What standards are to be applied, Computer Network Security

Government funding has been given to a university consortium establishing a repository of resources for school teachers. They have engaged you to develop a search facility for teachers who will use it to discover small chunks of useful material, located anywhere. The chunks will be strung together to make customised lessons for students who cannot attend school, for one reason or another, or whose teachers do not include specialists in subjects the students want to study. The client group knows that it is more 'attractive' to their funding agency if there is a lot of multimedia product in the selection. You know that it is hard to produce accessible multimedia and there is hardly any 'out there'. You are asked to advise your client about accessibility.

Q1 What is going on? - What are the facts?

I. I report to the university consortium.

II. I am to develop a repository search facility for school teachers to extract useful teaching materials to develop suitable lessons.

III. Target students are supervised by non-specialists (possibly remotely, at home, or in care).

IV. The government funding agency likes multimedia.

V. Accessible multimedia content is scarce and 'hard' to develop.

VI. The consortium requires ‘accessibility' advice.

Q What are the issues?

VII. What are the contractual details/arrangements?

VIII. Accessible multimedia may be costly to develop. There appears to be a funding bias towards multimedia content. How much multimedia is envisaged? Would a simple multimedia put funding at risk? Advice to the consortium might be rejected (along with this job) by recommending a simple, 'non-glossy' approach.

IX. What are the exact requirements for the multimedia? What standards are to be applied? What is the budget for it and how much of that is for the extra accessibility work?

X. Sophisticated multimedia is unlikely to be easily accessed/afforded by all supervisors or students due to special needs and telecommunications inequities.

XI. What range of resources do supervisors/teachers and students have ready access to?

XII. What range of disabilities do the target students suffer, if any? How will these be identified and accounted for?

XIII. What level of training and support is envisaged for teachers, non-specialist supervisors and students?

XIV. It is not clear if 'normal' school teachers are to benefit from this system.

Posted Date: 5/7/2013 8:52:08 AM | Location : United States

Related Discussions:- What standards are to be applied, Assignment Help, Ask Question on What standards are to be applied, Get Answer, Expert's Help, What standards are to be applied Discussions

Write discussion on What standards are to be applied
Your posts are moderated
Related Questions
Question: (a) State whether the following statements are TRUE or FALSE. Justify your answer. i. A good site security policy will require that users use computer generated p

A digital signature is a stamp on the data, which is unique and very hard to forge.  A digital signature has 2 steps and creates 2 things from the security perspective. STEP 1

The Cost Benefit Analysis (CBA) Formula CBA determines that whether the control alternative being evaluated is worth cost incurred to control vulnerability or not. CBA easily ca

(a) Cost allocation mechanisms are important when it comes to establishing other aspects of inter-firm compensations and how these are transferred to the users. There are two pri

SECURING THE COMPONENTS Computer can be subject of an attack or the object of an attack. When subject of an attack, computer is used as lively tool to conduct attack. The figure

IP DATAGRAM SIZE:  Datagrams may have different sizes i.e. Header area is generally fixed (20 octets) but can have various options. Data area may contain between 1 octet and 6

COLLISION DETECTION The signals from two devices will interfere with each other and the overlapping of frames is known a collision. It does not cause to the hardware but data

Question: (a) What is the minimum length of a password that could be considered to be "strong" in the context of today's computing power? (b) The security of a PIN system,

The method used to check errors is checksum . In this method data is treated as a sequence of integers and their arithmetic sum is calculated and the carry bits are added to the

QUESTION (a) Describe the role of DNS root servers in the Internet network. (b) What do you understand by the handover concept in a mobile network? (c) List five meth