Start Discovering Solved Questions and Your Course Assignments
TextBooks Included
Active Tutors
Asked Questions
Answered Questions
questiona outline the concept of the real time gross settlement rtgs system in mauritius and name the three main system components of the macssb
questiona i describe the entire process of credit card processing identifying the different steps and parties involvedii what are the roles of the
questiona differentiate between the following key terms used in any e-banking security systemi authorisation vs authentication ii data integrity
question a how do you relate the subsequent terms in the context of an information system data information and decision-makingb why do you think
questiona describe the importance of backups and the use of antivirus softwareb with the help of an example illustration explain the term
question 1a in the context of an information system distinguish and relate among the terms data information and decision-makingb describe at
question 1lsquothere is an overwhelming imperative for organisations to analyse every bit of information they can extract from their huge data
question 1describe the following terms in your own words a internet b www c intranet
questiona the cpio utility has three operating modes what are theyb the characters of the permission string are broken up into three groups of
questiona briefly describe how the file system is organized in unixb what is the importance of the touch command give one of its disadvantagec
questiona what is a linux shellb prepare the commands for the following tasks i change the working directory ii show the working directory iii
question a give three examples of vulnerable services which are among the overwhelming majority of successful attacksb name the five outside
questiona one of the most important duties of a system administrator is to protect the information that is stored on network servers in the same
question 1a give three examples of shells in linuxb differentiate between the join command and the paste command in linux use an example to support
questiona briefly describe the purpose of windows powershellb name three ways software can be installed on linuxc what is an interrupt requestd
questiona list three characteristics and two potential problems of a peer-to-peer environmentb list three characteristics and two potential
questiona the systems administrator of acme company performs the backup of the website database file every day at 1550 the original file location
questiona briefly describe the purpose of windows powershellb name ways software can be installed on linuxc what is an interrupt requestd as the
a you are provided with the followinga an rsa facility complete with publicprivate key pair b a cbc cipher block chaining facility incorporating
questiona what is a script kiddie is it a significant security threat and whyb assume that unix uses the user login name in lieu of the traditional
questiona explain the usage of the following parts of the ipv4 datagram formati vers ii hlen iii total length iv service type v header checksumb
questiona show by means of a diagram the ethernet frame structure and describe the six fields of the ethernet frame structureb explain the operation
question a describe with the aid of a diagram a hybrid topology of a network of your choiceb briefly explain the similarity and differences
questiona with mobile telecommunications providing an important engine for growth continuing to stimulate growth and to ensure mobiles remain