Important concerns for safety and security of the network

Assignment Help Computer Networking
Reference no: EM13858254

Remember Bill? He was the gentleman that you helped to start up his business in week 4. Well his business is doing well, but he has come to you with some questions and concerns. You discuss each of these with Bill and promise to send him a written report with your suggestions and recommendations. Submit your written response to Bill's questions and concerns below.
1. Bill has set up a spreadsheet in Excel that will help him keep track of expenses. So far, he has this:

Tell Bill how to do the following tasks:
· What formula or function does he put in Column F that will show the total expenses for each day?
· What formula or function does he put in columns B through F in Row 13 that will give him the total expenses for the week in each category?
· Bill wants the entry in Column G to remind him of expenses that require receipts for the accountant. Tell Bill what to put in Column G to do this:
a. Print the word "Yes" in any row where the total daily expenses are greater than or equal to $100.00.
b. If the daily expenses total is less than $100.00, leave the Column G entry for that row blank.

2. Bill's business is already expanding. He thinks that in a few weeks, he will need to hire one or two employees to help him. He knows that each new employee will need their own computer. He is also making the necessary changes so that the new employees will be working in a spare room in Bill's house. Explain to Bill what networking options he has. Go through each type or configuration of network possible for him, making sure that you explain the pros and cons of each configuration. Finish with your suggestion for the network that he should set up and explain what new hardware will be required to do this.

3. With the possibility of three business computers in his home, and all of his business records possibly vulnerable, this would be a good time to advise Bill on how to set up a routine plan to protect and defend his new network. Provide a list of the five most important concerns for safety and security of the network and the computers in the network. For each concern, specify the action to be taken, and if applicable, what software you recommend be added to the system. Justify each of your recommendations.

Your proposal will be evaluated using the rubric below. Make sure you read the rubric and have a clear idea of what is expected. If there are any additional questions that you would have asked Bill be sure to note them as you explain to Bill what networking options he has so that you can explain what additional information could change your suggestion if any.

Reference no: EM13858254

Previous Q& A

  Feel about your own body weight, size, and shape

1.  How do you feel about your own body weight, size, and shape? Do you have strong feelings about what an ideal male body should look like? How do you think you developed these ideals? Are they realistic?

  Define and describe allport concept of functional autonomy

Define and describe Allport's concept of functional autonomy. What role does it play in the development of personality (be specific....how does functional autonomy shape and/or influence personality)

  Draw a force diagram for the water skier

Draw a force diagram for a baseball player who slows as he slides into the base - Write the net force equations which indicate the net force on your system in both the horizontal and vertical dimensions.

  What were the benefits of this study

How did the author overcome the limitations of doing a qualitative study? What were the benefits of this study

  Are international negotiators considered strategic suppliers

Are international negotiators considered strategic suppliers? How do we drive the suppliers to be aligned with your requirements?

  Do our children miss anything when they don attend schools

What was your experience when in elementary and middle/high school--did you experience cultural and racial diversity, or a school that was primarily one culture/race? Do our children miss anything when they don't attend culturally diverse schools

  Benefits of creating web presence for a small business

What are some of the benefits of creating web presence for a small business, including marketing and increased customer base?

  Write a pl/sql program to compute the sum of even number

Write an anonymous PL/SQL program to print out the GPA of John - write a PL/SQL program to compute the sum of even number

  What are the primary assumptions each author makes

What is the main point-of-view in each article? What are the primary assumptions each author makes? Which author are you inclined to agree with? Support your choice with scholarly reasoning and cite your evidence

  Explain the difference between a policy and a procedure

In your discussion post, Explain the difference between a policy and a procedure. Provide two to three examples of each. Outline one to two ideas for implementing or enforcing policies and procedures

Reviews

Write a Review

 

Similar Q& A

  A residential heat pump uses the ground as an energy source

a residential heat pump uses the ground as an energy source. at a particular operating condition the heat pump delivers

  Develop server-side dynamic webpages

A company is warned by its credit card companies that it will be classified as a high-risk firm unless it immediately reduces the number of fraudulent purchases made by its e-commerce clients. Come up with a plan to avoid this outcome.

  Network consultation for designit

Network Consultation for DesignIT The owners of DesignIT, who recently purchased 56'x36' space for their expanding business, have asked you to place a bid on a consulting job. DesignIT is a graphic arts company that, up until now, had contracted w..

  Review the latest version of netware

Review the latest version of NetWare and summarize three features that make it easy to manage.

  Distinguish local area networks and wide area network

Identify hardware and software needed to secure your choice of networks against all electronic threats. Distinguish between local area networks (LANs), wide area networks (WANs), and wireless technologies.

  Your router has the following ip address on ethernet

Your router has the following IP address on Ethernet 0: 172.16.2.1/23. Which of the following can be valid host IDs on the LAN interface attached to the router?

  How company ensure adequate destruction of materials

How will your company ensure adequate destruction of the materials thus ensuring an individual's privacy? Will any state-wide, national, or industry standards be met? If so, which ones and how?

  How security-performance-architecture issues can be solved

Over 70% of web applications use the database to store persistent data. Write down some of the problems and issues related with internet databases?

  Compare compilers and interpreters with respect to memory

Compare compilers and interpreters with respect to memory requirements for program execution and CPU requirements for program execution

  This assignment requires you to research into recent

this assignment requires you to research into recent advances in lsquobroadband adsl asymmetric digital subscriber line

  Difference between symmetric and public key system

What is the most important difference between a symmetric key system and a public key system and in what way does a hash function provide a better message integrity check than a checksum

  Implement an ad-integrated dns zone

What factors might an organization consider when choosing to implement an AD-integrated DNS zone versus a traditional zone

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd