...SECTION A (Total 40 marks) Answer ALL the questions in this section. Question 1 (a) Briefly explain the key differences between HTML and XML. (8 marks) (b) Describe how an RFID system works. Name three disadvantages in adopting its use. (10 marks) (c) What is meant by the term grid computing ? Why has this form of computing become more popular only in the present decade ? (8 marks) (d) Distinguish between online analytical processing and data mining. (8 marks) (e) Identify the computer crime tactic used in each of the following scenario: (i) directing a Web user to a bogus web site even when he has entered a valid URL eavesdropping on the data travelling on a network flooding a server with an avalanche of service requests to crash the network (6 marks) (ii) (iii) ICT219 Copyright © 2008 SIM University Examination – January Semester 2008 Page 2 of 4 SECTION B (Total 60 marks) Answer ALL the questions in this section. Question 2 (a) The Internet offers a variety of services, such as email. Identify the service that support each of the following function: (i) (ii) (iii) (iv) transferring files from one computer to another live, interactive conversations logging onto one computer and doing work on another retrieving information using hypertext links (4 marks) (b) (i) Explain the phrase multitiered client-server computing. (4 marks) (ii) Figure Q2 below shows a client with a web browser accessing data from a company’s database. Suggest...
Words: 430 - Pages: 2
...Chapter 1 2 & 3 Review Questions Arcacia Godfrey 07/10/15 Mr. Gima (1). 1 bit represents one binary digit. (2). Kilobyte means approximately 106 byte. (3). 64 bits per quadruple word associated with each term. (4). The Random Access memory is used for short term memory and used to process data. (5). this is true the CPU tells the RAM which address holds the data that CPU wants to read. (6). A Character set determines in part what bits the computer stores. (7). the binary equivalent of decimal 123456789 stores in the RAM. (8). An Actuator arm is not a feature of a file system that might be used with a hard disk drive. (9). The Important features provides a convenient way to name a set of data for easier operations like copying and moving. The names gives users an easy way to reference the data and gives the CPU an easy way to identify the data it wants to read from RAM. (10). the classmate flash drive contents will not be usable by the classmate. (11). Changing the disk’s surface so that later the light will reflect differently for 0 or 1 describes how a hard disk drive physically writes a binary. (12). an internal hard disk drive is used for long term memory and connects to the CPU over a bus using a cable. (13). the components of an internal hard drive is an Actuator arm and platters. (14). RAM and optical disc drive are considered to be a solid state. (15). The Binary equivalent of decimal 123456789 the computer will need to consider. (16)....
Words: 1126 - Pages: 5
...Rocco Pugliese Chapter 1 - Assignment 1.1 BCOM/275: BUSINESS COMMUNICATIONS AND CRITICAL THINKING April 23rd, Monday 2012 Geri Markley Chapter 1 - Assignment 1.1 Misunderstanding 1 Who was the sender? | Rocco | Who was the receiver? | Manager | What was the message? | Determine if network devices were PCI compliant | What channel was used to send the message? | Excel worksheet, Verbal conversation via telephone | What was the misunderstanding that occurred? | Determination if network devices were PCI compliant | How could the misunderstanding have been avoided? | More experienced manager needed to determine if controls met compliance controls | Legend: Company X (purchaser) Company Y (purchasee) 1. What did you learn about the communication process from this activity? * This was my first project with PCI controls with a client who was being acquired by another company. PCI controls are very specific and detailed. I was chosen for this project for my attention to detail and understanding of network devices, routers, firewalls etc. * Through detailed, verbal meetings with Company X network team, it was determined all network devices monitored and audited by (X) were PCI compliant. Therefore I began completion of each sample documentation examples requiring the review of network device configurations as complete. The verbiage read as “All audits and controls are compliant by Company X. No further documentation required. * The manager...
Words: 763 - Pages: 4
...Hugh McCauley, COO, has requested that the HR system be integrated into a single application. This proposal documents my approach to gathering requirements and scoping the HRIS. In the following weeks I will outline the approach for implementing the entire HR system. The aim of this proposal is to help Riordan deploy a new HRIS. The new, modern HR system will make sure that each location can have a high level of compatibility through a standardized operating system. They will begin to implement the new system in six months, and it will be operational by next year's second quarter. Riordan's HRIS system will be updated by a developing team, who will come up with a project plan and tell management what resources they need. To understand the project goal, the problem's domain and stakeholders must be identified. Interviewing different users will pinpoint particular problems in the system and begin to develop a possible solution. “Requirement elicitation must focus on the creation of requirements, not design activities, in order to adequately address users’ concerns and not just developer needs” (Christel & Kang, p. 18, 1992). Sometimes it is an indefinite goal to gather a problem's requirements, and it is possible that design language makes the unclear specifications unverifiable. The following techniques will be used to find specific user requirements. * Workshops- that facilitating meetings with many stakeholders. * Surveys – collecting information from...
Words: 2195 - Pages: 9
...Lab 1 Assessment Questions 1. Name at least five applications and tools pre-loaded on the Windows 2003 Server Target VM and identify whether that application starts as a service on the system or must be run manually? Windows Applications Loaded | Starts as Service Y/N | FileZila Server | Y | Nmap | N | WireShark | N | WinPcap | N | Tenable Network Security | N | Tftpd32-SE | N | 2. What was the DHCP allocated source IP host address for the Student VM, DHCP Server, and IP default gateway router? a. Student – 10.96.108.20 b. TargetWindows01 – 10.96.109.30 c. TargetUbunto01 – 10.96.109.36 d. TargetUbuntu02 – 10.96.109.40 3. Did the targeted IP host respond to the ICMP echo-request packet with an ICMP echo-reply packet when you initiated the “ping” command at your DOS prompt? If yes, how many ICMP echo-request packets were sent back to the IP source? e. Yes. f. 4 4. If you ping the “WindowsTarget01” VM server and the “UbuntuTarget01” VM server, which fields in the ICMP echo-request / echo-plies vary? g. The TTL on Windows was 128 while on Ubuntu the TTL was 64. 5. What is the command line syntax for running an “Intense Scan” with ZenMap on a target subnet of 172.30.0.0/24? h. Nmap –T4 –A –V –PE –PS22, 25, 80 –PA21, 23, 80, 3389 10.96.109.30 6. Name at least 5 different scans that may be performed from the ZenMap GUI and document under what circumstances you would choose to run those particular...
Words: 415 - Pages: 2
...Lab Assessment Questions & Answers lab #8 1. What are some common risks, threats, and vulnerabilities commonly found in the Remote Access Domain that must be mitigated through a layered security strategy? 2. What default configuration should be placed on host-based firewalls when accessing the network remotely? 3. What risks, threats, and vulnerabilities are introduced by implementing a Remote Access Server? 4. What is a recommended best practice when implementing a Remote Access Policy server user authentication service? 5. What is a Remediation LAN? 6. Explain the concept of a Remediation Server and traffic separation as it relates to remote access. 7. What is a VPN? Distinguish between VPN server, VPN client, VPN router, and SSL VPNS. 8. What is the difference between a tunnel-mode VPN and a split-tunneling VPN? 9. According to the Remote Access Policy STIG are personally owned devices considered acceptable to perform privileged (administrative) tasks on a DoD network? 10. When connected to a public network or shared public Internet access point, what are some precautions that remote users should take to ensure confidentiality of communications? 11. What are the three types of remote access users as defined by the DoD in the Secure Remote Computing STIG v2r5? 12. What are the additional elements required of a network architecture if the...
Words: 278 - Pages: 2
...or needs to be built, and the technology that needs to go into the project. System design is all how all the hardware is set up while the instruction set architecture is the program language. Table of Contents Introduction What OS file system should we use? What types of processors? Cluster Architecture? Data Backup LAN or WAN Web-based diagram Introduction to Coast to Coast computing We can get in a plane and be across the country in a few hours but what if we need to work together faster than a few hours? Is it possible? How hard is it to have users in California work with users in Washington, New York, and Florida? What has to be done to make this happen? How secure will it be to have such a network? This and many other questions come up when a company starts thinking of expansion beyond the building or city they headquartered at. When looking at a network a business wants to be sure it is using the most cost effective form for the network. The base of a network is the architecture. For small businesses a peer to peer architecture would be best. There are three types of peer-to-peer architecture: collaborative computing, instant messaging, and affinity communities. In collaborative computing the unused CPU processing power along with any free disk space is combined with machines on the same network. A very common peer-to-peer networking is instant messaging. Google Hangouts is an example of this where each user can communicate in real time via chat. In affinity...
Words: 1513 - Pages: 7
...Prepared by: Radames RamirezDate: 03/03/2016 | Approved by: | 1. Description of the service-summary In an attempt to provide end users with a well maintained network storage that would be easily accessible from any location while maintaining a secured connection. To provide an environment to minimize the use and maintenance of local servers, server space, connectivity, and redundancy. | 2. Intended clients or customers The intended client or customer would be the end users of the company, this end users vary from medical office assistants, physicians, office managers, nurses, administrative assistants, receptionist, finance dept, insurance dept, medical records, and materials management to name a few. | 3. Business objective statementThe business objective is to minimize the cost of maintaining 40+ servers on a specified region, meanwhile providing for data storage, redundancy, and fast access to network files that would be housed in the cloud. | 4. Application architecture descriptionThe application architecture would consist of building a system that in scalable for future growth, it would possibly include emails servers, data servers, instant messaging. | 5. Information provided to the clientsThe clients would be notified of the changes being made via email, departmental meetings, and online training in order to be able to find their files and incur minimal downtime. | 6. Basic requirementsSome of the basic requirements we would be looking at would be the cost...
Words: 3576 - Pages: 15
...access required to enter any level 2 security workstation or work are. In order to enter any level 2 work area there will be a required key card for entry. On to our level 3 client workstations include; senior administrators, junior administrators, & the co-ceo & the ceo. We plan on implementing a fingerprint scanner to boot the workstation, a 128 bit hard drive encrypted password to log on. In order to enter a level 3 workstation area users will be required to user a CAC magnetized card, a fingerprint, and must be cleared by 24hr surveillance to enter the level 3 workstations area. Server areas- For Richman investments each server room will have 24 hr. surveillance and an onsite guard. Only network administrators, senior administrators, junior administrators and CEO, & CO-CEO’s will have security clearance to enter a server room. In order to enter the server area there will be a required fingerprint, and a magnetic key card to enter the room. There will be a hard key also in case of power outages or hardware failure. Security auditing-...
Words: 751 - Pages: 4
...Technologies’ decision CA Technologies’ is a company which has been providing solutions and software to streamline and automatize mainframe systems since 1976. The IT sector is a fast moving industry and more and more capital is being invested by companies in getting and maintaining an up to date IT system. Furthermore, the typical business computing system as developed from the typical Mainframe setup to a Client/Server setup and then into a Grid setup. All this while, CA Technologies’ made the right business decisions and kept growing through diverse acquisitions, will to keep up with the technology evolution and constant effort in remarketing its own image to better reflect the panel of software and solutions the company has been offering. Consequently, as of 2010, CA Technologies’ accounted over 60% of its revenues from Mainframe business. For the past few years, the consensus on the Mainframe computing model and its future is far from being positive. Whether or not this concern is justified is still a mystery as the Mainframe setup, nowadays often in guise of a server, still serves overs 4000 majors organizations worldwide. However, the appearance of a whole new kind of setup where the information is stocked in multiple locations, hence the name of “Cloud” Technology, and which can be accessed from anywhere with a device capable of connecting to the Internet is a new factor that CA Technologies’ has to take into account today. Moreover, the market is estimated to evolve from...
Words: 623 - Pages: 3
...Chaper 4 (Hardware) Review Questions Laudon & Laudon book (2007) | |In which of the following computer categories will you find the highest FLOPS performance? | | | | | |a. Server computer | | |b. desktop computer | | |c. mainframe computer | | |d. Grid computing | | | | | |Answer: d Page Reference: 120 Difficulty: Moderate | | | | | |AACSB: Reflective Thinking | | |Which of the following types...
Words: 351 - Pages: 2
...the Internet an inexpensive communications standard. 2. Why might an organization want to limit how an employee uses e-mail during work hours? Various studies have concluded that at least 25 percent of employee online time is spent on non-work-related Web surfing, and perhaps as many as 90 percent of employees receive or send personal e-mail at work. Personal traffic on company networks can also clog the company’s network so that legitimate business work cannot be performed. 3. What is an e-mail’s path once it leaves an organization? A message is decomposed into packets via the TCP protocol. Each packet contains its destination address. The packets are then sent from the client to the network server and from there on to as many other servers as necessary to arrive at a specific computer with a known address. At the destination address, the packets are reassembled into the original message. 4. What is the effect of instant messaging on organizational networks? What are benefits and drawbacks of using instant messaging in an organization? The instant messaging system alerts the user whenever someone on his or her private list is online so that the user can initiate a chat session with other individuals. Companies concerned with security use proprietary instant messaging systems such as Lotus Sametime since it can be used as a tool for...
Words: 421 - Pages: 2
...FACULTY OF MEDIA, INFORMATION & COMMUNICATION TECHNOLOGY DIPLOMA IN INFORMATION TECHNOLOGY (2 YEAR) NETWORKS 621 1ST SEMESTER ASSIGNMENT Name & Surname: ____________________________________________ ICAS No: _________________ Qualification: ______________________ Semester: _____ Module Name: __________________________ Date Submitted: ___________ ASSESSMENT CRITERIA QUESTION ONE QUESTION TWO GENERIC TO BOTH QUESTIONS LAYOUT AND SPELLING Font – Calibri 12 Line Spacing – 1.0 Margin should be justified. REFERENCE According to the Harvard Method TOTAL MARK ALLOCATION 35 30 15 5 EXAMINER MARKS MODERATOR MARKS 10 80 Examiner’s Comments: Moderator’s Comments: Signature of Examiner: Signature of Moderator: The purpose of an assignment is to ensure that the Learner is able to: Use methods of enquiry and research in a disciplined field. Interpret and evaluate text. Have a sound understanding of key principles and theories, rules and awareness. Solve unfamiliar problems using correct procedures as well as investigate and critically analyse information and report thereof. Present and communicate information reliably and coherently. Page 1 of 4 Instructions and guidelines for writing assignments 1. Use the correct cover page provided by the institution. 2. All essay type assignments must include the following: 2.1 Table of contents 2.2 Introduction 2.3 Main body with subheadings 2.4 Conclusions and recommendations 2.5 Bibliography 3. The length of the entire assignment must...
Words: 777 - Pages: 4
...areas is technology. It is impossible to eliminate technology such as computers all together because it’s a big part of the city daily operations. One of the potential options is virtualization of city’s physical servers, storage devices, and end user computers would result in significant savings in cost to the city of Seabreeze. Benefits of Virtualization Virtualization is defined as a technology that uses software to run multiple applications and operating systems on one or more physical host servers all at the same time. Within the host server is comprised virtual computers known as VM (Virtual Machines) are running the operating systems and applications similar to a physical PC. VM are setup as virtual servers and virtual desktops. Below is an example how a virtualization server operates. Example of Virtualization Server One of the benefits of virtualization is consolidation of servers since the city has 72 physical servers. The physical servers could be reduced from 72 to 4 host servers due to virtualization. By consolidating the physical servers, it will reduce cost of maintenance, software licenses, and hardware. One example of cost savings, in 2009, Landmark Healthcare had 63 physical servers and used virtualization to replace them. Those servers were replaced with 3...
Words: 2736 - Pages: 11
...Lab Assessment Questions & Answers 1. Explain why a layered security strategy helps mitigate risk and threats both external and internal. Multiple layers can be used to secure internal threats like keeping employees from accessing inappropriate material, update and patch workstations and run current anti-virus/malware on workstations daily. The layers also help mitigate external threats like hackers by using firewalls and shutting traffic out of the internal network. 2. Why is it a good idea to put shared servers and services on a DMZ when both internal and external users need access? When you have a DMZ there are two firewalls to protect the internal network from external threats. The necessary servers can be placed between the two in order to allow access from either side through strict firewalls while still allowing very little external traffic into the internal zone. The outermost firewall can allow a certain set of traffic to come in and access the servers. The inner most firewall blocks access into the intranet while allowing internal users to access the information on the servers. 3. What recommendations do you have for the future e-commerce server and deployment in regards to physical location and back-end security for privacy data and credit card data? I would place the e-commerce server in the DMZ with the private and credit card data stored inside the internal network. The commerce server will have access to the private data and will...
Words: 276 - Pages: 2