IT 505 Final Milestone
.docx
keyboard_arrow_up
School
Southern New Hampshire University *
*We aren’t endorsed by this school
Course
505
Subject
Computer Science
Date
Jan 9, 2024
Type
docx
Pages
12
Uploaded by emmemaria28
Final Milestone
Emme Chadwick
Southern New Hampshire University
IT 505: Introduction to Core Technologies
Dr. Robert Pratt 14 November 2023
1
Abstract
This report contains information about the proper network configuration and javascript needed in order to properly display system updates. Users within the company need to have multiple people access the internet at one time, meaning, an Ethernet cable that is currently being
used is not needed. Further, javascript holds the code to alert employees which needs proper syntax and other components in order to work properly. Additionally, an explanation of the database that holds employee information and their update day is included and thoroughly discussed. Specific queries that need to be run have to include the right links to the right tables. If
a piece of information is missing then the query will not run correctly. All of the information provided in the enclosed report is to inform current and future employees of the Help Desk in order to have successful system updates.
2
Final Milestone
It is well known that as a company begins to expand, so do the needs of the databases and
systems used on a daily basis. Without consistent upgrades to the network and systems it could result in technological chaos. For example, a business that has two users and one printer may be able to use an Ethernet cable for their connection. However, in a large scale company such as this, many users with different servers need access to the internet. Due to this, the system’s network needs to be updated in order to fit the needs of the company. By further explaining the code behind employee notifications, the databases used for queries, and the overall modifications
that are needed the Help Desk team is able to quickly resolve any issues that may arise.
Modifications of Base Code Generally, in programming languages, code is composed of five different types of components that determine how the code runs and what it is intended for. In spite of the fact that code may appear overly complicated and impossible to learn, there are a few foundational terms that make navigating the programming world slightly easier. The five components of the code seen in the system upgrade are the following: Values, operators, variables, tools, and syntax. Furthermore, the programming language used throughout the upgrade is Javascript. Javascript is a highly popular form of code used to produce websites, animations, pop-ups, and more. Due to the nature of Javascript and its use in the system upgrade, it’s relative to understanding the basic concepts housed within this programming language.
First and foremost, values
can essentially be defined as the skeleton of code. Values
are the different components of Javascript such as strings, numbers, functions, etc. Within figure 1.1,
the use of values
is seen throughout the document. For example, the line: “var msPerDay = 24 *
Figure 1.1
3
60 * 60 * 1000;” contains numbers and arithmetic operators that are later used to compute the final results of when the company upgrade will occur, these are the values
. Additionally, variables
can also be seen in figure 1.1. Each line that begins with var
is defined as a variable
. Variables
in Javascript organize data by controlling different parts of the code; simply speaking, each variable
is responsible for storing specific components of data that
can later be called on. Secondly, operators
in
Javascript assign values
to a
purpose and allow the code to
perform specific actions. In figure
1.1 this can be see in “=”, “*”, and
“/”. Which subsequently means,
this variable is assigned to this
name, multiple these two numbers, and divide the two variables
listed. Operators
are an essential part of Javascript and inside the company code it allows the calculation of when the upgrade will be completed. Additionally, tools
are used by every programming language. It’s what allows the code to be typed into a computer. The tools
used in the figures provided were established with W3Schools.
Finally, syntax
means that each part of the code has a time and place to be used and if that
order is mixed up, the code most likely will not run. There are several key components that are needed to make a code run, such as the aforementioned variables, tools, and so forth. In figure 1.2, the space between the variable
“new Date” is taken away to become “newDate”. Due to this
4
disruption of the code, it is now unable to run correctly. This is largely due to “new Date” being used in the line below it, but “new Date” and “newDate” are two entirely different variables
according to the system. Therefore, when it calls on “new Date” it can’t find it since it was altered to have the space removed. This is a prime example of the importance of syntax as well as the other five components of the code covered in this section.
Network Configuration Evaluation
and Examination
The network configuration
within the company is based on the use
of a LAN (Local Area Network) and is
in a bus network format. The LAN
provides connection to users within a
small geographical area, making it easy
to control and host the services needed. Additionally, the following are also utilized in the company such as Ethernet, printers, routers, firewalls, department servers, and generalized cloud internet connection. These different factors operate simultaneously to give users the connection they need without the service slowing down. As seen in the diagram, Ethernet is the main connecting source for department computers as well as servers and other similar devices. Ethernets are particularly useful because they are able to have decent connectivity speeds, are reliable at transferring information between users, and operate at a relatively low cost. Further, the network has implemented a router with a firewall. A router is able to connect several networks to one another and helps improve network speeds by choosing the fastest route to connect to. Additionally, if one route fails to connect, the router is able to search for another
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
Smart-Toys-Smart Kids has decided to install a new e-mail package to streamline communications within the company. Fred would like to have one common calendar for his all 200 employees. The expected features of the new e-mail package are “background processing” that doesn't get a great deal of attention. This includes managing connections, checking for errors in commands and e-mail messages, and reacting accordingly. The e-mail software vendors offered two different e-mail system for solution. One vendor is offering an SMTP-based two-tier client server architecture. The second vendor is offering a Web-based e-mail architecture. Fred doesn't understand either one.
Briefly explain to Fred, in layman's terms, the differences between the two.
arrow_forward
Smart-Toys-Smart Kids has decided to install a new e-mail package to streamline communications within the company. Fred would like to have one common calendar for his all 200 employees. The expected features of the new e-mail package are “background processing” that doesn't get a great deal of attention. This includes managing connections, checking for errors in commands and e-mail messages, and reacting accordingly. The e-mail software vendors offered two different e-mail system for solution. One vendor is offering an SMTP-based two-tier client server architecture. The second vendor is offering a Web-based e-mail architecture. Fred doesn't understand either one.
Outline the pros and cons of the two alternatives
arrow_forward
What is the text about? What did you understand here in general?
arrow_forward
You are assigned to create a network infrastructure for a medium size business making physical widgets (term in the business world for manufacturing something unknown). There is a central office that has 25 workers for centralized billing and all office computers have common office applications. The widgets are built in a home based system where parts are shipped directly to each individual home to be built. Each completed widget must be checked in on a company owned computer at each home location. There are 30 home assembly employees that have a company issued computer to use in building widgets. Your task is to design a network infrastructure to accommodate the needs. You will need to research your solution and justify the design with your research.
arrow_forward
Please provide a reaction to below discussions.
Discussion:
The most important part of an information system within a company or business is the reliability of the network and information system - a streamlined network connectivity that is reliable between the point of the input from the employees to the servers that relay and transfer data to the necessary storage locations.
The two types of input devices are manual input and direct input. A keyboard is an example of a device where data is input manually. The user uses the keyboard to input data on to the PC itself. This transfers thought or product into data to be stored or shared from the PC. A direct input device. A manual input device is basically a device that requires a person to do most of the work for data input. A direct input device would be something like a sensor or a barcode scanner. A sensor could even be something like a thermometer on your vehicle. When the vehicle is on, the sensor is always on a monitoring.
The…
arrow_forward
Company A's IT department has a hosting platform specifically for systems used by the company's large
marketing department. This platform provides critical, high-availability hosted IT resources and services. However,
the IT department has started to receive complaints about the time it takes to start new marketing campaigns,
primarily due to how long it takes to provision new servers within this platform. Also, as a result of a recent set of
mergers
and acquisitions, the consumers of the services hosted by this platform have become more distributed, with
service consumers accessing services from a large variety of locations, and with increasingly different types of
devices.
On the other hand Company B is an IT hosting company that provides a range of shared services used by a wide
variety of customers. One of Company B's customers is Company A. Specifically, Company A's marketing
department has been using a service hosted by Company B's on-premise environment. The service provides…
arrow_forward
Read the text and fill the gaps.
arrow_forward
Detail the features and potential applications of the network monitor 3.1
program. What additional software programs are available that are
comparable to network monitor 3.1 in terms of functionality and concept?
arrow_forward
You are a Technology Specialist in your organisation. You have been tasked to run a workshop onnetwork system design specifically looking into the requirements and constraints. You havedecided to approach the task by studying the components that make up a network system andthen the relationship between network systems and related areas.Thus far, you have realised that you will base your workshop on the exhibit extracted fromSerpanos and Wolf (2011).Exhibit: Requirements and constraints for network system design
Identify a suitable network scenario/ case that can be used to explain and discussthe relationship of concepts in the exhibit. Ensure that you provide details of thefollowing aspects of the scenario:• Description of the scenario;• Why the scenario is considered a network system.
As part of the requirements analysis, list the requirements for each component orrelated area presented in the exhibit. Include the following components or networkareas:• Network systems and related…
arrow_forward
Describe the network monitor 3.1 software, including its functionality and the many fields in which it may be used. In terms of its features and overall idea, what other software products are there that are comparable to network monitor 3.1?
arrow_forward
Question
You are a Technology Specialist in your organisation. You have been tasked to run a workshop onnetwork system design specifically looking into the requirements and constraints. You havedecided to approach the task by studying the components that make up a network system andthen the relationship between network systems and related areas.Thus far, you have realised that you will base your workshop on the exhibit extracted fromSerpanos and Wolf (2011).Exhibit: Requirements and constraints for network system design.
Q.1.1 Identify a suitable network scenario/ case that can be used to explain and discuss
the relationship of concepts in the exhibit. Ensure that you provide details of the
following aspects of the scenario:
• Description of the scenario;
• Why the scenario is considered a network system.
Q.1.2 As part of the requirements analysis, list the requirements for each component orrelated area presented in the exhibit. Include the following components or networkareas:•…
arrow_forward
You are a Technology Specialist in your organisation. You have been tasked to run a workshop onnetwork system design specifically looking into the requirements and constraints. You havedecided to approach the task by studying the components that make up a network system andthen the relationship between network systems and related areas.Thus far, you have realised that you will base your workshop on the exhibit extracted fromSerpanos and Wolf (2011).Exhibit: Requirements and constraints for network system design.
arrow_forward
Network administrators often resort to a broad array of diagnostic and fundamental utility applications in the course of administering and troubleshooting a network. Productivity and engagement on the work are both influenced by a wide variety of factors. There is a possibility that the Open Systems Interconnection (OSI) model will be of assistance to us in figuring this out.
arrow_forward
4. In line with the concept of the program that you created (a program that generates IP address), search
for at least one (1) framework that can be used in creating the same program. Explain how you will
implement the framework. (Essay: 15 points)
arrow_forward
Defend the use of the UDP protocol over the TCP protocol and provide an example of why it would be advantageous for an application developer to do so.
arrow_forward
You are a Technology Specialist in your organisation. You have been tasked to run a workshop on network system design specifically looking into the requirements and constraints. You have decided to approach the task by studying the components that make up a network system and then the relationship between network systems and related areas. Thus far, you have realised that you will base your workshop on the exhibit extracted from Serpanos and Wolf (2011). Exhibit: Requirements and constraints for network system design Prepare for this workshop by completing the following questions. Q.1.1 Identify a suitable network scenario/case that can be used to explain and discuss the relationship of concepts in the exhibit. Ensure that you provide details of the following aspects of the scenario: • Description of the scenario;• Why the scenario is considered a network system.Page 5 of 33Q.1.2 As part of the requirements analysis, list the requirements for each component or related area presented in…
arrow_forward
A large Southeast city is requesting federal funding for a park-and-ride project. One of the requirements in the request application is a
network plan for the design phase of the project. Sophie Kim, the chief engineer, wants you to develop a project network plan to meet
this requirement. She has gathered the activity time estimates and their dependencies shown here.
ID
Description
Predecessor
Time
(days)
A
Survey
None
11
B
Soils report
A
26
C
Traffic design
A
23
D
Lot layout
A
10
E
Approve design
B, C, D
85
F
Illumination
E
20
G
S
Drainage
E
28
H
Landscape
E
21
I
Signage
E
25
] Bid proposal
F, G, H, I
8
The project is expected to take
The critical path is:
Early start for Activity E is:
Late finish for Activity F is:
Slack for Activity in
days.
A, B, E, G, J
dauley
arrow_forward
Describe the features of the network monitor 3.1 software as well as the many industries it may be used to. What other software applications are available that are equivalent to network monitor 3.1 in terms of their functionality and general concepts?
arrow_forward
Assume you're working on a fantastic social networking platform. You expect to have half a million users within a month of your debut. You can't hire half a million people to test your system, but it must be reliable and simple to use when that many people use it. What are your options? What strategies will be most beneficial to you? Make recommendations for testability techniques and approaches for this social networking system.
arrow_forward
Based on what you have learned in this module and in your own understanding, explain what a network is. Include how networks are used and why they might be important in our society.(This will serve as the intro to your argument and establish a common point)
What are the advantages and disadvantages of a network?(This will serve as your premise portion)
Do the dangers outweigh the benefits (or vice versa)? Why or why not?(This is your conclusion statement that must be supported by your premises)
arrow_forward
Network maintenance is an important task
in organizations today who entirely rely on
their network infrastructure for
communication.
a) Compare and contrast the two
approaches for performing Network
Maintenance.
b) Which approach is better and why?
c) Referring to your answer in b), why is is
difficult to avoid the less preferred
approach?
Please avoid plagiarism and direct copy
and paste from google or paraphrasing,
arrow_forward
Network management refers to the activities, methods, procedures, and tools that pertain to the operation, administration, maintenance, and provisioning of networked systems. Answer the following questions about how the Network Management is implemented and used.
a.) Why efficiency of a network is depend on the cost. How can you calculate the Total Cost of Ownership for a network?
b.) What are the main aspects of network quality?
c.) How can you categorize the complexities of Network Mangement? Explain all the complexities and possibilities to tackle them.
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education
Related Questions
- Smart-Toys-Smart Kids has decided to install a new e-mail package to streamline communications within the company. Fred would like to have one common calendar for his all 200 employees. The expected features of the new e-mail package are “background processing” that doesn't get a great deal of attention. This includes managing connections, checking for errors in commands and e-mail messages, and reacting accordingly. The e-mail software vendors offered two different e-mail system for solution. One vendor is offering an SMTP-based two-tier client server architecture. The second vendor is offering a Web-based e-mail architecture. Fred doesn't understand either one. Briefly explain to Fred, in layman's terms, the differences between the two.arrow_forwardSmart-Toys-Smart Kids has decided to install a new e-mail package to streamline communications within the company. Fred would like to have one common calendar for his all 200 employees. The expected features of the new e-mail package are “background processing” that doesn't get a great deal of attention. This includes managing connections, checking for errors in commands and e-mail messages, and reacting accordingly. The e-mail software vendors offered two different e-mail system for solution. One vendor is offering an SMTP-based two-tier client server architecture. The second vendor is offering a Web-based e-mail architecture. Fred doesn't understand either one. Outline the pros and cons of the two alternativesarrow_forwardWhat is the text about? What did you understand here in general?arrow_forward
- You are assigned to create a network infrastructure for a medium size business making physical widgets (term in the business world for manufacturing something unknown). There is a central office that has 25 workers for centralized billing and all office computers have common office applications. The widgets are built in a home based system where parts are shipped directly to each individual home to be built. Each completed widget must be checked in on a company owned computer at each home location. There are 30 home assembly employees that have a company issued computer to use in building widgets. Your task is to design a network infrastructure to accommodate the needs. You will need to research your solution and justify the design with your research.arrow_forwardPlease provide a reaction to below discussions. Discussion: The most important part of an information system within a company or business is the reliability of the network and information system - a streamlined network connectivity that is reliable between the point of the input from the employees to the servers that relay and transfer data to the necessary storage locations. The two types of input devices are manual input and direct input. A keyboard is an example of a device where data is input manually. The user uses the keyboard to input data on to the PC itself. This transfers thought or product into data to be stored or shared from the PC. A direct input device. A manual input device is basically a device that requires a person to do most of the work for data input. A direct input device would be something like a sensor or a barcode scanner. A sensor could even be something like a thermometer on your vehicle. When the vehicle is on, the sensor is always on a monitoring. The…arrow_forwardCompany A's IT department has a hosting platform specifically for systems used by the company's large marketing department. This platform provides critical, high-availability hosted IT resources and services. However, the IT department has started to receive complaints about the time it takes to start new marketing campaigns, primarily due to how long it takes to provision new servers within this platform. Also, as a result of a recent set of mergers and acquisitions, the consumers of the services hosted by this platform have become more distributed, with service consumers accessing services from a large variety of locations, and with increasingly different types of devices. On the other hand Company B is an IT hosting company that provides a range of shared services used by a wide variety of customers. One of Company B's customers is Company A. Specifically, Company A's marketing department has been using a service hosted by Company B's on-premise environment. The service provides…arrow_forward
- Read the text and fill the gaps.arrow_forwardDetail the features and potential applications of the network monitor 3.1 program. What additional software programs are available that are comparable to network monitor 3.1 in terms of functionality and concept?arrow_forwardYou are a Technology Specialist in your organisation. You have been tasked to run a workshop onnetwork system design specifically looking into the requirements and constraints. You havedecided to approach the task by studying the components that make up a network system andthen the relationship between network systems and related areas.Thus far, you have realised that you will base your workshop on the exhibit extracted fromSerpanos and Wolf (2011).Exhibit: Requirements and constraints for network system design Identify a suitable network scenario/ case that can be used to explain and discussthe relationship of concepts in the exhibit. Ensure that you provide details of thefollowing aspects of the scenario:• Description of the scenario;• Why the scenario is considered a network system. As part of the requirements analysis, list the requirements for each component orrelated area presented in the exhibit. Include the following components or networkareas:• Network systems and related…arrow_forward
- Describe the network monitor 3.1 software, including its functionality and the many fields in which it may be used. In terms of its features and overall idea, what other software products are there that are comparable to network monitor 3.1?arrow_forwardQuestion You are a Technology Specialist in your organisation. You have been tasked to run a workshop onnetwork system design specifically looking into the requirements and constraints. You havedecided to approach the task by studying the components that make up a network system andthen the relationship between network systems and related areas.Thus far, you have realised that you will base your workshop on the exhibit extracted fromSerpanos and Wolf (2011).Exhibit: Requirements and constraints for network system design. Q.1.1 Identify a suitable network scenario/ case that can be used to explain and discuss the relationship of concepts in the exhibit. Ensure that you provide details of the following aspects of the scenario: • Description of the scenario; • Why the scenario is considered a network system. Q.1.2 As part of the requirements analysis, list the requirements for each component orrelated area presented in the exhibit. Include the following components or networkareas:•…arrow_forwardYou are a Technology Specialist in your organisation. You have been tasked to run a workshop onnetwork system design specifically looking into the requirements and constraints. You havedecided to approach the task by studying the components that make up a network system andthen the relationship between network systems and related areas.Thus far, you have realised that you will base your workshop on the exhibit extracted fromSerpanos and Wolf (2011).Exhibit: Requirements and constraints for network system design.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education