NAME: NGUYEN QUANG TRUNGID: 201413693CLASS: IT SOFTWAREProviding Basic dịch - NAME: NGUYEN QUANG TRUNGID: 201413693CLASS: IT SOFTWAREProviding Basic Việt làm thế nào để nói

NAME: NGUYEN QUANG TRUNGID: 2014136

NAME: NGUYEN QUANG TRUNG
ID: 201413693
CLASS: IT SOFTWARE
Providing Basic System Administration
Section 1. Introduction to Basic System Administration
Question 3. Which of the following are good password patterns?
a. 4 digits
b. 8 alpha characters
c. Surname backwards
d. 4 mixed alphanumeric characters
e. None of the above
f. (b) and (d)
Website generate password: https://strongpasswordgenerator.com/
https://identitysafe.norton.com/password-generator
http://www.techzoom.net/tools/password-generator.en
Question 4. What access attribute does a printer have?
 A printer have write attribute
Question 5. Is a magnetic stripe entry access card an example of authentication or authorization?
 Yes
Section 2. Providing Basic System Administration
Question 2. ManageSoft is a supplier of license tracking software. Research the company and their solutions and report on their license tracking software and what report it produces, what types of licenses it monitors, and what type of alerts it produces. (Hint: watch the live demonstration).
If you cannot locate information on this company, choose another and answer the same questions about their offering. Provide evidence.
Place all your research and findings in a report form, and present to your teacher/trainer for review and comment.
 Company: ManageEngine
Website:http://www.manageengine.com/products/service-desk/software-license-tracking.html
Tracking software: MS Windows, MS Offices, …
What report it produces?
 List of installed software
 List of purchased license
 List of review license
 List of authorized software
Their license tracking:
What type of alerts it produces?
 Software violation alert
 Unauthorized software installation alert
Question 3. Research the SIIA’s website. List the three points of their mission statement.

Promote the Industry: SIIA promotes the common interests of the software and digital content industry as a whole, as well as its component parts.
Protect the Industry: SIIA protects the intellectual property of member companies, and advocates a legal and regulatory environment that benefits the entire industry.
Inform the Industry: SIIA informs the industry and the broader public by serving as a resource on trends, technologies, policies and related issues that affect member firms and demonstrate the contribution of the industry to the broader economy.
Question 4. Define the concept of concurrent users in respect to software licensing.
 Many software products are licensed based on how many users access the software simultaneously. For example Microsoft Office might be licensed for 500 concurrent users. Advantageous when even though there may be 2000 employees that might use MS Office it might be deemed unlikely that more than 500 will be active at any one point in time.
Question 5. What is a “dongle”?
 A mechanism for ensuring that only authorized users can copy or use specific software applications. Usually used for very expensive programs. Common mechanisms include a hardware key that plugs into a port or USB slot on a computer and that a software application accesses for verification before executing.
It is also a small piece of hardware that attaches to computer, TV, or other electronic device, and that, when attached, enables additional functions such as copy protection, audio, video, games, data, or other services
Question 6: Choose what license tracking is desirable for:
a. Keeping track of renewal dates
b. Detecting pirate software
c. Controlling costs
d. Authentication
e. All of the above
f. (a), (b), (c)
Section 3. System Back Up and Restore
Question 2. Interview two IT managers in two separate companies. Tell them you are doing a research project. Ask them to describe their system recovery plans with you, and ask them if there were any instances where this plan was implemented, and what the cause was.
Thank them for their time.
Put your findings in a report form and present to your teacher/trainer for review and comment.

Name: NGUYEN THE VINH
Organization: NAMDINH UNIVERSITY OF TECHNICAL EDUCATION
Recovery plan:
 Manual
 Terminal
 Backup: When there is a change in the operating system or application software and restore When an error
 Backup: Operating system, application software, Data,…
 Restore: Operating system, application software, Data,…
Question 3. What is the grandfather/father/son method?
 Grandfather-father-son backup refers to a common rotation scheme for backup media. In this scheme there are three or more backup cycles, such as daily, weekly and monthly. The daily backups are rotated on a daily basis using a FIFO system as above. The weekly backups are similarly rotated on a weekly basis, and the monthly backup on a monthly basis. In addition, quarterly, half-yearly, and/or annual backups could also be separately retained. Often some of these backups are removed from the site for safekeeping and disaster recovery purposes
Question 4. What is meant by the term data integrity?
 The term data integrity is broad in scope and may have widely different meanings depending on the specific context – even under the same general umbrela of computing. This article provides only a broad overview of some of the different types and concerns of data integrity.
- Data integrity is the opposite of data corruption, which is a form of data loss. The overall intent of any data integrity technique is the same: ensure data is recorded exactly as intended (such as a database correctly rejecting mutually exclusive possibilities,) and upon later retrieval, ensure the data is the same as it was when it was originally recorded. In short, data integrity aims to prevent unintentional changes to information. Data integrity is not to be confused with data security, the discipline of protecting data from unauthorized parties.
Question 5. Differential backup is a valid backup method. True or false?
 True
Question 6. Valid techniques in backup data manipulation include:
a. De-duplication (True)
b. Compression (True)
c. Encryption (True)

Section 4. Networks and Network Hardware
Question 1.
Name: NGUYEN THE VINH
Organization: NAMDINH UNIVERSITY OF TECHNICAL EDUCATION
Location: Phu Nghia Street, Ngoc Hai District, Nam Dinh city
How many computers/users are connected to their LAN?
 200 computers
Do they have an IT department that manages the LAN?
 Yes
If not, do they have an outside consultant/contractor manage their LAN?
Question 2: As a review in your own words what is the meaning of the following terms:
Node: a node (Latin nodus, ‘knot’) is either a connection point, a redistribution point or a communication endpoint (some terminal equipment). The definition of a node depends on the network and protocol layer referred to. A physical network node is an active electronic device that is attached to a network, and is capable of sending, receiving, or forwarding information over a communications channel. A passive distribution point such as a distribution frame or patch panel is consequently not a node.
Topology: The word topology in computer networking means the schematic layout of a network. In other words the way the computers are connected to each other when it is drawn out. When speaking about network topology, any computer or communication device connected to a network is called a ‘node’.
There are four standard types of network topologies:
 The Star Network
 The Ring Network
 The Bus Network
 The Tree Network
Schematic: A schematic, or schematic diagram, is a representation of the elements of a system using abstract, graphic symbols rather than realistic pictures. A schematic usually omits all details that are not relevant to the information the schematic is intended to convey, and may add unrealistic elements that aid comprehension
Backbone: A backbone network or network backbone is a part of computer network infrastructure that interconnects various pieces of network, providing a path for the exchange of information between different LANs or sub networks. A backbone can tie together diverse networks in the same building, in different buildings in a campus environment, or over wide areas. Normally, the backbone's capacity is greater than the networks connected to it
LAN: A local area network (LAN) is a computer network that interconnects computers within a limited area such as a home, school, computer laboratory, or office building, using network media.
WAN: A wide area network (WAN) is a network that covers a broad area (i.e., any telecommunications network that links across metropolitan, regional, national or international boundaries) using leased telecommunication lines.
Question 3: The protocol standard ‘Open Systems Interconnection’ (OSI) has a substantial influence on how networks are set up especially how network devices communication between themselves and other networks.
As we mentioned the model is based on seven layers, each layer specifying a specific network function. This activity requires you to research and draw out in a graphical form those layers.
Show your activity to your teacher/trainer for review and comment.

Question 4: There are many examples of businesses using an extranet. Research and find three extranets.

- Manufacturing. From airlines to automobiles, the manufacturing industry uses extranets to provide access to product manuals and technical specifications. Extranets make it easy to share and transfer this type of information, which can run to thousands of pages in print format. Also, those with access can update information, flag problems and issue warnings all instantly, in a self-serve format.
- Financial services. Banks, brokerages and other institutions use extranets to perform a variety of transactions, covering everything from consumer banking to check-clearing services. Even the Internal Revenue Service has developed an extranet that allows tax-processing companies to submit forms over the Internet.
- On
0/5000
Từ: -
Sang: -
Kết quả (Việt) 1: [Sao chép]
Sao chép!
GIẤY PHÉP THỰC THI PHÁP LUẬTThời gian thực theo dõi của tất đoàn (hoặc đã chọn) các ứng Scholars chạy trên các máy tính trong tổ chức được sử scholars tiếng phát hiệnphần mềm chưa, không có tập phép phần mềm, phần mềm bất hợp pháp và vi phạm tập phép (ví dụ như vượt quá lồng đa người dùng đồng thời). Như vậyTáng sát cũng có Bulgaria ngăn chặn phần mềm thực hiện hoặc hạn chế thực hiện tiếng thời gian thời gian nhất định. Người quản trị hay thống có Bulgaria thực hiện như vậyquy tắc như, ví dụ, tiếng không cho phép thực hiện trò chơi hoặc truy cập vào Internet trong giờ làm việc.Nó là phổ biến cho quản trị hay thống tiếng phát hành các cảnh báo về đạt tập phép sử scholars giới hạn và thậm chí yêu cầu người sử scholars tiếng thoát khỏi phần mềmĐó không phải là được sử scholars tiếng giải phóng một tập phép cho một ai đó chờ đợi tiếng sử scholars nó.Cướp dưới phần mềm cũng là một vấn đề lớn. 'Quản trị doanh nghiệp' behooves một tổ chức tiếng phẫn sát việc sử scholars bất hợp pháp của phần mềm và phát hiệnvà trừng phạt người phạm tội. Đây cũng là một phần của quản lý rủi ro tổ chức. Tiền phạt có Bulgaria được áp Scholars đối với người phạm tội cá nhân và cáctổ chức anh/cô ấy làm việc cho. Nhiều tổ chức ngăn chặn ban này xảy ra bởi người dùng cá nhân từ chối quyền Thái đặt phần mềm.Hai tổ chức, BSA và SPA có tổ chức chính tập phép thực thi pháp luật. Một số công ty phần mềm cũng hoạt động trên của họsở hữu. SPA (Hiệp hội các nhà cạnh bản phần mềm) là tổ chức chống vi phạm bản quyền ban đầu, chuyển thành bởi nhiều người trong số các phần mềm lớn hơnnhà cạnh bản. SPA vẫn là khá tích cực như cánh tay chống vi phạm bản quyền của SIIA (thông tin ngành công nghiệp Hiệp hội phần mềm).Microsoft, đang là các nhà cung cấp của một số lượng lớn các tập phép, tài trợ sự chuyển thành của một tổ chức chống vi phạm bản quyền thứ hai, BSA(Liên minh phần mềm doanh nghiệp). BSA, thông qua công khai dữ dội, đã trở thành tổ chức nổi bật hơn.Cuối cùng một từ về mã nguồn mở phần mềm. Phần mềm nguồn mở đề cập đến chương trình trong đó mã nguồn có sẵn cho cáccông chúng đảm chung cho sử scholars và/hoặc sửa đổi miễn phí, tức là, mở. Nhiều tổ chức sử scholars phần mềm mã nguồn mở quan trọngỨng Scholars. Mã nguồn mở phần mềm nào đó nên được theo dõi và bất kỳ ban kiện áp Scholars, đối với bất kỳ phần mềm nào ông.
đang được dịch, vui lòng đợi..
 
Các ngôn ngữ khác
Hỗ trợ công cụ dịch thuật: Albania, Amharic, Anh, Armenia, Azerbaijan, Ba Lan, Ba Tư, Bantu, Basque, Belarus, Bengal, Bosnia, Bulgaria, Bồ Đào Nha, Catalan, Cebuano, Chichewa, Corsi, Creole (Haiti), Croatia, Do Thái, Estonia, Filipino, Frisia, Gael Scotland, Galicia, George, Gujarat, Hausa, Hawaii, Hindi, Hmong, Hungary, Hy Lạp, Hà Lan, Hà Lan (Nam Phi), Hàn, Iceland, Igbo, Ireland, Java, Kannada, Kazakh, Khmer, Kinyarwanda, Klingon, Kurd, Kyrgyz, Latinh, Latvia, Litva, Luxembourg, Lào, Macedonia, Malagasy, Malayalam, Malta, Maori, Marathi, Myanmar, Mã Lai, Mông Cổ, Na Uy, Nepal, Nga, Nhật, Odia (Oriya), Pashto, Pháp, Phát hiện ngôn ngữ, Phần Lan, Punjab, Quốc tế ngữ, Rumani, Samoa, Serbia, Sesotho, Shona, Sindhi, Sinhala, Slovak, Slovenia, Somali, Sunda, Swahili, Séc, Tajik, Tamil, Tatar, Telugu, Thái, Thổ Nhĩ Kỳ, Thụy Điển, Tiếng Indonesia, Tiếng Ý, Trung, Trung (Phồn thể), Turkmen, Tây Ban Nha, Ukraina, Urdu, Uyghur, Uzbek, Việt, Xứ Wales, Yiddish, Yoruba, Zulu, Đan Mạch, Đức, Ả Rập, dịch ngôn ngữ.

Copyright ©2025 I Love Translation. All reserved.

E-mail: