subject

What are the main features of IEEE 802 Ethernet standard? 2. Briefly describe the features any two transmission media for computer
communications, detalling out their physical characteristics, advantages and
disadvantages

33. You are meeting with the branch manager of an insurance firm. This is a large insurance
firm that employs fifty insurance brokers. They have just changed over from their old
paper methods of filing insurance claims and contracts to using computers on a LAN.
The LAN is composed of 30 workstations and one file server. All data is stored on the
file server which has a 50B drive. Nothing of importance is stored on the workstations.
Downtime should be kept to a 2 hour maximum, because brokers can still sell insurance
using the software on their PCs, but if the server is down, they cannot retrieve any
client information. This insurance company is now very interested in designing a
backup strategy and possibly installing some form of fault tolerance for the branch
Your job is to provide a backup solution, whether the company should implement a full
backup, incremental backup or differential backup, and give a general cost analysis of
different security measures they should take to secure their data.

34. What are the technological solutions available in setting up a network for a home for
the elderly (retired civil servants) with a capacity of 200 occupants. It is to be managed
by an administrative unit located 100 miles away. Briefly discuss the factors you would
take into consideration to arrive at a cost-effective networked solution​

ansver
Answers: 1

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 06:20
In what kind of attack can attackers make use of millions of computers under their control in an attack against a single server or network availability confidentiality integrity identity automated attack software? those who wrongfully disclose individually identifiable health information can be fined up to what amount per calendar year? single most expensive malicious attack hipaa what are script kiddies? advanced persistent threat security manager security engineer what level of security access should a computer user have to do their job what process describes using technology as a basis for controlling the access and usage of sensitive data? cybercriminal
Answers: 1
question
Computers and Technology, 23.06.2019 00:30
Which of the following would you find on a network
Answers: 3
question
Computers and Technology, 23.06.2019 11:30
The most accurate readings that you can take on an analog vom are when the meter's pointer is at the a. center scale. b. extreme right. c. near right. d. extreme left.
Answers: 1
question
Computers and Technology, 23.06.2019 13:30
Drag the tiles to the correct boxes to complete the pairs. match the errors with their definitions. #name #value #ref when a formula produces output that is too lengthy to fit in the spreadsheet cell arrowright when you enter an invalid cell reference in a formula arrowright when you type text in cells that accept numeric data arrowright when you type in a cell reference that doesn’t exist arrowright reset next
Answers: 1
You know the right answer?
What are the main features of IEEE 802 Ethernet standard? 2. Briefly describe the features any two...
Questions
question
Mathematics, 17.11.2020 04:40
question
Computers and Technology, 17.11.2020 04:40
Questions on the website: 13722360