Administration or a help desk professional

Assignment Help Basic Computer Science
Reference no: EM131204480

Application Activity 1:

Interview someone at the company of your choice who handles network administration or a help desk professional who handles the administration of any of the operating systems identified in this course. It is important to select an individual that has a functional knowledge of identifying types of cyber-attacks, designing and implementing measures to respond to such an event, and understands different forms of malicious code. While an in-person interview is preferred, you can also conduct this interview by phone or e-mail.

During your interview be sure to inquire as to the individual's job title and daily responsibilities. Also, be sure to discuss the problems that exist with monitoring network activity, to include access controls, cryptography, and identifying malicious code. In addition, note the features of operating systems that typically benefit organizations in terms of security benefits. Lastly, inquire as to the career potential that exists in network security and related fields. Feel free to ask many additional questions, as these questions are given to ensure key areas are identified.

Once you have concluded your interview, gather your data and draft a report detailing the information gained as a result of the interview. Your report should be a minimum of 5 pages excluding the title page and references. There must be a minimum of 5 peer-reviewed sources included.

Reference no: EM131204480

Questions Cloud

Prepare a research paper about grandma vs research : Prepare a research paper about Grandma vs. Research. Overview some of the specific research methods described in the video to study happiness. Which seemed the most effective to you and why?
Provides three examples of each component of shell model : Completes the SHEL(L) worksheet - Provides at least three examples of each component of the SHEL(L) model.- identify the example of that SHEL(L) model component.
What if the optimal size is between 3 and 4 : If the optimal club size is between 4 and 5, what is the smallest population beyond which eminency is always achieved? What if the optimal size is between 3 and 4?
Compute the standard deviation : Compute the expected return of stock a and compute the standard deviation - compute the expected return ?B. Compute the standard deviation ?C. Presuming the stock returns are normally distributed, what do these results indicate?
Administration or a help desk professional : Interview someone at the company of your choice who handles network administration or a help desk professional who handles the administration of any of the operating systems identified in this course.
What is the membership level that maximizes total utility : Consider a club where the utility function (incorporating the charge) of a member is U = a + bn -cn2. Find the optimal membership of the club. What is the membership level that maximizes the total utility of the club? Contrast the two levels and e..
Identify how the activity enhances physical development : Describe the activity in some detail (provide more than just the name of the activity). Describe the theory and/or research which supports the use of this class or activity. Identify how the activity enhances physical development.
Develop branding strategies for existing and new products : Develop branding strategies for existing and new products. Develop pricing strategies and distribution channels for products. Analyze integrated marketing communications and its relationship to advertising strategy.
Describe what is meant by the term synoptic gospels : Explain at least three reasons why there are so many divisions / denominations in the Christian religion. Explain what is meant by the term "synoptic gospels", and discuss why this term is important for Christians when reading the Bible.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  How can force diagrams be useful

Discuss the security issues of nonfunctional goals in relationship to the force diagram and tensions in the business enterprise. Describe and explain what a nonfunctional goal is. How can force diagrams be useful?

  Different types of cloud computing solutions

Different types of cloud computing solutions that include your recommendation for the best choice and why you made that choice. An Office Productivity Software solution in a collaborative environment and why it is important to move in that direction

  Compare and contrast the process of conceptual design

Compare and contrast the process of (i) conceptual design, (ii) preliminary design, and (iii) detailed design in general and in the development of an automobile.

  What is the privacy of the data and information

What is the privacy of the data and information? Give detailed information of computer virus and how it works? How one can protect the computer from virus or explain the working of antivirus.

  How do you remember order of operations

How do you remember order of operations? If you use a calculator for computation, is order of operations still important? Why or why not? What are some of the possible outcomes when order of operations is ignored?

  Computing characters are there in encyclopedia

The text of the Encyclopedia Britannica is about 44 million words. For a sample of about 2000 words, the average word length was 6.1 characters per word. Approximately how many characters are there in the encyclopedia?

  Which sources of growth are most likely to be protrade

Which sources of growth are most likely to be antitrade? Which types of commodities are most likely to result in protrade consumption? antitrade consumption?

  Preparing simple er diagram or schema

Composite and multi-valued attributes can be nested to any number of levels. Suppose we want to design an attribute (one attribute) for a STUDENT entity type to keep track of previous college education.

  Appliance perform multiple defense functions

Can a single "black box" appliance perform multiple defense functions as well as those multiple devices programmed to run a single function alone? Why or why not? Are there environments or situations where the use of a security appliance can be ju..

  Issues of usefulness and security

A federal agency has asked your cybersecurity consulting firm to provide it with a white paper that discusses the issues of usefulness and security in regards to Open Data.

  How would you go about implementing these technologies

How would you go about implementing these technologies in this high-risk environment? What precautions or approaches would you take to minimize risks?

  Basis of the linear transformation

a) Enter a basis of the linear transformation's kernel, as a list of vectors, for example (1,2,3),(2,1,3). b) Enter a basis of the linear transformation's range.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd