Saturday, October 4, 2014

Animator vs. Animation IV (original)







The struggle between a stick figure and its creator, a computer
animator. In this fourth installment, the animator is finally shown in
real life interacting with his computer monitor. 

The stick figure,
resisting his tormentor, attacks his social life by hacking his Facebook
account, traveling onto his iPhone via USB cord, and drawing animations
of his own to dismantle the animation interface.

Monday, September 8, 2014

Easy Ways to Recycle

When you think of recycling do you sigh and think that you just don't have the time or energy to do it?

Recycling is not just saving up your empty containers for collection, for example, I have a terrible habit of leaving lights on when I leave a room.  I seem to be someone who, when doing any kind of work, whether it's writing or stripping wallpaper, I need a lot of light around to do it. 

There are many ways to conserve and recycle as the video below shows :-)



The first way I found to conserve energy and count myself in as a "recycler" was to turn off lights as I left a room.  Sounds easy, right?  Well, that's because it is easy.  The only thing I had to do was remind myself that I was no longer going to waste energy by leaving lights on in a room that no one was occupying

Another way is that I changed my light bulbs.  Yup, that simple act of replacing a burned-out bulb with one of the new, energy saving kind has really been a big help.  The newer bulbs use up to 75% less energy when lighting a room and they are supposed to last 10 times longer (debatable).  How can you beat that?  And there wasn't any effort on my part; all I did was replace the bulb with the new and improved bulb and have made quite the impact on my electric bill.

There are easy ways to stay on track with recycling, and you don't have to look very far to find them, maybe that car is the way of the future.......

More Networking questions coming soon :-)

Friday, August 22, 2014

More network based questions part 8

Here's another selection of random networking questions - enjoy.


1. If I were to give an IP address to VLAN1, then VLAN2, and VLAN3, which VLAN would be the management VLAN?

A) VLAN0
B) VLAN1
C) VLAN2
D) VLAN_A
E) VLAN01


2. Frame tagging is used to identify...

A) The intended recipient of a frame
B) The IP address of the frame
C) The source of the frame
D) The VLAN ID of the frame
E) The trunking method

3. What are the three layers of the Cisco hierarchical model?

A) Core layer, Network layer, Access layer
B) Core layer, Distribution layer, Access layer
C) Physical layer, Network layer, Transport layer
D) Media Layer, Transport layer, Application layer


4. HDLC is ISO standard WAN protocol which means you don't need Cisco routers at both ends of a WAN connection, a router from any vendor that supports HDLC will work.
A) True
B) False

5. What type of IP address has the following structure?

network.node.node.node

A) Class A
B) Class B
C) Class C



And a couple of subnetting questions

6. What is the first valid host on the subnet that this address 172.21.15.22/21 belongs to?

7. What is the broadcast address of the network 172.20.80.0 255.255.240.0?


Note: Subnet zero is allowed for all of these subnetting questions.








1. Correct Answer B

VLAN1 is a management VLAN and by default all ports on a switch are members of VLAN1.  Cisco recommends that you use VLAN1 for administrative purposes only, also note you can't change the name of VLAN1.


2. Correct Answer D

Frame tagging is used to tags frames on trunked links to identify what VLAN they belong to.


 3. Correct Answer B

Core layer: Considered the backbone of the network (high-end switches, high-speed cables). Concerned only with speed and reliable delivery of data. No packet filtering happens here.

Distribution layer (Workgroup layer): Ensures packets are properly routed between subnets and VLANs using LAN-based routers and Layer 3 switches.

Access layer (Desktop layer): Deals with connecting workstations to the network with switches and hubs.


 4. Correct Answer B

Even though HDLC is an ISO standard, each vendor has their own implementations of HDLC.


5. Correct Answer A

http://en.wikipedia.org/wiki/Classful_network#Introduction_of_address_classes

Subnetting Answers

6. Correct Answer: 172.21.8.1

7. Correct Answer: 172.20.95.255



http://d53428b9fnj5bvangscjx43m9m.hop.clickbank.net/

   The will to win, the desire to succeed, the urge to reach your full potential... these are the keys that will unlock the door to personal excellence.

― Confucius

Monday, August 18, 2014

Cisco Exam Demo



In the case of Cisco exams,  students fall into a trap. They learn the theory and a little bit of troubleshooting, but they have no idea what the CCNA exam will be like when they go to the testing center.

Luckily Cisco have a little known demo which shows you what types of questions you will encounter on the exam and lets you try them out. Once you are familiar with the different types of exam questions, you'll be much more confident going into the exam.

Go to the Cisco Exam demo

Saturday, August 16, 2014

Cisco base networking questions for 2014 - part 7


Here's some more random networking to activate the brain cells... enjoy!!!

Thought it was about time I started 
adding to the collection :-) apologies for the gap.



 1. What is the correct sequence of Spanning Tree states?

A) Blocking, Listening, Learning, Forwarding, Disabled
B) Disabled, Blocking, Listening, Learning, Forwarding
C) Learning, Listening, Forwarding, Disabled, Blocking
D) Listening, Learning, Forwarding, Blocking, Disabled

2. If a switch receives a multicast frame, what does it do with it?

A) Forwards it out every port
B) Sends it back to the originator asking for a destination address
C) Drops the frame

3. IGRP advertises routes to interior, system and exterior routes

A) True
B) False
4. What is the reserved address space for a Class C network?

A) 10.0.0.0 - 10.255.255.255
B) 20.0.0.0 - 20.255.255.255
C) 172.16.0.0 - 172.31.255.255
D) 192.168.0.0 - 192.168.255.255
E) 208.168.0.0 - 208.168.255.255

5. What does the trace response N mean?

A) Network unreachable
B) Not forwarded due to ACL restriction
C) Protocol unreachable
D) Port could not be reached

6. Cut Through switching method is best described by which of the following?

A) The entire frame is received before forwarding is commenced
B) Forwards frame after receiving the destination MAC address
C) Filters out collision packets by waiting for the first 64 bytes of data
D) Forwards frame after receiving the source MAC address



Engineer Sales training





1. Correct Answer A
 
STP switch port states:

Blocking > Listening > Learning > Forwarding > Disabled 

2. Correct Answer A 

Internally multicast is treated as broadcast. So the Switch, will send it to all ports except from the one which it is received, just like a broadcast.

3. Correct Answer A

IGRP advertises three types of routes:

Interior routes are routes between subnets in the network attached to a router interface.
System routes are routes to networks within an autonomous system.
Exterior routes are routes to networks outside the autonomous system.


5.  Correct Answer A

Cisco Trace Command Response Codes
Response Meaning
 *         Timed out
 !H       router received packet but did not forward it
 N        network unreachable
 P        protocol unreachable
 U        port unreachable

6. Correct Answer B

Cut-Through switching is also referred to as Fast Forward.

When in cut-through mode the switch waits for the destination MAC Address to be received. Once the MAC Address is known the switch refers to its MAC filter table to determine which port the frame should be forwarded out. The switch forwards the frame even before the entire frame has arrived.


I hope you enjoyed those - more to come..stay tuned....

   Success is a state of mind. If you want success, start thinking of yourself as a success.

― Joyce Brothers


Wednesday, May 28, 2014

A new series of Cisco base networking questions for 2014 - part 6

Lets get to thinking with a random selection of Networking / IT based questions and answers :-)








1. When each network segment uses a different subnet mask this is referred to as...

A) Classful routing
B) Classless routing


2. What is the structure of the MAC address?

A) 32 bit network ID + 32 bit host ID
B) 14 bit vendor code + 6 bit serial number
C) 24 bit vendor code + 24 bit serial number
D) Network + Host

3. Which WAN protocol is capable of carrying video, Circuit Switched Data And Telephone Services using normal phone network?

A) Frame Relay
B) ISDN
C) PPP
D) ISL


4. What do the IOS commands below achieve?

Router(config)#access-list 5 permit 172.5.15.2
Router(config)#line vty 0 4
Router(config-line)#access-class 5 in

 A) Create an extended ACL to only permit host 172.5.15.2 to connect to VTY
B) Create a standard ACL to only permit host 172.5.15.2 to connect to VTY
C) Create an extended ACL to only permit hosts on the network 172.5.15.2 to connect to VTY
D) Create a standard ACL to only permit hosts on the network 172.5.15.2 to connect to VTY


5. What OSI layer does the following refer to?

"Establishes availability of intended communication partners, establishes agreement on procedures regarding error recovery and data integrity and synchronizes networked applications"

A) Transport layer
B) Session layer
C) Datalink layer
D) Application layer
E) Presentation layer


6. IGRP advertises routes to interior, system and exterior routes

A) True
B) False





-->
Clickbank Products



1. Correct Answer B

http://en.wikipedia.org/wiki/Classful_network


2. Correct Answer C

MAC Addresses are 48 bits long and consist of a 24 bit vendor code and a 24 bit serial number.


3. Correct Answer B

ISDN (Integrated Services Digital Network) is a set of standards for simultaneous digital communications (voice, video, data) over the traditional circuits of the public switched telephone network.


4. Correct Answer B

Router(config)#access-list 5 permit 172.5.15.2
Router(config)#line vty 0 4
Router(config-line)#access-class 5 in


This standard access list permits only the host 172.5.15.2 to connect to your VTY telnet line.


5. Correct Answer D

The Application layer of the OSI model (layer 7) establishes availability of intended communication partners, establishes agreement on procedures regarding error recovery and data integrity and synchronizes networked applications.


6. Correct Answer A

IGRP advertises three types of routes:

Interior routes are routes between subnets in the network attached to a router interface.
System routes are routes to networks within an autonomous system.
Exterior routes are routes to networks outside the autonomous system.


Let me know how you went, :-)

 "I couldn't wait for success so I started without it" 
Jonathan Winters



Wednesday, May 21, 2014

A new series of Cisco base networking questions for 2014 - part 5

Another selection of random Networking / IT based questions and answer, hopefully to help with getting your certifications or just increase knowledge - enjoy. 



1.  Which of the following best describes the presentation layer?

A) Translates between different data formats
B) Provides transport services
C) Supports communication between different programs
D) Establishes and terminates applications


2. Which protocol is used to determine the IP address if the MAC address is already known?

A) ARP
B) RARP
C) IP
D) IPX
E) TCP


3. What IOS command will copy the current running-config to NVRAM?

A) write memory
B) wr nvram
C) copy start-up run
D) copy run start
E) Answers A and D are correct


4. What process is used to check whether packets have been received when using IP?

A) Acknowledgments
B) CRC
C) Windowing
D) Flow control
E) None


5. Subnetting Questions

    a. What is the broadcast address of the network 192.168.98.64/26? 

    b. Which subnet does host 172.27.249.128 255.255.248.0 belong to?

6. What IOS command would you issue in privileged-mode to change the router configuration stored on TFTP?

A) config t
B) config mem
C) config net
D) config tftp






eToro Forex Trading




1. Correct Answer A

Presentation Layer is the 6th Layer of OSI model. It is responsible for converting different formats to device understandable language at both ends.


 2. Correct Answer B

Reverse Address Resolution Protocol (RARP) is a networking protocol used by a host computer to request its IP address from an administrative host, when it knows its MAC address.

 http://en.wikipedia.org/wiki/Reverse_Address_Resolution_Protocol 

 3. Correct Answer E

There are two types of configuration files on a router:

Running config - The configuration currently running on the router. Stored in RAM.
Startup config - Saved configuration stored in NVRAM.

To save the running configuration to the startup configuration use the following command.

Router# copy running-config startup-config  

or
Router# copy run start


 4. Correct Answer E

Trick question. IP provides no form of error correction / acknowledgements.

(Cisco loves trick questions....)

 5. Correct Answers

 a.  192.168.98.127
 b.  172.27.248.0

6.  Correct Answer C

To change the router configuration stored on TFTP you use configure network (config net)



 A couple of curly ones there, subnetting always seems to slow one down :-)

Stay tuned for more...

Friday, May 16, 2014

A new series of Cisco base networking questions for 2014 - part 4

Another selection of random Networking / IT based questions and answers to get the grey matter ticking..enjoy

1. What is the correct sequence of Spanning Tree states?

A) Blocking, Listening, Learning, Forwarding, Disabled
B) Disabled, Blocking, Listening, Learning, Forwarding
C) Learning, Listening, Forwarding, Disabled, Blocking
D) Listening, Learning, Forwarding, Blocking, Disabled


 2. What type of NAT allows you to map multiple unregistered IP addresses to a single registered IP address?

A) Static NAT
B) Dynamic NAT
C) Overloading (Port Address Translation)


3.  You are having to enter a certain command into the router several times, how would you recall the last entry?

A) Up arrow
B) Down arrow
C) Ctrl+N
D) Shift-P
E) Alt-P


 4. What is responsible for ensuring a router is functional and the interfaces are present on booting?

A) Bootstrap
B) POST
C) ROM monitor
D) NVRAM
E) Configuration register


5.  What is the Spanning Tree forward delay?

A) The time that is spent in the Listening and Learning states
B) 50 seconds
C) Time taken for a switch to go from Listening to Forwarding
D) Time taken for a switch to go from Blocking to Forwarding



6. What describes the role of the Session layer?

A) Provides transport services
B) Translates between different data formats
C) Supports communication between applications
D) Establishes and terminates communications between applications 





Dodo Australia - ADSL2+ Broadband - No Bundling Required



1,  Correct Answer A

STP switch port states:

Blocking
Listening
Learning
Forwarding
Disabled


2. Correct Answer C

 PAT (Port Address Translation) allows you to map multiple unregistered IP addresses to a single registered IP address

3. Correct Answer A

Cisco Keyboard Shortcut Actions

Up Arrow Displays your previous commands.  (command history)
TAB Key Completes a partially typed CLI commands.
CTRL+Z Takes you back to Privileged EXEC Mode.

CTRL+A Places the cursor at the beginning of a line.
CTRL+E Places the cursor at the end of a line.
CTRL+R Redisplays the current command line.
CTRL+W Erases a word (behind the cursor).
CTRL+U Erases an entire line.


4. Correct Answer B

POST (Power-on-self-test) stored in ROM performs a basic router health-check on booting.


5. Correct Answer A

Forward delay — The time that is spent in the listening and learning state, 15 sec by default, but you can tune the time to be between 4 and 30 sec.


6. Correct Answer D

The Session Layer (layer 5) of the OSI model provides the mechanism for opening, closing and managing a session between end-user application processes.


Very random I know, how did you go? More to come, fun isn't it :-)


Courage doesn't always roar. Sometimes courage is the quiet voice at the end of the day saying, "I will try again tomorrow."
~ Mary Anne Radmacher "



Tuesday, May 13, 2014

7 Ways to Improve Your Mobile Banking Security

As mobile banking grows in popularity, experts are offering consumers advice on how to safely use this service so they can be protected while conveniently managing their finances. It’s timely advice; mobile banking is one of the industry’s fastest growing trends because it gives consumers flexibility and the chance to manage their finances anytime and anywhere. But to enjoy the benefits without compromising security, you need to make informed decisions, avoiding the scams and schemes that are growing up around this new technology. To that end, some tips:


1.Invest in an antivirus app for your smartphone or tablet to help protect you when downloading other apps and mobile content. A good site I found for ideas on this is Digitl Trends, Top 5 Android security Apps.

2.Never provide personal identification or banking information over your mobile device unless you initiate the contact and you know that you’re dealing directly with your bank.

3.Never share your password, account number, PIN, or answers to your secret questions. Moreover, don't save this information anywhere on your phone – if you do, and it’s lost or stolen, you’re a sitting duck.

4.Never set an app to automatically log you into your bank account. If you do and your device is lost or stolen, someone will have free access to your money.

5.Set your phone to require a password to power on the handset or awaken it from sleep mode.

6.Remember, your bank would never call or text you asking for personal or banking information. Assume any unsolicited text request is fraudulent.

7.Immediately tell your mobile operator and your bank if you lose your phone.


You can ensure multiple antivirus programs aren’t interfering with each other by making sure they aren’t scanning at the same time.




--> Clickbank Products