What are some of the protocols involved in communication

Assignment Help Management Information Sys
Reference no: EM133543535

Assignment:

What is happening with data when a employee on a company is trying o do their job and get access the data base of the company , what are the networking devices included, what are some of the protocols involved in communication, which is the source and destination device and names of protocols.

I'm looking for how a employee access the data and each step it take such as employee logins in using the HTTp protocol to send a receive to the data base sever to get the information needed what happens after that can you explain each step one by one and what happens and what deceives are used and how they are linked for data communicate?

Reference no: EM133543535

Questions Cloud

How you perceive yourself and how you communicate with other : Write a discussion post in which you try to explain the relationship that exists between how you perceive yourself and how you communicate with others.
Evaluate a forward with a maturity of half a year : Evaluate a Forward with a maturity of half a year on a share with no dividend. The price is 60 with an exercise price of $5 the continuous rate is 4%
Evaluate a portfolio consisting of a long call : Evaluate a portfolio consisting of a long call on a share with strike price X and a short put with the strike X. Please solve graphically and algebraically
Who are financially independent and who deferred enrollment : students who are older than the general student population, who are financially independent, and who deferred enrollment after high school.
What are some of the protocols involved in communication : What are some of the protocols involved in communication, which is the source and destination device and names of protocols.
Graphic rating scale performance appraisal method : Examine the advantages and disadvantages of the graphic rating scale performance appraisal method currently used.
How you would have addressed-responded to the situation : Compare and contrast how the leader addressed and responded to the situation with how you would have addressed/responded to the situation.
Create a directory named linux : Mike wants to create a directory named Linux, and he wants to create a few files in directory such as Mike1.ppt, Mike2.txt, use copy command.
Differentiate pathophysiology of extradural hematoma : Differentiate the pathophysiology of extradural hematoma and subdural hematoma.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Employ an action research methodology

You will employ an Action Research Methodology to complete their selected project. This methodology can be used for new development.

  Perform a search on the web for articles

Perform a search on the Web for articles and stories about social engineering attacks or reverse social engineering attacks.

  Create presentations using cascading style sheets and dhtml

Describe the structure of the World Wide Web as interconnected hypertext documents. Create and validate HTML documents. Create presentations using Cascading Style Sheets and DHTML.

  Explain significance of information system security policies

Explain the significance of information systems security policies and the challenges and issues associated with ineffective or nonexistent policies.

  Examine the significance of the statement

In your own words, examine the significance of this statement as it relates to integrative information technology solutions within an organization.

  How are the tasks in this mixed approach different

How should we start? How can they be mixed? How are the tasks in this mixed approach different from traditional structured analysis?

  Differences between data warehouses and data marts

Write a one- to two-page (250-500 word) paper that discusses the differences between data warehouses and data marts

  Assess the migration path formats

Assess the migration path formats and evaluate the similarities and differences.

  Demonstrate a connection to your current work environment

How the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment.

  Describe the project scope and provide a brief cost

ISY2001 – Provide a description of the business case and justification about the business benefits from implementing this system.

  Create a package diagram of the problem domain layer

Create a package diagram of the problem domain layer using the communication diagrams and the CRUDE matrix through the use of graphical tools.

  Discuss the procedure for design using anthropometric data

Discuss the procedure for design using anthropometric data

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd