Describe role windows firewall plays in protecting computer

Assignment Help Computer Networking
Reference no: EM131473593 , Length: word count:2000

Short Answer Questions:

Task - This assessment item aims to develop and gauge student understanding of the key topics covered so far. Answers MUST be written in your own words.

Question 1 -

Research and list some salient features of each of the following versions of Windows 10 and provide your answer in a tabular format.

  • Windows 10 Home
  • Windows 10 Pro
  • Windows 10 Enterprise
  • Windows 10 Education
  • Windows 10 Mobile
  • Windows 10 Mobile Enterprise

Question 2 -

You have been hired as a technology intern by the IT department of a medium sized company. The company is currently running on Windows 8. One of the 1st tasks you have been assigned is to prepare for an upgrade for all computers to Windows 10. Write a report to your manager detailing the system requirements for installing or upgrading to Windows 10. Your answer should be detailed and include all hardware and software requirements

Question 3 -

a) Describe the role Windows Firewall plays in protecting a computer from threats.

b) List the steps you would take to explore all the apps and features that have "permitted access" through the Windows 10 Firewall on your computer. Write a brief summary of any changes you would make to the settings for the selected apps.

Question 4 -

While working as a technology intern for ABC enterprises, a corporate training firm in Melbourne. Most of the employees use Windows 10 laptops and tablet computers to record training needs of their clients. All staff are experiencing a common problem and are losing versions of files they have created for clients and you have been asked by your manager to investigate and provide a solution to this problem. Provide a short report on how to address and solve this issue utilising some features of Windows 10.

Question 5 -

You have been hired by a training organisation to develop a training session on "Networking Essentials using Windows 10". Your manager has asked you to prepare the 1st training session to familiarise staff to the following frequently used networking terms.

network, communications channel, bandwidth, local area network (LAN), wide area network (WAN), router, coaxial cable, modem, network adaptor and MAC address.

Using your preferred Internet search engine, prepare a training document to deliver your training. In your document, you should include the definition of each term, a brief description of its role and figures where appropriate. You must reference the sources utilised, using APA referencing style.

Rationale

This assessment aims to assess the following learning objectives of this subject:

  • be able to install and upgrade Windows desktops;
  • be able to analyse system and application logs and make recommendations as appropriate;
  • be able to deploy and evaluate applications during and after operating system deployments;
  • be able to maintain and optimise systems that run Windows desktops;
  • be able to configure and troubleshoot mobile computing for Windows;
  • be able to analyse services, programs and user account controls for security vulnerabilities.

Reference no: EM131473593

Questions Cloud

How should court rule ftc motion for preliminary injunction : Sabal manufactured and sold of a line of overthe-counter topical hair loss products known as the "hair farming system." She claimed that these products work.
The dudley street neighborhood initiative : The Dudley Street Neighborhood Initiative (DSNI) is a nonprofit community-based planning and organizing entity rooted in Roxbury/North Dorchester neighborhoods
Compute the annual break-even point in number of haircuts : Determine the annual break-even point, in number of haircuts. Support your answer with an appropriate explanation. Show calculations to support your answer.
Initial cash flow of the butterfly spread strategy : What is the initial cash flow of the butterfly spread strategy? If it's a cash inflow, enter a positive number.
Describe role windows firewall plays in protecting computer : Describe the role Windows Firewall plays in protecting computer from threats. Research and list some salient features of each of following versions of Window 10
Major behavior schools of management theories : Three major behavior schools of management theories
What is the maturity risk premium : What is the maturity risk premium for the 2-year security?
Sustainability consulting business-calculate the forecast : Joey is managing a sustainability consulting business. She would like to predict what revenues will be for October 2016.Calculate the forecast for October 2016
Interest loan with monthly payments : What is the effective interest rate if the loan is an add-on interest loan with 12 monthly payments?

Reviews

len1473593

4/25/2017 5:44:02 AM

Total 5 questions are given. Each answer has to be about 400 words, total 2000 words single spaced. Please see the assignment attached. Reply back if you are confident of doing it correctly. Do not start unless confirmed. Late submission or incorrect submission may be penalized. This assessment item aims to develop and gauge student understanding of the key topics covered so far. Answering these questions will help you build some understanding of the subject content. It is expected that answers to the assignment questions be succinct (i.e. precise and concise) with all sources of information fully referenced as per APA referencing style. You have to reference the text book and any additional material you have used in your answers. Note that the guide for APA referencing is provided in the Resource section of Interact site.

len1473593

4/25/2017 5:43:53 AM

Answers MUST be written in your own words. If an answer contains more than 20% direct quote (referenced or unreferenced) marks will be deducted for this question. One or two sentence answers will be too short and only receive low marks. Answers longer than 1.5 pages (12 point font, single line spacing) may incur a penalty if too much non-relevant information is stated. Differantiate among the various editions of Windows 10. Understanding of requirements for installing and upgrading to Windows 10. Understand and analyse the security features of Windows 10. Comprehend the Windows 10 file and system maintenance requirements and Desmonstrate understanding of Windows 10 networking.

len1473593

4/25/2017 5:43:43 AM

Marks will be deducted for NOT following the presentation guidelines below as well as for poor presentation, spelling and/or grammar mistakes. Marks will also be deducted for NOT providing / following the proper APA style referencing. Referencing should be accurately documented using APA 6th edition and includes in text and bibliographic information. (Note that the guide for APA referencing is provided in the Resource section of the subject site)

Write a Review

Computer Networking Questions & Answers

  Compute total time required to transfer file

Compute the total time required to transfer a 1000KB file on a 1Mbps link with an RTD of 100msec ans a packet size of 1 KB in the following cases.a).

  Explain the need of encapsulation elaborately explain the

q1. describe the need of encapsulation. elaborately describe the process of encapsulation and creation of packets as a

  Determine the root cause of the problem

Your team has been tasked to determine the root cause of this problem. The analysis should begin by taking a holistic view of the network diagram to understand the topology.

  Choose to run over tcp rather than udp

Describe why an application developer might choose to run over TCP rather than UDP. Suppose host A is sending host B a large file over a TCP connection. If the acknowledge number for a segment of this connection is y, then the acknowledge number for ..

  Implement some very sophisticated server-side scripting

Discuss this in relation to server security, the continuing trend to eCommerce and the continual rise in popularity of PHP as a solution to eCommerce applications.

  Design ip addressing scheme for five departments

You are hired to design an IP addressing scheme for five departments that will give security and access to Internet. Each department requires between 1,500 - 2,000 IP addresses.

  What are the advantages to mesh, bus, ring,star topology

What are the advantages and disadvantages to Ethernet, Token Ring, FDDI, and wireless?

  Features to facilitate overcoming limits of security

What features do they incorporate to facilitate overcoming limits of security, merchant risk, cost, etc.? How do they validate cardholder identities?

  What are the similarities in wan''s and lan''s

Compare WAN's and LAN's. What are the similarities, what are the differences. What special considerations must you remember when planning a WAN

  Describe the characteristics of the worst reports

Describe the characteristics of the worst reports. Consider different aspects of the report that could go wrong such as format, layout and content, and describe what could go wrong with them under different categories

  Make a program which manages a registry of compact discs

make a program that manages a registry of compact discs cds. the register may e.g. based on a doubly linked list

  The auto club of japan sponsors driver education events

the auto club of japan sponsors driver education events that provide high-performance driving instruction on actual

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd