Management Information System practice in Bangladesh: A Study on Grameen Phone NATIONAL UNIVERSITY Assignment on: Management Information Systems Practice in Bangladesh: A Study on Grameen phone Course Name: Management Information systems SUBMITTED TO: Md. Nahid Mia Lecturer Business Study group National University SUBMITTED BY: The Group of Innovation Roll No. | Reg. No. | Name | 147010 | 1462810 | Md. Raisul Islam | 147008 | 1462808 | Md. Shah Ali Dolon |
Words: 2993 - Pages: 12
COMPUTER NETWORK INTERVIEW QUESTIONS WITH ANSWERS 1.What do you mean by data communication? Ans: It is the exchange of data between two devices via some form of transmission medium such as wire cable. The communicating system must be part of a communication system made up of a combination of hardware and software.The effectiveness of a data communication system depends on three fundamental characteristics: delivery, accuracy and timeliness. 2.What is simplex? Ans: It is the mode of communication
Words: 3493 - Pages: 14
Glassen Introduction: Riordan Manufacturing’s current Information Technology Human Resource (HR) system is considered legacy and in need of replacement. The expected results are to define the business requirements for the development of an HR system to support the objective of a more sophisticated, state of the art, information systems technology. In this document, I will outline my plan for the new Information Technology system following in detail the Software Development Life Cycle (SDLC) for
Words: 3437 - Pages: 14
Quiz 1 and 2 * Windows Deployment Services (WDS) is a software platform and technology that allows you to perform which function? A) automated network-based installations based on network-based boot and installation media * Which two role services does the WDS Role include? A) Transport Server and Deployment Server * What role does preboot execution environment (PXE) play in WDS? A) It's used to boot to a WDS Server to install a preinstallation environment What is
Words: 3472 - Pages: 14
Vulnerability Unauthorized access via un-patched software could jeopardize customer’s web presence and cause Company and user’s reputations to be tarnished, effecting revenue. Just to name one threat possible, buffer overflows pose a substantial threat to networks and can be
Words: 1578 - Pages: 7
Campus network. The Biology Lab is running RIP protocol, whereas the Fund-raising office is running OSPF routing protocol. The new Genome4U Lab network is decided to run on EIGRP routing protocol. The edge router of this network is used to redistribute the RIP, OSPF and EIGRP routes. It will also be used to provide internet access to the Genome4U Lab network through the University Campus Network. Network Design As shown in the figure below, the Biology lab network, fund-raising office network and
Words: 981 - Pages: 4
Cable Alexander Williams Dr. Johnson CIS175 July 25, 2013 The Benefits of Twisted Pair Cable 2 Abstract I have been recently hired by a Network Consulting Firm (NCF) and my fist task as a consultant will be to work with Ocper, Inc. Upon arrival at Ocper, I learn from the president that there is no one dedicated to information technology or networking on the staff and there are 20 Windows peer-to-peer client computers connected via coax cable. The president also addresses her concerns
Words: 1053 - Pages: 5
that connects you to the public switched telephone network (PSTN). This line can be a voice line, or it can be a data line. The physical wiring for the local loop consists of a pair of twisted copper wires that run from the telephone company's central office to the subscriber's premise and another pair of twisted copper wires that run back to the telephone company's Central Office1 b. Central Office A Central Office is part of the telephone network in your area. It is a building in which the phone
Words: 1505 - Pages: 7
1. What is a byte? 8 bits 2. When using a truth table, 1 and 0 equal __False____. 3. What do parentheses do in mathematical equations? Indicate what operations do to first 4. What is a node on a network? Hardware connected to the network 5. Which physical topology has the inherent weakness of a single point of failure? Star 6. In a Web address, which part identifies the protocol being used? HTTP 7. What is basic to every networking standard? (Hint: relates to Documentation) Beyond the
Words: 1474 - Pages: 6
Contents Abstract 4 Introduction 5 Operating System 5 Servers 5 Computers 6 File System 7 Processors 9 Servers 9 Computers 10 Cluster Architecture 11 Network Architecture 12 Network Topology 14 Conclusion 15 References 16 Abstract This paper will discuss the suggested solution for our new network architecture. With our insurance company moving to new headquarters in Denver, Colorado and the expansion of our company to include satellite offices on both the east and
Words: 3828 - Pages: 16