Learning team collaborative discussion

Assignment Help Basic Computer Science
Reference no: EM131355727

Based on your Learning Team collaborative discussion, prepare a 2- to 3-page security memo and a 1-page diagram with 1/2- to 1-page narrative. Include:

  • Analysis of the situation that demonstrates fundamental understanding of TCP/IP protocol(s) information, insights into throughput reduction, and analysis of the issue.
  • Solution recommendation that includes cable and device recommendation and installation diagram.
  • Insights on any potential ethical issues and security threats.   Below is the learning team collaborative discussion.

Consider the following scenario for your Learning Team collaborative discussion and associated Individual Assignment:

Given recent business growth, Jon has become concerned about internal and external security threats. He has asked you to prepare a memo with ten ideas to improve or enhance internal and external security. Jon realizes that you are not aware of all of the security precautions and activities currently in place, but he expects your list will include some new ideas.

Many of the managers in the main building have approached Jon about the actions they can take to support the information security in their departments. Jon has asked you to draft a security checklist that can be used by the managers to reduce internal and external threats.

Recently, there has been a 5% reduction in the daily throughput to the 3D printers without any reduction of demand or usage from customers. This has had an effect on revenues that will eventually result in cost reductions to include the reduction of employees. You have noticed that some employees watch HD shows on their business computer during their lunch hours and for a while after working hours. You are concerned that the downloading of HD shows over the company's network might be using throughput that would otherwise go to the 3D printers.

Each student should submit the assignment individually using his/her own ideas and research.

Reference no: EM131355727

Questions Cloud

Computer forensics and traditional forensics : 1. The difference between computer forensics and traditional forensics 2. Discuss the issues you deem important in computer forensics.
Research the changes in the healthcare industry in past : Research the changes in the healthcare industry in the past five to ten years and the role of HRM in maintaining success while adapting to these changes. Select one healthcare trend for deeper study. On the basis of your research.Describe and expl..
Subprograms and functions with parameters and arguments : Using Notepad++ (installed from the "Start Here!" page), write a program using Pseudocode to solve the following problem. In your program, make use of subprograms and functions with parameters and arguments.
Draw the top view repetitive unit cell : Next, redefine the weave parameters, first by 90o rotating the weaving pattern, and second by considering the opposite face of the weaving pattern, on both initial orientation and 90o rotated orientation of the weaving pattern. Is this a twill or ..
Learning team collaborative discussion : Based on your Learning Team collaborative discussion, prepare a 2- to 3-page security memo and a 1-page diagram with 1/2- to 1-page narrative. Include:
Draw the top view repetitive unit cell : Draw the top view repetitive unit cell (RUC) for 5/1/2 weave counting along the x-direction.- Is this a twill or a satin weave?
Examine the impact of each law on hr management : Using the first e-Activity, choose two (2) employment laws, and examine the impact of each law on human resources management (HRM). Support your response with specific examples of each selected law's impact on HRM.Using the second e-Activity, ill..
How would you define ethical behavior then : And what happens if you're doing business in a society different from your own? How would you define ethical behavior then? Explain and defend your position in a 3- page paper APA format.
Rfid and nfc communication technologies : Then write a paper in current APA format that compares three similarities and three differences, discuss how each of these technologies can be used in personal and commercial environments, and the ease or difficulty in configuring systems and appl..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd