CHAPTER 1 ORGANIZATIONAL ANALYSIS INTRODUCTION This chapter tackles about the company background, including its history, vision, mission, goals, and organizational plan. It briefly describes the view of business organization and ICT situation. Also, a proposed strategic plan has been given a glimpse, in account to the company concerns and information systems covered. Company Background * HISTORY 2Peng Internet Café started to operate last April 2008 at Dahlia St. Phase 1, Garden Villas
Words: 2816 - Pages: 12
1. What is the difference between RFID, RFID chips, and RFID tags? RFID – radio frequency identification, it allows physical objects to be identified by digital devices. RFID describes the technology. An RFID chip refers to the RFID technology on a semiconductor chip in a device. RFID tags are a combination of an RFID chip and an antenna. 2. What are three uses of the RFID tags to cut costs and boost efficiency? Some given examples were the tracking and recovery
Words: 551 - Pages: 3
scenario. Saguaro Federal should use a token ring. I say this because of the topology and function of a token ring. The general overview of a token ring is a circle. Within this circle each system is connected through a MAU by either UTP or STP. The token refers to a data packet that travels around the ring to its destination or destinations. The bank would benefit from a token ring because of the closed aspect of the network, and also because of the one way traffic that happens within the ring.
Words: 385 - Pages: 2
can be made about the network and the devices supported on it as well. The outcome of the analysis will be used to recommend new technologies in data collection, internal communication, and security. If done correctly, this will link productivity with care thereby improving performance and reducing the cost of operations in the hospital. Network Overview A review of Patton Fuller’s network reveals that the network is set up in a bus topology, which is the oldest topology. All stations are attached
Words: 784 - Pages: 4
In the early days of networking development, networks was chaotic. The protocols that were used to transfer the data from one computer to another computer were developed by hardware manufactures. Each vendor developed different proprietary protocols to support their own products. Some manufacturers even had multiple protocols, because protocols were developed independently for different computer platforms. The main problem with the protocols was, the protocols that were developed by one vendor were
Words: 1352 - Pages: 6
CompTIA Network+ Practice Question Answers Question 1. Objective: Given a scenario, install and configure routers and switches. The IEEE standard 802.3af states the specifications for which of the following? a) Quality of Service b) VLANs c) Routing tables d) Power over Ethernet Question 2. Objective: Given a scenario, troubleshoot common router and switch problems. A user's remote marketing server has changed IP address schemes and now the user can no longer access it. The user
Words: 1379 - Pages: 6
In building construction, the plenum (pronounced PLEH-nuhm) is the space that is used for air circulation in heating and air conditioning systems, typically between the structural ceiling and the suspended ceiling or under a raised floor. Riser Network cable that is rated for installation in buildings in a vertical format so if a fire should occur it would not burn like a wick and cause fires on upper levels of the building. Rip Cord It is the white cord inside a UTP cable used to rip the plastic
Words: 625 - Pages: 3
Communications Commission. The FCC is responsible for rating personal computers and other equipment as either Class A or Class B. The ratings indicate how much radiation a personal computer emits. NIST - Short for the National Institute of Standards and Technology, NIST is a non-regulatory federal agency within the U.S.
Words: 377 - Pages: 2
used? 6. Is the Internet one centrally controlled and managed network? 7. What manages peripheral devices on your computer? 8. What network topologies suffer from a single point of failure? 9. Define a networking standard? 10. What standards-setting body sets de facto standards? 11. Why is the TCP/IP model divided into layers? 12. What do routers do? 13. What is “encapsulation” when talking about data? 14. In TCP/IP networks, how are nodes identified layer 2 and layer 3? 15. Define the
Words: 537 - Pages: 3
Date: October 11, 2014 ISSC340 Week 1 Assignment (3% of Grade) APUS/Sanford Lesson 1 Review: Overview of Local Area Networks The purpose of this activity is to reinforce what you have learned so far about local area networks technologies. 1. What are the main architectural components of a LAN? (Minimum word count: 60) I LAN is define as a local area network which consist of a croup of computers that are within the same geographical location such as a home, or building, or even a group
Words: 335 - Pages: 2