IT 505 Final Milestone
.docx
keyboard_arrow_up
School
Southern New Hampshire University *
*We aren’t endorsed by this school
Course
505
Subject
Computer Science
Date
Jan 9, 2024
Type
docx
Pages
12
Uploaded by emmemaria28
Final Milestone
Emme Chadwick
Southern New Hampshire University
IT 505: Introduction to Core Technologies
Dr. Robert Pratt 14 November 2023
1
Abstract
This report contains information about the proper network configuration and javascript needed in order to properly display system updates. Users within the company need to have multiple people access the internet at one time, meaning, an Ethernet cable that is currently being
used is not needed. Further, javascript holds the code to alert employees which needs proper syntax and other components in order to work properly. Additionally, an explanation of the database that holds employee information and their update day is included and thoroughly discussed. Specific queries that need to be run have to include the right links to the right tables. If
a piece of information is missing then the query will not run correctly. All of the information provided in the enclosed report is to inform current and future employees of the Help Desk in order to have successful system updates.
2
Final Milestone
It is well known that as a company begins to expand, so do the needs of the databases and
systems used on a daily basis. Without consistent upgrades to the network and systems it could result in technological chaos. For example, a business that has two users and one printer may be able to use an Ethernet cable for their connection. However, in a large scale company such as this, many users with different servers need access to the internet. Due to this, the system’s network needs to be updated in order to fit the needs of the company. By further explaining the code behind employee notifications, the databases used for queries, and the overall modifications
that are needed the Help Desk team is able to quickly resolve any issues that may arise.
Modifications of Base Code Generally, in programming languages, code is composed of five different types of components that determine how the code runs and what it is intended for. In spite of the fact that code may appear overly complicated and impossible to learn, there are a few foundational terms that make navigating the programming world slightly easier. The five components of the code seen in the system upgrade are the following: Values, operators, variables, tools, and syntax. Furthermore, the programming language used throughout the upgrade is Javascript. Javascript is a highly popular form of code used to produce websites, animations, pop-ups, and more. Due to the nature of Javascript and its use in the system upgrade, it’s relative to understanding the basic concepts housed within this programming language.
First and foremost, values
can essentially be defined as the skeleton of code. Values
are the different components of Javascript such as strings, numbers, functions, etc. Within figure 1.1,
the use of values
is seen throughout the document. For example, the line: “var msPerDay = 24 *
Figure 1.1
3
60 * 60 * 1000;” contains numbers and arithmetic operators that are later used to compute the final results of when the company upgrade will occur, these are the values
. Additionally, variables
can also be seen in figure 1.1. Each line that begins with var
is defined as a variable
. Variables
in Javascript organize data by controlling different parts of the code; simply speaking, each variable
is responsible for storing specific components of data that
can later be called on. Secondly, operators
in
Javascript assign values
to a
purpose and allow the code to
perform specific actions. In figure
1.1 this can be see in “=”, “*”, and
“/”. Which subsequently means,
this variable is assigned to this
name, multiple these two numbers, and divide the two variables
listed. Operators
are an essential part of Javascript and inside the company code it allows the calculation of when the upgrade will be completed. Additionally, tools
are used by every programming language. It’s what allows the code to be typed into a computer. The tools
used in the figures provided were established with W3Schools.
Finally, syntax
means that each part of the code has a time and place to be used and if that
order is mixed up, the code most likely will not run. There are several key components that are needed to make a code run, such as the aforementioned variables, tools, and so forth. In figure 1.2, the space between the variable
“new Date” is taken away to become “newDate”. Due to this
4
disruption of the code, it is now unable to run correctly. This is largely due to “new Date” being used in the line below it, but “new Date” and “newDate” are two entirely different variables
according to the system. Therefore, when it calls on “new Date” it can’t find it since it was altered to have the space removed. This is a prime example of the importance of syntax as well as the other five components of the code covered in this section.
Network Configuration Evaluation
and Examination
The network configuration
within the company is based on the use
of a LAN (Local Area Network) and is
in a bus network format. The LAN
provides connection to users within a
small geographical area, making it easy
to control and host the services needed. Additionally, the following are also utilized in the company such as Ethernet, printers, routers, firewalls, department servers, and generalized cloud internet connection. These different factors operate simultaneously to give users the connection they need without the service slowing down. As seen in the diagram, Ethernet is the main connecting source for department computers as well as servers and other similar devices. Ethernets are particularly useful because they are able to have decent connectivity speeds, are reliable at transferring information between users, and operate at a relatively low cost. Further, the network has implemented a router with a firewall. A router is able to connect several networks to one another and helps improve network speeds by choosing the fastest route to connect to. Additionally, if one route fails to connect, the router is able to search for another
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
Network Analysis Exercise
Please work with a few other people to answer the following question as best you can. After about 5 minutes, the class as a whole will discuss the answers.
Types of network analysis:
Routing (shortest route)
Closest Facilities
Vehicle Routing
Service Areas
Location-Allocation
Potential Input Data:
Street network / Facilities / Start Locations / End Locations / Demand Locations
See Types of network analysis layers—ArcMap | DocumentationLinks to an external site. for more information about these choices
Each of the following problems could be addressed using a type of network analysis.
For each of them:
describe what general type of network analysis it is,
what input data would be necessary to run the analysis,
what information about the street network would be useful to refine the analysis, and
any other information/analysis that would help solve this task?
Planning evacuation routes during a fire which has closed several roads for a neighborhood in…
arrow_forward
What are some prominent examples of legitimate and appropriate use of P2P?
Whenever we discuss P2P, students will inevitably bring up torrent-based P2P file sharing. From a web technology perspective, what are some of the programs that have been developed, and what kinds of interfaces do they offer? What are the risks of using them?
arrow_forward
What are some well-known instances of P2P being used properly and appropriately?
Students often bring up torrent-based P2P file sharing when we talk about P2P. What are some of the programs that have been created and what types of interfaces do they provide from the viewpoint of web technology? Use of these products has potential hazards, what are they?
arrow_forward
You will complete this phase using Microsoft Visio and a web development Integrated Development Environment (IDE). Reference the Learn material in Module 8: Week 8 to complete the following steps:
Instructions
Design a Detailed Network Diagram for a Distributed System
List the global locations where the systems will be housed.
Develop a minimum of 10 network node design, including:
ISP/bandwidth/caching devices,
Load balancers,
Firewalls,
Routers, and
Switches.
Design a Detailed Cloud/Distributed Computing Diagram
Identify a client-server architecture such as:
Three-layer client-server architecture, and
N-Tier Architecture.
Develop a minimum of 10 server node design, which could include:
Storage Area Network (SAN),
Database servers,
Application servers, and
Web servers.
Integration services
API services
Design a Graphical User-interface (GUI)
Choose 1 of the following transition procedures from the use cases to your menu hierarchy:
Use case groupings…
arrow_forward
Class Activity - Draw Your Concept of the Internet
Objectives
Demonstrate that networks are made of many different components.
Background / Scenario
Draw and label a map of the Internet as you interpret it now. Include your home or school/university location
and its respective cabling, equipment, devices, etc. Some items you may want to include:
• Devices or equipment
• Media (cabling)
Link addresses or names
Sources and destinations
• Internet service providers
Upon completion, save your work and upload it in canvas. explain your work.
Required Resources
Internet access
Paper and pencils or pens (if students are creating a hard copy)
Illustration & Explanation
Paste your work here and below is your brief explanation about your concept of the internet.
arrow_forward
There is usually more room for richer game play design if a mobile game
application can be hooked up to the Internet. Please list THREE (3) gaming
features which you can think of that require a network connection to the Internet
and suggest how they are accomplished.
Security challenges are presented to mobile application developers when the
original offline game app is adapted to include gaming features you listed.
Please briefly describe potential challenges associated to each of the features
and label the level of security attention each feature requires (e.g., not critical,
critical).
arrow_forward
Software Engineering
PLS HELP WITHIN 60 MINUTES!!
MUST BE UPVOTE IF THE ANSWER IS USEFUL!!!!!
A local bus company is planning to develop a web application which can provide users with the estimated bus arrival time, updates on bus services, and the latest bus route information.(a)Suggest an architecture pattern that is suitable for designing the above web application. Justify your answer.(b)Draw a block diagram to depict the software architecture of the above web application with reference to your choice in part (a).
arrow_forward
Basic concepts and benefits behind computer networks
(Discuss the basic concepts behind computer networks and the benefits of computer networking). Think of this as an introductory section. Follow slide 1.1 Concepts & Benefits of Networks, Network Scopes (Network types), Network Architecture (P2P and Client Server), so that you know what to cover. We don’t need lots of detail for this task – just cover the key points. We have later tasks for going into detail.
arrow_forward
QI
Using email to communicate with an audience is critical, thus
it is necessary to get the design right. Nearly 40% of emails
are only read for eight seconds or less.
(a)
b)
Give THREE (3) opinions on the usability aspects that should be
considered in designing email applications.
Discuss TWO (2) techniques/approaches for creating a user-friendly
email application interface.
(c) Create ONE (1) user interface design for the login page in the email
application by considering functionality criteria. Explain your design.
arrow_forward
Assignment 1b
The following is the scope for Assignment 1b.
Response to assignment 1a
It is mandatory that students should demonstrate how they have incorporated the feedback given in assignment 1a. You may use a tabular form whenever necessary.
Network design and justification
Draw a network design that you think will be useful in the future for the industry that you have visited. Network should include the following requirements:
3 routers
4 switches
10 PCs
4 VLANs.
Suitable IP addressing scheme in tabular form (assume as many hosts as necessary for each department). Use 1906702 to come up with your own IP addressing scheme (to avoid Academic Misconduct). Justify the choice of IP address.
Indicate where do you use static routing, dynamic routing protocols (name the protocols, RIP, EIGRP, OSPF, etc.), Access Control List (ACL) as per the network preferences. Justify your choices.
Network configuration
Configure your network using Packet Tracer. Write a report on…
arrow_forward
Company A's IT department has a hosting platform specifically for systems used by the company's large
marketing department. This platform provides critical, high-availability hosted IT resources and services. However,
the IT department has started to receive complaints about the time it takes to start new marketing campaigns,
primarily due to how long it takes to provision new servers within this platform. Also, as a result of a recent set of
mergers
and acquisitions, the consumers of the services hosted by this platform have become more distributed, with
service consumers accessing services from a large variety of locations, and with increasingly different types of
devices.
On the other hand Company B is an IT hosting company that provides a range of shared services used by a wide
variety of customers. One of Company B's customers is Company A. Specifically, Company A's marketing
department has been using a service hosted by Company B's on-premise environment. The service provides…
arrow_forward
Please provide a reaction to below discussions.
Discussion:
The most important part of an information system within a company or business is the reliability of the network and information system - a streamlined network connectivity that is reliable between the point of the input from the employees to the servers that relay and transfer data to the necessary storage locations.
The two types of input devices are manual input and direct input. A keyboard is an example of a device where data is input manually. The user uses the keyboard to input data on to the PC itself. This transfers thought or product into data to be stored or shared from the PC. A direct input device. A manual input device is basically a device that requires a person to do most of the work for data input. A direct input device would be something like a sensor or a barcode scanner. A sensor could even be something like a thermometer on your vehicle. When the vehicle is on, the sensor is always on a monitoring.
The…
arrow_forward
You are assigned to create a network infrastructure for a medium size business making physical widgets (term in the business world for manufacturing something unknown). There is a central office that has 25 workers for centralized billing and all office computers have common office applications. The widgets are built in a home based system where parts are shipped directly to each individual home to be built. Each completed widget must be checked in on a company owned computer at each home location. There are 30 home assembly employees that have a company issued computer to use in building widgets. Your task is to design a network infrastructure to accommodate the needs. You will need to research your solution and justify the design with your research.
arrow_forward
Detail the features and potential applications of the network monitor 3.1
program. What additional software programs are available that are
comparable to network monitor 3.1 in terms of functionality and concept?
arrow_forward
If something is not clear in the description and you need to make assumptions to make a decision, document the assumptions you make. Please read it carefully
The department of public works for a large city has decided to develop a Web-based pothole tracking and repair system (PHTRS). The department hired a new system analyst to analyse and design the web-based PHTRS. The analyst came up with the following description of their requirement:
Citizens can log onto a website to view and make potholes report. The report contains the location and severity of potholes. As potholes are reported they are logged with a "public works department repair system" and are assigned with the given data. The recorded potholes consist of information as follows:
an identifying number,
stored with street address,
size (on a scale of 1 to 10),
location (middle, curb, etc.),
district,
and repair priority (determined from the size of the pothole).
Further, a work order data is generated for each newly added…
arrow_forward
Identify a suitable network scenario/ case that can be used to explain and discussthe relationship of concepts in the exhibit. Ensure that you provide details of thefollowing aspects of the scenario: • Description of the scenario; • Why the scenario is considered a network system.
arrow_forward
Describe the network monitor 3.1 software, including its functionality and the many fields in which it may be used. In terms of its features and overall idea, what other software products are there that are comparable to network monitor 3.1?
arrow_forward
You are a Technology Specialist in your organisation. You have been tasked to run a workshop onnetwork system design specifically looking into the requirements and constraints. You havedecided to approach the task by studying the components that make up a network system andthen the relationship between network systems and related areas.Thus far, you have realised that you will base your workshop on the exhibit extracted fromSerpanos and Wolf (2011).Exhibit: Requirements and constraints for network system design
Identify a suitable network scenario/ case that can be used to explain and discussthe relationship of concepts in the exhibit. Ensure that you provide details of thefollowing aspects of the scenario:• Description of the scenario;• Why the scenario is considered a network system.
As part of the requirements analysis, list the requirements for each component orrelated area presented in the exhibit. Include the following components or networkareas:• Network systems and related…
arrow_forward
Question 1Denzel and Brianne Associates is a microcomputer development companythat has a 260-computer network. The company is located in a three-storybuilding with about 65 computers in each floor. The current network ispoorly design for its current needs and must be completely replaced.
a) Create a schematic drawing that depicts the network and describe thenetwork you would recommend and how it would be configured with thegoal of building a new network that will support the company’s needs forthe next 3 years with few additional investments.
b) Provides a list of equipment and costs you can use to build your network.You will need to make some assumptions, so be sure to document yourassumptions.
arrow_forward
In your perspective, what place may screencasting play in technical writing? How do you
believe it will benefit the IT sector?
arrow_forward
Question
You are a Technology Specialist in your organisation. You have been tasked to run a workshop onnetwork system design specifically looking into the requirements and constraints. You havedecided to approach the task by studying the components that make up a network system andthen the relationship between network systems and related areas.Thus far, you have realised that you will base your workshop on the exhibit extracted fromSerpanos and Wolf (2011).Exhibit: Requirements and constraints for network system design.
Q.1.1 Identify a suitable network scenario/ case that can be used to explain and discuss
the relationship of concepts in the exhibit. Ensure that you provide details of the
following aspects of the scenario:
• Description of the scenario;
• Why the scenario is considered a network system.
Q.1.2 As part of the requirements analysis, list the requirements for each component orrelated area presented in the exhibit. Include the following components or networkareas:•…
arrow_forward
Choose at least two (2) systems from the list and create
block diagrams for those systems. You can use
PowerPoint or any app you prefer to draw the
components. If you are using a mobile phone, draw the
block diagrams on a clean sheet of paper. Take a photo
of your output then upload here
1. Enrollment system
2. Facebook registration
3. Computer troubleshooting
4. PEMDAS Order of Operation
5. Video editing
arrow_forward
You are a Technology Specialist in your organisation. You have been tasked to run a workshop onnetwork system design specifically looking into the requirements and constraints. You havedecided to approach the task by studying the components that make up a network system andthen the relationship between network systems and related areas.Thus far, you have realised that you will base your workshop on the exhibit extracted fromSerpanos and Wolf (2011).Exhibit: Requirements and constraints for network system design.
Q.1.1 Identify a suitable network scenario/ case that can be used to explain and discuss
the relationship of concepts in the exhibit. Ensure that you provide details of the
following aspects of the scenario:
• Description of the scenario;
• Why the scenario is considered a network system.
Q.1.2 As part of the requirements analysis, list the requirements for each component orrelated area presented in the exhibit. Include the following components or networkareas:• Network…
arrow_forward
I. Project objective:
At the beginning of this course, we discussed network performance. There is no doubt that performance issues can immensely impact the end-user experience and put productivity on hold. Almost every system admin makes it his/her top priority to find out the root cause of performance issues. This is where packet sniffers come into play. The purpose of this project is to establish a sound knowledge base of packet sniffers/analyzers, how they work, and their importance in understanding internet routing.
II. Project Description:
As we discussed in Chapter 2, communication via the Internet is done using a five-layer suite. By using a packet sniffer, we can capture the packets and analyze them at four layers: application, transport, network, and data-link. There is no packet exchange at the physical layer; communication at this layer is done using bits. With the appropriate packet sniffer, you’ll be well-equipped to capture and analyze network…
arrow_forward
QUESTION:
LATEST TRENDS CLOTHING COMPANY requires a new API for their systems which will be used to enable communications to and from their internal systems and will be used by their suppliers as well as their distributors. Below is a sample of the functionality required by the API.
Manage current stock levels
Generate orders and send them to suppliers
Receive bulk orders from distributors
Receive individual orders from distributors customers (including customer delivery details)
You are tasked with producing recommendations for the implementation of a new secure API as described in the scenario above. You will need to investigate available API authentication standards, databasing, logging, security requirements and any other area which you feel may be applicable to ensure a successful and secure implementation for the above scenario.
Once your research is completed, you will then write a report with supporting evidence putting forward details of key considerations along with…
arrow_forward
Describe the features of the network monitor 3.1 software as well as the many industries it may be used to. What other software applications are available that are equivalent to network monitor 3.1 in terms of their functionality and general concepts?
arrow_forward
You are a Technology Specialist in your organisation. You have been tasked to run a workshop onnetwork system design specifically looking into the requirements and constraints. You havedecided to approach the task by studying the components that make up a network system andthen the relationship between network systems and related areas.Thus far, you have realised that you will base your workshop on the exhibit extracted fromSerpanos and Wolf (2011).Exhibit: Requirements and constraints for network system design.
arrow_forward
In your company, you are a Technology Specialist.You've been given the duty of leading a workshop on network system design, with a focus on the requirements and restrictions.You've decided to start by looking at the components that make up a network system, then the connections between network systems and other fields.
So far, you've decided that your workshop will be based on the exhibit from Serpanos and Wolf (2011).Exhibit: Network system design requirements and restrictions
arrow_forward
1) In order to recognized that the copy of software is legally recognized as part of the proprietarily or is distributed by a recognized vendor, software companies use software _____________ for this purpose
2) One of the problem or concern with regards in Network is that the interpretation of the message is base on the understanding and competency level of the users. In the concept of information technology this is called the understanding of ______________ of message
arrow_forward
Defend the use of the UDP protocol over the TCP protocol and provide an example of why it would be advantageous for an application developer to do so.
arrow_forward
Network administrators often resort to a broad array of diagnostic and fundamental utility applications in the course of administering and troubleshooting a network. Productivity and engagement on the work are both influenced by a wide variety of factors. There is a possibility that the Open Systems Interconnection (OSI) model will be of assistance to us in figuring this out.
arrow_forward
4. In line with the concept of the program that you created (a program that generates IP address), search
for at least one (1) framework that can be used in creating the same program. Explain how you will
implement the framework. (Essay: 15 points)
arrow_forward
You are a Technology Specialist in your organisation. You have been tasked to run a workshop on network system design specifically looking into the requirements and constraints. You have decided to approach the task by studying the components that make up a network system and then the relationship between network systems and related areas. Thus far, you have realised that you will base your workshop on the exhibit extracted from Serpanos and Wolf (2011). Exhibit: Requirements and constraints for network system design Prepare for this workshop by completing the following questions. Q.1.1 Identify a suitable network scenario/case that can be used to explain and discuss the relationship of concepts in the exhibit. Ensure that you provide details of the following aspects of the scenario: • Description of the scenario;• Why the scenario is considered a network system.Page 5 of 33Q.1.2 As part of the requirements analysis, list the requirements for each component or related area presented in…
arrow_forward
Design a computer network to be implemented in a multilevel buildingenvironment separated geographically in three sites. The network devices, cabling and appropriate wiringwill be proposed to address the requirements of the users with considerations on scalability, reliability,availability and security. Proper configurations including network protocols in the OSI Layer will beconsidered. Layered design model will be followed for the LAN and WAN environment. Servers and hostPCs should meet the requirements. Critical devices will be housed in a Wiring Closet. Safety and existingstandards in designing networks will be considered throughout the design. Details of the designrequirements are outlined per area. (USE PACKET TRACER)
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education
Related Questions
- Network Analysis Exercise Please work with a few other people to answer the following question as best you can. After about 5 minutes, the class as a whole will discuss the answers. Types of network analysis: Routing (shortest route) Closest Facilities Vehicle Routing Service Areas Location-Allocation Potential Input Data: Street network / Facilities / Start Locations / End Locations / Demand Locations See Types of network analysis layers—ArcMap | DocumentationLinks to an external site. for more information about these choices Each of the following problems could be addressed using a type of network analysis. For each of them: describe what general type of network analysis it is, what input data would be necessary to run the analysis, what information about the street network would be useful to refine the analysis, and any other information/analysis that would help solve this task? Planning evacuation routes during a fire which has closed several roads for a neighborhood in…arrow_forwardWhat are some prominent examples of legitimate and appropriate use of P2P? Whenever we discuss P2P, students will inevitably bring up torrent-based P2P file sharing. From a web technology perspective, what are some of the programs that have been developed, and what kinds of interfaces do they offer? What are the risks of using them?arrow_forwardWhat are some well-known instances of P2P being used properly and appropriately? Students often bring up torrent-based P2P file sharing when we talk about P2P. What are some of the programs that have been created and what types of interfaces do they provide from the viewpoint of web technology? Use of these products has potential hazards, what are they?arrow_forward
- You will complete this phase using Microsoft Visio and a web development Integrated Development Environment (IDE). Reference the Learn material in Module 8: Week 8 to complete the following steps: Instructions Design a Detailed Network Diagram for a Distributed System List the global locations where the systems will be housed. Develop a minimum of 10 network node design, including: ISP/bandwidth/caching devices, Load balancers, Firewalls, Routers, and Switches. Design a Detailed Cloud/Distributed Computing Diagram Identify a client-server architecture such as: Three-layer client-server architecture, and N-Tier Architecture. Develop a minimum of 10 server node design, which could include: Storage Area Network (SAN), Database servers, Application servers, and Web servers. Integration services API services Design a Graphical User-interface (GUI) Choose 1 of the following transition procedures from the use cases to your menu hierarchy: Use case groupings…arrow_forwardClass Activity - Draw Your Concept of the Internet Objectives Demonstrate that networks are made of many different components. Background / Scenario Draw and label a map of the Internet as you interpret it now. Include your home or school/university location and its respective cabling, equipment, devices, etc. Some items you may want to include: • Devices or equipment • Media (cabling) Link addresses or names Sources and destinations • Internet service providers Upon completion, save your work and upload it in canvas. explain your work. Required Resources Internet access Paper and pencils or pens (if students are creating a hard copy) Illustration & Explanation Paste your work here and below is your brief explanation about your concept of the internet.arrow_forwardThere is usually more room for richer game play design if a mobile game application can be hooked up to the Internet. Please list THREE (3) gaming features which you can think of that require a network connection to the Internet and suggest how they are accomplished. Security challenges are presented to mobile application developers when the original offline game app is adapted to include gaming features you listed. Please briefly describe potential challenges associated to each of the features and label the level of security attention each feature requires (e.g., not critical, critical).arrow_forward
- Software Engineering PLS HELP WITHIN 60 MINUTES!! MUST BE UPVOTE IF THE ANSWER IS USEFUL!!!!! A local bus company is planning to develop a web application which can provide users with the estimated bus arrival time, updates on bus services, and the latest bus route information.(a)Suggest an architecture pattern that is suitable for designing the above web application. Justify your answer.(b)Draw a block diagram to depict the software architecture of the above web application with reference to your choice in part (a).arrow_forwardBasic concepts and benefits behind computer networks (Discuss the basic concepts behind computer networks and the benefits of computer networking). Think of this as an introductory section. Follow slide 1.1 Concepts & Benefits of Networks, Network Scopes (Network types), Network Architecture (P2P and Client Server), so that you know what to cover. We don’t need lots of detail for this task – just cover the key points. We have later tasks for going into detail.arrow_forwardQI Using email to communicate with an audience is critical, thus it is necessary to get the design right. Nearly 40% of emails are only read for eight seconds or less. (a) b) Give THREE (3) opinions on the usability aspects that should be considered in designing email applications. Discuss TWO (2) techniques/approaches for creating a user-friendly email application interface. (c) Create ONE (1) user interface design for the login page in the email application by considering functionality criteria. Explain your design.arrow_forward
- Assignment 1b The following is the scope for Assignment 1b. Response to assignment 1a It is mandatory that students should demonstrate how they have incorporated the feedback given in assignment 1a. You may use a tabular form whenever necessary. Network design and justification Draw a network design that you think will be useful in the future for the industry that you have visited. Network should include the following requirements: 3 routers 4 switches 10 PCs 4 VLANs. Suitable IP addressing scheme in tabular form (assume as many hosts as necessary for each department). Use 1906702 to come up with your own IP addressing scheme (to avoid Academic Misconduct). Justify the choice of IP address. Indicate where do you use static routing, dynamic routing protocols (name the protocols, RIP, EIGRP, OSPF, etc.), Access Control List (ACL) as per the network preferences. Justify your choices. Network configuration Configure your network using Packet Tracer. Write a report on…arrow_forwardCompany A's IT department has a hosting platform specifically for systems used by the company's large marketing department. This platform provides critical, high-availability hosted IT resources and services. However, the IT department has started to receive complaints about the time it takes to start new marketing campaigns, primarily due to how long it takes to provision new servers within this platform. Also, as a result of a recent set of mergers and acquisitions, the consumers of the services hosted by this platform have become more distributed, with service consumers accessing services from a large variety of locations, and with increasingly different types of devices. On the other hand Company B is an IT hosting company that provides a range of shared services used by a wide variety of customers. One of Company B's customers is Company A. Specifically, Company A's marketing department has been using a service hosted by Company B's on-premise environment. The service provides…arrow_forwardPlease provide a reaction to below discussions. Discussion: The most important part of an information system within a company or business is the reliability of the network and information system - a streamlined network connectivity that is reliable between the point of the input from the employees to the servers that relay and transfer data to the necessary storage locations. The two types of input devices are manual input and direct input. A keyboard is an example of a device where data is input manually. The user uses the keyboard to input data on to the PC itself. This transfers thought or product into data to be stored or shared from the PC. A direct input device. A manual input device is basically a device that requires a person to do most of the work for data input. A direct input device would be something like a sensor or a barcode scanner. A sensor could even be something like a thermometer on your vehicle. When the vehicle is on, the sensor is always on a monitoring. The…arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education