Start Discovering Solved Questions and Your Course Assignments
TextBooks Included
Active Tutors
Asked Questions
Answered Questions
state the steps to provide more computing powerin order to provide more computing power the following steps may be taken add more processing power by
explain the term - primary memory and hard diska peculiar situation arises when the existing server arrives at a stage when it cannot handle the
determine the functioning of service supportservice support must be considered a strong point for hardware especially for servers and should be
define the term - hot swapping the reliability of the machine can be dramatically improved by installing the best components hot swapping is a
state the types of performance of computer hardwarethe hardware ie the server or computer has a direct relationship on performance in the following
state the specification of high-end server a mid-range or high-end server with the following specifications would be sufficient for a medium to large
state the reason for intranet system breaks down care must be taken to ensure that proper spare parts are available even after about five years of
determine the task which should intranet require intranet to work smoothly the following tasks should be properly synchronised all computers
describe about the network equipment and connectivity network equipment and connectivity should address various networking equipments such as routers
define the analog audio and video conferencing systemswhen analog audio and video conferencing systems were used the procurement and installation was
what are the value added servicesmany organisations are demanding higher services also called value added services such as faxing minimal cost call
explain about the intranet hardware and softwareintranets not only provide a secure environment for companies but also provide an excellent working
state the example of security audit as case study linda narrates one of her experience about a security audit she was performing a spot audit where
why routine security audits are essentialit is essential that regular security audits are conducted to find out physically which computer is
security risks present on the networks lots of risks are present everywhere on internet as well as on intranet if it is not known what is being done
state the term - lot of care required while programmingit is a common and well-known saying that many developers of secure systems leave a back door
how firewall configuration makes all the difference the greatest blunder that any company make is to just install a firewall and think that they have
determine the disadvantages of socks protocolthe main problem with socks is that it lacks transparency to software developers and usersimplementation
illustrate the products based on socks protocolthere are a number of products based on socks specifications such as auto socks available in the
name the protocol which is networking middlewaresocks is a networking middleware a circuit-level gateway acting as a proxy and is placed at the
illustrate about the working of socks protocolsocks is an open industry-standard protocol advanced by the authenticated firewall traversal working
define the term socks- network securityas it is well known each type of network security protects data at a different layer of the osi model built-in
connection to backbone lanin most cases interconnection with stations on a wired backbone lan is needed for infrastructure wireless lans this is
explain in brief about the throughputthe medium access control protocol should make as well-organized use as possible of the wireless medium to
explain the terms - lan extension and ad hoc networklan extension a wireless lan integrated with a wired lan to extend the coverage area of the lan