Determine the needed hardware and software for a new system

Assignment Help Computer Networking
Reference no: EM13945894

- When an organization needs to use two or more computer systems, one of three basic processing strategies may be followed:

Centralized

Decentralized

Distributed

- Feasibility analysis is typically done during the investigation stage of systems development.

- The Internet protocol enables traffic to flow on the Internet from one network to another.

- A computer network consists of communications media, devices, and software needed to connect two or more computer systems and/or devices.

- Software that enables users to improve their personal effectiveness, increasing the amount of work they can do and its quality, is called personal productivity software.

- The electronic transmission of signals for communications is called telecommunications.

- Determining the needed hardware and software for a new system is an example of physical design.

- B2B a form of e-commerce, in which the participants are organizations.

- An information system is a set of interrelated components that collect, manipulate, and disseminate data and information; and provide a feedback mechanism to meet an objective.

- Prototyping takes an iterative approach to the systems development process.

- The following are the major functions of an information system:

output Function

processing Function

input Function

storage Function

- The primary communications protocol of the Internet is called TCP/IP.

- Software that has the greatest potential to affect the processes that add value to a business because it is designed for specific organizational activities and functions is called application software.

- The format of Internet address on the Web is called a Uniform Resource Locator (URL).

- Stakeholders are individuals that ultimately benefit from a systems development project.

- DBMS stands for database management system

- A computer-based information system consists of hardware, software, databases, telecommunications, people, and procedures.

- eBay is an example of the C2C form of e-commerce.

- A local area network connects computers, called workstations, within a limited geographical area.

? ROM chips are said to be nonvolatile, while RAM chips are volatile.

- A decision support system (DSS) is an organized collection of people, procedures, software, databases, and devices working to support managerial decision making.

- A data warehouse is a collection of data drawn from other databases used by the business.

- More stringent privacy laws would most likely cause higher prices, higher mortgage rates and fewer loans, fewer free Web sites, and less shopping convenience.

- One advantage of database processing is that programs are not dependent on the organization of the data in the database.

- Advantages to outsourcing include access to more skilled and experienced programmers, avoidance of diverting internal staff from current work, and possibly lower costs while disadvantages include losing control of the project, failure of internal developers to learn skills necessary to maintain the system, and failure of the outsourcer to deliver on its claim.

- A group of related bits are called characters (or bytes) that make up a field; while a group of related fields is called a record; a group of related records are called a data file; and finally a group of related data files is called a database.

- Spyware is software that monitors Internet usage and report it back to a server?

- The widespread use of computers has impacted the networked economy and our dependency on the Internet for communications.

- Processing that uses several processing units is called multiprocessing.

- Computers have continued to shrink and their performance/cost ratio has also reduced.

- An organization with a direct connection to the Internet must consider the trade-offs between making its Web, e-mail, and other Internet-related servers easily available to its stakeholders and protecting the servers from unwanted intrusions.

- People can use the Internet to spread negative information about another person or group, and this information can prove very difficult to correct.

- Web browsers have significantly changed the way people use the Internet.

- A type of application package used to back up data is known as backup software while software that protects us from virus infection is called anti-virus detection software.

- The microprocessor and memory are the two most important components in a computer.

- Computer hardware consists of the following:

central processing unit

input and output devices

primary storage

secondary storage

- A mouse and keyboard are considered input devices on a computer system.

- Software is defined as all the computer instructions necessary to perform a function

- The following are uses of the Internet for business:

electronic mail

news groups

telecommuting

live chats

- Java language is a third-generation language

- SQL is a standardized query language for DBMSs.

- Huge collections of related data are often referred to as databases.

- Data security does not guard software and data against disasters.

? ERP software is known as enterprise resource planning.

- The following are threats to privacy that exist in a networked economy:

exposure of information

data surveillance

identity theft

spam and spyware

Reference no: EM13945894

Questions Cloud

What are the motivations of politicians as regulators : You should research assigned article and clarify, what you feel is the meaning behind that article, giving consideration to the various theories under the umbrella of the Public Interest Theory and what of the role of regulators (politicians)? Wha..
Describe the osi and tcp/ip reference models. : Discuss how the layered stack approach assists in our understanding of these reference models.
What security suggestions do have to secure communication : In the attached solution I have described the problems and solutions of both mobile and server communications
Estimate the benefits from reduced staff turnover : Estimate the costs of operating the programme described above. Estimate the benefits in terms of increased productivity.
Determine the needed hardware and software for a new system : The Internet protocol enables traffic to flow on the Internet from one network to another.
Discuss the scene that we workshopped : You could discuss the scene that we workshopped in class about the acting company rehearsing, or choose from the opening scenes: that is, how Theseus's beginning lines to Hippolyta, Hermia's disagreement with her father, or Helena's jealousy of He..
Who is the speaker of the poem : What is the poem about? Describe the action of the poem. Who is the speaker of the poem? It is not the author necessarily. What can you tell about the speaker from the poem
What are the advantages of networked computers : What are the disadvantages and the characteristics between the internet and a group of networked computers.
How do the tcp/ip layers map to the osi layers : Describe and explain the similarities and differences between the OSI model and the TCP/IP Architecture.

Reviews

Write a Review

Computer Networking Questions & Answers

  Explain why networking standards are important

Explain why networking standards are important and why equipment that uses these standards should be purchased

  Describe the wireless spectrum

Describe the wireless spectrum. Describe how interference can distort and weaken a wireless signal. Describe the Frequency-Hopping Spread Spectrum (FHSS) and Direct-Sequence Spread Spectrum (DSSS) spread spectrum technologies

  Create the network for use in training environment

You are asked to create the network for use in training environment. It must be mobile, ... Mobile Training is small training firm which offers mobile classrooms.

  Explain dns and why it is necessary for today networks

Explain DNS and why it is necessary for today networks. Using your local DNS server, try to resolve "www.google.com.au" and report the resolved address(es).

  Advantages-disadvantages of replacing old servers with new

As the data center manager for your organization, you have been asked by the CIO to provide a short presentation on the advantages and disadvantages of replacing old servers with new servers.

  D a plan to integrate the different routing

design a plan to integrate the different routing protocols into a new network design for genome4us lab.identify

  Compute data transmission rate in bits per second

Assume that airliner carries 10,000 kg of those floppies at speed of 1000 km/h over distance of 5000 km. Compute data transmission rate in bits per second of this system?

  Explain standard can versus extended can

What is CAN protocol and where is it used, what is LIN and where is it used and explain "Standard CAN" versus "Extended CAN".

  Beyond the literal meaning write down the broader

beyond its literal meaning what are the broader implications of the clicheacute keeping the family name alive? or has

  Determine possible routing paths in bgp routing table

In the topology, network S is multi-homed to four providers, i.e., P1, P2, P3 and P4, where P1, P2 and P3 are customers of common provider P while P4 is customer. Now assume D is destination of interest. Determine the possible routing paths to D th..

  Significant means for assessing health of existing network

Explain some of the most significant means for assessing health of existing network. Which do you believe is most significant, and explain why?

  What are the different types of security

What is network security, What are the different types of security and how many are there and Compare small and big networks

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd