Explore BrainMass

Explore BrainMass

    Operating Systems

    BrainMass Solutions Available for Instant Download

    Technology & Inventory

    Which technologies could be used by customers to access company information externally? In a computer network company, why do keep inventory?

    Queries

    1. It is time again for the company picnic. There is concern that there may be some employees who aren't age 21 yet, so COUNT how many employees we have who aren't yet age 21 as of today, and we'll decide if alcohol will be served or not. * To determine an employee's current age, you'll want to know how many years old t

    Spyware and Adware

    Explain the effects of spyware and adware. How has spyware and adware impacted the public's confidence in the security of internet? How can an individual protect their computer against spyware and adware?

    An Example of Basic HTML Formatting Elements

    See the attached file. Prepare an HTML document using Microsoft® Notepad, focusing on a concept relevant to this course. Begin by choosing a topic of interest. Brainstorm or outline important concepts related to the chosen topic. Structure your Web page to incorporate the following HTML elements: Please put both the HTML ta

    Catching Exception Using Class Exception - Java

    Write a program that demonstrates how various exceptions are caught with catch (Exception exception) This time, define classes ExceptionA (which inherits from class Exception) and ExceptionB (which inherits from class ExceptionA). In your program, create try blocks that throw exceptions of types ExceptionA, ExceptionB, Nul

    VPN Threats to Perimeter Security

    1- Early on we learned how routers and firewalls and IDSs inspect inbound and outbound traffic and how we use those features to our advantage in securing the network. Now, Virtual Private Networks encrypt all traffic and make it impossible to inspect what's coming and going. What can we do to assure that legitimate traffic flo

    Create a HIPO Chart, Flowchart, Decision Table, and Pseudocode for the program.

    Now that you have a program design and a chosen programming language for your project, you can begin looking at the logical flow of the processes within your program and the data that is input, modified, and/or output. You have seen graphical tools used to represent these processes such as flowcharts, HIPO charts, and Decisi

    Passwords Problem

    This case is about Passwords Problems: We all know about the problems with people and passwords and how technology can mitigate some of them. What kinds of problems do you suppose implementing these technologies for people might cause? How well can password alternatives bridge the gap between people and technology while rem

    IT Architecture Basic Questions

    1. Name two advantages of Stateful Inspection Packet Filtering Routers. 2. Name two advantages that firewalls add to a network 3. Name two advantages of the Dual Homed Bastion Host firewall architecture 4. Name two advantages of the Screened Subnet or DMZ Firewall architecture 5. You just discovered a knowledgeable

    Firewalls

    1 - Can you think of situations that call for multiple firewalls on the same network or same network segment? Why might you firewall off two or more connections into a subnetwork? In the #2 please give your own opinion if you agree or disagree and why. Like discussion. 2 - Yes there will be cases where we need multiples f

    Technology Management

    1. Name some examples of enablers and inhibitors to strategic alignment. Explain. 2. Are there IT processes that span more than one layer(i.e. strategic, tactical, operational)? If so, identify them. If not, explain why not. 3. Some of the better-known security issues are: 1. Unauthorized access to systems 2. Unaut

    Windows XP Hard Drive Maintenence

    A hard drive must be maintained to be used most efficiently. This maintenance includes deleting old files, defragmenting a drive so that it does not waste space, as well as, from time to time, finding and attempting to correct disk failures. Using the Internet, and Windows XP Help and Support, research what maintenance shoul

    Describe the security mechanisms related to server-side software

    Search the Internet to find server-side software that is required to be installed on the hospital's servers to support access by your local hospital doctors to patients' information using their cellular phones or PDAs. Describe the benefits of server-side software and how it provides mobile users with access to certain types of

    Voice over IP (VoIP)

    An interesting emerging market is using Internet phone and a company's high speed LAN to replace the same company's PBX. Write a one page report on this issue. Cover the following questions in your report: a. What is a PBX? b. Consider a call between a user in the company and another user out of the company who is connected

    WLAN over wired

    Discuss reasons that might make it favorable or unfavorable to install a Wireless LAN network in an organization over a traditional wired network. Search the Internet to find one example such as a university or museum or any other organization and their rationale behind such a decision.

    NAT IPv6

    Today we have a big problem with advertising companies which are making profiles of people by collecting their information. With IPv6, this task would be much easier because if they found the user's identity of a specific IP address, then they would use the IP address to collect the information easier. Imagine if they know the I

    Unicast Versus Multicast Service Model

    Those applications that do not require a high level of reliability for operations can use the Minimalist Internet Multicast service model, like streaming of continues data in the forms of audio or video, however applications that need reliability like real time applications they would be best suited utilizing the unicast service

    Linux, Novell, Mac, MS

    § Do you agree or disagree that the Linux-Novel partnership now presents a viable alternative to Microsoft® in the business world. Why or why not? § Linux is continuing to make inroads into the business world. Will this trend continue in the future? Why or why not? § Because there are alternati

    DNS server

    Having a DNS server available to the public can be a tool in the hand for attackers. If anyone is able to use your DNS, they can use it to send a huge amount of traffic to their victim. As a result, the victim would not be able to handle all the traffic and it would be unavailable to others who need to access it. So, we should b

    Total Average Response Time, Average Access Delay calculation Calculation

    There is an institutional network connected to the internet by a 1 Mbps link. The institutional network is a very high-speed LAN (let 10 Mbps or more). Suppose that the average object size is 800,000 bits and that the average request rate from the institution's browsers to the original server is 1 request per second. Also suppos

    Data Warehousing

    You are implementing a data warehouse project for a client and need to evaluate the various tools available for extracting, transforming, and loading data into the data warehouse from various sources. Problem: - For your client in this case, select a company that is familiar to you. Briefly describe the company and how it

    Coding and design

    Create a database with a table called tblNames and tblLogin. The tblNames table should have the following columns. SSN - of type text. Set this as the Primary Key. FirstName - of type Text. LastName - of type Text. The tblLogin table should have the following columns. ID - this is the Primary Key. It type is autonumb

    Software package you know well such as Windows 2000

    1. Based on your personal experience, what steps would you add to the check list? What steps would you leave out? If you have access to a machine-readable version of the check list you selected make the modifications you recommend. Site preparation ? Location ? Ergonomic concerns ? Power requirements ? Telephone and netwo

    Airlines employee management-analysis and design model

    I require assistance in producing an analysis model & design model for the system through use case diagrams and document template as attached. The employee management system deals with all aspects of managing employees. This includes pay, benefits, work history and security. Employees are paid on a weekly basis. Payment is

    Requirement model for the Airlines information management system

    I require assistance in finalizing the requirements model for the Airlines Information Management System (AIMS) project. The requirements model need to include use case diagrams for the entire AIM system. This includes all three sub-systems: bookings, fleet management and employee management. I also require assistance in havi

    Operating systems Function

    What is one of the functions that an operating system provides to make a computer run. Explain why that is an important feature and what an OS needs to be aware of to provide that service.