Premium Essay

Dphs Server

In:

Submitted By vonkaizer
Words 22831
Pages 92
Chapter I
THE PROBLEM AND ITS BACKGROUND

Introduction The advances in computer technologies have affected everybody’s daily life. Computers support and assist almost every single human activity. Traditional Decision Support Systems (DSS) has focused on computerized support for making decisions with respect to managerial problems (Turban 2005).
Information is power. Providing significant and updated information is important to an administration because it is committed to promote transparency in school. It is grateful to a certain place that if it is linked to the rest of the world, it means that people could easily access vital information about the school. This set of web information could include data about the events of school or the school history, its vision and mission, its faculty and staff and its plans and programs.
In this age of information, almost all fields of endeavor such as education, manufacturing, research, games, entertainment, and business treat information systems as a need. Indeed, every activity in our daily life today requires people to get involved in the use of information systems.
Information technology is playing a crucial role in the development of modern society and social life. It has transformed the whole world into a global village. Now social life has moved to online. People are using discussion board, blogs and social networking sites through web-based technology to communicate digitally. World Wide Web, digital library, e-commerce and computer based distance learning have made our life easier.
The advancement of information communication technology in developed country, education field should take advantage to upgrade their learning and management techniques. Students should be allowed to learn anytime, anywhere and at their own place. However, administration and lecture should be managed to work more effective and

Similar Documents

Free Essay

Brick & Mortar, Nostalgic Record Store

...Information System Proposal May Tia Lee BIS/220 November 14, 2012 Ralph Schwehr Informational System Proposal The following proposal summary has been prepared by the Information Technology (IT) team describing a new information system required by our Advanced Services Network Consulting Engineers (NCEs). The information provided has been summarized and is intended to provide an overview of the proposed project. Executive Summary Within our organization we have a group of Network Consulting Engineers (NCEs) that provide Planning, Design, Implementation, and Operational (PDIO) services to contracted enterprise and service provider clients. On a number of recent occasions, it has come to light that one NCE is struggling with a design or planning issue that has already been addressed by another NCE. And in some cases, the solutions provided to our clients were not consistent between the NCEs. It has been determined a new system is needed that will provide an orderly and organized data repository that would be available to all NCEs. This system needs to provide an easy method for the NCEs to access and leverage previously defined design solutions. This system will provide several key benefits to the NCE team: ▪ NCE will be able to search for data related to the solution being considered ▪ NCE will save time in that we will not "reinvent the wheel" ▪ NCE provided solutions will be more standardized ▪ Using the same solution repeatedly simplifies supporting...

Words: 1688 - Pages: 7

Premium Essay

Case Study

...wireless unit that combined new acquisitions such as DSP Communications Inc. ( a chipset supplier for digital communications) with Intel’s memory operations. 3. Economic Affected by Septemeber 11, 2001 and needed to withdraw investments in new markets (production of network servers and routers and e-commerce service for small businesses) due to direct result of the downturn in economic condition. Intel’s shares also suffered. At $26, were down to 60 pecent compared to their highest over the previous years and get worse after the downturn and fell further to $20 by October. 4. Ecological Not being mentioned in the case. 5. Political Operates on a global basis and so be attuned to different governmental and country requirements in its distribution and sales. The manufacturing plant in Hamburg, Germany suggests an important political dependency that must be monitored. Task Environment or Industry Structure (Five Forces Analysis) 1. Threat of entry - Low Intel has very strong brand and being known in the industry. New entrant needed to encompass this to be able to be competitive. The chip used in the high-end servers, but the market was much smaller than originally been hoped for. 2. Threat of substitute product – Moderate to High...

Words: 424 - Pages: 2

Premium Essay

Education

...It appears that the telephone is no longer the preferred communication tool in the workplace; email has overtaken oral communication, according to the results of a recently released Data monitor report (Leggatt). According to Pew Internet and American Life Project statistics reported in February 2009, 90% of Internet Users between the ages of 18 and 72 use email (Effective Email Communication). A recent report estimated that over 7 trillion emails were sent worldwide last year! Spam messages are jamming in-boxes across the globe and the average office worker now gets between 60-200 messages a day (Friedman). Electronic mail is an effective way of communication that allows messages to be sent and received. In 1971, Ray Tomlinson, a computer engineer was the first person to send an email (Tomlinson). This was done by sending information between two computers that were sitting side by side (Tomlinson). The first email message was the announcement of network email. The exact content is unknown, but it gave instructions about using the (@) sign to separate the user's name from his host computer name. The function of email is the same as it was back then except now we have the ability to filter spam (Tomlinson). The rapid growth of email has been of the most exciting developments in the history of business communication (Flatley, Rentz, Lentz, 2012). Emails have become a common way of communication in the workplace. It has also played a major role of communication in today's society...

Words: 296 - Pages: 2

Free Essay

Ethical Computer Use Policies

...Ethical Computer Use Policies Mr. XX Ms. DARLENE RINGHAND CIS 500 January 28th, 2012 Ethical Computer Use Policy Offensive language and offensive material policy Effective: January 28th 2012 This policy is for all employees that use any desktop computer, laptop, PDA or any device that’s connected to this company network. It is everyone responsibility to use them in an ethical and professional manner without violating any laws. By signing this policy you agree to abide by the following conditions: * Do not view any nudity or sexual content online. * Do not publish, email, or distribute any obscene and or offensive content. * Do not download, print or store any files or services having sexually explicit content. * Do not send picture, photograph, and drawing or similar visual representation displaying sexual content. * Do not view any websites or send emails promoting crime or violence. * Do not view any websites or send emails promoting or criticizing religious beliefs. * Do not view or send Illegal material, such as child pornography. * Do not view or send Information that is sexual in nature that can be considered harassment. If anyone is found guilty of abuse they will be held accountable and may be subject to disciplinary action. Employee Signature: Date: Ethical Computer Use Policy Spam policy Effective: January 28th 2012 This policy is for all employees that use any desktop computer, laptop, PDA or any device that’s...

Words: 386 - Pages: 2

Premium Essay

Importance of Firewall

...Importance of Firewall The importance of a firewall is that it blocks malware that would be able to scan your computer to find its vulnerable areas and then attempt to break it while it is at its weakest point. First of all there is only one way to make your computer completely safe from attack and that is either when it is off or unconnected from the Internet. Other than that there are always vulnerabilities. However, you can make it as close to hacker proof as possible while it is connected to the Internet. The way to do this is to have a personal firewall installed along with antivirus and anti spyware protection. Plus you have to make sure that all three of these are updated on the regular. Additional protection is available to a network that used a router with a firewall feature. Firewalls protect your computer from outside attacks by guarding it from unnecessary Internet traffic. They can however be configured to block certain data while letting other data in. The importance of a firewall on your computer can not be underestimated especially for those who are always connected to the Internet. Firewalls are positioned between your computer and your network and are great for protecting multiple computers but also offer a great degree of protection for single computer use. It allows individual users decide how much content they want to filter through and what websites are safe to use. In some cases users have a very lax opinion of what should and should not be allowed...

Words: 529 - Pages: 3

Premium Essay

Office Administration

...Dan India Furniture Office Admin Case Study Below is a free excerpt of "Dan India Furniture Office Admin Case Study" from Anti Essays, your source for free research papers, essays, and term paper examples. OFFICE ADMINISTRATION Table of Contents Electronic Mail 1 Telephone 3 Importance of Effective Customer Care 4 Organisation 4 Customer 4 Evaluation of Office System and Procedure 6 Customer Complaints Procedure 6     Revised Customer Complaints Procedure 6     DanIndia Furniture Customer Complaints Procedure………………………………………………………………….... 8 Customer Complaints Form……………………………………………………………………………………………………………….9 References……………………………………………………………………………………………………………………………………….10 OUTCOME 3 ASSESSMENT – OFFICE ADMINISTRATION From the case study two methods used by DanIndia Furniture to communicate with customers are via e- mail and by telephone. Electronic Mail “Electronic mail, commonly called e-mail or email, is a method of exchanging digital messages from an author to one or more recipients”. http://en.wikipedia.org/wiki/Email. Date accessed 24/10/2011.   Electronic mail is a computer based method of sending messages from one computer terminal to another. Messages normally consist of single pieces of text but can include more complicated formats such as graphics and word processed documents. Messages can be sent to another user even if the other user is not logged on at the time the message is sent. The message can be read at a later time. The procedure is similar...

Words: 691 - Pages: 3

Premium Essay

Mis 582 Ilab 2

...Everyone is on a first-name basis, even with Peter Charles, the president. Organization Structure Coastline Systems Consulting [pic] Information Systems Facilities PCs Each technician works uses a Dell notebook: o Pentium M class machines with 512 MB RAM, 30-50 GB hard drives The bookkeeper/receptionist has a Dell Optiplex desktop running a Pentium 4, 256 MB RAM, and an 80 GB hard drive: Operating systems - MS Windows Windows XP Professional Tools - MS Office 2003 suite plus other software depending on use Internet Browser – IE 6 and Mozilla FireFox E-mail Client - Mozilla Thunderbird Various inkjet and laser printers Servers Dell PowerEdge 2800 Server o 1 GB of RAM, 80 GB RAID-5 hard drive storage o Operating system - MS Windows Server...

Words: 626 - Pages: 3

Premium Essay

Chapter 9

...evaluated last? Asset A: Switch L47 connects a network to the Internet. It has two vulnerabilities. It is susceptible to hardware failure at a likelihood of 0.2 and is subject to an SNMP buffer overflow attack at a likelihood of 0.1. The switch has an impact rating of 90 and no current controls in place. You are 75% certain of the assumptions and data. Asset B: Sever WebSrv6 hosts a company Web site and performs e-commerce transactions. It has a Web server version that can be attacked by sending it invalid Unicode values. The likelihood of that attack is estimated at 0.1. The server has been assigned an impact value of 100, and a control has been implanted that reduces the impact of the vulnerability by 75%. You are 80% certain of the assumptions and data. Asset C: Operators use an MGMT45 control console to monitor operations in the server room. It has no passwords and is susceptible to unlogged misuse by the operators. Estimates show the likelihood of misuse is 0.1. There are no controls in place on this asset; it has an impact rating of 5. You are 90% certain of the assumptions and data. 3. Suppose XYZ Software Company has a new application development project, with projected revenues of $1,200,000. Using the following table, calculate the ARO and ALE for each threat category that XYZ Software Company faces for this project: |Threat...

Words: 659 - Pages: 3

Premium Essay

Richman Investments

...Memorandum for Distribution To: RI Security Officer From: IT Consultant Subject: Acceptable Use Policy (AUP) Greetings RI Security Officer, Richman Investments expresses the acceptable and unacceptable use of the Internet and e-mail access. The following report will address the “Acceptable Use Policy” (AUP) standard at Richman Investments. All users of Richman Investments agree to and must comply with this Acceptable Use Policy (AUP). Richman Investments does not control or review the content of any Web site. However, Richman Investments may block or remove any materials that, in Richman Investments sole discretion, may be illegal, or which may violate this AUP. Richman Investments may cooperate with legal authorities and/or third parties in the investigation of any suspected or alleged crime or civil wrong. Violation of this AUP may result in the suspension or termination of either access to the Services and/or Richman Investments account or other actions as deemed appropriate. User Responsibilities: These guidelines are intended to help you make the best use of the Internet resources at your disposal. You should understand the following. 1. Richman Investments provides Internet access to staff to assist them in carrying out their duties for the Company. It is envisaged that it will be used to lookup details about suppliers, products, to access client information and other statutory information. It should not be used for personal reasons. 2. You may only access the...

Words: 621 - Pages: 3

Premium Essay

Harware/Software Components

...chip that people would be able to program it the way they wanted in their own | | |personal computer. | |PCs |A PC is a person’s personal computer that they can use at home or at work. On this PC,| | |they can store data and have passwords so no one else is able to retrieve the | | |information. | |Network computers |Network computers are computers in a business that are linked to the same server. | |World Wide Web and Internet |The worldwide web and internet is a way to retrieve and share information from a | |...

Words: 298 - Pages: 2

Free Essay

Cloud Computing

...over the Internet. These services are offered from data centers all over the world, which collectively are referred to as the "cloud." This metaphor represents the intangible, yet universal nature of the Internet. The idea of the "cloud" simplifies the many network connections and computer systems involved in online services. In fact, many network diagrams use the image of a cloud to represent the Internet. This symbolizes the Internet's broad reach, while simplifying its complexity. Any user with an Internet connection can access the cloud and the services it provides. Basically, instead of storing all of your information on your phone, hard drive, etc. and taking up space, you can store it in a “cloud”. Otherwise known as a server. Companies purchase server space (i.e. Cloud) instead of actual hardware to back up their files. A cloud computing solution can help your organization at home or your work achieve multiple benefits, including: * Faster time to market due to on demand deployment * Cost Structuring: Predictable operational expenses and IT resources matched to your actual needs compared with implementing and managing excess costs to meet demands. * Increased productivity due to ease of IT management * Easy access for approved users from internet There are many cloud computing companies out there. The few that people recognize are iCloud, Google Drive, and Microsoft SkyDrive. However...

Words: 505 - Pages: 3

Free Essay

Computers and Childrens

...1. Children, adolescents, and the Internet: A new field of inquiry in developmental psychology. Greenfield, Patricia; Yan, Zheng Developmental Psychology, Vol 42(3), May 2006, 391-394. doi: 10.1037/0012-1649.42.3.391 Special Section: Children, Adolescents, and the Internet. http://www.cdmc.ucla.edu/PG_Media_biblio_files/gy-2006_1.pdf In this article Greenfield and Yan survey the new field of inquiry to understand how today’s generation i.e. children and adolescents live in a complex universe of virtual technology. The author used six empirical articles to show various aspects of children and adolescent development in this massive and virtual universe. The major themes of article of this new are: communication on Internet, cognitive development, academic achievements and Internet. This article is useful to my research topic, as it includes and gives information about the impact of Internet on children. This article samples both the positive and negative aspect of the virtual world where children are more focused and increasingly living. This article is useful to supplement the information for my research. 2. Impact of Media on Children and Adolescents: A 10-Year Review of the Research SUSAN VILLANI, M.D. http://www.lionlamb.org/research_articles/01C392.pdf This article deals with the research regarding the impact of the media upon children within past 10 years. Different media categories are researched with computer technology. It has focused on the viewing patterns...

Words: 444 - Pages: 2

Premium Essay

Acceptaple Use Policy

...common oractice for many businesses and educational facilities to require that employees or students sign an acceptable use policy before being granted a network ID. When you sign up with an Internet Service provider (ISPs) such as Verizon, you will usually be presented with an AUP. Which states that you agree to adhere to such stipulations such as: * Not using the service as part of violating the law * Not attempting to break the security of any computer or user * Not posting commercial messages to internet groups without prior permission * Not attempting to send junk e-mail or spam to anyone who doesn’t want to receive it * Not attempting to mail bomb a site with mass amounts of email in order to flood their server Many Alabama K-12 educators Use the instructional resources found via shared educational tools, such as school and division-wide computer networks and the Internet. The increased use of such resources requires administrators, teachers, library media specialists, students, and parents take steps to insure that are used responsibility for K-12 instruction. In response to these concerns, schools or school districts are required To establish guidelines for the appropriate use of computer networks. The University of Pennsylvania has an established AUP it defines the boundaries of “acceptable use” of limited University electronic resources, including computers, networks, electronic mail services and electronic information sources...

Words: 367 - Pages: 2

Premium Essay

Week 4 Checkpoint

...in productivity and the business might have to make the clients pay more. Another setback to using personal e-mail in the workplace is that a business has to hold on to all of its e-mail communication for a specific amount of time or risk paying a heavy penalty. This is mainly due to the fact that if the business is being sued or is suing another entity and the e-mails are needed as evidence. As far as the court system is concerned, if an e-mail is sent from a personal account or a business account, they are the same, It does not matter to the court what exactly is the e-mails makeup, but you can be sure that the business will be assumed to be in charge of the contents within the e-mail. Once an e-mail leaves an organization it goes to a server and then goes to the recipient. What is the effect of instant messaging on organizational networks? What are benefits and drawbacks of using instant messaging in an organization? The effect of instant messaging on an organizational network is the space that is being taken up by the program and the speed of the computer and...

Words: 530 - Pages: 3

Premium Essay

Tech

...In today’s society technology effects many different people. The largest group effected by technology is college students. There are many good things about technology in this period of time. One of the main things that really have a good effect on college students is a computer. There are many things that college students use computers for. One of the real reasons that almost every college student has a computer in their dorm or in their house is to type up all of those papers that are assigned to them by their professors. Another one of the biggest things in technology is the Internet. You would swear that now someone would die if they didn’t have the Internet. People use the Internet almost everyday to either check e-mail, search something from the Internet, or they can even use it for AOL instant messenger. E-mail is one of the new things in technology that almost everyone is using now instead of the mail service. This is a really good thing for college students because this is a cheap way of keeping in touch with everyone you know without having to spend a fortune on phone calls. College students can also e-mail their professors about something that is going wrong, why they won’t be in class, or they can also e-mail their professors their essays or papers. Researching on the Internet is a very famous thing too. College students can use this to look up information on a topic that they have to write a paper on or just look up anything in general. AOL instant messenger is...

Words: 449 - Pages: 2