Monitoring and eliminating system and software faults

Assignment Help Computer Networking
Reference no: EM133107317

PART A

Question 1. List two (2) quality assurance processes for monitoring and eliminating system and software faults.

Question 2. Explain three (3) network data flow collection and analyzing tools. You must include screenshots and functionality for each tool.

Question 3. List the steps you must take to resolve the following hardware and software related problems.
• Slowness of computer
• Blue screen.
• Computer not booting

Question 4. What is the process to change the automatic Windows 10 updates to the manual updates? Explain the process in 100-150 words.

Question 5. Give an example to explain how you can create and modify the environment variables systematically. Write your answer in 200-300 words.

Question 6. Explain in 200-300 words how will you rectify the internet connectivity related problems in windows 10.

Question 7. What fields must be present in the template to record the network problem. (List any three (3))

Question 8. Explain three (3) change management tools. Explain each in 100-150 words

Question 9. Write two (2) change control procedures for any ICT based organisation. Explain each procedure in 100-150 words

Question 10. Describe two (2) troubleshooting methodologies used for any hardware problem occurring due to newly installed hardware? (100-150 words for each method)

Question 11. Describe five (5) common computer problems and their possible solutions?

PART B
Question 1 What is a gateway? What function(s) does this perform?
(Write detailed answer in full sentences recommended length one paragraph)

Question 2 What are the 3 FTP transfer modes? Briefly describe each
(Write detailed answer in full sentences recommended length one paragraph)

Question 3 What is ‘Internet Control Message Protocol' (ICMP)? What are the functions of this?
(Write detailed answer in full sentences recommended length one paragraph)

Question 4 What is ‘User Datagram Protocol' used for?
(Write detailed answer in full sentences recommended length one paragraph)

Question 5 Outline the functions of the following protocols:(Write detailed answer in full sentences recommended length one sentence each)
a) BOOT Protocol
b) AARP

Question 6 What are the 3 principle categories of Ethernet?
(Write detailed answer in full sentences recommended length one sentence each)

Question 7 List 4 examples of useful data / information that can be obtained using a Network Monitoring Program

Question 8 Outline the functions of the following AppleTalk protocols:Write detailed answer in full sentences recommended length from one sentence to one paragraph each
a) AARP
b) NBP

Question 9 What is the difference between a router and a switch? Discuss
(Write detailed answer in full sentences recommended length one paragraph)

Question 10 List 3 methods of security that can be utilised for VoIP technology

Question 11 What is a firewall? What is the purpose of a firewall?
(Write detailed answer in full sentences recommended length one to two paragraphs - be sure to answer both parts of this question!)

Question 12 List 3 types of data security technologies

Question 13 What is DHCP? What are the reasons this protocol would be used?
(Write detailed answer in full sentences recommended length one to two paragraphs - be sure to answer both parts of this question!)

Question 14 Outline the structure of UTP cables. How does the number of twists affect quality?
(Write detailed answer in full sentences recommended length one to paragraph - be sure to answer both parts of this question!)

Question 15 Outline the structure of STP cables. Why would these be selected over UTP cables?
(Write detailed answer in full sentences recommended length oneparagraps - be sure to answer both parts of this question!)

Question 16 What are the 3 types of configurations of STP cables?

Question 17 Outline the structure of coaxial cables. List an advantage and disadvantage of this type of cable.
(Write detailed answer in full sentences recommended length one sentence to one paragraph)

Question 18 What are the following cables rated to:
a) CAT-5is rated to ...........
b) CAT-5eis rated to ...........
c) CAT-6is rated to approximately ...........

Question 19 List 3 advantages of wireless networks

Question 20 List 3 disadvantages of wireless networks

Question 21 Briefly outline the contracting procedures included in Assessment 1 at your simulated workplace
(Write detailed answer in full sentences recommended length one sentence to one paragraph)

The following questions relate to the Operating System: Windows 10

Question 22 List 5 software packages supported by this operating system

Question 23 List 5 features of this operating system

Question 24 List 4 requirements that must be checked prior to installing software on computer with this OS?

Question 25 Outline the procedures you would follow to install software (as part of your hardware installation) on this OS.
(Write detailed answer in full sentences recommended length one sentence to one paragraph)

Question 26 Choose one hardware component installed on this OS.
Outline the installation procedures
(Write detailed answer in full sentences recommended length one sentence to oneparagraph)

PART C
Question 1 What is a high strength password? Why would it be a good idea to have password strength requirements for user logins at a workplace?
Give an example and explain why with a full sentence answer

Question 2 List 5 specific security options that can be edited for a user when setting up their login

Question 3 List 5 specific hardware components that need to be checked to ensure compatibility when installing an operating system

Question 4 When installing a Windows operating system (e.g. Windows 2000) what file system should be selected? Why? explain your answer using full sentence/s

Question 5 List 3 methods that can be used to install operating systems

Question 6 What is software integration / cross-over software?

Question 7 List 3 diagnostic tools that are in-built in an operating system

Question 8 List 3 diagnostic tool products that can be used to diagnose operating system issues

Question 9 Discuss the principles of access control in detail. How can a business ensure access to data is restricted to personnel who are adequately authorised?

Give full sentences for answer, minimum length one paragraph

Question 10 What is a firewall? What is the purpose of a firewall?

Question 11 List 5 ways a computer can become infected with a virus

Questions 12 - 14 relate to the operating systems: Windows 10 and MAC OS Catalina

Question 12 List 5 software packages supported by this operating system

Question 13 List 5 features of this operating system

Question 14 List 4 operating system requirements that must be checked prior to installing the OS?

Question 15 What is the boot process? Full sentence answer please

Question 16 What is BIOS? Full sentence answer please

Question 17 How can you access BIOS at start-up? Full sentence answer please

Question 18 What is an Internet Protocol? Full sentence answer please

Question 19 What is an IP address and how does it work? Full sentence answer please

Question 20 What is a dynamic IP address? Full sentence answer please

Question 21 What is a subnet? Full sentence answer please

Question 22 What is print spooling? Full sentence answer please

Question 23 Why is it important to have a print queue management system in place?
Full sentence answer please

Question 24 Why is it important to have a print queue management system in place?
Full sentence answer please

Question 25 For 2 different OS, list a remote desktop product that is available.
Full sentence answer please

Question 26 List 3 common compatibility issues that face Windows 7, and how to work around them.
Compatibility Issue Work-around

Question 27 List 2 common compatibility issues that face Mac OSX Snow Leopard, and how to work around them.
Compatibility Issue Work-around

Question 28 What are the roles and responsibilities of employees relating to OH&S / WHS?
Give at least three

Question 29 Describe in detail the ergonomically correct way to sit at a computer desk.
Full sentence answer please, minimum two paragraphs

PART D
Question 1 What is PING? How and when is it used? Please provide a detailed answer using full sentences, suggested length one to two paragraphs

Question 2 What are Utility Software Programs? Please provide a detailed answer using full sentences, suggested length one paragraph

Question 3 List 4 different OS tools / utilities, and what they are used for

Question 4 Explain what log files are, their purpose, and what they do Please provide a detailed answer using full sentences, suggested length up to one paragraph

Question 5 What is divide and conquer in relation to Algorithm Design? Please provide a detailed answer using full sentences, suggested length one to two paragraphs

Question 6 What are the 5 components of Greedy Algorithms

Question 7 Describe the 4 components of functional testing listed below Please provide a detailed answer using full sentences, suggested length one or two sentences
Unit Testing
Integration Testing
Systems Testing
Acceptance Testing

Question 8 Describe the 4 components of non-functional testing listed below
short answer, dot points is adequate or sentences
Performance, Load, Stress Testing
Security, Vulnerability Testing
Usability Testing
Compatibility Testing

Question 9 Describe the following programming structuring short answer, dot points is adequate or sentences
Sequence
Selection
Iteration

PART E

Question 1a: List nine (9) essential elements of a Data Security Policy for an organisation.

Question 1b: Briefly explain the organisation structure. In 20-40 words.

Question 1c: As a network specialist, why you need to review organisational structure and functionality to implement data integrity? Answer in 50-70 words.

Question 2: a) What do you understand by security audit? Write your answer in 100-150 words.
b) What are the seven (7) factors to be considered for a security audit? Write your answer in 50-100 words.

Question 3: What do you understand from the term User Account Control (UAC)? Write your answer in 50-100 words.
b) What are the seven (7) reasons that trigger a UAC prompt in Windows?

Question 4: What are the seven (7) steps you will follow to set the permissions for file and folders to secure your data?

Question 5: Explain each of the following in 50-100 words:
a. Microsoft Software Inventory Analyzer - MSIA
b. MSINFO32
c. DxDiag
d. E-Z Audit

Question 6a: Briefly explain asset tracking. Answer in 50-100 words.

Question 6b: List six important aspects you should task prior to decide the asset management software.

Question 6c: Explain the importance of developing a system to record assets. Write your answer in 150-200 words.

Question 7a: List the five (5) factors to be considered while choosing an antivirus solution for a corporate office IT setup.

Question 7b: Briefly explain two current antivirus solutions for server security. Answer in 100-150 words.

Question 7c: Briefly explain two current antivirus techniques for server security. Answer in 100-150 words.

Question 8: How to install and activate AVG Antivirus? Explain in 100-150 words and add screenshots of the steps involved.

