| |
Questions on Networks
- A university provides staff and students with access
to its computer network. a. Activity on the university's networking
system is monitored and an accounting log is automatically produced.
Suggest what this log might include and explain why it is useful. (8)
b. Appropriate staff have access to personal and
financial data. What steps should be taken to preserve the security of
the data in such a system? (4)
- The IT manager of a large college is about to change
the software that is used to record student attendance in classes.
Given that this new software must provide different access permissions
and types of report, what capabilities and restrictions should the IT
manager allocate in order to satisfy the needs of each of the following
groups of users? (8)
- students
- teaching staff
- office staff
- senior managers
- An international company wants to set up a new
computer network. Although many staff currently use stand-alone
desk-top systems the company has no experience of networking. As an IT
consultant you have been asked to prepare a report for the company
directors, outlining the issues, and the potential benefits, to
communications and productivity that such a network could bring. Your
report should include:
- a description of the various network components
which would be involved;
- a description of the relative merits of
different types of network which could be considered; o a description
of the security and accounting issues involved;
- an explanation of networked applications which
could improve communications and productivity within the company. (20)
- A company has a computer network system.
(a) Activity on the network system is monitored and
an accounting log is automatically produced. (i) State four items of
information that this log might include (4) (ii) Give four reasons why
such a log is useful. (4)
(b) An IT consultant has suggested that the company
changes from a peer-to-peer network to a server based network. Give six
features of these network environments which contract the two different
approaches. (6)
|