Free

Computer Science Questions - Essay Example

Comments (0) Cite this document
Summary
In order to foster cooperation, one needs to involve the senior management staff in the planning, evaluation and implementation of the projects. They should be…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER98.6% of users find it useful
Computer Science Questions
Read TextPreview

Extract of sample "Computer Science Questions"

Computer Science Questions al Affiliation) Question One Prencipe asserts that senior management cooperation is very important for the success of any project in a company. In order to foster cooperation, one needs to involve the senior management staff in the planning, evaluation and implementation of the projects. They should be informed about the proposed development of the security policy and should contribute their ideas on the architecture and implementation. Therefore, a committee should be formed that is comprised of members from all the relevant stakeholders, including the senior management personnel (Prencipe, 2003).
Question Two
Wilson argues that in order to determine the threat scale during computer forensic tactics preparation, one identifies the rate of spread of the malicious program (worm, virus). The other step involves determining the extent to which the malicious program has spread to other computer users and the damage that the program has inflicted on those users that have been affected (Wilson, 2002).
Question Three
I think that subnets are the most difficult part of IP addressing. This is because it is very hard to understand how to work with prefix length and subnet length. In addition, the determination of the host addresses and the prefix involves changing the address into binary by conducting logical (NOR and AND) operations on the subnet mask and address, before finally converting the figures into decimal points.
Question Four
According to White, IPv6 have a number of drawbacks such as the cost. In order to migrate to IPv6 protocols, businesses have to factor in time spent, additional personnel and monetary assets. A business has to buy new servers and basically new equipment for performing IPv6 functions that are very specific (White, 2012).
Another factor is the complication of shifting to IPv6. The move entails involving all departments, which means that the day to day operations will be curtailed. In addition, all the departments have to be satisfied. Other factors include getting rid of the IPv4 inventory and handling issues relating to the legacy system.
Question Five
According to White, some of the best practices during deployment of directory services include:-
i. Possessing multiple domain controllers.
ii. Backing up data using disk to disk applications for continuous backing.
iii. Running domain controllers through Server Core.
iv. Modelling network connections via site link bridges.
v. Periodically checking the status of all subnets.
vi. Implementing a change auditing package.
vii. Generally planning the adequate infrastructure for load management (White, 2012).
Question Six
According to Mason et al., the factors to consider when deciding whether to implement a traditional zone or an integrated (AD) DNS zone include- the type of zones, database replication topologies and administrative supervision available (Mason, 2012).
It is not preferable to integrate a DNS zone into AD when there are very many computers that have inadequate security measures.
Halwagi argues that the main factors to consider when deciding which particular DCs host DNS include- hardware requirements, the place you will place DNS servers for traffic loads on the network, number of DNS servers and if you will exclusively use all DNS servers or a combination of DNS server implementations (Halwagi, 2006).
Reference List
Halwagi, M. (2006). Process integration. Amsterdam: Elsevier Academic Press.
Mason, B., & Ramsey, G. (2012). Microsoft System Center 2012 configuration manager administration cookbook. Birmingham, UK: Packt Pub.Copied to Clipboard!Bottom of Form
Prencipe, A. (2003). The business of systems integration. Oxford: Oxford University Press.
White, C. (2012). Data Communications and Computer Networks: A Business Users Approach (7th Ed.). Cengage Learning.
Wilson, D. (2002). Managing information IT for business processes (3rd ed.). Oxford: Butterworth-Heinemann. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Computer Science Questions Essay Example | Topics and Well Written Essays - 250 words - 1”, n.d.)
Computer Science Questions Essay Example | Topics and Well Written Essays - 250 words - 1. Retrieved from https://studentshare.org/information-technology/1699589-computer-science-questions
(Computer Science Questions Essay Example | Topics and Well Written Essays - 250 Words - 1)
Computer Science Questions Essay Example | Topics and Well Written Essays - 250 Words - 1. https://studentshare.org/information-technology/1699589-computer-science-questions.
“Computer Science Questions Essay Example | Topics and Well Written Essays - 250 Words - 1”, n.d. https://studentshare.org/information-technology/1699589-computer-science-questions.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Computer Science Questions

Computer Science

...Personal Statement - Computer Science I always fancied myself with computers since my childhood. Because I grew up in a small town in Vietnam, a place where computers were not introduced to the fullest at the time of its inception and were considered wholly as a luxury instead of a necessity, it was curiosity plus a self-driven need to learn about this new technology. My interest in computer sciences dates back to my school days. My first instance with a computer was in my mid-school where I got a chance to play games on it. High schools in my town at that time did not offer computers as a subject for...
4 Pages(1000 words)Personal Statement

Computer Science and Information Technology in HR Department of an Organization

...”, “Software Administration”, “Networking”, “Network Security” and “Technical Support”. In other words, it is the “management of computers” (Abhishek 2012). Computer science and Information technology in the HR department of the organization must be reasonable, available, and significant. The quick and extensive use of information technology and computers has created a need for extremely trained employees, proficient in different job functions. The most considerable alteration is that the professionals in the HR department at the present focus more on company strategic question from a “human resource” facet through the top level managers of the...
9 Pages(2250 words)Research Paper

Computer Science Information System

...Case Study: of the Situation: From the case study of a fitness center, we derive at the following assumptions There are 5 centers around the metropolitan. 2. There are in total 650 members and 30 members at each location. 3. This system will be used by both members and fitness consultants to track participation in various fitness activities, such as free weights, volleyball, swimming, stair climbers, and yoga and aerobic classes. The DSS system will be implemented in the form of a client server model with an interface, possibly a computer visual display unit, at all the five centers and will act as a platform to the prospective and current members and consultants. They are able to access the required information...
3 Pages(750 words)Essay

Computer Science

.../321957-321957-64295-306995-306995-3355644.html HP Pavilion a6500z series .http://www.shopping.hp.com/webapp/shopping/computer_can_series.dostoreName=computer_store&category=desktops&a1=Category&v1=Everyday+computing&series_name=a6500z_series Choosing a PDA versus a Laptop. (2007). Retrieved july 30, 2008, from http://www.googobits.com/articles/1019-choosing-a-pda-versus-a-laptop.html roseberry, catherine. (2008). Laptop or PDA for Business Trips. Retrieved july 30, 2008, from http://mobileoffice.about.com/cs/packyourgear1/a/laptoppda.htm Heather, booth., & Brown, murray. (n.d.). Basics of computer science. Retrieved july 30, 2008, from http://www.cs.utk.edu/modules/acknowledgements.html... 1. Write a short report with examples to show how a...
13 Pages(3250 words)Essay

Science Questions

...Topic: Science’s QuestionsQuestion Using a d example illustrate how natural income and natural capital enable a resource to be sustainable. You can not use any of the examples that have been given to you previously (i.e. timber or fish stock) Answer: A natural capital is according to Costanza (1997) is made up of the stock of resources and living systems from which flows resource harvest and extraction, as well as the essential ecosystem services of a bioregion. Some of the resources that may be included in the natural capital of a region include timber, oil, coal, wildlife, fresh water, fruits, fish and minerals. Living systems in a region may contain wetlands, prairies, coral...
4 Pages(1000 words)Essay

Computer Science

...changes (Ambler et al., 2007). The next confront for the traditional Software Engineering is: How do we proffer effortlessness and visibility into SE actions? Incorporating and supporting the transparency and visibility in the Software Engineering is really hard and delicate (Williams et al., 2003). Agile Software Engineering makes use of and pays more stress on the teamwork and in-group collaboration. This attribute of the Agile Software Engineering makes it capable to counter this confront of the conventional Software Engineering. Next we have the challenge: How could software engineering reveals that it would be able to track paramount practices in management science? Software Engineering is more than a project...
10 Pages(2500 words)Essay

Computer Science

... ≥ 0.5 then y = y + 1 error = error - 1.0 THE PIXEL DUPLICATION This is the simplest approach to solving the resolution problem. It is majorly used for drawing curves with slopes between −1 and 1. Each pixel both below and above are drawn thus resulting in a curve that has a thickness of 2n+1 pixel in the y axis (Drawing Lines and Curves (Introduction to Computer Graphics Using Java 2D and 3D). It works better for thinner lines. In this algorithm the pixels are duplicated in columns for the lines with – 1 < slope < 1 and in rows for all other lines . This results in lines that are vertical or horizontal towards the end thus displeasing for thicker lines as illustrated below... ...
4 Pages(1000 words)Lab Report

Computer Science

.... (1128 words) References Brown.edu, (2015). A Framework for Making Ethical Decisions | Science and Technology Studies. [online] Available at: http://www.brown.edu/academics/science-and-technology-studies/framework-making-ethical-decisions [Accessed 3 May 2015]. Velasquez, M., Andre, C., Shanks, T. and Meyer, M. (2015). Calculating Consequences: The Utilitarian Approach to Ethics. [online] Scu.edu. Available at: http://www.scu.edu/ethics/practicing/decision/calculating.html [Accessed 3 May 2015].... and Morality Introduction Morals and Ethics can have a philosophical impact on thechoices individuals make on ...
4 Pages(1000 words)Coursework

Computer Science

...COMPUTER SCIENCE Dos/DDos Dos attack ification is vital in understanding the attacked protocols so as to avoid the worms on suitable platforms. Over the last decades there has been no study on the DDos attacks and therefore there is not much understanding on the same. This is because there is insufficient data at the backscatter. According to Kumar, there are some articles that have scrutinized the hosts that have been contaminated with the worms. This has been done through examination of the structure and the properties of the worms. This has been instrumental in the classification.Mandia and Prosise categorized the DDos attack into three distinct groups. These groups include Destructive, Resource...
2 Pages(500 words)Essay

Computer Science and IT

...Computer Science and IT A computerised accounting system is an accounting information system that processes the financial transactions and events as per the accounting principles and standards to generate reports as per user requirements. The computerised accounting system has two main aspects that include accounting principles and a user defined structure for the upkeep of records and production of reports. (Kiely, 2015).There is a requirement to create innovative products and services to respond to the variable customer routines and their demographics. The intense competition among banks calls for a steady refurbishment of the banking activities to ensure customers enjoy quick and efficient services. An improved service through... ...
4 Pages(1000 words)Article
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Computer Science Questions for FREE!

Contact Us