Question

In: Computer Science

In one of the buildings that your company has installed a network, some of the devices...

In one of the buildings that your company has installed a network, some of the devices have stopped working completely. The devices do not even turn on. Your manager has requested that you investigate the possible causes of the damaged devices. Advise on what can be installed so that other devices can be protected. Explain two ways to achieve this

Solutions

Expert Solution

Reinforcement your data. Anti-malware security may be a must Make your ancient computers' difficult drives unreadable. Install working framework updates. Automate your computer program updates. Secure your remote arrange at your domestic or business. Use a firewall Create scrambled volumes for versatile, private information files. Don't disregard to erase ancient records from cloud backups.

1)The surge security gadgets ought to be associated to this holding framework for greatest adequacy. In an electrical frameworks, surge assurance gadgets are more often than not introduced in tap-off setup (in parallel) between the live conductors and the soil.

The working rule of SPD can be comparable to that of a circuit breaker. Lightning overvoltages show up primarily in common mode and more often than not at the root of the electrical establishment. Overvoltages in leftover current mode as a rule show up in TT mode and primarily influence delicate gear (electronic gear, computers, etc.).

The leftover current mode voltage U, between stage and unbiased, can increment up to a esteem rise to to the whole of the remaining voltages of each component of the surge assurance gadget, i.e. twofold the level of assurance in common mode.

2)Fair as overcurrent security must be given by gadgets with appraisals suitable to each level of the establishment (beginning, auxiliary, terminal) facilitated with each other, security against temporal overvoltages is based on a comparative approach employing a “cascaded” combination of a few surge security gadgets. The rule of cascaded assurance is additionally utilized for moo current applications (communication, communication and data systems), combining the primary two levels of assurance in a single gadget that's more often than not found at the root of the establishment.


Related Solutions

Question 5 In one of the buildings that your company has installed a network, some of...
Question 5 In one of the buildings that your company has installed a network, some of the devices have stopped working completely. The devices do not even turn on. Your manager has requested that you investigate the possible causes of the damaged devices. Advise on what can be installed so that other devices can be protected. Explain two ways to achieve this.
9- Suppose that a company has 2 buildings, one for investment (A) and one for administrative...
9- Suppose that a company has 2 buildings, one for investment (A) and one for administrative (B) purposes. Both properties have an initial cost of 1.000.000 TL. The company does not use the cost model and both properties have 10 years of useful lives. A is revalued one year later and the revalued amount is 900.000 TL. B is also revalued one year later and the revalued amount is 1.200.000 TL. After the revaluation the company immediately sells A at...
In a    network topology, all network devices are connected to a common backbone that serves as...
In a    network topology, all network devices are connected to a common backbone that serves as a shared communications medium.
The devices designed for the purpose of addressing security in the network generate a number of...
The devices designed for the purpose of addressing security in the network generate a number of logs during the continuous monitoring of the network. Discuss in detail the different types of logs created and how the security professional can use this information for analysing security in the network.
The devices designed for the purpose of addressing security in the network generate a number of...
The devices designed for the purpose of addressing security in the network generate a number of logs during the continuous monitoring of the network. Discuss in detail the different types of logs created and how the security professional can use this information for analysing security in the network.
The devices designed for the purpose of addressing security in the network generate a number of...
The devices designed for the purpose of addressing security in the network generate a number of logs during the continuous monitoring of the network. Discuss in detail the different types of logs created and how the security professional can use this information for analysing security in the network.
The devices designed for the purpose of addressing security in the network generate a number of...
The devices designed for the purpose of addressing security in the network generate a number of logs during the continuous monitoring of the network. Discuss in detail the different types of logs created and how the security professional can use this information for analysing security in the network.
The devices designed for the purpose of addressing security in the network generate a number of...
The devices designed for the purpose of addressing security in the network generate a number of logs during the continuous monitoring of the network. Discuss in detail the different types of logs created and how the security professional can use this information for analysing security in the network.
The devices designed for the purpose of addressing security in the network generate a number of...
The devices designed for the purpose of addressing security in the network generate a number of logs during the continuous monitoring of the network. Discuss in detail the different types of logs created and how the security professional can use this information for analysing security in the network.
The devices designed for the purpose of addressing security in the network generate a number of...
The devices designed for the purpose of addressing security in the network generate a number of logs during the continuous monitoring of the network. Discuss in detail the different types of logs created and how the security professional can use this information for analysing security in the network.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT