Design a backup strategy that would provide secure

Assignment Help Computer Engineering
Reference no: EM131722538

Design a Backup and Recovery Strategy for the following scenario using the tools and techniques discussed in Chapter 5.

Your friends Dinesh and Vinnie have started a small graphics design firm in Covington KY. They know you are enrolled in the MSIS program at UC and want you to design a backup strategy for them. Presently the firm is small, with only the owners Dinesh and Vinnie working full time, and a part-time receptionist and bookkeeper, Judy. The owners each have Mac Pro for their design work, as well as Macbook Pros that they use when there are visiting clients or working from home. Dinesh also has a Dell XPS 8900 that he uses occasionally when the Windows environment is needed. Judy has an Imac 21" machine that she uses for email, word processing, etc., and also an HP desktop for their Quickbooks software. (Their accountant is notfamilar with Apple devices, and insisted that the bookkeeping be done on a Windows machine).

Dinesh and Vinnie each generate several hundred megabytes of graphics each week that need to be preserved in the event of a disaster. Judy generates approximately 10 megabytes of documents per week, and the Quickbook files are approximately 500 megabytes in size.

The owners would like you to design a backup strategy that would provide secure storage of all their data, and a recovery plan that would allow them to get back up and running as soon as possible in the event of a disaster.

Reference no: EM131722538

Questions Cloud

Define the term system security : Define the term system security as it is used in the field of information security
Business advantage to the company : How Project Portfolio Management process could provide business advantage to the company?
Complete a transformational leadership questionnaire : Complete a Transformational Leadership questionnaire. Comment on the accuracy of the assessed skills inventory.
What is meant by social capital : What is meant by social capital? What role do strong ties and weak links play in social capital? Give an example if possible
Design a backup strategy that would provide secure : design a backup strategy that would provide secure storage of all their data, and a recovery plan that would allow
Differences between external and internal suppliers : What are the similarities and differences between external and internal suppliers? How should a project leader attend to each?
Describe the data summarized in the table : Blogs for Fortune 500 firms. Website communication through blogs and forums is becoming a key marketing tool for companies.
Basis statement of the responsibility : At beginning, provide a basis statement of the responsibility for your organization: short paragraph explaining the job/mission of your organization.
What are expectations each of you has for other team members : Where do you think your team challenges will reside? What are the expectations each of you has for the other team members?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd