Cari Blog Ini

Entri yang Diunggulkan

CARA MENGISI IP ADDRESS DI WINDOWS

CARA MENGISI IP ADDRESS DI WINDOWS  Untuk mengisi IP address di Windows,   gunakan Control Panel atau Pengaturan (Settings) untuk menuju  Ne...

Rabu, 26 Februari 2025

5.1.4 Check Your Understanding - Binary Number System

 5.1.4 Check Your Understanding - Binary Number System

Correct

You have successfully identified the correct answers.

1. 192.168.11.10 is equivalent to 11000000.10101000‬.00001011‬.00001010‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬
2. 172.16.31.30 is equivalent to 10101100.00010000‬.00011111‬.000111110

4.6.4 Check Your Understanding - Wireless Media

 4.6.4 Check Your Understanding - Wireless Media

Correct

You have successfully identified the correct answers.

1. The correct answer is False. Wireless provides the greatest mobility of all media and is gaining popularity in enterprise networks.
2. The correct answer is False. WLANs operate in half-duplex, which means only one device can send or receive at a time. This can impact network performance if there are many users accessing the WLAN at the same time.
3. Zigbee is intended for applications that require short-range, low data-rates, and long battery life, making it well suited for industrial and IoT applications.
4. This wireless standard is used for Personal Area Networks (PANs) and allows devices to communicate over distances of 1 to 100 meters.

4.5.7 Check Your Understanding - Fiber-Optic Cabling

 4.5.7 Check Your Understanding - Fiber-Optic Cabling

Correct

You have successfully identified the correct answers.

1. Multimode fiber has a shorter distance limitation than single-mode fiber. Commonly used on LANs with a distance of a few hundred meters but can be up to 2 km.
2. Multimode fiber used LEDs as the light source.
3. Single-mode fiber uses laser technology as the light source.
4. Single-mode fiber is commonly used for long haul TV and telephony applications.
5. Single-mode fiber is used for long haul applications up to 100 km.
6. Multimode fiber has a shorter distance limitation than single-mode fiber. Commonly used on LANs within a campus network.

4.3.6 Check Your Understanding - Copper Cabling

 4.3.6 Check Your Understanding - Copper Cabling

Correct

You have successfully identified the correct answers.

1. Coaxial cable, which is used for cable TV and internet service, is also used to attach antennas to wireless devices.
2. Shielded twisted-pair cable (STP) incorporates shielding and special connectors to prevent signal interference from other wires, EMI, and RFI.
3. Unshielded twisted-pair cable (UTP) is the most common type of wired network media.
4. Coaxial cable, which is used for cable TV and internet service and to attach antennas to wireless devices, uses several types of connectors to include BNC, N type, and F type connectors.

4.2.7 Check Your Understanding - Physical Layer Characteristics

 4.2.7 Check Your Understanding - Physical Layer Characteristics

Correct

You have successfully identified the correct answers.

1. In wireless networks data is represented by patterns of microwave transmissions.
2. Fiber-optic cables use patterns of light to represent bits.
3. Electrical pulses are used to represent bits on networks using copper cable media.
4. Bandwidth is the capacity of a network medium to carry data.
5. The transfer of bits across the network media over a period of time is known as throughput.

4.1.3 Check Your Understanding - Purpose of the Physical Layer

4.1.3 Check Your Understanding - Purpose of the Physical Layer

 Correct

You have successfully identified the correct answers.

1. The correct answer is False. The physical layer provides the means to transport bits over the network whether the network is wired or wireless.
2. The correct answer is False. When encoded, the bits making up a frame are transmitted over the media one at a time.
3. The physical layer receives frames from the data-link layer and converts it to bits for transmission. On the sending device the physical layer passes the transmitted bits up to the data link layer as a complete frame.
4. The physical layer receives frames from the data link layer for encoding and transmission.

Selasa, 25 Februari 2025

2.6.3 Check Your Understanding - Ports and Addresses

 2.6.3 Check Your Understanding - Ports and Addresses

Correct

You have successfully identified the correct answers.

1. IPv4 addresses are written in dotted-decimal format. For example: 192.168.1.1.
2. IPv4 addresses are written as four groups of decimal numbers separated by periods. For example: 192.168.1.1.
3. Switch virtual interfaces (SVIs) are virtual and have no physical port. Layer 2 switches use SVIs for remote management.

Kamis, 20 Februari 2025

2.2.8 Check Your Understanding - IOS Navigation (CCNA)

 2.2.8 Check Your Understanding - IOS Navigation

Correct

You have successfully identified the correct answers.

1. The privileged EXEC mode allows access to all commands. Higher level commands like global configuration mode and subconfiguration modes can only be reached from the privileged EXEC mode.
2. Global configuration mode is identified by the (config)# prompt.
3. The > prompt after the device name identifies user EXEC mode.
4. To return from any prompt, all the way down to privileged EXEC mode, type the end command or by pressing the CTRL+Z keys simultaneously on the keyboard.

2.1.6 Check Your Understanding - Cisco IOS Access

 2.1.6 Check Your Understanding - Cisco IOS Access

Correct

You have successfully identified the correct answers.

1. Because a new switch would not have any initial configurations, it could only be configured through the console port.
2. Connecting a computer to a Cisco device through the console port requires a special console cable.
3. Both Telnet and SSH are in-band access methods that require an active network connection to the device.
4. The AUX port on a Cisco device provided out-of-band connections over a telephone line.

Senin, 17 Februari 2025

1.8.3 Check Your Understanding - Network Security (CCNA)

 1.8.3 Check Your Understanding - Network Security

Correct

You have successfully identified the correct answers.

1. A DoS attack slows down or crashes equipment and programs.
2. A VPN creates a secure connection for remote workers.
3. A firewall blocks unauthorized access to your network.
4. A zero-day or zero-hour attack occurs on the first day that a vulnerability becomes known.
5. A virus, worm, or Trojan horse is malicious code running on user devices.



Rabu, 12 Februari 2025

Referensi novel bacaan untuk literasi

 Referensi novel bacaan untuk literasi 

1. MUDA MENDUNIA

 Karya : dr. Gamal Albinsaid

Penerbit : CV. Netmedis

Melalui buku inilah kita mampu mengetahui bagaimana seharusnya kita

menjadi bagian dari Bangsa Indonesia dan menjadi bagian dari

Makhluk Tuhan. Saya yakin, para pemuda Indonesia akan terus berusaha,

mampu meningkatkan kesejajaran diri dengan bangsa-bangsa lain di luar

sana. Akhirnya, saya mengucapkan selamat membaca.

Semoga bisa baca bukunya

ini kita akan terdorong dan melakukan jejak-jejak perbaikan dan pembaharuan

seperti apa yang telah dilakukan dr. Gamal Albinsaid.

https://drive.google.com/file/d/17w5nleOXDwlnyaI5tUWZf62eiOi5MzgU/view


2. Yang Fana Adalah Waktu 

Karya : Sapardi Djoko Damono

https://drive.google.com/file/d/1q7NbF8FTSub4HhZgw75icVYRNztTBH2a/view


3. Negeri di ujung tanduk


https://drive.usercontent.google.com/u/0/uc?id=17UD521DJRyhzyNYUUGObq5cwyoM_LgiG&export=download