Replace legacy system-categories of compression algorithms

Assignment Help Basic Computer Science
Reference no: EM132437023

1. "Build or Buy"

A company that is looking to replace a legacy system. The company is evaluating whether it is better to "build" a new replacement or better to "buy" an existing out of the box system. Please research and in paragraph form:

1. Give the advantages and disadvantages of each building your own or buying an existing system.

2. Give your opinion, after your research, which option do you think is better. (There is no correct answer)

2. "Data and Images" Please respond to the following:

Lossless and lossy are the two universally known categories of compression algorithms. Compare the two (2) categories of algorithms, and determine the major advantages and disadvantages of each. Provide one (1) example of a type of data for which each is best suited.

• BitMap and object (i.e., vector) are the two (2) categories of images. Compare the two (2) categories of images, and determine the advantages, and disadvantages of each. Provide one (1) example of type of file for which each is best suited.

3. When you set up your first Windows 2016 server and configure it as a domain, there are a few things to consider.  There are points where it is relatively easy at points, as you just answer a few questions like what language you use, your keyboard, etc.  At other points, it becomes more involved.

1. Based on your reading and labs that you may have started this week, what do you think would be a good name for your server(s) and why?

• What about server password security?

• What are some things to consider when setting that up?

2. Do you think it is important to have different security levels on servers versus workstations and why? 

3. Will you use DHCP or hard-coded IPs for

• Servers?

• Workstations?

• Why? 

Flesh out your thoughts and interact with your classmates.  Post your initial response by Wednesday each week and then return on a couple of other days to see what's going on with the discussions.  The more you interact, the more you learn from your peers, and the more you share with them about what you know.  You'll also be showing your instructor what you've picked up.

4. Choose one of the following to respond to. Be sure to indicate which one you are addressing in your response.

Pick an example of a potential vulnerability when you might be willing to hire, or accept, a gray hat? This may include "bug bounties." If you believe you would never use a gray hat, explain why and the alternative you might pursue.

OR:

Discuss no less than three motivations for hacking. How can understanding motivation help one develop a strategy for defending against such threats?

Reference no: EM132437023

Questions Cloud

Familiarize students with few networking concepts : The purpose of this assignment is to familiarize students with a few networking concepts that are frequently utilized by IT professionals.
What are dietary supplements : What are dietary supplements? and how do they differ from a pharmaceutical drug?
Protein recommendations and drinks : Discuss a topic on healthy nutrition practices for a high school physical education class and include specific ideas such as healthy snacking, nutrition choices
What is the Ontological Argument for the existence of God : According to Hobbes, justice is a concept created by society since people must have rules to get along. What does his position imply about way people naturally
Replace legacy system-categories of compression algorithms : A company that is looking to replace a legacy system. Lossless and lossy are the two universally known categories of compression algorithms.
What are good sources of protein for vegetarians : What are good sources of protein for vegetarians? In what vitamins or minerals may vegetarians become deficient?
Discuss the process by which the toxicant cause : Discuss the process by which the toxicant cause reproductive toxicity and the concentration of exposure;ways exposure to the toxicant might be limited
Adequate control of diabetes : To provide adequate control of diabetes, one of the best dietary recommendations would be to: manage total daily carbohydrate intake and split it more
What types of motives may be influencing the authors : Evaluate the quality of the reasoning in this source. You may address questions such as: How adequately the article supports the premises with research

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd