A complete home network

Assignment Help Basic Computer Science
Reference no: EM13834188

Assignment 2: A Complete Home Network

Develop an entire home network with a budget of $1,000.00. Your configuration must assume the purchase of associated hardware for access to both wireless and wired connections and a broadband connection. As part of this design and configuration, you are to create access and accounts for yourself and four (4) unique and fictional individuals, configure the IP addressing, ensure it is safe from intruders, and set up sharing for files and folders. 

Write a two to three (2-3) page paper in which you:

  1. Describe the hardware you will purchase or build (inclusive of computers, memory, storage, video cards, printers, routers and cabling). Justify your hardware selection.
  2. Develop a spreadsheet or table within the two to three (2-3) page paper that itemizes the costs from the online retailer(s) of your choice. 
  3. Summarize and support the approach you will use to back up your devices.
  4. Suppose you were provided an additional $1,000.00 to enhance your network. Explain the changes you would make to grow your infrastructure. Support your response inclusive of memory, storage, networking and redundancy solutions.
  5. Use at least two (2) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. 

The specific course learning outcomes associated with this assignment are:

  • Explain how the components of information technology systems interrelate.
  • Illustrate the use of information and communication technologies to solve problems as an information technology professional.
  • Use technology and information resources to research issues in security management.
  • Write clearly and concisely about the theories of security management using proper writing mechanics and technical style conventions.

Reference no: EM13834188

Questions Cloud

What is the before tax consumer and producer surplus : Suppose the current equilibrium price of a quarter-pound hamburger is $5 and 10 million quarter-pound hamburgers are sold per month. After the federal government imposes a tax of $.50 per hamburger, the equilibrium price of hamburgers rises to $5.20 ..
Corresponding price and quantity and explanation : Supply and Demand in the U.S. Car Market. Please include a graph showing the initial equilibrium and the new equilibrium with the corresponding price and quantity and an explanation to support your answer.
Discuss job analysis impacts upon hr processes holistically : Discuss Job analysis and design impacts upon HR processes holistically and needs to be undertaken methodically. Human Resources Information Systems have contributed to the increasingly strategic nature of the HR function'. Discuss.
Wgy safety professional to become knowledgeable and skilled : Explain why it is important for the safety professional to become knowledgeable and skilled in system safety concepts
A complete home network : Develop an entire home network with a budget of $1,000.00. Your configuration must assume the purchase of associated hardware for access to both wireless and wired connections and a broadband connection. As part of this design and configuration, you ..
What is the magnitude of the couples displacement : What is the magnitude of the couples displacement
Write a function named getrandomaverage : Write a function named "getRandomAverage" that uses a "for" loop to compute the average of random numbers. The function receives the quantity of numbers to be averaged and returns the average of all thevalues. It does not print any output from within..
Foundations of information technology : For your final project, select an industry and company of your choice. Write an 8-10 page research report (typed, double-spaced) or a 4-5 page research report with accompanying PowerPoint presentation (15-20 slides) in which you: Describe the company..
Why system safety principles not used by safety professional : Why are system safety principles not used by all safety professionals? Suggest some ways to overcome the obstacles to wider adoption of system safety

Reviews

Write a Review

Basic Computer Science Questions & Answers

  The various types of complex selection control structures

In your opinion of the various types of complex selection control structures, which would be the most challenging to write in pseudocode. Why. What best practices could be utilized

  E-commerce web site

Final project will be a Java programming project that uses design patterns to help form a dynamic Web database application. Final Project:  e-commerce Web Site

  Question regarding enterprise resource planning

The question belongs to Computer Science and it is a report for implementation of ERP application in an organization. ERP implementation, particularly for future accountants who can integrate the information from the whole organization. The soluti..

  For this assignment we will focus on different tools and

for this assignment we will focus on the various tools and techniques available to the security professional in order

  The computation result of the alu is negative

Suppose the MIPS ALU, in addition to a zero flag output, also has an additional flag output for "negative"which equals 1 whenever the computation result of the ALU is negative (i.e., has high-order bit set to1. Show how to modify the data path ..

  Explaining health insurance portability-accountability act

Based on your knowledge of IT security management, argue for or against assertions that Epworth system is in compliance with Health Insurance Portability and Accountability Act (HIPAA).

  Describe happening of water lubrication film under ice skate

Similar reasoning is utilized to describe occurrence of water lubrication film beneath ice skates. Describe your opinion of this explanation?

  Disposal of technology devices and gadgets

This assignment requires you to use more presentation tools and allows you to be creative. It switches gears and addresses the disposal of our technology devices and gadgets.

  What information is required to setup a new account

What information is required to setup a new account, what category information is collected by the site

  You are given for input the student name

Draw a flowchart to illustrate the following problem. You are given for input the student name, number of credits, and cost per credit. You need to output the student name, number of credits and total tuition.

  Disaster recovery and business continuity policies

Disaster Recovery and Business Continuity Policies

  Changed phone number setting and want it back where it was

I accidentally changed the phone number setting and want it back to where it was. Is there a simple way to restore this setting

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd