Question

Subject is Foundation of Information Technology Discussion Questions To log on to a website such as...

Subject is Foundation of Information Technology

Discussion Questions

To log on to a website such as G-mail or Yahoo!, you need to specify your login name and password. The site does not allow you to access your e-mail messages if the information provided is incorrect. At times you do not remember the password for a particular site and have to repeatedly guess the right password and type it, wasting valuable time.

1. What are some of the ideas that you use for generating passwords for your own use?

What do you believe are good aspects about this method and what do you think are issues with this method?

Be careful not to share any of your own personal passwords.

2. The Internet is based on the client/server architecture, which is the most widely used system architecture.

Another system architecture called the peer-to-peer architecture can be used on a LAN.

Research peer-to-peer architecture and compare it with client/server architecture.

Share examples along with positives and negatives for the uses of either architecture and how it can affect outcomes or results from the infrastructure.

Please answer all questions if possible.

Homework Answers

Answer #1

Answer 1

For generating the passwords one can take into account following things:

  1. Use of one or more words that use in day to day life, except your name.
  2. Mixing those words with upper and lower case letters.
  3. Adding up some digits, like your lucky number or part of yours any vehicle’s number.
  4. Adding some alphanumeric characters, excluding alphabets, like @, #, etc.
  5. Length of the password is also necessary, according to me minimum 10 characters should be there in the password.

Positive points about this technique are:

  1. Since most of the people tend to forget the password, so by using a word which is very familiar to us helps us in remembering it.
  2. To make the password secure, make it case sensitive is very efficient.
  3. Addition of digits and other characters helps us in breaking the long password into parts and it makes it easy to remember it as well as security is being enhanced.

Shortcoming of this technique is:

  1. The word being used is familiar to us and so it may be familiar to people who are close to us, most of the time, like family members.
  2. If size of password is very long, then it becomes hard to remember it, and we ultimately waste our time by thinking what was the right password.

Answer 2

Peer-to-peer (P2P) networking is a distributed application architecture that partitions tasks or workloads between peers. Peers are equally privileged, equipotent participants in the application. There are three models of unstructured P2P computer network architecture:

  • Pure P2P
  • Hybrid P2P
  • Centralized P2P

The most common application is for content distribution. This includes software publication and distribution, content delivery networks, streaming media and peer casting for multicasting streams, which facilitates on-demand content delivery.

Peer-to-Peer

Client-Server

Resources are not removed from the network until they are no longer being requested.

Resources may be removed at any time.

Resources inserted under content hash key URIs will always have the same content.

Resources referenced by URIs may change content.

Signed subspace keys create unique, verifiable namespaces in the network.

Namespaces are assigned by a centralized body and rely on DNS resolution.

Storage and bandwidth are distributed and provided by the entire network.

Storage and bandwidth must be provided by the host.

Very difficult to determine who is inserting or requesting content. Thus good privacy.

Relatively easy to determine who is inserting or requesting content. Lesser privacy

Peer to Peer

Examples — Skype, GNUnet, Lime Wire, Kazaa etc. are some leading software using peer to peer architecture.

Advantages of peer to peer architecture are:

  1. Easy and simple to set up only requiring a hub or a switch to connect all computers together.
  2. You can access any file on the computer as-long as it is set to a shared folder.
  3. If one computer fails to work all the other computers connected to it still continue to work.

Disadvantages of peer to peer architecture are:

  1. Security is not good.
  2. If the connections are not connected to the computers properly then there can be problems accessing certain files. Data loss may also happen due to improper connectivity.
  3. It does not run efficient if you have many computers. Best performance is given with two to eight computers.


Client/Server

Examples — WhatsApp, Hike, Cloud services, google mailing services, etc.

Advantages of Client/Server

  1. A client server can be scaled upto many services that can also be used by multiple users.
  2. Security is more advanced than a peer-to-peer network.
  3. All the data is stored onto the servers which generally have far greater security controls than most clients.
  4. Server can control the access and resources better to guarantee that only those clients with the appropriate permissions may access and change data.

Disadvantages

  1. More expensive than a peer-to-peer network.
  2. When the server goes down or crashes all the computers connected to it become unavailable to use.
  3. When you expend the server it starts to slow down due to the Bit rate per second.
  4. When everyone tries to do the same thing it takes a little while for the server to do certain tasks.

Peer to Peer

  1. It has low cost, thus rapidly increasing use, so highly supportive to business infrastructure.
  2. Many of the leading brands are using this, like Skype — most of the telephonic interviews, companies’ call conferencing, meetings are commonly done using Skype. Thus peer to peer networking has a positive impact on the current infrastructure.

Client/Server

  1. Cloud services like Google Drive, DropBox etc. are being enabled by such network only, thus depending on the requirement it too has positive impact on the infrastructure.
Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
Review the discussion below and reply with your thoughts in your own words: 1. Why are...
Review the discussion below and reply with your thoughts in your own words: 1. Why are hospitals adopting the “Toyota Way”? According to Colliver (2013), “the Toyota Way, as it is called, is the company’s systematic approach to producing cars and trucks efficiently, with the primary goal of pleasing the customer” (para. 2). Hospitals are adopting the “Toyota Way” because of the need to compete as reimbursements are dwindling. More hospitals are doing this to attract patients because the available...
Case Study 1: A Day in the Life Rachel, the project manager of a large information...
Case Study 1: A Day in the Life Rachel, the project manager of a large information systems project, arrives at her office early to get caught up with work before her co- workers and project team arrive. However, as she enters the office she meets Neil, one of her fellow project managers, who also wants to get an early start on the day. Neil has just completed a project overseas. They spend 10 minutes socializing and catching up on personal...
Background You are a manager in the audit division at Miller Yates Howarth (MYH), an accounting...
Background You are a manager in the audit division at Miller Yates Howarth (MYH), an accounting firm with offices throughout the major regional centres of NSW and Queensland. Although a medium sized firm by national standards, MYH is the second largest regional accounting firm in Australia. Most of MYH’s audit clients are in the agriculture, mining, manufacturing and property industries. All of those industries are currently under pressure, either from a downturn in commodity prices or fierce competition from overseas...
You are a manager in the audit division at Miller Yates Howarth (MYH), an accounting firm...
You are a manager in the audit division at Miller Yates Howarth (MYH), an accounting firm with offices throughout the major regional centres of NSW and Queensland. Although a medium sized firm by national standards, MYH is the second largest regional accounting firm in Australia. Most of MYH’s audit clients are in the agriculture, mining, manufacturing and property industries. All of those industries are currently under pressure, either from a downturn in commodity prices or fierce competition from overseas competitors....
Please read the article and answear about questions. Determining the Value of the Business After you...
Please read the article and answear about questions. Determining the Value of the Business After you have completed a thorough and exacting investigation, you need to analyze all the infor- mation you have gathered. This is the time to consult with your business, financial, and legal advis- ers to arrive at an estimate of the value of the business. Outside advisers are impartial and are more likely to see the bad things about the business than are you. You should...
Funding an IS project through a Chargeback method involves: Pricing the IS service out for the...
Funding an IS project through a Chargeback method involves: Pricing the IS service out for the customer buying the end product Direct billing by the firm for IS resources or services to the department that uses them Direct billing by the manager of a function for IS resources or services to an employee that uses them An accounting process that reduces tax liability for capital investments All of the following are attributes of considering IS costs as Overhead except the...
Review the Robatelli's Pizzeria Case Study. Develop another internal controls system, but this time, in the...
Review the Robatelli's Pizzeria Case Study. Develop another internal controls system, but this time, in the purchases and fixed assets business areas. Prepare a 12- to 16-slide presentation describing the purchases and fixed assets business areas. Be sure to incorporate speaker notes as well as appropriate visuals, graphics, fonts, etc. Include any associated risk in these areas. Describe specific internal controls that include authorization of transactions, segregation of duties, adequate records and documentation, security of assets, and independent checks and...
Pandora is the Internet’s most successful subscription radio service. As of June 2013, it had over...
Pandora is the Internet’s most successful subscription radio service. As of June 2013, it had over 200 million registered users (140 million of which access the service via a mobile device) and over 70 million active listeners. Pandora now accounts for more than 70% of all Internet radio listening hours and a 7% share of total U.S. radio listening (both traditional and Internet). At Pandora, users select a genre of music based on a favorite musician, and a computer algorithm...
Using the model proposed by Lafley and Charan, analyze how Apigee was able to drive innovation....
Using the model proposed by Lafley and Charan, analyze how Apigee was able to drive innovation. case:    W17400 APIGEE: PEOPLE MANAGEMENT PRACTICES AND THE CHALLENGE OF GROWTH Ranjeet Nambudiri, S. Ramnarayan, and Catherine Xavier wrote this case solely to provide material for class discussion. The authors do not intend to illustrate either effective or ineffective handling of a managerial situation. The authors may have disguised certain names and other identifying information to protect confidentiality. This publication may not be...
2. SECURING THE WORKFORCE Diversity management in X-tech, a Japanese organisation This case is intended to...
2. SECURING THE WORKFORCE Diversity management in X-tech, a Japanese organisation This case is intended to be used as a basis for class discussion rather than as an illustration of the effective or ineffective handling of an administrative situation. The name of the company is disguised. INTRODUCTION In light of demographic concerns, in 2012, the Japanese government initiated an effort to change the work environment in order to secure the workforce of the future. Japan is world renowned for its...