What standards are to be applied, Computer Network Security

Assignment Help:

Government funding has been given to a university consortium establishing a repository of resources for school teachers. They have engaged you to develop a search facility for teachers who will use it to discover small chunks of useful material, located anywhere. The chunks will be strung together to make customised lessons for students who cannot attend school, for one reason or another, or whose teachers do not include specialists in subjects the students want to study. The client group knows that it is more 'attractive' to their funding agency if there is a lot of multimedia product in the selection. You know that it is hard to produce accessible multimedia and there is hardly any 'out there'. You are asked to advise your client about accessibility.


Q1 What is going on? - What are the facts?

I. I report to the university consortium.

II. I am to develop a repository search facility for school teachers to extract useful teaching materials to develop suitable lessons.

III. Target students are supervised by non-specialists (possibly remotely, at home, or in care).

IV. The government funding agency likes multimedia.

V. Accessible multimedia content is scarce and 'hard' to develop.

VI. The consortium requires ‘accessibility' advice.

Q What are the issues?

VII. What are the contractual details/arrangements?

VIII. Accessible multimedia may be costly to develop. There appears to be a funding bias towards multimedia content. How much multimedia is envisaged? Would a simple multimedia put funding at risk? Advice to the consortium might be rejected (along with this job) by recommending a simple, 'non-glossy' approach.

IX. What are the exact requirements for the multimedia? What standards are to be applied? What is the budget for it and how much of that is for the extra accessibility work?

X. Sophisticated multimedia is unlikely to be easily accessed/afforded by all supervisors or students due to special needs and telecommunications inequities.

XI. What range of resources do supervisors/teachers and students have ready access to?

XII. What range of disabilities do the target students suffer, if any? How will these be identified and accounted for?

XIII. What level of training and support is envisaged for teachers, non-specialist supervisors and students?

XIV. It is not clear if 'normal' school teachers are to benefit from this system.


Related Discussions:- What standards are to be applied

Explain how the key exchange algorithm works, Question: (a) Explain how...

Question: (a) Explain how the Diffie-Hellman key establishment protocol works. (b) Prove that the Diffie-Hellman key establishment protocol is vulnerable to a `man in the mi

Describe the functionality of a router, QUESTION: (a) Explain, with the...

QUESTION: (a) Explain, with the aid of a diagram, a Star topology of a network of your choice. (b) Illustrate on the use of a MAN and give an example of one. (c) Describe

Explain how can we achieved privacy in an e-mail system, Explain how can we...

Explain how can we achieved privacy in an e-mail system.  The full form of PEM is Privacy Enhanced Mail: PEM  is  the  internet  Privacy  Enhanced  Mail  standard  adopted

What do you meant by network address translation, Problem: (a) What do ...

Problem: (a) What do you meant by Network Address Translation (NAT)? Why is it used? (b) Given the following information by your ISP about your newly acquired Frame Relay c

Advantages and disadvantage of packet filtering firewall, Advantages and Di...

Advantages and Disadvantage of Packet Filtering firewall   Advantages One screening router can help protect entire network One key advantage of packet filter

Computer security incident response team, QUESTION 1 Using a real life ...

QUESTION 1 Using a real life scenario or context list and set the scene for at least four advantages that an organized incident response program promotes. QUESTION 2 Yo

Find the capacity of the wcdma, Question: (a) Describe the term interfe...

Question: (a) Describe the term interference in the space, time, frequency, and code domain. (b) Consider a 1 G - AMPS: 824-849 MHz (forward) ; 869-894 MHz (reverse). B

Explain security, W h a t do you understand by the terms security, netwo...

W h a t do you understand by the terms security, network security and information security? How network security and information security are connected? Security can be def

Ipv6 addressing, IPv6 ADDRESSING IPv6 has 128-bit addresses. A 128-bit...

IPv6 ADDRESSING IPv6 has 128-bit addresses. A 128-bit address adds network prefix and host suffix. An benefit of IPv6 addressing is that there is address classes i.e. prefix/s

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd