Question

In: Computer Science

PLEASE ANSWER ALL OF THE FOLLOWING QUESTIONS 2. Describe the networks that might be used to...

PLEASE ANSWER ALL OF THE FOLLOWING QUESTIONS

2. Describe the networks that might be used to support a small family-owned neighborhood convenience store with a point of sale (POS) computer, and an office computer for inventory control, accounting, product acquisition, etc.

3. Describe the distributed applications that might be used to support a neighborhood book store with a coffee shop/browsing area that offers free Internet access to its customers, accepts credit cards for purchases, has an email-based marketing plan, and sells some products online.

4. Describe the networks that might be used to support a small manufacturing facility that supplies widgets to a large international manufacturing firm. The organization uses automation in their production, employs a small management staff (accounting, materials procurement, human resources, etc.), and receives their orders for widgets via electronic communications with the larger firm.

5. Explain the differences between backend LANs, SANs, and backbone LANs

6. List and describe the key components of satellite communications systems

7. In a computer and network security context, list and briefly describe three classes of intruders

8. In a computer and network security context, list and briefly describe three intruder behavior patterns

9. Describe the computing needs of a medium-sized enterprise and the need for client/server, intranet, and/or cloud computing.

10. Conveniently Yours is a small family-owned neighborhood convenience store that sells products and Lottery tickets to a very limited customer base. Their computing equipment is minimal with a point of sale (POS) computer, an office computer for inventory control, accounting, product acquisition, etc. Describe Conveniently Yours computing needs and their possible need for client/server, intranet, and/or cloud computing that would support his business operations.

Solutions

Expert Solution

2- PAN( Personal Area Network ) can be used which may be made up of a wireless modem, few computers, phones, printers, etc., and revolves around one person in one building or just the neighbourhood. These types of networks are typically found in small offices or residences, like the one in the question.

LAN OR WLAN (Wireless local area network ) can also be used, it is a simple network to connect low voltage devices across short distances.

3- There are large variety of Distributed application available today , the application that can be used for 2, should be like resource sharing so that both the things should be managed with minimum expense, it should be precise to maintain a good check on the money transaction, security is the key to keep data safe, availability is an important feature so that this app should always be a boon to the business never an obstacle some examples of distributed applications are Brave, EOSdynasty , MakerDAO etc which are used for different purposes.

4- CAN- Campus area network can be used with proper security as per the requirement. CAN is spread across several buildings that are fairly close to each other so users can share resources. so even if there is any scale up of the infra, CAN can accumulate the devices.

5- In simple terms, Backend (LAN)networks are generally used to interconnect large systems such as mainframes, supercomputers, and large storage devices where main need here is for bulk data transfer with reliability among a limited number of devices in a not a large area preferrably a smaller one. The SAN separates storage tasks from specific servers and creates a shared storage facility across a high-speed network. Whereas a backbone LAN is a high-capacity LAN which is used to interconnect LANs with lowercapacity .

6- Repeater- It is a circuit that changes the frequency band of the transmitted signal from the received one and acts like a transponder. It consist of input multiplexer, multiplier and output multiplexer.

7 - Masquerader - It is an unauthorized user who penetrates a system and exploits a authorized user’s account (outside).

-Misfeasor - An authorized user who makes unauthorized accesses i.e. misuses his privileges .

  -Clandestein user- It grabs supervisory control to elude other controls like auditing and access controls or may suppress audit collection as well.

8- Hacker- Select target, identify vulnerable services, wait for user to log in, captures password and use it to access the network.

Criminal Enterprise- Exploit through vulnerable ports, use trojen horses, act quick, hard to detect and make no mistakes generally.

Internal Threat- use accounts they don't use for themselves for daily jobs, email former and prospective employers, conduct chats, do large downloads and file copying, access network during non working hours.

9-Medium-sized enterprise need flexible , secure, scalable, portable and efficient in terms of collaboration type of services in their computing.

Need of intranet- It provides one central place to store all the company documents, always up-to-date and can be accessed by anyone on the team, it shows properties like distribution and availability and provide tools like search to ensure that employees can find the information what they need in order to perform their jobs.

Need of Client server-  client computers provide an interface to allow a computer user to request services of the server and to display the results the server returns. Hence they are required to fulfill the various requirement in simple ordered way.

Need of cloud-Cloud computing helps in the access of applications and data from any location and device( internet connection) around the world . It offers businesses with scalable computing resources helping themin saving the cost in acquiring and maintaining them.

10- The computer needs will be- A secure, environment friendly and user friendly system, easy to manage and portable computing with distributed system like cloud for ensuring availability, scalability and to not bother about maintainability.


Related Solutions

Describe the networks that might be used to support a neighborhood book store with a coffee...
Describe the networks that might be used to support a neighborhood book store with a coffee shop/browsing area that offers free Internet access to its customers. Their data infrastructure includes sufficient computing resources to support their business operations. Short Essay Question
Answer all of the following Questions in depth. (Please write In PDF format) 1. Describe the...
Answer all of the following Questions in depth. (Please write In PDF format) 1. Describe the four types of Not-for-Profit entities. 2. Discuss the role of funds in accounting for NFP’s. 3. Discuss donor imposed restrictions on the use of contributions. 4. Describe the 3 types financial statements prepared by NFP’s. 5. Discuss the oversight bodies for NFP’s 6. Discuss the accounting for contributed services. 7. Describe the presentation of cash on the financial statements of NFP’s. Include in your...
Describe the networks that might be used to support a large national retail organization. The organization...
Describe the networks that might be used to support a large national retail organization. The organization maintains a headquarters located in the Southern U.S. that supports hundreds of retail stores located around the country. The organization has massive distribution centers and procures its products from around the world. Short Essay Question
Describe the networks that might be used to support a small manufacturing facility that supplies widgets...
Describe the networks that might be used to support a small manufacturing facility that supplies widgets to a large international manufacturing firm. The organization uses automation in their production, employs a small management staff (accounting, materials procurement, human resources, etc.), and receives their orders for widgets via electronic communications with the larger firm.
Please answer all the following questions in depth. 1. Describe the four types of Not-for-Profit entities....
Please answer all the following questions in depth. 1. Describe the four types of Not-for-Profit entities. 2. Discuss the role of funds in accounting for NFP’s. 3. Discuss donor imposed restrictions on the use of contributions. 4. Describe the 3 types financial statements prepared by NFP’s. 5. Discuss the oversight bodies for NFP’s 6. Discuss the accounting for contributed services. 7. Describe the presentation of cash on the financial statements of NFP’s. Include in your answer a discussion of the...
Please answer the following questions in complete sentences. 1. What is a decision? 2. Describe the...
Please answer the following questions in complete sentences. 1. What is a decision? 2. Describe the steps in the managerial decision making process.
Please answer all the questions. Thank you Use the following data to answer the questions below:...
Please answer all the questions. Thank you Use the following data to answer the questions below: Column 1 Column 2 Column 3 Y in $ C in $ 0 500 500 850 1,000 1,200 1,500 1,550 2,000 1,900 2,500 2,250 3,000 2,600 What is mpc and mps? Compute mpc and mps. Assume investment equals $ 100, government spending equals $ 75, exports equal $ 50 and imports equal $ 35. Compute the aggregate expenditure in column 3. Draw a graph...
Answer true or false to the following questions please explain your answers and answer all please  ...
Answer true or false to the following questions please explain your answers and answer all please   1.The cytoplasmatic side of the integral membrane proteins is often glycosylated. 2. Cholesterol is more enriched at the outer leaflet of the plasma membrana 3.Inner leaflet of the plasma membrane is enriched with glycolipids. 4.Membrane proteins that pomp ions in and out of the cell have specific Km values. 5. A symport would function as an antiport if its orientation in the membrane were...
Please answer all fo the following questions. 1. Describe a population where you would expect to...
Please answer all fo the following questions. 1. Describe a population where you would expect to find a low frequency of adult lactose tolerance. 2. Why is adult lactose tolerance infrequent in that population? 3. Describe a population where you would expect to find a high frequency of adult lactose tolerance. 4. Why is adult lactose tolerance frequent in that population?
Please answer the following questions: 1) List the five characteristics of pure monopoly. 2) Describe the...
Please answer the following questions: 1) List the five characteristics of pure monopoly. 2) Describe the demand curve facing a pure monopoly and how it differs from that facing a firm in a purely competitive market. 3) Explain why the marginal revenue is equal to the price in pure competition but not in monopoly. 4) Use the chart to solve the following: Calculate the Marginal Cost at Q 100? Calculate the Marginal Cost at Q 200? Calculate the Marginal Cost...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT