Important concerns for safety and security of the network

Assignment Help Computer Networking
Reference no: EM13858254

Remember Bill? He was the gentleman that you helped to start up his business in week 4. Well his business is doing well, but he has come to you with some questions and concerns. You discuss each of these with Bill and promise to send him a written report with your suggestions and recommendations. Submit your written response to Bill's questions and concerns below.
1. Bill has set up a spreadsheet in Excel that will help him keep track of expenses. So far, he has this:

Tell Bill how to do the following tasks:
· What formula or function does he put in Column F that will show the total expenses for each day?
· What formula or function does he put in columns B through F in Row 13 that will give him the total expenses for the week in each category?
· Bill wants the entry in Column G to remind him of expenses that require receipts for the accountant. Tell Bill what to put in Column G to do this:
a. Print the word "Yes" in any row where the total daily expenses are greater than or equal to $100.00.
b. If the daily expenses total is less than $100.00, leave the Column G entry for that row blank.

2. Bill's business is already expanding. He thinks that in a few weeks, he will need to hire one or two employees to help him. He knows that each new employee will need their own computer. He is also making the necessary changes so that the new employees will be working in a spare room in Bill's house. Explain to Bill what networking options he has. Go through each type or configuration of network possible for him, making sure that you explain the pros and cons of each configuration. Finish with your suggestion for the network that he should set up and explain what new hardware will be required to do this.

3. With the possibility of three business computers in his home, and all of his business records possibly vulnerable, this would be a good time to advise Bill on how to set up a routine plan to protect and defend his new network. Provide a list of the five most important concerns for safety and security of the network and the computers in the network. For each concern, specify the action to be taken, and if applicable, what software you recommend be added to the system. Justify each of your recommendations.

Your proposal will be evaluated using the rubric below. Make sure you read the rubric and have a clear idea of what is expected. If there are any additional questions that you would have asked Bill be sure to note them as you explain to Bill what networking options he has so that you can explain what additional information could change your suggestion if any.

Reference no: EM13858254

Questions Cloud

Create an argument supporting three items : Create an argument supporting three items in the act that you would not change - identify and discuss at least three changes that should be made to the act, indicating why these changes are necessary.
What is net income : Problem 1: Likeline Inc., has sales $445,000, costs $173,000, depreciation expense of $72,000, interest expense of $36,000, and a tax rate of 35 percent. What is their net income?
Develop plan to protect its accounting and financial systems : Develop a plan to protect its accounting and financial systems at a reasonable cost. Suggest a high-level plan for the CFO. Provide support for your suggestion.
Common forms of vulnerable adult and elderly neglect : Develop a PowerPoint presentation of 15-18 slides, addressing neglect and abuse of dependent adults and the elderly. Create speaker notes for each of the slides. Include the following in your presentation: Common forms of vulnerable adult and e..
Important concerns for safety and security of the network : most important concerns for safety and security of the network
Feel about your own body weight, size, and shape : 1.  How do you feel about your own body weight, size, and shape? Do you have strong feelings about what an ideal male body should look like? How do you think you developed these ideals? Are they realistic?
Define and describe allport concept of functional autonomy : Define and describe Allport's concept of functional autonomy. What role does it play in the development of personality (be specific....how does functional autonomy shape and/or influence personality)
Draw a force diagram for the water skier : Draw a force diagram for a baseball player who slows as he slides into the base - Write the net force equations which indicate the net force on your system in both the horizontal and vertical dimensions.
What were the benefits of this study : How did the author overcome the limitations of doing a qualitative study? What were the benefits of this study

Reviews

Write a Review

 

Computer Networking Questions & Answers

  Create separate offices across the globe

Question 1: Discuss the latest implementations of routing protocols that would be used in the company's wide area network and the Internet.

  Telecommunications essentials

THE NEW ERA OF MICROWAVE: WIRELESS BROADBAND

  Explain why wbs has different levels

Explain why a WBS has different levels and what each level represents. Respond to the following: "If you were a project manager in charge of employees affected by the above situation.

  Research on external and internal environments

Choose an industry you have not yet written about in this course, and one publicly traded corporation within that industry. Research the company on its own Website, the public filings on the Securities and Exchange Commission EDGAR database, in t..

  Assume there are n nodes

Assume there are N nodes connected to a wireless access point (AP) operating on IEEE 802.11b, and every node has at least one packet to send at a given time.

  Your manager has assigned you and two other engineers to do

you work for a university that has over 3500 students on campus. the you supports about 600 staff and faculty that are

  Prevent from the loss of confidentiality caused by malware?

1. Cybercirminals can use malware to steal files and information from computer, if this happens have loss of confidentiality. Explain how antivirus can be help to prevent from the loss of confidentiality caused by malware?

  Advantage of connecting outer conductor to ground

Coaxial cable is two-wire transmission system, determine the advantage of connecting outer conductor to ground? Explain the two layers: LLC & MAC.

  Design a network for the local business

Imagine that you have been hired as a contractor by a local business that has recently purchased new office space for its growing business. Design a network for the local business

  Write down a 2- to 3-page paper comparing and contrasting

write a 2- to 3-page paper comparing and contrasting switches routers and gateways. include the difference between a

  News regarding wireless hacking-hardware hacking

The key to this assignment is to demonstrate your understanding of the topics, not to re-word the text or reference material. Please see Appendix A for the grading rubric on all written assignments.

  Importance of explicit enterprise security policies

Write a 200- to 300-word response to the following question: What are the predominant electronic and physical threats to communications networks? What is the importance of explicit enterprise security policies and procedures

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd