Reference no: EM1379587
These questions were given as a guide to study from. What would be the correct way to answer these? I guess there is no real right or wrong answer but would like to know how you would solve. Thanks. They are listed below.
Question1. Discuss and explain a technology related ethical issue. Determine the issue and its possible outcomes? How can the issue be resolved?
Question2. Discuss one aspect of the security protection in place at a company. What is it? How does it work? What inconvenience does it cause the user?
Question3. Identify an Internet-related regulatory issue. Discuss the issue including a description, indicate who are the stakeholders are, identify who will be impacted - and how - by the regulation, etc.
Question4. Identify an Internet-related productivity issue. Discuss the issue including a description, who the issue impacts, the economic costs, etc.
Question5. Internet addresses have at least two formats:
Top-Level Domains: These addresses end with three-digit codes such as .edu, .com., etc. There are at least fourteen of these domains.
Root-Zones: These addresses end with two-digit country codes such as .uk (United Kingdom), .us (United States), .fr (Frogs.. er France) etc. (Actually, Root-Zones are a special case of Top-Level domains)
a. Pick Top-Level domain that is of interest and write a paragraph or two about the reason for the domain and the organization responsible administering the domain. Proposed domains can be used for your answer.
b. Locate a list of Root-Zones and choose a country code. Please share the Root-Zone country code and what is interesting about it.
Roles of network managers
: In Many development companies and universities network managers must oversee a network that has several computers connected to it that are used through developers for design and product development reason.
|
Protecting the company data
: Suppose you work for a small, one office loan business. Your data is critical, and a fire or other disaster could destroy all of your computer documents.
|
Procedure that adds 2 words together
: Create a small procedure that adds two words together and stores the results in CX and DX. Call the procedure from a program that loads the words to be added together in registers BX and AX
|
Relational database architecture from a network
: Determine what would make a corporation or organization migrate to a relational database architecture from a network or hierarchical architecture?
|
Discuss technology related ethical issue
: Discuss and explain a technology related ethical issue. Determine the issue and its possible outcomes? How can the issue be resolved?
|
Encoding the data using the generator polynomial
: Encode the data bit sequence 10011011100 using the generator polynomial and provide the code word.
|
Comparison of wireless lan and lan
: Assume your local hospital has decided to extend their offices to another department of the building where it is difficult to have cables installed.
|
Finding the length of cable in the lan
: Suppose that the smallest possible message is sixty-four bytes. If we use 10BaseT, how long is a sixty-four byte message?
|
Objectives of database management systems
: Discuss the objectives of database management systems, Integrating databases; sharing information; maintaining integrity; reducing redundancy and enabling database evolution
|