Exploring your computer’s network

 

 

• Log on to MAC OS on Host A.
• Click on System Preference

 

 

• Click on Network. The Network window opens.

 

• Click on Advanced

• Click on WI-FI Tap.

 

• List the name of three of the WIFI networks. Can you recognize the ZU WIFI Network among the list?
___________________________________________________________
___________________________________________________________

• Click on TCP/IP Tap.

 

• What is the IP address? List the IP Addresses of IPv4, Subnet Mask and the Router?
___________________________________________________________
___________________________________________________________
___________________________________________________________
___________________________________________________________

 

• Click on the DNS Tab above.

• Explain what is a DNS? List the IP Addresses of DNS?
___________________________________________________________
__________________________________________________________
• Click on the HARDWARE Tab above.

• Explain what is a MAC address ? List the MAC Address of your computer.
___________________________________________________________
__________________________________________________________

Record your computer’s network information using Terminal.
• Locate and open Terminal from Applications->Utilities->Terminal.

• At the Terminal Prompt, type ifconfig and press Enter. This will list all of your network settings, including the physical addresses of your wired and wireless hardware.

• What is the Physical Address and IP address for your connection, use the above image as a guide:

_________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________

• Use terminal to find a Website IP Address. Use the same terminal. Type the nslookup
> For example: nslookup google.com

 

• List the address of google.com?
___________________________________________________________
__________________________________________________________

• Using your browser, type in the IP address and hit enter. What do you notice?
___________________________________________________________
__________________________________________________________

.

Reflection – Write about your experience with the lab activity. (The tools used, new information you learned, and how you navigated through the steps.)
________________________________________________________
________________________________________________________
________________________________________________________
________________________________________________________
________________________________________________________
________________________________________________________
________________________________________________________
________________________________________________________
________________________________________________________
________________________________________________________
________________________________________________________
________________________________________________________
________________________________________________________
________________________________________________________
________________________________________________________
________________________________________________________
________________________________________________________
________________________________________________________
________________________________________________________
________________________________________________________
________________________________________________________

 

 

 

 

Sample Solution

Abstract – This paper studies the use of facial recognition technologies to prevent crime. The most common technologies that are being used for security and authentication purposes are analyzed. The Eigenface method is the most used facial recognition technology, it can be used for security and authentication purposes. This method focuses on the aspects of the face stimuli that are important for identification, this is done by decoding face images into significant local and global ‘features’.
There are many ways for law enforcement to help them in decreasing the amount of crime. Four of these ways that use facial recognition are: FaceIt, matching faces from live security images, face recognition in photographs and face recognition from sketches. As these technologies are improving very rapidly, the dangers and ethical issues also have to be taken into account before the technologies can actually be used in our daily lives.
From this paper can be concluded that facial recognition creates a lot of opportunities to help prevent crime. However, there are still a lot of difficulties that can cause problems when these techniques are used in the real world.

1. Introduction
Every day a lot of crimes take place. Criminality is a big problem all over the world. It is a challenge to track down criminals and Artificial Intelligence could help with this. The technologies that exist nowadays make it easier to identify individuals. One of these technologies is facial recognition. These technologies have the ability to identify criminals. Facial recognition algorithms can compare two sets of data. When a match has been fou

This question has been answered.

Get Answer
WeCreativez WhatsApp Support
Our customer support team is here to answer your questions. Ask us anything!
👋 Hi, Welcome to Compliant Papers.