Nt1310 Unit 1 Review Paper

Powerful Essays
NAME______________________________DATE_______________PER.________
Unit 1 REVIEW

REVIEW SHEET: GEOMETRY BASICS

Please identify the following terms defined below, then sketch the term in the space provided.

1. _____________

An exact location in space with an indefinite shape and size.

2. _____________

An object with no thickness that extends infinitely in two directions.

3. _____________

Part of a line consisting of two endpoints and all the points in between.

4. _____________

Part of a line consisting of one endpoint and extending infinitely in one direction.

5. _____________

Rays that share a common endpoint, but continue infinitely in opposite directions.

6. _____________
…show more content…
20. _________________

A pair of angles that add up to 180°.

21. _________________

A pair of angles that add up to 90°.

22. _________________

A segment, ray, line, or plane that cuts an angle in half.

Refer to the figure at right to name each of the following.

23. a line containing point A_ ______________

24. a line passing through B: _______________

25. two points collinear with point D: __________

26. two points coplanar with point B: ______________

27. a plane containing points B, C, and E: ____________

28. a plane containing lines p and q: ______________________

In the figure below, CD bisects AB at D. For each of the following, find the value of ‘x’ and the measure of the segment indicated.

29. x = __________

AB = ______

AD = 2x + 11
DB = 4x – 5

30. x = __________

AD = _______

AB = 5x – 4
DB = x + 1

The numbers given are the coordinates of two points on a number line.
Find the distance between the two points.

31.d = _____________

-3 and 5
Given that B is between A and C, find the indicated length.

32. BC =

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Nt1310 Unit 9 Final Paper

    • 432 Words
    • 2 Pages

    According to the book military, security, taxes, police are greatly impacted by technology. The military use technology for combat stimulation and research. Security use technology to gather information and protect the system through the computer. For taxes, technology is used for calculation of bills and tax returns. Lastly the police use technology to search through records for important information. (de Arazoza, 2015)…

    • 432 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1330 Unit 9 Final Paper

    • 491 Words
    • 2 Pages

    In previous post I have shown how to add a data connection in server explorer for a SQLite database file, and along the way also showed the process to create a new SQLite database file using visual studio 2010. if you haven’t read it or wish to read it please visit http://munnaondotnet.blogspot.com/2012/06/using-sqlite-in-visual-studio-2010-with.html farther more you can visit http://munnaondotnet.blogspot.com/search/label/SQLite for other SQLite post.…

    • 491 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Hackers formulate different variations of Malware to take advantage of these areas before the Developers can patch and protect against these vulnerabilities (Wikipedia, 2013). Oracle’s Java is an example of an application that is vulnerable. Their latest patch JAVA 7 Update 11 is in place to prevent up to fifty of these vulnerabilities as it just recently experienced some of these exploits. Many users are disabling this application in a Browser setting, likening it to “Kissing a black rat, in London, during the plague.” As stated in the Inquirer (Neal,…

    • 1564 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    nt1330 unit 7 assinment1

    • 350 Words
    • 2 Pages

    I can understand how you concerned with your company’s security after all information on competitors can be invaluable or very harmful to a company and this is why it must be protected from prying eyes. This does not have to mean that you have to lose production over trying to secure your networks information. An easy measure like user names and passwords can be used to protect less sensitive information but how strong you make those usernames and passwords can have a significant effect on how well your information is protected. I will give you some tips on how to better secure your network with the tools that you already have at hand, keep in mind that you can also buy better security items to better protect you network things like; smart card, finger print scanners, retinal scanners, etc. but I only recommend these for really sensitive information and only for certain users in your company. On the server that is the DC log in to the administrator account and in the Active Directory Users and Computers in the Domain icon in the left pane click on the users icon, you’ll be able to see all of the users in that domain. From here you can click on any user and make changes as necessary, for user names I recommend you use the following format; using capital and lower case letters the first letter of their name, their whole last name and their employee number, ex. “CCbattle1234@Domain*%#.Local” if someone hack the account and all that they knew the person name and the domain name they could not get in because it is very unlikely that they would know that person employee number and if they do then you have a spy in your company. As for passwords I recommend that they be alpha numeric and what this means is that they should be at least eight characters long, be composed of upper and lower case letters, should contain at least one number and one special character.…

    • 350 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    The NETSTAT utility is a command available on most platforms that enables a user to list the sockets in use on a system. The information returned by the command is only for the local host, and there is no provision for monitoring remote hosts using this utility.…

    • 670 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    Nt1310 Unit 9 Final Paper

    • 506 Words
    • 3 Pages

    Electroplating is the process of coating a metal object with a thin layer of another metal by means of electrolysis.…

    • 506 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    1. One can differentiate between the terms health record and health information by identifying their main purpose in the health community. Health records are the type of information regarding family history, diagnosis, complaints, or patient’s medications. Health information requires analyzing medical information and provides protection.…

    • 211 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Digital medical records is a great tool in the medical industry, but what is even more exciting in the medical industry is that most of X-ray equipment is digital , producing results instantly. These results can be attached to the digital medical records, where doctors can access it with a click of a button. With so much personal information stored digitally on servers, it is very important to have a secure network in place. A majority of large medical groups have already invested in Network Security to meet the HIPPA standards and beyond. However, the small imaging offices that I’m familiar with have poor Network Security in place or no Network Security at all. “Mobile devices are ubiquitous in today's society, and the number and types of devices used by physicians, nurses,…

    • 698 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Nt1330 Unit 3 Case Study

    • 685 Words
    • 3 Pages

    What can you do to benefit the server: Starting off, I would take care of the chat for the server so that the environment is family friendly. Later on, I would attempt to deal with more blatant rule breakers such as hackers and or people whom abuse glitches or bugs to take advantage of anything. If anyone breaks the rules with the exception of hackers (instantly taken action against) I will first give them a verbal warning so they know they shouldn't repeat what they just did. If did again, either action or another verbal warning will be issued but the third time will call for immediate action. Considering the timezones, I can catch the more 'blatant' rule breakers whom could be ruining the experiences of players in my timezone where other staff aren't online or…

    • 685 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Brian Boisjoli Human-Computer Interaction 12/14/16 Final Project Part 1: For this final project, I have made a few changes to my program to make it…

    • 1014 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    The CMOS, or Complementary Metal Oxide Semiconductor, is the chip in a computer that holds the most basic of settings for a computer. These settings include the date, time, and system setup parameters. The most common way to access the CMOS to change these parameters is hitting a specific key during the computer’s initial startup (CMOS, 2013). Since the inception there have been many changes made to the CMOS. The CMOS memory has been changed from analog to digital and the speed at which it is accessed has been increased (CMOS, 2013).…

    • 244 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Nt1310 Unit 3 Case Study

    • 538 Words
    • 3 Pages

    b) From the data provided, the greatest variance is in the Height data collected, it was the most variable and most scattered…

    • 538 Words
    • 3 Pages
    Good Essays
  • Good Essays

    · S/W Environment: Minimum one Web Browser should be installed before PC installation, Use IE 5.5 or higher, Go to Tools > Internet Options > Security tab and click on Custom Level button and make sure that under the Scripting section the Active Scripting is set to “Enable”.…

    • 1858 Words
    • 8 Pages
    Good Essays
  • Good Essays

    Nt1330 Unit 9 Final Paper

    • 1263 Words
    • 6 Pages

    With the help of process flow diagrams, compare the pre-triage and the post-triage systems in terms of total system time and total waiting times. Is the new system an improvement over the old?…

    • 1263 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    Nt1310 Unit 4 Case Study

    • 317 Words
    • 2 Pages

    I have attached question number 11 for everyone to review. This step is not completely done because we are missing expenses and revenues for 2017. The reason I am sending it out to you guys is so that you can see what I have done so far. This information may be particularly relevant to Jon. In the excel document, there are two tabs so far: the original budget, and expense scenario 1. The first tab is all the calculations I have done to get to tab 2. Also, In tab 1 I have made the following assumptions.…

    • 317 Words
    • 2 Pages
    Satisfactory Essays