Question 9: a) What is the importance of testing the functionality of the antivirus? Write in 100-150 words.
b) Explain the steps involved to test the functionality of the antivirus. Write your answer in 100-150 words.

Question 10: Explain four (4) major environmental threats to data centers and computer rooms. Write your answer in 150-200 words.

Question 11: List the five (5) key elements required to be documented in regard to data center environmental concerns.

Question 12: Fire Suppression System is implemented in data centers to protect from fire. What is to be considered for implementing data center fire suppression systems? Write 150-200 words for your answer.

Question 13: a) List the ten (10) different types of backups used for data.
b) What are the seven (7) commonly used backup media options for taking the backup?

Question 14: a) What are the three (3) steps involved in implementing a backup solution?

b) List the five (5) compelling functionalities necessary for every enterprise backup solution.
c) List the four (4) different methods to restore the backed-up data.
d) What do you understand by real-time backup, synchronization and replication? Write your answer in 100-150 words.

Question 15: Read the following case study and answer the question.
You are working as an IT administrator in a small rganization. The rganization name is CCI media solution. The rganization is providing a range of online service including website design, SCO, Video creation and digital marketing for different businesses.
The organisation has 20 employees including management, marketing, account. Organisationdo not have any policies and procedures related to IT operation. The organisation is using following hardware and software:
• Windows server 2012
• Windows 10 for users
• Cisco router and switch
• Management is using the remote login to work from home

Question: You manager has asked you to create you a basic procedure for backup, restore and rollback of the data.

Question 16: a) List any five (5) network performance monitoring tools and describe any two tools including their functions.
b) What are the five (5) factors to consider while implementing network performance tool?

Question 17: List the ten (10) essential elements to be considered while developing a report on network performance.

Question 18 a: Briefly explain disaster recovery processes. Answer in 150-200 words.

Reference no: EM133107317

Questions Cloud

Explanation of routines : Develop a classroom management plan to share with your principal or leadership team. Explanation of routines. Description of behavior management plan aspect
Information serve for human resource departments : What purpose does job analysis information serve for human resource departments?
Why have the manager not made the change : An employee asked to have their training schedule adjusted and it still has not been done. The training class is supposed to start next week, and the student is
Explain the principles underlying most tax systems : Explain the principles underlying most tax systems. Explain why both are needed? Why, or should, both principles co-exist?
Monitoring and eliminating system and software faults : Explain network data flow collection and analyzing tools. You must include screenshots and functionality for each tool
How global movement of labour has an impact : 1. Explain how global movement of labour has an impact on HRM in Canada?
What are Lilys taxable income and tax liability for the year : Lily's taxable income before these transactions is $190,500. What are Lily's taxable income and tax liability for the year? Use Tax Rate Schedule
Explain the principles underlying most tax systems : Explain the principles underlying most tax systems. Explain why both are needed? Why, or should, both principles co-exist?
How traditional and differentiated classrooms differ : Compare/contrast and explain how traditional and differentiated classrooms differ. Provide a minimum of 3 examples with details and elaboration.

Reviews

Write a Review

Computer Networking Questions & Answers

  Which interface is in the blocking mode

Which interface is in the blocking mode and What distinguishing characteristic of the switch interfaces indicates that this switch is the root of the spanning tree instance

  Understand Client-Server communication via sockets

MCIS 6163 Computer Networking Assignment Help and Solution, Southern Arkansas University - Homework Help

  Use ifconfig and ip command to view ip address

Use the GUI tool to view network card and connection information (particularly IP address).Use the nmcli command to view network card and connection information

  First prepare an abstract of your business recommendations

first create an abstract of your business recommendations for network solutions for large businesses. an abstract is a

  Ip subnet design project-technical design of network service

technical design of network services - You are a consultant being brought in by XUMUC to assist with its merger with another company

  What are preferred architectures used in technology layers

How can you improve the performance of a BN?- Why are broadcast messages important?- What are the preferred architectures used in the technology layers in backbone design?

  Pros and cons of out-of-band network management

Write a 2- to 3-page paper describing the pros and cons of out-of-band network management as opposed to in-band network management

  How long does b takes to acknowledge

Assume that no packet or acknowledgement are dropped. Assume that A sends a packet to C and waits for its acknowledgement to come back from C. How long does it take until A gets that acknowledgement?

  What is the maximum frame size

Suppose frame-based processing is used to provide visual data to a video screen. Assume the sample frequency is Fs = 48 kHz, the the screen updates.

  Your neighbor is starting a small billing business and has

your neighbor is starting a small billing business and has asked you to design the network. currently you neighbor has

  Assignment suppose you are the information security

assignment suppose you are the information security director at a small software company. the organization currently

  What is router prompt for the interface configuration mode

Is clocking of a router's serial interface set by the DCE or the DTE?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd