Formulas Spring 2025

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/143

flashcard set

Earn XP

Description and Tags

Formulas for all classes 2025

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

144 Terms

1
New cards

V=πr^2h

Cylinder Volume

2
New cards

l×w×h (length × width × height)

Rectangular Prism

3
New cards

V=4/3​πr^3

Sphere

4
New cards

D=m/V

Density

5
New cards

sin of, 30 | 60 triangle

½ | √3/2

6
New cards

cos of 30 | 60 triangle

√3/2 | ½

7
New cards

tan of 30 | 60 triangle

√3/3 | √3

8
New cards

cotangent of a 30 | 60 triangle

√3 | √3/3

9
New cards

secent of the 30 | 60 triangle

2√3/3 and 2

10
New cards

secent

2√3/3 and 2

11
New cards

secent

2 and 2√3/3

12
New cards

sin of a 45 triangle

√2/2

13
New cards

cosine of a 45 triangle

√2/2

14
New cards

tan of a 45 triangle

1

15
New cards

cotangent of a 45 triangle

1

16
New cards

sec of a 45 triangle

√2

17
New cards

cosecant of a 45 triangle

√2

18
New cards

The number significant digits in the answer (math) should

be of the same as the lowest variable in the equation

19
New cards

significant digits is the

#of digits counted from the 1st non zero digits

20
New cards

complimentary angles are (alpha and beta)

angles that equal 90 degrees

21
New cards

the angle sum of a triangle is

180 degrees

22
New cards

The Pythagorem Theorem is

a2+b2=c2

23
New cards

A congruent triangle has

the same sides and angles

24
New cards

Similar triangles

have the same angle measures but different side lengths

25
New cards

A vertical angle would be

<1 and <4

26
New cards

An alternate interior angle would be

< 3 and <6

27
New cards

An alternate exterior angle example is

<1 and <8 or <2 and <7

28
New cards

Corresponding Angles exam

<1 = <5 and <2= <6

29
New cards

Interior angle on same side of the transversal

< 3 and < 5 =180s | < 4 and <6 = 180

30
New cards

The two special triangles are

45 triangle and 30,60 triangle

31
New cards

Servers are computers that provide information to

end device

32
New cards

Clients are computers that send requests to the servers to

retrieve information

33
New cards

Email server runs email server ________.

Clients use _____ software to access email.

software | client

34
New cards

Web server runs ___ _______ software.

Clients use ________ ________ to access web pages.

web server | browser software

35
New cards

File server stores _____ and user files.

The _____ devices access these files.

corporate | client

36
New cards

An end device is where a message

originates from or where it is received

37
New cards

Example of an intermediary device

switches, wireless access points, routers, and firewalls.

38
New cards

An Intermediary device manages

data as its moves through a network

39
New cards

Communication across a network is carried through a

medium which allows a message to travel from source to destination.

40
New cards

Medium Type examples include

Metal wires within cables

Glass or plastic fibers within cables (fiber-optic cable)

or Wireless transmission

41
New cards

Metal wires within cables use

electrical impulses

42
New cards

glass or plastic fibers within cables (fiber-optic cable) use

pulses of light

43
New cards

Wireless transmission use

modulation of specific frequencies of electromagnetic waves.

44
New cards

Topology diagrams, use ________ to represent devices within the network

symbols

45
New cards

Physical topology diagrams illustrate the ________ of intermediary devices and cable installation.

physical location

46
New cards

physical topology

47
New cards

logical topoligy

48
New cards

Logical topology diagrams illustrate ______ _______ _________ of the network.

devices, ports, and the addressing scheme

49
New cards

Small Home Networks

•connect a few computers to each other and the Internet

50
New cards

Small Office/Home Office

•enables computer within a home or remote office to connect to a corporate network

51
New cards

Medium to Large Networks

many locations with hundreds or thousands of interconnected computers

52
New cards

World Wide Networks

connects hundreds of millions of computers world-wide – such as the internet

53
New cards

Two most common types of networks

Local Area Network (LAN)

Wide Area Network (WAN)

54
New cards

Visual Representation of a LAN | WAN network

55
New cards

LANs are connected to each other using

WANs

56
New cards

Visual Representation of LAN and WAN connection

57
New cards

The following groups were developed to help maintain structure on the internet

•IETF

•ICANN

•IAB

58
New cards

IETF (Internet Engineering Task Force)

Develops and maintains technical standards for the internet, such as communication protocols (e.g., TCP/IP, HTTP).

59
New cards

ICANN (Internet Corporation for Assigned Names and Numbers)

Manages domain names, IP addresses, and the DNS system to ensure unique and organized addressing.

60
New cards

IAB (Internet Architecture Board)

Oversees internet standards and protocols, providing guidance on overall internet architecture and policies.

61
New cards

Visual Diagram of Intranet and Extranet

62
New cards

Popular services for home users and small offices include _________ ______, broadband digital subscriber line (DSL), _______ ___, and mobile services.

broadband cable | wireless WANs

63
New cards

•Organizations need faster connections to support __ ___________, ______ ____________, and data center storage.

IP phones, video conferencing

64
New cards

Home and Small Office Internet Connections consist of cable, ____, cellular, _______, and _______ _________

DSL | Satellite | Dial-Up Telephone

65
New cards

Cable connection offers _____ _________, always on, internet offered by cable television service providers

high bandwidth

66
New cards

A DSL connection offers high bandwidth, always on, internet connection that runs over a _______ _____.

telephone line

67
New cards

Corporate business connections consist of _________ ___, DSL, _________ ______ _____, and satellite

dedicated lease line, Ethernet WAN,

68
New cards

Dedicated lease line are

reserved circuits within the service provider’s network that connect distant offices with private voice and/or data networking.

69
New cards

Converged networks can deliver data, _____, and video over the same network infrastructure

voice

70
New cards

The converged network infrastructure uses the same

set of rules and standards.

71
New cards

Management Information Systems refer to

the ability to manage a collection of systems, which work together, allows a business to run smoothly and efficiently

72
New cards

Great management revolves around the ability to

communicate

73
New cards

John Locke is the father of _____ and developed the theory of ________

liberalism | property

74
New cards

Adam Smith is the father of ______ and develop the principles of _________ of labor and ______ enterprise

economics | division | free

75
New cards

The four basic characteristics that the underlying architectures need to address to meet user expectations are

Fault Tolerance | Scalability | Quality of Service (QoS) | Security

76
New cards

A fault tolerant network limits the impact of a failure by limiting

the number of affected devices

77
New cards

Reliable networks provide redundancy by implementing

a packet switched network

78
New cards

Packet switching splits ______ into packets that are ______ over a network

traffic | routed

79
New cards

A scalable network can expand quickly and easily to support new users and applications without

impacting the performance of services to existing users.

80
New cards

Quality of Service (QoS) is the primary mechanism used to ensure

reliable delivery of content for all users.

81
New cards

•With a QoS policy in place, the router can more easily ______ the flow of _____ ___ _____ traffic.

manage | data and voice

82
New cards

Network infrastructure security consist of _________ _________ of network devices and preventing __________ _________ to the devices

physical security | unauthorized access

83
New cards

Information Security is protection of the _________ or ____ transmitted over the network

information | data

84
New cards

The are two main types of network security that must be addressed are

Network Infrastructure Security and Information Security

85
New cards

Three goals of network security

CIA (Confidentiality, Integrity, Availibility)

86
New cards

Confidentiality

only intended recipients can read the data

87
New cards

Integrity

assurance that the data has not be altered with during transmission

88
New cards

Availability

assurance of timely and reliable access to data for authorized users

89
New cards

A NIC is a specialized port on a networking device that

connects to individual networks.

90
New cards

S1> is what mode

User Exec

91
New cards

Connect command in PKA terminal

opens a terminal connection

92
New cards

(Cisco) When part of a command is typed, the _____ key can be used to complete the partial command.

Tab

93
New cards

S1# is what mode

Privilleged Exec

94
New cards

S1 (config) #

global configuration mode.

95
New cards

S1# clock set 15:00:00 31 Jan 2035 does what

set clock to the date and time requested

96
New cards

enable command

turn on privilege exec

97
New cards

Switch# configure terminal

Switch(config)# hostname S1

S1(config)# exit

S1#

Assigning a name to a switch

98
New cards

configure terminal is what comand

to enter configuration mode

99
New cards

S1# config t

S1(config)# enable secret itsasecret

S1(config)# exit

S1#

enables an encrypted password that overwrites the enable password

100
New cards