What Distinguishes Cyberspace, the Internet, and the World Wide Web?

What Distinguishes Cyberspace, the Internet, and the World Wide Web

Cyberspace is defined by the National Security Presidential Directive 54/Homeland Security Presidential Directive 23 as “The interdependent network of information technology infrastructures, and includes the Internet, telecommunications networks, computer systems, and embedded processors and controllers in critical industries.”  In other words, cyberspace refers to the virtual environment in which people communicate …

Read More »

Ohms Law and Power in Electrical Circuits

Ohms Law and Power in Electrical Circuits

This module will enable readers to use Ohm’s Law and electric power formulas to determine the voltage, current, resistance and power in a basic DC circuit. Objective Learner will be able to: Use Ohm’s Law to determine voltage, current, or resistance Define Energy and Power Calculate Power in a basic …

Read More »

Electrical Elementary Diagrams

Electrical Elementary Diagrams

When the circuit components are either large, remote from each other, or numerous in a given electrical-power distribution system or control process drawing, the pictorial wiring diagram is an ineffective way to relay the required information. A different type of drawing, called the elementary diagram, which displays only the electrical …

Read More »

Circuit Breaker Types and Their Uses

types-of-circuit-breakers

Low-voltage circuit breakers are typically used in applications such as lighting circuits, motor control centers, feeder circuits and any application in which electrical power needs to be turned on and off and overcurrent protection is required. Medium-voltage circuit breakers are used in many of the same types of applications as …

Read More »

Medium Voltage Circuit Breakers Operation

medium voltage circuit breaker

Low- and medium-voltage Vacuum circuit breakers are similar in construction and operation. One of the primary differences between them is that the OCPDs on LVPCBs are mounted on the circuit breakers, while medium-voltage circuit breakers use protective relays, which are typically mounted on the enclosure door. Medium-voltage circuit breakers have …

Read More »

Circuit Breaker Schematic Diagram

Schematic-diagram-of-a-circuit-breaker-

A schematic diagram is a drawing that shows electrical system circuitry with symbols that depict electrical devices and lines representing conductors. Only qualified persons should review schematic diagrams and perform work on circuit breakers. A qualified person is a person who has special knowledge, training, and experience in the installation, …

Read More »

Secure Remote Access and Network Protection

Secure Remote Access and Network Protection

Introduction This lesson will cover remote access and how to better secure data transmissions. Remote access methods describe how a client connects to the local area network (LAN) remotely. In order for the client to access the LAN, they have to be authenticated through a remote access server. Network protection …

Read More »

IP Address Management & Subnetting- CompTIA Network+

IP Address Management & Subnetting- CompTIA Network+

Introduction This lesson will cover IP address management and a topic everybody loves, subnetting. There will be information in this lesson that will help identify network and host portions of an IP address. Lastly, this lesson will explain how to calculate the number of host and subnets needed on a …

Read More »

How to Install and Configure Routers and Switches

How to Install and Configure Routers and Switches

Introduction In this lesson you will learn about aspects of routing and switching when configuring a network. The options and features discussed provide for effective management of a local area network (LAN). Lesson Objectives By the end of this lesson, you will be able to: Identifying the steps involved with …

Read More »

Wireless Security Vulnerabilities and Mitigation

Wireless Security Vulnerabilities and Mitigations

Wireless Security and Vulnerabilities There are several encryption protocols that are used to protect network access: Wired Equivalency Privacy (WEP), WI – FI Protected Access (WPA), and Wireless Protected Access 2 (WPA2). 1. Wired Equivalency Privacy (WEP) is an encryption protocol the uses a 64 0r 128 bit encryption key …

Read More »