What standards are to be applied, Computer Network Security

Assignment Help:

Government funding has been given to a university consortium establishing a repository of resources for school teachers. They have engaged you to develop a search facility for teachers who will use it to discover small chunks of useful material, located anywhere. The chunks will be strung together to make customised lessons for students who cannot attend school, for one reason or another, or whose teachers do not include specialists in subjects the students want to study. The client group knows that it is more 'attractive' to their funding agency if there is a lot of multimedia product in the selection. You know that it is hard to produce accessible multimedia and there is hardly any 'out there'. You are asked to advise your client about accessibility.


Q1 What is going on? - What are the facts?

I. I report to the university consortium.

II. I am to develop a repository search facility for school teachers to extract useful teaching materials to develop suitable lessons.

III. Target students are supervised by non-specialists (possibly remotely, at home, or in care).

IV. The government funding agency likes multimedia.

V. Accessible multimedia content is scarce and 'hard' to develop.

VI. The consortium requires ‘accessibility' advice.

Q What are the issues?

VII. What are the contractual details/arrangements?

VIII. Accessible multimedia may be costly to develop. There appears to be a funding bias towards multimedia content. How much multimedia is envisaged? Would a simple multimedia put funding at risk? Advice to the consortium might be rejected (along with this job) by recommending a simple, 'non-glossy' approach.

IX. What are the exact requirements for the multimedia? What standards are to be applied? What is the budget for it and how much of that is for the extra accessibility work?

X. Sophisticated multimedia is unlikely to be easily accessed/afforded by all supervisors or students due to special needs and telecommunications inequities.

XI. What range of resources do supervisors/teachers and students have ready access to?

XII. What range of disabilities do the target students suffer, if any? How will these be identified and accounted for?

XIII. What level of training and support is envisaged for teachers, non-specialist supervisors and students?

XIV. It is not clear if 'normal' school teachers are to benefit from this system.


Related Discussions:- What standards are to be applied

Udp encapsulation, UDP ENCAPSULATION As given in the figure below, UDP...

UDP ENCAPSULATION As given in the figure below, UDP packet is included in IP datagram and the IP datagram is then attached in the Frame.

Digital certificates, A Certificate presents an organization in an official...

A Certificate presents an organization in an official digital form. This is same to an electronic identity card which serves the purpose of Identifying the owner of the certificate

Describe the functioning of cloud computing, Question 1:  Describe the ...

Question 1:  Describe the functioning of cloud computing. Question 2: Discuss on "Platform as a Service". Question 3: Discuss the steps involved in effective co

Ucsf medical center case study-information security, Example : UCSF Medical...

Example : UCSF Medical Center In the year 2002, the University of California, San Francisco (UCSF) Medical Center received an email message from someone who claimed to be a doct

Feasibility studies-risk management, Feasibility Studies Before deciding...

Feasibility Studies Before deciding on strategy, all information of economic or non economic consequences of vulnerability of information asset should be explored. A number of w

Ethical hacking penetration testing, Get a copy of Metasploitable at Make...

Get a copy of Metasploitable at Make">http://sourceforge.net/projects/metasploitable/files/Metasploitable2/ Make sure to follow these directions very carefully. You will get po

Explain the operation of the matchmaker middle agent, Question 1: (a) E...

Question 1: (a) Explain the operation of the "matchmaker" middle agent. (b) Describe why broker middle agents are more efficient in terms of the time taken for a service to

Ring topology, RING topology all computers are connected in loop. A ring ...

RING topology all computers are connected in loop. A ring topology is a network topology in which every node connects to exactly two other devices, forming a single continuous pa

Complexity of network systems, Computer networks is a complex subject due t...

Computer networks is a complex subject due to the given reasons: MANY DIFFERENT TECHNOLOGIES EXIST: The first reason for the complexity of networks is that there are s

Implement database security, Question: (a) Describe fully with example ...

Question: (a) Describe fully with example the two access control methods available to implement database security. (b) Discuss why database statistics (meta data) provide es

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd