COMPLETE COURSE MIS589 COMPLETE COURSE
Login
now
Register
now

Saturday, 7 November 2015

COMPLETE COURSE MIS589 COMPLETE COURSE

MIS 589COMPLETE COURSE MIS589 COMPLETE COURSE

Click below link for Answers

MIS- 589 Week 2 - Homework

Week 2 - Homework
Textbook Questions and Mini Cases
These activities are found at the end of each chapter after the Summary section.
· Chapter 3: Questions 1, 3, and 6


MIS- 589 Week 3 - Homework

Week 3 - Homework
Textbook Questions and Mini Cases
These activities are found at the end of each chapter after the Summary section.
· Chapter 4: Questions: 1, 10, and 26
· Chapter 4: Mini Case 1 – Smith, Smith, Smith, and Smith

MIS- 589 Week 4 - Homework

Week 4 - Homework
Textbook Questions and Mini-Cases
These activities are found at the end of each chapter after the Summary section.
· Chapter 5: Questions 3, 4, and 8
· Chapter 5: Mini Case 2 - Central University

MIS- 589 Week 5 - Homework

Week 5 - Homework
Textbook Questions and Mini-Cases
These activities are found at the end of each chapter after the Summary section.
· Chapter 7: Questions 3, 7, and 23
· Chapter 8: Exercises 8-3

Week 6 - Homework
Textbook Questions and Mini-Cases
These activities are found at the end of each chapter after the Summary section.
· Chapter 9: Questions 9, 19, and 29
· Chapter 10: Mini-Case 1 - Cathy's Collectibles

MIS- 589 Week 7 - Homework

Week 7 - Homework
Textbook Questions and Mini Cases
These activities are found at the end of each chapter after the Summary section.
· Chapter 11: Mini Case 1 – Belmont State Bank
· Chapter 12: Mini Case 1 – Computer Dynamics

MIS-589 Week 1 Quiz 100% Correct Answers

1.
Question :
(TCO A) This layer is responsible for translating electrical pulses into data.
Student Answer:
Data Link Layer
Transport Layer
Physical Layer
Network Layer
2.
Question :
(TCO A) A(n) _____________ is a set of rules that determine what a layer would do and provides a clearly defined set of messages that software at the layer needs to understand.
Student Answer:
Agreement
Standard
Protocol
Regulations

3.
Question :
(TCO A) Cables and wireless transmissions are also known as _________.
Student Answer:
circuits
lines
connectors
portals

4.
Question :
(TCO A) Today we have access to the broadband Internet access from home appliances, televisions, mobile phones, MP3 players, cars, computers, phones and many other devices. This is an example of the coming existence of ___________.
Student Answer:
pervasive networking
cloud computing
application synergy
broadband evolution

5.
Question :
(TCO A) Which standards body is responsible for the development of local area network (LAN) standards?
Student Answer:
ANSI
ISO
IEEE
ITU-T

6.
Question :
(TCO B) You have five physical computers in available to you. Your organization has started a project that requires 10 different servers to meet all requirements. You have no additional funding to purchase new servers. Using ________ technology is the best option you have.
Student Answer:
virtual server
cluster services
data access logic
simulation

7.
Question :
(TCO B) The company vice president has just received an email from an associate with claims that 50,000 dollars needs to be wired to a location in Eastern Europe. You want to confirm that this email is indeed from the associate by identifying the message ID and From address. What portion of the SMTP packet would you examine?
Student Answer:
The footer
The Transport Protocol Layer
The data portion
The header

8.
Question :
(TCO B) There are required and optional parts of an HTTP response. They are:
Student Answer:
response status, response header, response body
response address, response header
response status, response header
response address, response status
9.
Question :
(TCO B) The Cisco Telepresense system has grown in use over the past years and is a type of ____________.
Student Answer:
instant messaging
video conferencing
Webcasting
Imaging
10.
Question :
(TCO B) Which application architecture is known for having the lowest cost of infrastructure?
Student Answer:
client-server
host-based
peer-to-peer
client-based

MIS-589 Week 2 Physical Layer and LANs - You Decide

Leonard Cooper Charter School is a K-12 school with approximately 1,000 students. The school wants to develop a local area network that meets the needs of the school now and is scalable for the future. There have been numerous complaints about the speed and reliability of the network, especially since a new addition to the building was added a few years back.
Your Role and Assignment
You are the systems administrator contracted by Leonard Cooper to upgrade the local area network to meet the ever-increasing needs of the building's students and faculty members. Your first task is to interview key stakeholders to determine what the key areas of concern are.
Activity
The charter school's CEO has requested your help in updating the network to meet the demands of the building's faculty members and students. Your job is to interview the key stakeholders and to take action to remedy the issues that they have.
Write a two to three page proposal addressing each of the stakeholder concerns. Use the technologies below for the areas of concern. All of the technologies listed below will not be used, so be careful with your choices. You must use one of the solutions below to address each area of concern. Be specific in your responses, and justify the use of each technology based upon the concern.

MIS-589 Week 2 Quiz 100% Correct Answers

1.
Question :
(TCO B) A(n) __________ circuit is another name for a multipoint configuration.
Student Answer:
analog
shared
dedicated
simplex
2.
Question :
(TCO B) The technology director has decided that a host based application architecture based on mainframes is best for the payroll application. As the network engineer you need to decide which type of transmission is best and want to keep things as simple as possible. Select the transmission type that is ideally suited for this situation.
Student Answer:
half-duplex
full duplex
simplex
multiplex

3.
Question :
(TCO B) The Chief Information Officer has put you in charge of building the network. The CIO has informed you that cost are a factor in building the network. Security is not a concern and the CIO would like moderate speed. What type of media would you consider to build this network using to meet the CIO’s needs?
Student Answer:
fiber optic cable
satellite
radio
coaxial

4.
Question :
(TCO B) Which is true regarding parallel transmission mode?
Student Answer:
A stream is sent over a communication circuit bit by bit
Transmission speed is slower than serial transmission
Has to send two bits at a time of a character down the communication circuit
Can send all eight bits of a character down a circuit

5.
Question :
(TCO B) With respect to converting digital data into analog signals, AM stands for:
Student Answer:
Asynchronous Manchester
Analytic Mosiac
Amplitude Modulation
Analog Multimode
6.
Question :
(TCO C) A member of upper management has just informed you that an office space needs to accommodate seven new networked computers. In this office space you have one network cable that runs back to the main network distribution point. You want to get the seven new computers running as soon as possible. What is the fasted method of getting them connected to the network?
Student Answer:
Run network cables from the network distribution point
Install an eight port hub or switch
Split the network cables up between the computers
Install a multiplexer
7.
Question :
(TCO C) The storage capacity of your servers is quickly being exhausted. Organizational leadership has given you as much funding as you need to establish a long term solution to this problem. Which is the best option below to address this storage space problem from a long term perspective?
Student Answer:
add a new RAID controller to the server
implement a storage area network (SAN)
add new disk drives to the servers
implement server clustering
8.
Question :
(TCO C) Why do Switched Ethernet networks improve network performance?
Student Answer:
Because there are many devices on the same circuit
Hubs used to split network traffic result in reduced workload
Memory used by connected systems is reduced as a result of table memory
There are only two devices on a point to point circuit
9.
Question :
(TCO C) Which is true about a network hub?
Student Answer:
When a frame is sent from one computer to another the hub retransmit it to all computers attached
Keeps a table of addresses and ports
Each circuit connected to it is not shared
Internally the logical topology is a set of point-to-point circuits

10.
Question :
(TCO C) Which technology do most organizations today employ?
Student Answer:
1000Base-T over category 6
100Base-T over category 7
100Base-T over category 5e
1000Base-F

MIS-589 Week 3 Quiz 100% Correct Answers

1.
Question :
(TCO B) Which of the following is true with respect to the data link layer?
Student Answer:
It accepts streams of bits from the application layer
It is responsible for getting a message from one computer to another
It accepts messages from the physical layer
It performs routing functions
2.
Question :
(TCO B) You are working to resolve a problem with communication to an office in your building. The Sr. Network Engineer asks you to go get a mini-switch or repeater so that the source of the error can be resolved. What was the likely source of this error?
Student Answer:
Echo
Jitter
Crosstalk
Attenuation
3.
Question :
(TCO B) This error checking scheme adds 8, 16, 24, or 32 bits to the message.
Student Answer:
Parity Checking
Cyclical Redundancy Check
Checksum
Stop-and-Wait ARQ
4.
Question :
(TCO B) This type of transmission is typically used on a point-to-point full-duplex circuits.
Student Answer:
synchronous transmissions
High-level data link control
asynchronous transmissions
Continuous ARQ

5.
Question :
(TCO B) Your new position requires that you maintain a Token Ring network that includes several IBM mainframes. What type of access control would this network most likely use?
Student Answer:
Contention based
Mixed Mode
Relative performance based
Controlled based

6.
Question :
(TCO B) You are working with a co-worker over the phone to connect a router at your location in New York to their network in San Francisco. After hours of troubleshooting the WAN protocol configured on the routers you find that the root of the problem is that he has a Cisco router and you have a Nortel router. Which WAN protocol are you most likely configuring in this scenario?
Student Answer:
HDLC
SDLC
PPP
Ethernet

7.
Question :
(TCO B) __________ is not a function of a data link protocol.
Student Answer:
Media access control
Message delineation
Amplitude shift keying
Error Control
8.
Question :
(TCO B) The key to selecting the best access control technique is to _______________.
Student Answer:
whether you are using mainframes or not
selecting the appropriate cable media
find the crossover point between controlled and contention
type of LAN

9.
Question :
(TCO B) In general, controlled approaches:
Student Answer:
work better than contention approaches for small networks that have low usage
work better than contention approaches for large networks that have high usage
work better than contention approaches for all sizes of networks
do not require a host, server, or active monitor to assign media access control

10.
Question :
(TCO B) With contention:
Student Answer:
computers wait until the circuit is free before they send data
the front end processor must wait for a response from the polled client or terminal
one computer starts the poll and passes it to the next computer on the multipoint circuit
there is never a chance of a “collision” or two computers trying to send data at the same time

MIS-589 Week 4 iLab 2 Office Network Expansion

iLab 2: Office Network Expansion
Connect to the iLab here.
Submit your assignment to the Dropbox located on the silver tab at the top of this page.
(See "Due Dates for Assignments & Exams" in the Syllabus for due dates.)
i L A B O V E R V I E W
Scenario/Summary

In this lab, we will be simulating an office network that evaluates the effects of a proposed expansion.
Deliverables
Item
Points
Step 1: Small Internet Works - Analysis of Simulation
15
Step 2: Screenshot
15
Total Points
30
i L A B S T E P S
STEP 1: Small Internet Works
The following tutorials will lead you through creating a network simulation. You will first be creating the existing office network. Next, you will run the simulation of the current office network to get a baseline to compare the effects of the expansion. Then, you will create a second scenario that includes the expansion. You will run this simulation and compare the results of the expansion on the network with the current office network.
Open the IT Guru 15 tutorials Expand the tutorials link Expand the basic tutorials link Expand the small internetworks link and complete the Introduction, Getting Started, Creating the Network, Collecting Statistics, Viewing the Results, Expanding the Network, and the Comparing Results sections.
STEP 2: Screenshot
After completing the IT Guru Small Internetworks tutorial, take a screenshot using Ctrl + prtsc or another screen capture utility. Arrange the screen so that all items can be seen. The screen must contain the following:
Final network configuration Graph of overlaid results of the server statistics Graph of the overlaid results of the global statistics
Click on image to enlarge.

Screenshot Example 1
Click on image to enlarge.

Screenshot Example 2
Paste the screenshot into a Word document.
Include in the Word document containing your screenshot of the final results your written analysis on the proposed expansion. Address the following in your analysis:
Effect on server load Effect on network load What would be your recommendation on the expansion?
STEP 3: Submit to the Dropbox
Submit the completed word document to the weekly iLabDropbox.
For instructions on how to use the Dropbox, read these Step-by-Step Instructions or watch this Dropbox Tutorial.
See "Due Dates for Assignments & Exams" in the Syllabus for due date information.

MIS-589 Week 5 iLab 3 LAN Modeling

iLab 3: LAN Modeling
Connect to the iLab here.
Submit your assignment to the Dropbox located on the silver tab at the top of this page.
(See Syllabus "Due Dates for Assignments & Exams" for due dates.)
i L A B O V E R V I E W
Scenario/Summary

In this lab you will be simulating a company's WAN located on the East Coast. You will be evaluating how background traffic is affecting FTP traffic on their network.
Deliverables
Item
Points
Step 1: Lan Modeling – Analysis of Simulation
15
Step 2: Screenshot
15
Total Points
30
i L A B S T E P S
STEP 1: LAN Modeling
The following tutorials will lead you through creating the WAN simulation. You will be creating a WAN that spans several cities along the East Coast. You will be simulating the network with no back load and then duplicating the scenario with a back load and analyzing the results.
Open the IT Guru 15 tutorials. Expand the tutorials link. Expand the basic tutorials link. Expand the LAN Modeling link and complete the overview, setting up the scenario, configuring applications, building the network, background load, collecting statistics, and comparing results sections.
STEP 2: Screenshot
After completing the IT Guru 15 LAN Modeling tutorials, take a screen shot using Ctrl + PrintScrn or another screen capture utility. Arrange the screen and resize windows so that all items can be seen. The screenshot should contain the following:
final network configuration graph of overlaid results of average point to point utilization graph of the overlaid results of average FTP download response time
Click on image to enlarge.

Screenshot Example
Paste the screenshot into a Word document.
Include your analysis on the backload in the Word document containing your screen shot of the final results.
How is background traffic affecting the FTP traffic? Theorize possible solutions. What would be your recommendations from the analysis?
STEP 3: Submit to the Dropbox
Submit the completed Word document to the weekly iLabDropbox.
For instructions on how to use the Dropbox, read these step-by-step instructions or watch this Dropbox tutorial.
See Syllabus "Due Dates for Assignments & Exams" for due date information.

MIS-589 Week 6 WANs, MANs, and the Internet - iLab

Week 6: WANs, MANs, and the Internet - iLab
iLab 4: Web Report
Connect to the iLab here.
Submit your assignment to the Dropbox located on the silver tab at the top of this page.
(See "Due Dates for Assignments & Exams" in the Syllabus for due dates.)
i L A B O V E R V I E W
Scenario/Summary

In this lab, you will be evaluating the performance of two traffic contracts. In your scenario, you are utilizing a small ATM network. The two contracts are CBR (constant bit rate) and ABR (available bit rate).
Deliverables
Item
Points
Step 1: Web Report (opening existing LAN Model) - Analysis of Simulation
10
Step 2: Screenshot
20
Total Points
30
i L A B S T E P S
STEP 1: Web Reporting (opening existing LAN Model)
For this lab, you will be working with an existing LAN model. First, you will need to download the your_initials_web_report.zip file from Doc Sharing. Unzip the file on your computer and extract it to a location on your computer. Remember where you extract this file; you will need to unzip the file and then be able to browse to the extracted folder and copy it to the Citrix server.
Next, log in to the citrix lab.
Now, locate the Windows Explorer program you will use to copy the web report you downloaded to the Citrix server.
When receiving the following plug-in prompt, be sure to select "Yes."
You will next need to browse for the location on your computer where you downloaded the web report. The drive that represents your computer should be similar to the C$ designated number 1 in the picture, and the folder you unzipped should be named as demonstrated below. Click on the folder so that it is highlighted as shown.
From the Edit menu, select the copy command (or press Ctrl + C).
Browse for the op_models directory on the F: drive server. The location should be similar to that shown in the picture. Click on op_models so it is selected (highlighted).
From the Edit menu, select paste (or Ctrl + V) to paste the web report to your op_models directory.
Start IT Guru 15 and open the project named your_initials_web_report from your op_net models directory. Below is a screenshot of what the folder structure might look like on Citrix.
Select the project your_initials_web_report.prj and click open.
Next save the project with your initials. Make sure this is in your op_models directory. The folder directory should be as shown below.
You should now have the web report saved in your op_model's directory and be ready to proceed to step 2, the web reporting analysis.
STEP 2: Web Reporting Analysis
The following tutorials will lead you through opening an existing network model (see step 2) and generating a web report that you can use to evaluate two traffic contracts.
Open the IT Guru 15tutorials Expand the tutorials link Expand the basic tutorials link Expand the Web Reporting link. In step 1, you have completed the getting started through step 5, which was to open and save the existing report to your op_models directory. Continue with finishing the rest of the web reporting tutorial (Overview, the rest of Getting Started, Specifying and Generating a Web Report, General Report Format, and Results by Node and Statistic).
STEP 3: Screenshot
After completing the IT Guru 15 Web Reporting tutorial, take a screenshot using Ctrl + prtsc or another screen capture utility. Arrange the screen so that all items can be seen. The screen should contain the following:
Main screen of the web report with the Top Nodes and Links -> By Node being displayed.
Click on image to enlarge.

Screenshot Example
Paste screenshot into a Word document.
Include in the Word document containing your screenshot of the web report your analysis on the two contracts:
What were the results for the FTP? What were the results for Voice? What conclusions might you reach from the web report?
Submit your completed Word document to the weekly iLabDropbox. For instructions on how to use the Dropbox, read these Step-by-Step Instructions or watch this Dropbox Tutorial.
See "Due Dates for Assignments & Exams" in the Syllabus for due date information.

MIS-589 Week 7 Quiz 100% Correct Answers

1.
Question :
(TCO E) _________ controls stop a person from acting.
Student Answer:
detective
mitigating
corrective
preventative

2.
Question :
(TCO E) A _________ is a situation in which a hacker attempts to disrupt the network by sending messages to the network that prevent normal users’ messages from being processed.
Student Answer:
denial-of-service attack
virus
spamming
man-in-the-middle attack
3.
Question :
(TCO E) Your organization has decided to host a web server that will be accessible by the public. Organizational leadership is concerned about the web server being compromised and thus allowing the remaining network to be compromised. You want to come up with a solution to host the secure the web server internally, but still protect your network. What should you do?
Student Answer:
use a firewall
put the web server on the DMZ
put the web server in front of the firewall.
chassis based switch
4.
Question :
(TCO F) The traditional network design approach does not work well for _________ networks.
Student Answer:
slowly evolving
rapidly growing
static
modestly growing
5.
Question :
(TCO F) Which of the following would not be a type of circuit that needs to be considered when planning for technology design capacity?
Student Answer:
1000 Mbps
Ethernet
10 Mbps
100 Mbps

6.
Question :
(TCO F) Which of the following are not costs that are generally considered during the cost assessment stage of the network design process?
Student Answer:
cost of advertising brochures for new products to be offered by an organization
internetworking devices cost
network management costs
circuit costs
7.
Question :
(TCO G) ____________ refers to keeping track of the operation of network circuits to make sure they are working properly.
Student Answer:
Network monitoring
Fault tolerance
Fault management
Firefighting

8.
Question :
(TCO G) _____________ is a simple method that can help identify computers/devices or communication circuits that have higher-than-average error or usage rates.
Student Answer:
Quality control charting
Quality of servicing
Service leveling
Electronic software distributing

9.
Question :
(TCO G) A __________ is an organizational department that is responsible for monitoring and fixing overall network problems.
Student Answer:
mission critical area
fault tolerance department
network operations center
mullion delimiter agency

10.
Question :
(TCO G) Service Level Agreements (SLA) are significant for what reason?
Student Answer:
they ensure that the network will stay up 100% of the time
they are contracts outlining exact type of performance and fault conditions acceptable
they create redundant network links
they exclude compensation that must be provided by service providers

MIS-589 Weeks 1-7 Homework Exercises

Week 1 - Homework
Textbook Questions and Mini Cases
These activities are found at the end of each chapter after the Summary section.
· Chapter 1: Questions 7, 14, and 17
· Chapter 2: Mini Case 1: Deal-R-Us Brokers (Part 1)
Week 2 - Homework
Textbook Questions and Mini Cases
These activities are found at the end of each chapter after the Summary section.
· Chapter 3: Questions 1, 3, and 6
Week 3 - Homework
Textbook Questions and Mini Cases
These activities are found at the end of each chapter after the Summary section.
· Chapter 4: Questions: 1, 10, and 26
· Chapter 4: Mini Case 1 – Smith, Smith, Smith, and Smith
Week 4 - Homework
Textbook Questions and Mini-Cases
These activities are found at the end of each chapter after the Summary section.
· Chapter 5: Questions 3, 4, and 8
· Chapter 5: Mini Case 2 - Central University
Week 5 - Homework
Textbook Questions and Mini-Cases
These activities are found at the end of each chapter after the Summary section.
· Chapter 7: Questions 3, 7, and 23
· Chapter 8: Exercises 8-3
Week 6 - Homework
Textbook Questions and Mini-Cases
These activities are found at the end of each chapter after the Summary section.
· Chapter 9: Questions 9, 19, and 29
· Chapter 10: Mini-Case 1 - Cathy's Collectibles
Week 7 - Homework
Textbook Questions and Mini Cases
These activities are found at the end of each chapter after the Summary section.
· Chapter 11: Mini Case 1 – Belmont State Bank
· Chapter 12: Mini Case 1 – Computer Dynamics

MIS-589 All 7 Weeks Discussions

w1 dq1 - Technology and Evolution
w1 dq2 - The Application Layer
w2 dq1 - LAN Topology
w2 dq2 - Communication Media
w3 dq1 - Media Access Control
w3 dq2 - Data Link Layer
w4 dq1 - IPv4 versus IPv6
w4 dq2 - Network and Transport Layer Protocols
w5 dq1 - Backbone Network Components
w5 dq2 - Wireless Local Area Networks
w6 dq1 - Internet Architecture
w6 dq2 - Comparing WAN Architectures
w7 dq1 - The Wild, Wild Web
w7 dq2 - Cost Justification

MIS 589 Final Exam

(TCO A) Organization XYZ has just been granted access to the LAN of the ABC organization to access Web-based applications over the Internet. Organization ABC has established what type of access?
(TCO B) The ________________ is a WAN network that includes hundreds of thousands to millions of machines and users worldwide
(TCO B) Which of the following is considered a component of a network
(TCO C) Which is true about a network hub?
(TCO C) Hubs and switches also act as __________ to help prevent attenuation
(TCO D) A ___________ connect(s) two similar networks having the same network protocol and chooses the best route between two networks when there are multiple paths
(TCO D) In the case of Internet operation, a network access point is ______.
(TCO E) Your organization has been the victim of a recent DoS on one of your public websites. Your CIO wants this problem to have minimal impact on your organization in the future. What is the best technology to deploy to quickly detect and take action on a DoS attack once it starts
(TCO E) Your organization has decided to host a web server that will be accessible by the public. Organizational leadership is concerned about the web server being compromised and thus allowing the remaining network to be compromised. You want to come up with a solution to host and secure the Web server internally but still protect your network. What should you do
(TCO F) The building block design approach is sometimes called ______.
(TCO F) Your company is new and finally has acquired an operating facility. You are in change of designing the network. Organizational leadership has explained to you that they want a network that is simplistic, standardized, and that can be implemented in less than one year. What design option would best suit the needs of the organization
(TCO G) __________ policies attempt to allocate costs associated with a WAN or a mainframe to specific users
(TCO A) Discuss and describe three trends in communications and networking
(TCO B) Discuss and support your opinions of why combining voice and data is a major organizational challenge. Include your thoughts on its possible impacts on the organization in terms of competitive advantage, internal organization, and so forth
(TCO C) Switched Ethernet networks dominate the landscape of computer networks today. What improvements do Switched Ethernet networks have over its predecessor Shared Ethernet networks? Be specific and answer in details
(TCO C) What are the preferred technologies used in the three technology layers in backbone design? Describe each of the technologies in detail
(TCO D) What are the principal organizations responsible for Internet governance, and what do they do
(TCO E) Viruses and worms are issues that any networking professional must face. Compare and contrast viruses and worms. Be n
(TCO F) What are some major problems that can cause network designs to fail? Provide the problems in detail
(TCO G) The total cost of ownership (TCO) is a measure of how much it costs per year to keep one computer operating. TCO includes the cost of support staff to attach it to the network, install software, administer the network (e.g., create user ids, backup user data), provide training and technical support, and upgrade hardware and software. It also includes the cost of time “wasted” by the user when problems occur or when the user is attempting to learn new software.
Discuss in detail at least three approaches that can be used to reduce network costs

MIS 589 COMPLETE COURSE MIS589 COMPLETE COURSE

Click below link for Answers



 
© Copyright 2015 Work Bank Theme by Workbank