security needs of the new network Outlines relevant measures against security intrusion 5 6 Shows substantial understanding of the security needs of the new network Outlines measures against security intrusion 4 Identifies security measure(s) and/or security concern(s) of the new network 3 Outlines at least one of these Identifies security measure(s) and/or security concern(s) of the new network OR Outlines a security measure or a security concern of the new network Identifies a security measure OR 1 Shows a basic understanding of the security of the new network The new network can be protected against security invasion by implementing passwords for the users and password policies. Unique passwords are important as well as implementing policies of types of passwords and how often they should be changed eg every month. This helps security so that a person who may inadvertently give away their password will have to change it regularly and to a specific password. Using a firewall allows managed protection by only allowing access through a specific number of ports and to specified services such as the internet, or FTP. Intrusion can be monitored and restricted by managing access to and from the computer through these specified ports. For example port 80 allows http access. Therefore any other protocol trying to gain access will not be allowed access to the computer. Access control list can also be set to control access into and out of a network. This list can be as specific as file types. By placing a security feature called WPA this allows you to hide the network name and provides a security key access to allow permission to the network. The network can only be accessed by an authorised user. Answers could include: Share permissions Local users and groups Password policies Shared files and folders administration Encryption System files and folders power users Locking workstations User authentication guests Scheduled scans Regular passwords groups and safe removal smart cards Antivirus and malware techniques user names tools Regular backups 9
10 Section IV Question 8 Addresses all components of the question Provides a cohesive well-reasoned sequenced response that reflects a high level of organisation, judgement, synthesis and problem-solving skills Demonstrates an in-depth understanding of risk management with reference to the scenario used in the question Consistently uses relevant industry terminology Addresses most components of the question Provides a reasoned sequenced response showing significant organisational and problem-solving skills Demonstrates a detailed understanding of risk management with reference to the scenario used in the question Uses relevant industry terminology Addresses the majority of the components of the question Provides a response displaying sound organisational and problem-solving skills Demonstrates a sound understanding of risk management with some reference to the scenario used in the question Uses some relevant industry terminology Addresses some components of the question Provides a response displaying some organisational and problem-solving skills Demonstrates some understanding of risk management Addresses at least one component of the question Provides a response displaying basic organisation Demonstrates a basic understanding of WHS
11 There are a variety of internal methods that can be used in order to gather WHS information in the workplace. Risk management involves: 1. The identification of hazard Hazards can be defined as any procedure or process that presents potential harm to an individual. Types of hazards include: electricity, tools and equipment, handling goods and materials, work environment and any other human factor based hazards such as fatigue. The organisation could use audits and/or inspections with checklists in order to identify potential hazards within the workplace.. Formal risk assessments These could be conducted as audits, inspections, surveys or through meetings. Ordinarily risks are assessed using a risk assessment matrix. Hazards that are identified as risks within the workplace are rated using the matrix. An example of a matrix that could be used is seen below: Likelihood HAZARD RISK HIGH MEDIUM LOW Likely RED ORANGE YELLOW Unlikely RED YELLOW GREEN As an example, the hazard of exposed electrical cabling risk of injury is HIGH and Likelihood of injury is likely to occur. Therefore RED. 3. Controlling risks The workplace would use the risk assessment to determine controls in order to either eliminate the risks, minimise the risks or whether to implement other controls such as administrative controls. Using the risk matrix tool or checklists used to audit the potential hazards, the workplace could determine what controls could be implemented to change practices and procedures to eliminate risks, minimise by either substitution or modification or isolating the risk. The workplace could use the methods implemented to create other controls such as changes in policy management procedures that may also contribute to eliminating or minimising the risk. As an example, the exposed electrical cabling could be replaced to eliminate risk. 4. Monitoring and Reviewing. The workplace should consistently review previously assessed hazards and refer to controls and checklists used in audits in order to improve and minimise risks. A process of review should also be conducted of the procedures for auditing and inspecting. These practices need to fall in line with changes in order to maintain validity. As an example, implement a system of yearly electrical components tagging. 11
12 015 HSC Information and Digital Technology Networking and hardware Mapping Grid Section I Employability skills (Please put an where appropriate) Question HSC content focus area Communication Teamwork Problem-solving Initiative and enterprise Planning and organising Selfmanagement Learning Technology Operating Systems licensing (p8) Employment the difference between an award, agreement and contract (p4) Diagnostic testing strategies for troubleshooting (p3) Employment purpose and value of a code of conduct (p4) Preventative maintenance backup (p33) Work health and safety (WHS) the cost of workplace injury (p36) Risk management risk control (p37) Destructive and malicious software phishing (p33) Safe work practices and procedures tagging (p38) Configuring an operating system file attributes, creation, extensions and permissions (p9) Network and hardware installation installation of network components (p49) Network and hardware testing tools used to test the functionality of network settings and network components (p50) Determining requirements design options for a SOHO network (p48) Components, protocols and standards awareness of industry standards and protocols (p47) Components, protocols and standards commonly used networking technologies and devices (p47) 1
13 Employability skills (Please put an where appropriate) Question HSC content focus area Components, protocols and standards awareness of industry standards and protocols (p47) Components, protocols and standards commonly used networking technologies and devices (p47) Network security (p49) Network and hardware testing how network settings are used to troubleshoot network connectivity problems (p50) Network and hardware testing characteristics of TCPIP (p50) Communication Teamwork Problem-solving Initiative and enterprise Planning and organising Learning Technology Section II Question HSC content focus area 1 (a) 1 1 (b) 3 1 (c) (a) (b) 3 4 (a) 4 (b) 3 4 munication Employability skills (Please put an where appropriate) 3..4 Selecting an operating system how a range of requirements can impact on the choice of an operating system (p9) 3..4 Installing an operating system configuration of power management (p9) 3..4 Operating Systems features and capabilities of different types of operating systems (p8) Diagnostic testing troubleshooting (p33) Diagnostic testing preventative maintenance (p33) Working with others importance of teamwork in an ICT work environment (p6) Components, protocols and standards purpose and general characteristics of categories of internal hardware components (p47) Components, protocols and standards purpose and general characteristics of categories of internal hardware components (p47) Com eamwork T lem-solving Prob Init iative and enterprise nning and ganising Pla or Selfmanagement Selfnagement ma earning L chnology Te 13
14 Employability skills (Please put an where appropriate) Question HSC content focus area Communication Teamwork Problem-solving Initiative and enterprise Planning and organising Selfmanagement Learning Technology 4 (c) Components protocols and standards (p47) Documentation purpose and importance (p51) Network and hardware testing (p50) Section III Employability skills (Please put an where appropriate) Question HSC content focus area 7 (a) 7 7 (b) Network and hardware testing firewall (p50) Determining requirements design options for a SOHO network (p48) Determining requirements propose a final network (p48) Determining requirements factors influencing the design of a SOHO network (p48) Network and hardware installation processes and steps involved in installation of network components (p49) Network security potential network security intrusion symptoms and issues (p50) Communication Teamwork Problem-solving Initiative and enterprise Planning and organising Selfmanagement Learning Technology 14
15 Section IV Question HSC content focus area Risk management its application in the workplace (p37) WHS information and data internal and external sources of WHS information and data, methods and procedures for gathering WHS information and data (p39) Communication Employability skills (Please put an where appropriate) Teamwork Problem-solving Initiative and enterprise Planning and organising Selfmanagement Learning Technology 15
2015 HSC Information and Digital Technology Web and software applications Marking Guidelines
2015 HSC Information and Digital Technology Web and software applications Marking Guidelines Section I Multiple-choice Answer Key Question Answer 1 B 2 C 3 B 4 A 5 B 6 D 7 D 8 A 9 A 10 C 11 C 12 A 13 B
2015 HSC Information and Digital Technology Digital animation Marking Guidelines
2015 HSC Information and Digital Technology Digital animation Marking Guidelines Section I Multiple-choice Answer Key Question Answer 1 B 2 C 3 B 4 A 5 B 6 D 7 D 8 A 9 A 10 C 11 C 12 D 13 B 14 D 15 D 16
Information and Digital Technology
2014 HIGHER SCHOOL CERTIFICATE EXAMINATION Information and Digital Technology Networking and Hardware Total marks 80 Section I Pages 2 7 General Instructions Reading time 5 minutes Working time 2 hours
Section 12 MUST BE COMPLETED BY: 4/22
Test Out Online Lesson 12 Schedule Section 12 MUST BE COMPLETED BY: 4/22 Section 12.1: Best Practices This section discusses the following security best practices: Implement the Principle of Least Privilege
IT Networking and Security
elearning Course Outlines IT Networking and Security powered by Calibrate elearning Course Outline CompTIA A+ 801: Fundamentals of Computer Hardware/Software www.medallionlearning.com Fundamentals of Computer
FBLA Computer Problem Solving aligned with Common Core 6.14. FBLA: Computer Problem Solving RST.9-10.4 RST.11-12.4
Competency: Personal Computer Components 1. Identify how hardware components interact and work with software to perform computing tasks. 2. Install, configure, optimize, and upgrade personal computer components.
IT Networking and Security
elearning Course Outlines IT Networking and Security powered by Calibrate elearning Course Outline CompTIA A+ 801: Fundamentals of Computer Hardware/Software powered by Calibrate www.medallionlearning.com
ICANWK406A Install, configure and test network security
ICANWK406A Install, configure and test network security Release: 1 ICANWK406A Install, configure and test network security Modification History Release Release 1 Comments This Unit first released with
2011 HSC Information Technology Marking Guidelines
2011 HSC Information Technology Marking Guidelines Section I Multiple-choice Answer Key Question Answer 1 D 2 B 3 C 4 A 5 D 6 B 7 C 8 C 9 B 10 A 11 B 12 A 13 D 14 C 15 A 1 Section II 2011 HSC Information
ICAB5238B Build a highly secure firewall
ICAB5238B Build a highly secure firewall Release: 1 ICAB5238B Build a highly secure firewall Modification History Not Applicable Unit Descriptor Unit descriptor This unit defines the competency required
Advanced Diploma In Hardware, Networking & Server Configuration
Advanced Diploma In Hardware, Networking & Server Configuration Who should do this course? This course is meant for those persons who have a dream of getting job based on Computer Hardware, Networking
OCR LEVEL 3 CAMBRIDGE TECHNICAL
Cambridge TECHNICALS OCR LEVEL 3 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN IT COMPUTER NETWORKS R/601/7320 LEVEL 3 UNIT 7 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 COMPUTER NETWORKS R/601/7320 LEVEL
COURCE TITLE DURATION CompTIA A+ Certification 40 H.
COURCE TITLE DURATION CompTIA A+ Certification 40 H. Overview: The target student is anyone with basic computer user skills who is interested in: obtaining a job as an IT professional or PC technician.
Local Area Networking technologies Unit number: 26 Level: 5 Credit value: 15 Guided learning hours: 60 Unit reference number: L/601/1547
Unit title: Local Area Networking technologies Unit number: 26 Level: 5 Credit value: 15 Guided learning hours: 60 Unit reference number: L/601/1547 UNIT AIM AND PURPOSE Learners will gain an understanding
2.4GHz / 5GHz Dual CPU 600Mbps 11N AP/Router
Dual Band Concurrent Router ESR7750 2.4GHz / 5GHz Dual CPU 600Mbps 11N AP/Router PRODUCT DESCRIPTION ESR7750 is a Dual Band Concurrent Wireless 11N Broadband Router with dual CPU that offers user unprecedented
Information and Digital Technology
Information and Digital Technology Sample HSC examination questions for candidates undertaking the Digital animation stream The first HSC examination for Information and Digital Technology will be held
10605164 Medical Networks and Operating Systems
Western Technical College 10605164 Medical Networks and Operating Systems Course Outcome Summary Course Information Description Instructional Level Total Credits 4.00 Total Hours 108.00 A course studying
CompTIA Network+ (Exam N10-005)
CompTIA Network+ (Exam N10-005) Length: Location: Language(s): Audience(s): Level: Vendor: Type: Delivery Method: 5 Days 182, Broadway, Newmarket, Auckland English, Entry Level IT Professionals Intermediate
Course/Program Credential(s): Credential Certificate Postsecondary Degree University Degree Other:
Course Title: Information Technology Fundamentals Unit: Computer Basics Content Standard(s) and 1. Distinguish between input and output devices, including monitor, keyboard, mouse, and scanner. 2. Utilize
Tk20 Network Infrastructure
Tk20 Network Infrastructure Tk20 Network Infrastructure Table of Contents Overview... 4 Physical Layout... 4 Air Conditioning:... 4 Backup Power:... 4 Personnel Security:... 4 Fire Prevention and Suppression:...
Networking (Exploration 1)
Unit 105: CCNA Fundamentals of Networking (Exploration 1) Unit code: QCF Level 3: Credit value: 10 Guided learning hours: 80 Aim and purpose A/601/7537 BTEC in IT This unit introduces the architecture,
CCNA LAN Switching and Wireless (Exploration 3)
Unit 107: CCNA LAN Switching and Wireless (Exploration 3) Unit code: QCF Level 3: Credit value: 10 Guided learning hours: 80 Aim and purpose K/601/7453 BTEC in IT This unit focuses on a comprehensive,
CUSTOMIZED ASSESSMENT BLUEPRINT COMPUTER SYSTEMS NETWORKING PA. Test Code: 8148 Version: 01
CUSTOMIZED ASSESSMENT BLUEPRINT COMPUTER SYSTEMS NETWORKING PA Test Code: 8148 Version: 01 Specific competencies and skills tested in this assessment: Personal and Environmental Safety Wear personal protective
PLCs and SCADA Systems
Hands-On Programmable Logic Controllers and Supervisory Control / Data Acquisition Course Description This extensive course covers the essentials of SCADA and PLC systems, which are often used in close
What the student will need:
COMPTIA SERVER+: The Server+ course is designed to help the student take and pass the CompTIA Server+ certification exam. It consists of Book information, plus real world information a student could use
ESR7550 KEY FEATURES PRODUCT DESCRIPTION
PRODUCT DESCRIPTION ESR7750 is a Dual Band Concurrent Wireless 11N Broadband Router with dual CPU that offers user unprecedented network performance. WMM support boosts streaming and multimedia intensive
SOHO 6 Wireless Installation Procedure Windows 95/98/ME with Internet Explorer 5.x & 6.0
SOHO 6 Wireless Installation Procedure Windows 95/98/ME with Internet Explorer 5.x & 6.0 Before You Begin Before you install the SOHO 6 Wireless, you must have: A computer with a 10/100BaseT Ethernet card
A+ Correlation Chart. CompTIA A+ 220 702. Domain 1.0 Hardware. Text Lab Study Guide
A+ Correlation Chart Domain 1.0 Hardware 1.1 Given a scenario, install, configure and maintain personal computer components Storage devices (HDD such as SATA, PATA, and solid state; FDD; optical drives
JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01
JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT Test Code: 4514 Version: 01 Specific Competencies and Skills Tested in this Assessment: PC Principles Identify physical and equipment
Information Technology
2011 HIGHER SCHOOL CERTIFICATE EXAMINATION Information Technology Total marks 80 Section I Pages 2 6 General Instructions Reading time 5 minutes Working time 2 hours Write using black or blue pen Black
Lectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003
Lectures 9 Advanced Operating Systems Fundamental Security Computer Systems Administration TE2003 Lecture overview At the end of lecture 9 students can identify, describe and discuss: Main factors while
Network and Security Controls
Network and Security Controls State Of Arizona Office Of The Auditor General Phil Hanus IT Controls Webinar Series Part I Overview of IT Controls and Best Practices Part II Identifying Users and Limiting
What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.
What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things. AGENDA Current State of Information Security Data Breach Statics Data Breach Case Studies Why current
Advanced Higher Computing. Computer Networks. Homework Sheets
Advanced Higher Computing Computer Networks Homework Sheets Topic : Network Protocols and Standards. Name the organisation responsible for setting international standards and explain why network standards
Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security
Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 6 Network Security Objectives List the different types of network security devices and explain how they can be used Define network
Computer Networks. Credit value: 10 Guided learning hours: 60. Aim and purpose. Unit introduction. Learning outcomes
Unit 9: Computer Networks Unit code: QCF Level 3: Credit value: 10 Guided learning hours: 60 Aim and purpose R/601/7320 BTEC National The aim of this unit is to ensure learners understand the key components
How To Manage A Network Safely
ICANWK303A Configure and administer a network operating system Release: 1 ICANWK303A Configure and administer a network operating system Modification History Release Release 1 Comments This Unit first
MSP Service Matrix. Servers
Servers MSP Service Matrix Microsoft Windows O/S Patching - Patches automatically updated on a regular basis to the customer's servers and desktops. MS Baseline Analyzer and MS WSUS Server used Server
Networking Devices. Lesson 6
Networking Devices Lesson 6 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Network Interface Cards Modems Media Converters Repeaters and Hubs Bridges and
Test Code: 8148 / Version 1
Blueprint Computer Systems Networking PA Test Code: 8148 / Version 1 Copyright 2013. All Rights Reserved. General Assessment Information Computer Systems Networking PA Blueprint Contents General Assessment
NBG2105. User s Guide. Quick Start Guide. Wireless Mini Travel Router. Default Login Details. Version 1.00 Edition 1, 11/2012
NBG2105 Wireless Mini Travel Router Version 1.00 Edition 1, 11/2012 Quick Start Guide User s Guide LAN IP Address Default Login Details 192.168.1.1 (Router Mode) 192.168.1.2 (Other Modes) Passwordwww.zyxel.com
Chapter 2 Introduction
Chapter 2 Introduction This chapter describes the features of the NETGEAR 54 Mbps Wireless ADSL Modem Router Model DG834G. The Wireless ADSL Modem Router is a combination of a built-in ADSL modem, ADSL
Course Description. Course Audience. Course Outline. Course Page - Page 1 of 12
Course Page - Page 1 of 12 Windows 7 Enterprise Desktop Support Technician M-50331 Length: 5 days Price: $2,795.00 Course Description This five-day instructor-led course provides students with the knowledge
The evolution of data connectivity
Leveraging the Benefits of IP and the Cloud in the Security Sector The CCTV and alarm industry has relied on analogue or Integrated Services Digital Network (ISDN) communications to provide data connectivity
Business ebanking Fraud Prevention Best Practices
Business ebanking Fraud Prevention Best Practices User ID and Password Guidelines Create a strong password with at least 8 characters that includes a combination of mixed case letters, numbers, and special
U06 IT Infrastructure Policy
Dartmoor National Park Authority U06 IT Infrastructure Policy June 2010 This document is copyright to Dartmoor National Park Authority and should not be used or adapted for any purpose without the agreement
Hands-On Microsoft Windows Server 2008. Chapter 12 Managing System Reliability and Availability
Hands-On Microsoft Windows Server 2008 Chapter 12 Managing System Reliability and Availability Objectives Understand general problem-solving strategies Resolve boot problems Use and configure Event Viewer
USM IT Security Council Guide for Security Event Logging. Version 1.1
USM IT Security Council Guide for Security Event Logging Version 1.1 23 November 2010 1. General As outlined in the USM Security Guidelines, sections IV.3 and IV.4: IV.3. Institutions must maintain appropriate
Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire C and Attestation of Compliance
Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire C and Attestation of Compliance Payment Application Connected to Internet, No Electronic Cardholder Data Storage Version
CNE Network Assessment
+ CNE Network Assessment Overview The purpose of the network assessment is to measure, analyze, and document network functionality and performance. Areas of assessment include: Local Area Network (wired
NOS for Network Support (903)
NOS for Network Support (903) November 2014 V1.1 NOS Reference ESKITP903301 ESKITP903401 ESKITP903501 ESKITP903601 NOS Title Assist with Installation, Implementation and Handover of Network Infrastructure
Microsoft MTA Qualifications. CompTIA Qualifications. Course Title: SUPPORT SPECIALIST (ITSS) Includes Work Experience of 16 weeks with IT company
Course Title: IT SUPPORT SPECIALIST (ITSS) Program Type: Course Code: Award Type: Traineeship AT00005 Industry Professional Certification CompTIA and Microsoft Awards Objective Areas: Microsoft MTA; Server;
Student Halls Network. Connection Guide
Student Halls Network Connection Guide Contents: Page 3 Page 4 Page 6 Page 10 Page 17 Page 18 Page 19 Page 20 Introduction Network Connection Policy Connecting to the Student Halls Network Connecting to
MFC7840W Windows Network Connection Repair Instructions
Difficulty printing from your PC can occur for various reasons. The most common reason a networked Brother machine may stop printing, is because the connection between the computer and the Brother machine
Pre-lab and In-class Laboratory Exercise 10 (L10)
ECE/CS 4984: Wireless Networks and Mobile Systems Pre-lab and In-class Laboratory Exercise 10 (L10) Part I Objectives and Lab Materials Objective The objectives of this lab are to: Familiarize students
Chapter 15: Computer and Network Security
Chapter 15: Computer and Network Security Complete CompTIA A+ Guide to PCs, 6e What is in a security policy Mobile device security methods and devices To perform operating system and data protection How
ClearOS Network, Gateway, Server Quick Start Guide
ClearOS Network, Gateway, Server Quick Start Guide Welcome ClearOS is computer Operating System (OS) that provides enterprise-level network security and application services to the Small/Medium-sized Business
CONNECTING THE RASPBERRY PI TO A NETWORK
CLASSROOM CHALLENGE CONNECTING THE RASPBERRY PI TO A NETWORK In this lesson you will learn how to connect the Raspberry Pi computer to a network with both a wired and a wireless connection. To complete
MWR InfoSecurity Security Advisory. BT Home Hub SSID Script Injection Vulnerability. 10 th May 2010. Contents
Contents MWR InfoSecurity Security Advisory BT Home Hub SSID Script Injection Vulnerability 10 th May 2010 2010-05-10 Page 1 of 8 Contents Contents 1 Detailed Vulnerability Description... 5 1.1 Technical
Information Technology Career Field Pathways and Course Structure
Information Technology Career Field Pathways and Course Structure Courses in Information Support and Services (N0) Computer Hardware 2 145025 Computer Software 145030 Networking 2 145035 Network Operating
Best Practices For Department Server and Enterprise System Checklist
Best Practices For Department Server and Enterprise System Checklist INSTRUCTIONS Information Best Practices are guidelines used to ensure an adequate level of protection for Information Technology (IT)
STANDARD ON CONTROLS AGAINST MALICIOUS CODE
EUROPEAN COMMISSION DIRECTORATE-GENERAL HUMAN RESOURCES AND SECURITY Directorate HR.DS - Security Informatics Security Brussels, 21/06/2011 HR.DS5/GV/ac ARES (2011) 663475 SEC20.10.05/04 - Standards European
WRE6505. User s Guide. Quick Start Guide. Wireless AC750 Range Extender. Default Login Details. Version 1.00 Edition 1, 4 2014
WRE6505 Wireless AC750 Range Extender Version 1.00 Edition 1, 4 2014 2.4G 5G Quick Start Guide User s Guide Default Login Details LAN IP Address 192.168.1.2 User Name admin www.zyxel.com Password 1234
Home Station Fibra Óptica Freedom in a box.
Home Station Fibra Óptica Freedom in a box. Installation Guide 2 This guide explains the installation process for the Home Station Fibra Óptica. Follow these guidelines step by step. Box contents (1) Home
Quick Start Guide. WRV210 Wireless-G VPN Router with RangeBooster. Cisco Small Business
Quick Start Guide Cisco Small Business WRV210 Wireless-G VPN Router with RangeBooster Package Contents WRV210 Router Ethernet Cable Power Adapter Product CD-ROM Quick Start Guide Welcome Thank you for
ICANWK401A Install and manage a server
ICANWK401A Install and manage a server Release: 1 ICANWK401A Install and manage a server Modification History Release Release 1 Comments This Unit first released with ICA11 Information and Communications
UMHLABUYALINGANA MUNICIPALITY IT PERFORMANCE AND CAPACITY MANAGEMENT POLICY
UMHLABUYALINGANA MUNICIPALITY IT PERFORMANCE AND CAPACITY MANAGEMENT POLICY Originator: IT Performance and Capacity Management Policy Approval and Version Control Approval Process: Position or Meeting
ESET SMART SECURITY 6
ESET SMART SECURITY 6 Microsoft Windows 8 / 7 / Vista / XP / Home Server Quick Start Guide Click here to download the most recent version of this document ESET Smart Security provides state-of-the-art
How To Learn To Use A Computer System
Computer Repair & Networking Organization Washburn Institute of Technology Program Number 11.0901 Instructional Level Certificate Target Population Grades 11 & 12 Post-secondary Description This program
Nokia E90 Communicator Using WLAN
Using WLAN Nokia E90 Communicator Using WLAN Nokia E90 Communicator Using WLAN Legal Notice Nokia, Nokia Connecting People, Eseries and E90 Communicator are trademarks or registered trademarks of Nokia
CIP- 005 R2: Understanding the Security Requirements for Secure Remote Access to the Bulk Energy System
CIP- 005 R2: Understanding the Security Requirements for Secure Remote Access to the Bulk Energy System Purpose CIP-005-5 R2 is focused on ensuring that the security of the Bulk Energy System is not compromised
Chapter 10 Troubleshooting
Chapter 10 Troubleshooting This chapter provides troubleshooting tips and information for your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. After each problem description, instructions are provided
Data Network Security Policy
Authors: Mike Smith Rod Makosch Network Manager Data Security Officer IM&T IM&T Version No : 1 Approval Date: March 2005 Approved by : John Aird Director of IM&T Review Date : 1 April 2006 Trust Ref: C7/2005
Wireless LAN 802.11g USB Adapter
Wireless LAN 802.11g USB Adapter User s Guide Version 1.0 User s Guide 0 Copyright statement No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by
3.5 LAN HDD Enclosure User s Manual
3.5 LAN HDD Enclosure User s Manual NOTE: 1. USB and LAN can t be used at the same time. 2. HDD should be formatted as FAT32. Please check Disk utility section in this manual. 3. For internet FTP usage,
Supplier Security Assessment Questionnaire
HALKYN CONSULTING LTD Supplier Security Assessment Questionnaire Security Self-Assessment and Reporting This questionnaire is provided to assist organisations in conducting supplier security assessments.
Guideline on Auditing and Log Management
CMSGu2012-05 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Auditing and Log Management National Computer Board Mauritius
ESET SMART SECURITY 9
ESET SMART SECURITY 9 Microsoft Windows 10 / 8.1 / 8 / 7 / Vista / XP Quick Start Guide Click here to download the most recent version of this document ESET Smart Security is all-in-one Internet security
1 Purpose... 2. 2 Scope... 2. 3 Roles and Responsibilities... 2. 4 Physical & Environmental Security... 3. 5 Access Control to the Network...
