Preview

Nt1310 Unit 1 Term Paper

Good Essays
Open Document
Open Document
1401 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Nt1310 Unit 1 Term Paper
Problem 1:
What are the enabling technologies need to be developed for this system?
The system, because it should be usable from home, needs to be built to work over the internet.
The infrastructure needed to implement to such a system would be:
Fiber-to-the-x for the last mile in the telecommunication network for high-speed access to the system. This would give users of the system fast and reliable access to the application for the instant public referendum. Internet enabled devices must exist to consume the bandwidth that can be offered by this infrastructure at an affordable price so all citizens can own such devices to be able to participate in the referendum.

This is the application stack of the system:
View: This is the user facing component of the system. This is probably going to a webpage or an application native to the platform it is running on. Either case, it would require usage of some markup language (such as HTML) and some styling components (such as CSS). As for the ‘actionable’ items in this part of the component (such a clicking a button or choosing an option or submitting a form etc.) we would need some JavaScript or a similar scripting language with equivalent capabilities. Because there are
…show more content…
Also because the users will be operating remotely, they can be physically compromised and someone else could be affecting the decision making process of the end-user. Also, because the user is in their home environment, they could be distracted with other stuff going on in their surrounding and unintentionally make wrong decisions. Overall, I would say the security threat from snooping and other technical attacks outweigh the other disadvantages and care must be taken that the information is encrypted and the system itself is built using all security considerations so these potential issues can be

You May Also Find These Documents Helpful

  • Satisfactory Essays

    NT1330 Unit 2 homework

    • 364 Words
    • 2 Pages

    Check the workstations using ipconfig /all and find out if the ip range is within the address range you assigned, if it is a different address then the workstation failed to contact the DHCP server and has gone into apipa mode. The Network Interface Card might be assigned an incorrect driver. Another possible cause of the problem is that the patch cable is not plugged into the Network Interface Card, or is not connected to a switch on the other end. However, it could be that the server has run out of IP addresses that it can assign to clients. You can easily tell if this is the problem by comparing the size of the DHCP address scope to the number of devices on your network that request IP addresses from the DHCP server. But since only some of the workstations have got addresses the problem might be the DHCP server. Start off by doing some ping tests to verify that the DHCP server is able to communicate across the network. If the DHCP server is able to communicate with other computers on the network, then I recommend verifying that the DHCP server has an IP address that is compatible with the scope that the server is configured to assign addresses from. The server itself has to be assigned a static address in the same subnet range, such as 192.168.0.199. If this still doesn’t solve the problem make sure that the DHCP server is still authorized by the Active Directory to lease IP addresses. You should also check to verify that the scope is active, and that the necessary services are running on the DHCP server.…

    • 364 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Ones we have known about nodes in the network and links between them, then to analyze this network some SNA Measures are used. These measures are mathematical aggregation functions which calculates various aspects related to each node and also some of them can calculate some of the aspects with respect to the whole network .…

    • 596 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Analysis and Insights of things asked in Ques. 3 3. A) Observations and Explanations:  There were numerous objects downloaded from both nytimes.com and vox.com. But vox.com had a lot of image files to download and thus the total size of objects downloaded from vox.com (around 25 MB) is very large compared to nytimes.com (2 MB).  Considering vox.com:…

    • 2486 Words
    • 10 Pages
    Powerful Essays
  • Satisfactory Essays

    Nt1310 Unit 5 Paper

    • 323 Words
    • 2 Pages

    The Media Access Control (MAC) is one of the sublayers contained in the Data Link Layer (DLL) of the Open Systems Interconnection (OSI) model. The MAC layer provides addressing and channel access control mechanisms, and works to transmit data from one Network Interface Card (NIC) to another across a connected network.…

    • 323 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Nt1310 Unit 6 Paper

    • 368 Words
    • 2 Pages

    The stakeholder involved in this decision is Anne Distagne, the CEO of Linkage Construction, Inc. She was the individual involved in the decision-making process. of falsifying information to not display the significant increase in profit.…

    • 368 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Then click ‘Decrypt/Verify’ to proceed. The procedure also includes entering the passphrase of the certificate.…

    • 987 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Designing a fault-tolerant system can be done at different levels of the software stack. We call general purpose the approaches that detect and correct the failures at a given level of that stack, masking them entirely to the higher levels (and ultimately to the end-user, who eventually see a correct result, despite the occurrence of failures). General-purpose approaches can target specific types of failures (e.g. message loss, or message corruption), and let other types of failures hit higher levels of the software stack. In this section, we discuss a set of well-known and recently developed protocols to provide general-purpose fault tolerance for a large set of failure types, at different levels of the software stack, but always below the…

    • 1211 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Network attached storage (NAS) is basically a server that acts as hard drive that’s attached to a network (Johnson). This connection to a network allows anyone who is also connected to the network the ability to access the hard drive. The NAS come in many sizes and different capabilities. The network connection that the NAS uses can be almost any that are available. The standard Ethernet connection is the most common connection by there are also systems that use a wireless connection or even a fiber optic connection for extremely fast transfer speeds.…

    • 292 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    NT1310 Unit 3 Homework

    • 1253 Words
    • 5 Pages

    Q1) What does the shell ordinarily do while a command is executing? What should you do if you do not want to wait for a command to finish before running another command?…

    • 1253 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    It is major to see that private broadband speed ask for has an immensely fluctuating character. Families move stunningly in their centrality of usage, the kind of occupations they use their relationship for and the measure of progress these applications make. In this consider, we address this respectable mix by constraining between different groupings of customers, and our general outcomes are midpoints over these outlines. While the advance of the intensity for exchange speed is related to that of download speeds, their improvements are not by any associate of the creative vitality poorly characterized. Despite phenomenal things, download speeds are from time to time more desperate to customers as they are dependably holding up to use substance or use an application, while they are normally less squashed while exchanging data.…

    • 626 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Nt1310 Unit 6 Paper

    • 712 Words
    • 3 Pages

    When looking at security of your network first you must determine what laws and regulations you must abide by. Being a police department do you have information stored in your database that would be considered ePHI from when a inmate was treated then you may fall under HIPAA. Do you take credit card for payment of violations? If so you may be required to protect data under SOX or PCI. You must know what data you have and how you must protect it. Are you required to report to the public or the court if your data is breeched? If so at what level or detail?…

    • 712 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    The possibility of explorer appcrash issues with the module shell32.dll being responsible in Windows operating systems is very common. Once that happens it will become immensely difficult, to even perform the simplest of functions in Windows.…

    • 339 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    allows the user to travel within the virtual cockpit of the aircraft, around the aircraft, and around the…

    • 4092 Words
    • 17 Pages
    Powerful Essays
  • Satisfactory Essays

    Mdcm

    • 365 Words
    • 2 Pages

    Networking: This project involves the use of internet and networking resources available to enable the sharing of information.…

    • 365 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Hotel Management

    • 9014 Words
    • 37 Pages

    The purpose of the project is to present the requirement of the Computerization of Telephone Billing System. The project thus calculates…

    • 9014 Words
    • 37 Pages
    Good Essays