Explore BrainMass

Operating Systems

Network Security

What are some of the greatest security risks to a wide area network? Provide an example of one risk and discuss the potential consequences and possible precautions.

Network Security

Describe a recent high-profile computer security issue that you have heard of or read about. According to basic network security principles, how might the issue have been avoided? Provide at least one resource other than your text to support your answer.

Computer technology general background information

I would like some assitance in answering the following questions in order to help me develop an essay on computer technology. 1. Explain the difference between data and information and give an example of each. 2. What is an operating system? Give two examples. 3. What is application software? Give three examples. 4. Expla

Selling Security to management

Scenario: ABC company is a small but growing manufacturing company with revenues of approximately $25 million. Until now, the company has had a single headquarters and production facility in a Midwestern city, but it is building a separate sales office on the east coast which will open in a few months. You are the Manag

Active Directory: Submitting a Plan to the CIO

Based on the active directory proposal you completed, plan how to organize users into groups using the scopes available in Windows. Show how you might incorporate nesting as part of your plan. Submit a 2-3 page proposal to the CIO outlining your plan. See attachment for the active directory proposal.

Operating System Comparison

There are so many operating systems available in the market that it's difficult to decide which one is the best. Search the Internet for information on the following operating systems, and draw a table that compares them in terms of scalability, ease of use, reliability, and cost: - Windows XP - Windows Vista - Windows Serve

Handing a Situation as a System Administrator Team Leader

Details: While working with the System Administration Team, they tell you that a big part of the administrator's duties focus on troubleshooting problems within the network. There are categories of problems and levels of consideration for action. Most times, in a network, a problem that affects only one computer has a lower pri

Operating Systems and Practical Networking

Details: Your team's network plan can be supported by any network operating systems that SOPRO installs. The division supervisor wants recommendations from the Networking Team on which OS would best suit the client's needs. The criterion includes ease of use; a short learning curve, meaning that the users will be functional i

Fault Level Tolerence

Are there legal or regulatory considerations when determining the level of fault tolerance needed?

A Basics of English Composition and Basic Library Research Skills

A first step towards completing the Touchstone Project is to choose a topic and then form research questions. You will be developing a solution to a problem that exists in your program or field of study. For instance, if you are studying Information Technology, you might discuss a specific problem in that field (such as ethics i

Computer threats, vulnerabilities, and exploits

Research a current computer threat. Describe the nature of the thre and the potential repercussions it could have for a network. I have found four that I am looking for more information on: A worm called SASSER A computer threat known as the JS/Downloader

Explain the benefits of Mobile IP

Mobile IP is emerging as the next industry standard for the way in which wireless devices move from one network to another. Complete Case Project 5-4 Case Project 5-4: Mobile IP holds great promise, but it has been slow to gain popularity. Research Mobile IP and the different situations in which it is used. What are th

Java Programming Calculator

Need help in programming. 10. Write a method, removeAll, that takes three parameters: an array of integers, the length of the array, and an integer, say, removeItem. The method should find and delete all occurrences of removeItem in the array. If the value does not exist or the array is empty, output an appropriate message. (


Discuss at least three advantages gained by telecommuting and at least 3 obstacles or disadvantage to telecommuting programs.

Using various Internet sources, find an article or Web site on an information security topic that is of interest to you. Prepare a 1-2 page paper evaluating the article or Web site.

Please find an article or website about information security. Provide an introduction, and select various aspects of the article or Web site. Describe each aspect, providing comments on the usefulness, validity or appropriateness of the article or Web site. The evaluation should provide details, examples and/or reasons for your

LAN Operating Systems

I am seeking assistance on LAN Operating Systems Read the three scenarios below, then answer the questions that follow each scenario in 200 to 300 words total. 1. You are the network administrator for a new company that has 10 users and plans to add five more users within a year. The files need to be accessed by all 10 use

Network Security, Design, Management

Classic Catalog Company runs a small but rapidly growing catalog sales business. It outsourced its Web operations to a local ISP for several years but as the Web have become a larger portion of its business, it has decided to move its Web sites onto its own internal computer systems. It has also decided to undertake a major up


Question (i) (a) Give a table showing the Caesar cipher with a key 5, and then give the result of applying this cipher to the text 'I came I saw I conquered'. (You can ignore the difference between upper- and lower-case letters.) (b) A three-letter word has been encrypted using a Caesar cipher. Someone wants to decrypt the

Local Area Networks

Suppose you are the network manager for Central University, a medium-size university with 13,000 students. The university has 10 separate colleges (e.g., business, arts, journalism), 3 of which are relatively large (300 faculty and staff members, 2,000 students, and 3 buildings) and 7 of which are relatively small (200 faculty a

Internet Sales by cosmetics company: Current Technologies

You work for a cosmetics company and have been asked to manage a project team that will investigate whether or not your company should begin to sell its products directly to consumers through the internet. Describe some of the current technologies, issues and challenges that your project team will need to investigate.

LAN for local library: elements of a backbone

You have been hired by your local library to help them setup a LAN to connect their three library sites. The director of the library, Robert Jienwerski, has a good understanding of the jargon used by network installers and administrators. Robert is very excited about the project. During your first meeting with him, he wants you