Contents 1 Purpose... 2 2 Scope... 2 3 Roles and Responsibilities... 2 4 Physical & Environmental Security... 3 5 Access Control to the Network... 3 6 Firewall Standards... 4 7 Wired network... 5 8 Wireless
Business Internet Banking / Cash Management Fraud Prevention Best Practices
Business Internet Banking / Cash Management Fraud Prevention Best Practices This document provides fraud prevention best practices that can be used as a training tool to educate new Users within your organization
Mac computer configurations & OS X optimizations (Updated: November 2012)
Mac computer configurations & OS X optimizations (Updated: November 2012) A fast processor and a good amount of memory are important, but do not necessarily guarantee that a computer will perform well
Auditing the LAN with Network Discovery
Application Note Auditing the LAN with Network Discovery Introduction This application note is one in a series of papers about troubleshooting local area networks (LAN) from JDSU Communications Test and
Security Design. [email protected] http://wwwiuk.informatik.uni-rostock.de/
Security Design [email protected] http://wwwiuk.informatik.uni-rostock.de/ Content Security Design Analysing Design Requirements Resource Separation a Security Zones VLANs Tuning Load Balancing
NETVIGATOR Wireless Modem Setup Guide. (TG789Pvn)
NETVIGATOR Wireless Modem Setup Guide (TG789Pvn) Configure the NETVIGATOR Wireless Modem Make sure that system meets the following requirement prior to NETVIGATOR Wireless Modem usage: - Subscribers who
Information Technology Career Cluster Introduction to Cybersecurity Course Number: 11.48100
Information Technology Career Cluster Introduction to Cybersecurity Course Number: 11.48100 Course Description: Introduction to Cybersecurity is designed to provide students the basic concepts and terminology
Windows Operating Systems. Basic Security
Windows Operating Systems Basic Security Objectives Explain Windows Operating System (OS) common configurations Recognize OS related threats Apply major steps in securing the OS Windows Operating System
Chapter 8 Types of Utility Programs and Operating Systems. Discovering Computers 2012. Your Interactive Guide to the Digital World
Chapter 8 Types of Utility Programs and Operating Systems Discovering Computers 2012 Your Interactive Guide to the Digital World Objectives Overview Define system software and identify the two types of
Sample Career Ladder/Lattice for Information Technology
Click on a job title to see examples of descriptive information about the job. Click on a link between job titles to see the critical development experiences needed to move to that job on the pathway.
HC-6950. Emission Protected Security Workstation
Emission Protected Crypto AG / 6950-e-2.ppt / DA-HQ / 0004 / 1 PC and Workstation Risks Security Risks: Unauthorized change of data (Sabotage, Viruses) Unauthorized use of data Data loss (deletion) Physical
How To Connect Xbox 360 Game Consoles to the Router by Ethernet cable (RJ45)?
Is it really necessary for the three ports mentioned in Troubleshooting (UDP 88, UDP 3074, and TCP 3074) to be opened for Xbox Live to work properly? Most cable/dsl routers implement Network Address Translation
Seagate NAS OS 4 Reviewers Guide: NAS / NAS Pro / Business Storage Rackmounts
Seagate NAS OS 4 Reviewers Guide: NAS / NAS Pro / Business Storage Rackmounts Seagate NAS OS 4 Reviewers Guide 2 Purpose of this guide Experience the most common use cases for the product, learn about
A+ Practical Applications Solution Key
A+ Practical Applications Solution Key Module 1 Assignment: Introducing Microsoft Windows - answer the following questions: 1. What attributes are available in the NTFS file system that are not available
Network Management System (NMS) FAQ
Network Management System (NMS) FAQ Q: How does the NMS work? A: The Cooper NMS is a powerful, flexible and highly scalable wireless and fixed network management solution for thousands of network nodes
