NAME: NGUYEN QUANG TRUNGID: 201413693CLASS: IT SOFTWAREProviding Basic dịch - NAME: NGUYEN QUANG TRUNGID: 201413693CLASS: IT SOFTWAREProviding Basic Việt làm thế nào để nói

NAME: NGUYEN QUANG TRUNGID: 2014136

NAME: NGUYEN QUANG TRUNG
ID: 201413693
CLASS: IT SOFTWARE
Providing Basic System Administration
Section 1. Introduction to Basic System Administration
Question 3. Which of the following are good password patterns?
a. 4 digits
b. 8 alpha characters
c. Surname backwards
d. 4 mixed alphanumeric characters
e. None of the above
f. (b) and (d)
Website generate password: https://strongpasswordgenerator.com/
https://identitysafe.norton.com/password-generator
http://www.techzoom.net/tools/password-generator.en
Question 4. What access attribute does a printer have?
 A printer have write attribute
Question 5. Is a magnetic stripe entry access card an example of authentication or authorization?
 Yes
Section 2. Providing Basic System Administration
Question 2. ManageSoft is a supplier of license tracking software. Research the company and their solutions and report on their license tracking software and what report it produces, what types of licenses it monitors, and what type of alerts it produces. (Hint: watch the live demonstration).
If you cannot locate information on this company, choose another and answer the same questions about their offering. Provide evidence.
Place all your research and findings in a report form, and present to your teacher/trainer for review and comment.
 Company: ManageEngine
Website:http://www.manageengine.com/products/service-desk/software-license-tracking.html
Tracking software: MS Windows, MS Offices, …
What report it produces?
 List of installed software
 List of purchased license
 List of review license
 List of authorized software
Their license tracking:
What type of alerts it produces?
 Software violation alert
 Unauthorized software installation alert
Question 3. Research the SIIA’s website. List the three points of their mission statement.

Promote the Industry: SIIA promotes the common interests of the software and digital content industry as a whole, as well as its component parts.
Protect the Industry: SIIA protects the intellectual property of member companies, and advocates a legal and regulatory environment that benefits the entire industry.
Inform the Industry: SIIA informs the industry and the broader public by serving as a resource on trends, technologies, policies and related issues that affect member firms and demonstrate the contribution of the industry to the broader economy.
Question 4. Define the concept of concurrent users in respect to software licensing.
 Many software products are licensed based on how many users access the software simultaneously. For example Microsoft Office might be licensed for 500 concurrent users. Advantageous when even though there may be 2000 employees that might use MS Office it might be deemed unlikely that more than 500 will be active at any one point in time.
Question 5. What is a “dongle”?
 A mechanism for ensuring that only authorized users can copy or use specific software applications. Usually used for very expensive programs. Common mechanisms include a hardware key that plugs into a port or USB slot on a computer and that a software application accesses for verification before executing.
It is also a small piece of hardware that attaches to computer, TV, or other electronic device, and that, when attached, enables additional functions such as copy protection, audio, video, games, data, or other services
Question 6: Choose what license tracking is desirable for:
a. Keeping track of renewal dates
b. Detecting pirate software
c. Controlling costs
d. Authentication
e. All of the above
f. (a), (b), (c)
Section 3. System Back Up and Restore
Question 2. Interview two IT managers in two separate companies. Tell them you are doing a research project. Ask them to describe their system recovery plans with you, and ask them if there were any instances where this plan was implemented, and what the cause was.
Thank them for their time.
Put your findings in a report form and present to your teacher/trainer for review and comment.

Name: NGUYEN THE VINH
Organization: NAMDINH UNIVERSITY OF TECHNICAL EDUCATION
Recovery plan:
 Manual
 Terminal
 Backup: When there is a change in the operating system or application software and restore When an error
 Backup: Operating system, application software, Data,…
 Restore: Operating system, application software, Data,…
Question 3. What is the grandfather/father/son method?
 Grandfather-father-son backup refers to a common rotation scheme for backup media. In this scheme there are three or more backup cycles, such as daily, weekly and monthly. The daily backups are rotated on a daily basis using a FIFO system as above. The weekly backups are similarly rotated on a weekly basis, and the monthly backup on a monthly basis. In addition, quarterly, half-yearly, and/or annual backups could also be separately retained. Often some of these backups are removed from the site for safekeeping and disaster recovery purposes
Question 4. What is meant by the term data integrity?
 The term data integrity is broad in scope and may have widely different meanings depending on the specific context – even under the same general umbrela of computing. This article provides only a broad overview of some of the different types and concerns of data integrity.
- Data integrity is the opposite of data corruption, which is a form of data loss. The overall intent of any data integrity technique is the same: ensure data is recorded exactly as intended (such as a database correctly rejecting mutually exclusive possibilities,) and upon later retrieval, ensure the data is the same as it was when it was originally recorded. In short, data integrity aims to prevent unintentional changes to information. Data integrity is not to be confused with data security, the discipline of protecting data from unauthorized parties.
Question 5. Differential backup is a valid backup method. True or false?
 True
Question 6. Valid techniques in backup data manipulation include:
a. De-duplication (True)
b. Compression (True)
c. Encryption (True)

Section 4. Networks and Network Hardware
Question 1.
Name: NGUYEN THE VINH
Organization: NAMDINH UNIVERSITY OF TECHNICAL EDUCATION
Location: Phu Nghia Street, Ngoc Hai District, Nam Dinh city
How many computers/users are connected to their LAN?
 200 computers
Do they have an IT department that manages the LAN?
 Yes
If not, do they have an outside consultant/contractor manage their LAN?
Question 2: As a review in your own words what is the meaning of the following terms:
Node: a node (Latin nodus, ‘knot’) is either a connection point, a redistribution point or a communication endpoint (some terminal equipment). The definition of a node depends on the network and protocol layer referred to. A physical network node is an active electronic device that is attached to a network, and is capable of sending, receiving, or forwarding information over a communications channel. A passive distribution point such as a distribution frame or patch panel is consequently not a node.
Topology: The word topology in computer networking means the schematic layout of a network. In other words the way the computers are connected to each other when it is drawn out. When speaking about network topology, any computer or communication device connected to a network is called a ‘node’.
There are four standard types of network topologies:
 The Star Network
 The Ring Network
 The Bus Network
 The Tree Network
Schematic: A schematic, or schematic diagram, is a representation of the elements of a system using abstract, graphic symbols rather than realistic pictures. A schematic usually omits all details that are not relevant to the information the schematic is intended to convey, and may add unrealistic elements that aid comprehension
Backbone: A backbone network or network backbone is a part of computer network infrastructure that interconnects various pieces of network, providing a path for the exchange of information between different LANs or sub networks. A backbone can tie together diverse networks in the same building, in different buildings in a campus environment, or over wide areas. Normally, the backbone's capacity is greater than the networks connected to it
LAN: A local area network (LAN) is a computer network that interconnects computers within a limited area such as a home, school, computer laboratory, or office building, using network media.
WAN: A wide area network (WAN) is a network that covers a broad area (i.e., any telecommunications network that links across metropolitan, regional, national or international boundaries) using leased telecommunication lines.
Question 3: The protocol standard ‘Open Systems Interconnection’ (OSI) has a substantial influence on how networks are set up especially how network devices communication between themselves and other networks.
As we mentioned the model is based on seven layers, each layer specifying a specific network function. This activity requires you to research and draw out in a graphical form those layers.
Show your activity to your teacher/trainer for review and comment.

Question 4: There are many examples of businesses using an extranet. Research and find three extranets.

- Manufacturing. From airlines to automobiles, the manufacturing industry uses extranets to provide access to product manuals and technical specifications. Extranets make it easy to share and transfer this type of information, which can run to thousands of pages in print format. Also, those with access can update information, flag problems and issue warnings all instantly, in a self-serve format.
- Financial services. Banks, brokerages and other institutions use extranets to perform a variety of transactions, covering everything from consumer banking to check-clearing services. Even the Internal Revenue Service has developed an extranet that allows tax-processing companies to submit forms over the Internet.
- On
0/5000
Từ: -
Sang: -
Kết quả (Việt) 1: [Sao chép]
Sao chép!
NAME: NGUYEN QUANG TRUNGID: 201413693CLASS: IT SOFTWAREProviding Basic System AdministrationSection 1. Introduction to Basic System AdministrationQuestion 3. Which of the following are good password patterns?a. 4 digits b. 8 alpha characters c. Surname backwards d. 4 mixed alphanumeric characters e. None of the above f. (b) and (d)Website generate password: https://strongpasswordgenerator.com/https://identitysafe.norton.com/password-generatorhttp://www.techzoom.net/tools/password-generator.enQuestion 4. What access attribute does a printer have? A printer have write attributeQuestion 5. Is a magnetic stripe entry access card an example of authentication or authorization? YesSection 2. Providing Basic System AdministrationQuestion 2. ManageSoft is a supplier of license tracking software. Research the company and their solutions and report on their license tracking software and what report it produces, what types of licenses it monitors, and what type of alerts it produces. (Hint: watch the live demonstration). If you cannot locate information on this company, choose another and answer the same questions about their offering. Provide evidence. Place all your research and findings in a report form, and present to your teacher/trainer for review and comment. Company: ManageEngineWebsite:http://www.manageengine.com/products/service-desk/software-license-tracking.htmlTracking software: MS Windows, MS Offices, …Những gì báo cáo nó tạo ra? Danh sách đã cài đặt phần mềm Các danh sách mua giấy phép Danh sách giấy phép đánh giá Danh sách thẩm quyền phần mềmGiấy phép của họ theo dõi: Loại cảnh báo nó tạo ra? phần mềm vi phạm cảnh báo trái phép phần mềm cài đặt cảnh báoCâu hỏi 3. Nghiên cứu của SIIA trang web. Danh sách ba điểm của tuyên bố nhiệm vụ của họ. Thúc đẩy công nghệ: SIIA thúc đẩy lợi ích chung của các phần mềm và công nghiệp nội dung kỹ thuật số như một toàn thể, cũng như phần thành phần của nó. Bảo vệ các ngành công nghiệp: SIIA bảo vệ tài sản trí tuệ của công ty thành viên, và ủng hộ một môi trường Pháp lý và pháp lý lợi ích ngành công nghiệp toàn bộ. Thông báo cho ngành công nghiệp: SIIA thông báo cho ngành công nghiệp và công chúng rộng lớn hơn bằng cách phục vụ như một nguồn tài nguyên trên xu hướng, công nghệ, chính sách và các vấn đề liên quan mà ảnh hưởng đến công ty thành viên và chứng minh sự đóng góp của ngành công nghiệp sang nền kinh tế rộng lớn hơn.Câu hỏi 4. Xác định khái niệm của người sử dụng đồng thời trong quan đến cấp giấy phép phần mềm.  Nhiều sản phẩm phần mềm được cấp phép dựa trên số lượng người dùng truy cập vào các phần mềm cùng một lúc. Ví dụ: Microsoft Office có thể được cấp phép cho người sử dụng đồng thời 500. Thuận lợi khi mặc dù có thể có nhân viên năm 2000 có thể sử dụng MS Office nó có thể được coi là không nhiều hơn 500 sẽ được hoạt động tại bất kỳ một thời điểm trong thời gian. Câu hỏi 5. Một "dongle" là gì? A cơ chế đảm bảo chỉ được cho phép người dùng có thể sao chép hoặc sử dụng ứng dụng phần mềm cụ thể. Thường được sử dụng cho chương trình rất tốn kém. Cơ chế phổ biến bao gồm một phím phần cứng mà cắm vào một cổng hoặc khe cắm USB vào máy tính và yếu truy cấp các ứng dụng phần mềm để xác minh trước khi thực hiện.Nó cũng là một mảnh nhỏ của phần cứng gắn vào máy tính, TV, hoặc thiết bị điện tử khác, và rằng, khi gắn liền, cho phép các chức năng bổ sung chẳng hạn như bản sao bảo vệ, âm thanh, video, trò chơi, dữ liệu, hoặc các dịch vụ khácCâu hỏi 6: Chọn những gì giấy phép theo dõi là mong muốn cho: a. theo dõi của đổi mới ngày sinh phát hiện phần mềm pirate c. kiểm soát chi phí mất xác thực e. tất cả các bên trên f. (a), (b), (c).Phần 3. Hệ thống sao lưu và khôi phụcCâu hỏi 2. Phỏng vấn hai nhà quản lý CNTT trong hai công ty riêng biệt. Nói cho họ biết bạn đang làm một dự án nghiên cứu. Yêu cầu họ để mô tả kế hoạch phục hồi hệ thống của họ với bạn, và yêu cầu họ nếu có bất kỳ trường hợp nơi mà kế hoạch này đã được thực hiện, và những gì là nguyên nhân. Cảm ơn họ cho thời gian của họ. Đặt những phát hiện của bạn trong một hình thức báo cáo và trình bày cho giáo viên/huấn luyện của bạn để xem xét và bình luận. Tên: Nguyễn vĩnh Tổ chức: NAMDINH giáo dục đại học kỹ thuật Kế hoạch phục hồi:  hướng dẫn sử dụng  Terminal  sao lưu: khi có một sự thay đổi trong hệ điều hành hoặc phần mềm ứng dụng và khôi phục lại khi một lỗi  sao lưu: hệ điều hành, phần mềm ứng dụng, dữ liệu,... Restore: Operating system, application software, Data,…Question 3. What is the grandfather/father/son method? Grandfather-father-son backup refers to a common rotation scheme for backup media. In this scheme there are three or more backup cycles, such as daily, weekly and monthly. The daily backups are rotated on a daily basis using a FIFO system as above. The weekly backups are similarly rotated on a weekly basis, and the monthly backup on a monthly basis. In addition, quarterly, half-yearly, and/or annual backups could also be separately retained. Often some of these backups are removed from the site for safekeeping and disaster recovery purposesQuestion 4. What is meant by the term data integrity? The term data integrity is broad in scope and may have widely different meanings depending on the specific context – even under the same general umbrela of computing. This article provides only a broad overview of some of the different types and concerns of data integrity. - Data integrity is the opposite of data corruption, which is a form of data loss. The overall intent of any data integrity technique is the same: ensure data is recorded exactly as intended (such as a database correctly rejecting mutually exclusive possibilities,) and upon later retrieval, ensure the data is the same as it was when it was originally recorded. In short, data integrity aims to prevent unintentional changes to information. Data integrity is not to be confused with data security, the discipline of protecting data from unauthorized parties.Question 5. Differential backup is a valid backup method. True or false? TrueQuestion 6. Valid techniques in backup data manipulation include:a. De-duplication (True)b. Compression (True)c. Encryption (True)Section 4. Networks and Network HardwareQuestion 1. Name: NGUYEN THE VINH Organization: NAMDINH UNIVERSITY OF TECHNICAL EDUCATIONLocation: Phu Nghia Street, Ngoc Hai District, Nam Dinh cityHow many computers/users are connected to their LAN? 200 computersDo they have an IT department that manages the LAN? YesIf not, do they have an outside consultant/contractor manage their LAN?Question 2: As a review in your own words what is the meaning of the following terms:Node: a node (Latin nodus, ‘knot’) is either a connection point, a redistribution point or a communication endpoint (some terminal equipment). The definition of a node depends on the network and protocol layer referred to. A physical network node is an active electronic device that is attached to a network, and is capable of sending, receiving, or forwarding information over a communications channel. A passive distribution point such as a distribution frame or patch panel is consequently not a node.Topology: The word topology in computer networking means the schematic layout of a network. In other words the way the computers are connected to each other when it is drawn out. When speaking about network topology, any computer or communication device connected to a network is called a ‘node’. There are four standard types of network topologies:  The Star Network  The Ring Network  The Bus Network  The Tree NetworkSchematic: A schematic, or schematic diagram, is a representation of the elements of a system using abstract, graphic symbols rather than realistic pictures. A schematic usually omits all details that are not relevant to the information the schematic is intended to convey, and may add unrealistic elements that aid comprehensionBackbone: A backbone network or network backbone is a part of computer network infrastructure that interconnects various pieces of network, providing a path for the exchange of information between different LANs or sub networks. A backbone can tie together diverse networks in the same building, in different buildings in a campus environment, or over wide areas. Normally, the backbone's capacity is greater than the networks connected to itLAN: A local area network (LAN) is a computer network that interconnects computers within a limited area such as a home, school, computer laboratory, or office building, using network media.WAN: A wide area network (WAN) is a network that covers a broad area (i.e., any telecommunications network that links across metropolitan, regional, national or international boundaries) using leased telecommunication lines.Question 3: The protocol standard ‘Open Systems Interconnection’ (OSI) has a substantial influence on how networks are set up especially how network devices communication between themselves and other networks. As we mentioned the model is based on seven layers, each layer specifying a specific network function. This activity requires you to research and draw out in a graphical form those layers.
Show your activity to your teacher/trainer for review and comment.

Question 4: There are many examples of businesses using an extranet. Research and find three extranets.

- Manufacturing. From airlines to automobiles, the manufacturing industry uses extranets to provide access to product manuals and technical specifications. Extranets make it easy to share and transfer this type of information, which can run to thousands of pages in print format. Also, those with access can update information, flag problems and issue warnings all instantly, in a self-serve format.
- Financial services. Banks, brokerages and other institutions use extranets to perform a variety of transactions, covering everything from consumer banking to check-clearing services. Even the Internal Revenue Service has developed an extranet that allows tax-processing companies to submit forms over the Internet.
- On
đang được dịch, vui lòng đợi..
 
Các ngôn ngữ khác
Hỗ trợ công cụ dịch thuật: Albania, Amharic, Anh, Armenia, Azerbaijan, Ba Lan, Ba Tư, Bantu, Basque, Belarus, Bengal, Bosnia, Bulgaria, Bồ Đào Nha, Catalan, Cebuano, Chichewa, Corsi, Creole (Haiti), Croatia, Do Thái, Estonia, Filipino, Frisia, Gael Scotland, Galicia, George, Gujarat, Hausa, Hawaii, Hindi, Hmong, Hungary, Hy Lạp, Hà Lan, Hà Lan (Nam Phi), Hàn, Iceland, Igbo, Ireland, Java, Kannada, Kazakh, Khmer, Kinyarwanda, Klingon, Kurd, Kyrgyz, Latinh, Latvia, Litva, Luxembourg, Lào, Macedonia, Malagasy, Malayalam, Malta, Maori, Marathi, Myanmar, Mã Lai, Mông Cổ, Na Uy, Nepal, Nga, Nhật, Odia (Oriya), Pashto, Pháp, Phát hiện ngôn ngữ, Phần Lan, Punjab, Quốc tế ngữ, Rumani, Samoa, Serbia, Sesotho, Shona, Sindhi, Sinhala, Slovak, Slovenia, Somali, Sunda, Swahili, Séc, Tajik, Tamil, Tatar, Telugu, Thái, Thổ Nhĩ Kỳ, Thụy Điển, Tiếng Indonesia, Tiếng Ý, Trung, Trung (Phồn thể), Turkmen, Tây Ban Nha, Ukraina, Urdu, Uyghur, Uzbek, Việt, Xứ Wales, Yiddish, Yoruba, Zulu, Đan Mạch, Đức, Ả Rập, dịch ngôn ngữ.

Copyright ©2025 I Love Translation. All reserved.

E-mail: