Question

In: Computer Science

What is The Scenario Approach?    What is a project? What do Encryption and Firewalls mean?...

What is The Scenario Approach?   

What is a project?

What do Encryption and Firewalls mean?

Discuss the role of Business/IT Planning and its major components.

Solutions

Expert Solution

Scenario Approch is one of the technology that is used to solve complex problems that deals with infinite constraints and problems with uncertainity.

Project is an aim to be acheieved by One or more individuals colloboratively with well planned sequence of tasks.Project is derived from a latin word projectium which an action before.

Encryption is the way of converting plain text into secured text called cipher text.For accessing the encrypted data you should have password.Encrypted data should be decrypted inorder to understand the message.

Firewall is security provided to a network or a system from being accessed by unauthorized persons.Firewall monitors incoming and outgoing traffic in a network.

Role of IT Planning :

Planning is first and foremost crucial step of a initiating any work.Planning have the following advantages :

  • Planning provides direction to reach the aimed concept or project.
  • Planning at the initial stages of project,reduces the risks that occur in the future and can be predicted.
  • Efficient planning helps us to remove the wasteful activities.
  • Efficient planning hepls us to estimate the cost of the project.

there are even more advantages of planning in Bussiness/IT.

Major Components:

Planning is classified into two types.They are

a) Standing planning and

b) Single-use planning

Rules of the company,policies of company,strategies,objectives of the company.... all these comes under Standing plans which means lasts for long time.

Schedules,Meetings,Projects and Budgets....all these comes under Single use plans which are meant for only some period of time.


Related Solutions

1) What are firewalls and intrusion detection systems? 2)Why are encryption applications an important security tool?...
1) What are firewalls and intrusion detection systems? 2)Why are encryption applications an important security tool? 3)What kind of budgeting does your job use? What are the pain points that management feels because of this? Where are you seeing the benefit, or the problems, that result, and would another budgeting model work better?
For encryption, what does it mean for data to be in transition and in use? What...
For encryption, what does it mean for data to be in transition and in use? What are the major security concerns with data encryption?
In managing project conflicts, what does it mean to employ “a smoothing” approach to resolve a...
In managing project conflicts, what does it mean to employ “a smoothing” approach to resolve a particular conflict? ……………………………………………………………… ……………………………………………………………………………………………………………………………………………………………………………………………… What makes an individual a stakeholder in a project? ……………………………………………………………………………………………………………………………………………………………………………………………… A process that ensures that the descriptions of a project’s products and deliverables are correct and complete is known as ……………………………………………………….. The variance and the pessimistic time estimate of a project activity are 32/3 and 12 days respectively. Find the activity’s optimistic time estimate. …………………………….. All fast-tracked projects are crashed....
How does a scenario-based design approach help identify key design decisions on a project?
How does a scenario-based design approach help identify key design decisions on a project?
talk about database encryption and what type of encryption for database
talk about database encryption and what type of encryption for database
explain what an encryption algorithm is and what it can do to provide increased computer security...
explain what an encryption algorithm is and what it can do to provide increased computer security ?
What are two types of encryption for wireless networks? Which encryption standard is considered to be...
What are two types of encryption for wireless networks? Which encryption standard is considered to be more secure? Why? The property written in the format 00:00:00:0A:0B:0C for a device is called its ______________. Why should you disable the SSID on a wireless network? What is an evil twin attack? Why would you disable a Bluetooth device when you are in a public place? What happens when you jailbreak or root a device? What potential problems are caused by jailbreaking or...
In the caeser cipher encryption and decryption program below, what do the two lines if(ch >...
In the caeser cipher encryption and decryption program below, what do the two lines if(ch > 'z'){ ch = ch - 'z' + 'a' - 1; } if(ch < 'a'){ ch = ch + 'z' - 'a' + 1; } mean??? I understand that it has something to do with ASCII characters and makes sure that if the encryption/decryption character is more than "z", then it would loop back to "a" instead of outputting a charcter like "{" . I...
what do these definitions mean in terms of project management A customer issued solicitation for contractor...
what do these definitions mean in terms of project management A customer issued solicitation for contractor to supply specific products or services. It should contain technical, management and cost sections describing in detail the contractor’s proposed solution for addressing the customer’s needs. A formal document outlining specific requirements for the project or service so contractor can propose appropriate solution. A contractor produced response to an RFP. Tends to have higher risk in a cost-reimbursement type contract. Should be included in...
What is the typical approach in the contracts to shift the project risk to the other...
What is the typical approach in the contracts to shift the project risk to the other contracting party? What are the usual consequences of this inequitable risk assignment? Provide an example of contract provisions that are typically used to shift the project risk to other parties (Max 200 words).
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT