This essay I. STATEMENT & BACKGROUND has a total of 2814 words and 12 pages.
I. STATEMENT & BACKGROUND
The college of Business (COB) server is now being used to support deliver to the
Computer Information System (CIS) department. The CIS professors would be using the server
for various operations. Assignments, e-mail, and other types of information would be easier for
the students to access. Network users are able to share files, printers and other resources; send
electronic messages and run programs on other computers. However, certain important issues
need to be addressed and concentrated on. In order to begin the process of setting up the COB
server, the total numbers of users (faculty and students) must be determined. Some other
significant factors to be approached are: the required software applications needed on the
network, an efficient and appropriate directory structure and effective security structure. In
designing the directory structure, the major focus must be on accessibility. The number of
undergraduate CIS courses that the server will be used for is be!
tween 15 and 17. For the users to be ensured that their information is not at risk, we will create
an effective security structure. In composing the appropriate security structure there must be
certain access rights assigned to the users. An important technical detail in setting up a server is
the amount of money that will need to be allocated for the restructuring of the system. For the
system to function properly, the amount of hardware/ software will need to be determined.
II. FUNCTIONAL REQUIREMENTS
The COB server will primarily be used by CIS professors and CIS students. The
approximate number of professors in the CIS department is between five and seven and the
approximate number of CIS majors is between 100 and 120. As computer technology continues
to grow, the number of CIS majors is vastly increasing. If we see a considerable rise in
Computer Information Systems majors the department will have to expand its faculty members.
The CIS professors will be using the server to disburse their syllabi, distribute specific
assignments and send e-mail to their students. The layout, design and complexity of each class
will determine how much the professor may be using the server.
The first class a CIS major usually takes at Western is CIS 251. Management Information
Systems (CIS 251). This class offers students a basis for management information systems in
business organizations. In putting the COB server to use and getting the student ready for
hands-on knowledge of computer-based information systems, CIS 251 focuses on analysis,
development, design, implementation, and evaluation. Other tasks that are covered in this class
are computer applications ins spreadsheets, word processors, and database systems.
Information systems affect both business people and people who live in society.
The first programming class CIS majors take is CIS 256. This CIS course will be very
beneficial for the server. Business Computer Programming (CIS 256) introduces the student to
an application of programming principle in business. Detailed assignments involve flowcharting,
coding, documentation, and testing. This course provides the student with a background of
computer architecture and data representation. This class account will require the BASIC
programming language that will be used as well as the compiler.
The CIS elective, CIS 301, emphasizes maximum hands-on experience with
microcomputers and software packages, including word processing, spreadsheets, database
managers, and graphic systems. Microcomputer Applications (CIS 301), is an important course
for students not majoring in Computer Information Systems, but would like to familiarize
themselves with the personal computer. This account will contain Microsoft Office and e-mail
An important class that becomes useful for the server is the CIS 358 course. The professor
can send applications, reports, programs and other data to the server where the student can
transfer to a disk or their VAX account. Applications Development II (CIS 358) is a study of
the state of art tools and techniques for developing complex business applications; data
organization, on-line processing, software engineering, and software maintenance. This CIS class
is an extension to CIS 258. The student will expand his/her knowledge of the COBOL
programming language. In order for the CIS major to apply principle of good application design
and solving problems, the Visual Basic programming language will also be introduced. The
account for these two classes will contain the COBOL programming language and the compiler
for it as well as Visual Basic.
For the students to learn more about client-server technology, CIS 365 is required to the
Computer Information Systems curriculum. The student will be involved in learning about
different types of client-server environment such as configuring Worldwide Web environment and
building a Netware LAN to support delivery client-server computing. Computer Architecture,
Communications, and Operating Systems (CIS 365) focuses
Topics Related to I. STATEMENT & BACKGROUND
Server, Server hardware, Clientserver model, Computer network, Operating system, NetWare, Computing, Directory service, File server, Internet Relay Chat, Windows Server, Collaborative information seeking
Essays Related to I. STATEMENT & BACKGROUND
Robert AllenRobert Allen 92845 Robber Barons Then and Now Robber Barons, a term used in the late 1800s and early 1900s to describe a businessman who made an enormous amount of money, today we would call them billionaires. It was not really the fact they made an extreme amount of wealth, it was more the way they made it. In all the cases the acquiring of wealth was done in what was considered a ruthless manor and unscrupulous ways. A robber baron was more interested in acquiring wealth than the safety of his
Computer HackerComputer Hacker The meaning of Hacker is one who accesses a computer which is supposably not able to be accessed to non authorised people of the community. Hackers may use any type of system to access this information depending on what they intend on doing in the system. Methods Hackers may use a variety of ways to hack into a system. First if the hacker is experienced and smart the hacker will use telnet to access a shell on another machine so that the risk of getting caught is lower than doing
Net CensorshipNet Censorship Most of us have used it. Most of us find it useful, Some of us find it entertaining. Some of us find it offensive. It is the Internet. The Internet has dramatically changed our society. It brings together people and their ideas from all around the world in a short amount of time. It is expanding daily to allow new ideas and thought s to be transmitted quickly and easily with the single click of a button. One can find information on almost any subject there. Yet many people are t
How to Go From Class-Room to Web-Room as PainlesslHow to Go From Class-Room to Web-Room as Painlessly as Possible By Rik Hall, University of New Brunswick, Fredericton, New Brunswick 1.0 ABSTRACT Getting your course onto the World Wide Web (WWW) is best done using a systematic approach. There are a number of steps that need to be taken prior to starting any of the actual web work. Meetings should be held with various groups within your institution. Once the actual coursework is begun, there are some essential components and some optional compon
Internet Security Many people today are familiar wInternet Security Many people today are familiar with the Internet and its use. A large number of its users however, are not aware of the security problems they face when using the Internet. Most users feel they are anonymous when on-line, yet in actuality they are not. There are some very easy ways to protect the user from future problems. The Internet has brought many advantages to its users but has also created some major problems. Most people believe that they are anonymous when they are usi
Ever since the days of the Pony Express, people haEver since the days of the Pony Express, people have looked to getting information, whether personal or business, to its intended receiver as soon as possible. The computer has evolved as a communications super-tool, enabling people to do just that. Networking has given individuals the power to transfer ideas, reports, and files quickly and efficiently. Networks also grant the power to business professionals and families to conference with voice and video from their individual offices or homes.
INTRODUCTION OF NETWORKINGINTRODUCTION OF NETWORKING One problem that I see with people today is that they are unaware what a computer network is. They might have heard of a computer network, but they are clueless as to how it works or why it works. People have basic questions that need to be answered. My goal is to give basic network information that will hopefully answer those questions. To give people an understanding about computer networks there are several areas that I must focus on. I will give definitions of some
Network Design and Implementation SolutionNetwork Design and Implementation Solution Table of Contents 1. Executive Summary 1.1. Purpose of the Project 3 1.2. Strategic Recommendation 3 1.3. Implementation Consideration 3 1.4. Benefits of the Solution 4 2. Designing Requirements 2.1. Existing Network 5 2.2. Network Requirements 5 3. Design Solution 3.1. Proposed Network Topology 6 3.2. Hardware and Media Recommendation for the LAN 6 3.3. Hardware and Media Recommendation for the WAN 7 3.4. Network Layer Addressing and Naming Model 8 3.5
In today's world the bounds of information technolIn today\'s world the bounds of information technology are being pushed further and further every day. With Local Area Networks spanning into WorldWide Area Networks and globalization happening to every small business with a connection to the Internet the need for alternatives is growing. Technology and hardware are increasing faster than people with the skills to support them are. With this the ways to connect and expand into the Internet are improving as well as the speed of connections. There
TCP/IP SecurityTCP/IP Security The TCP/IP protocols, the basis for today\'s Internet, lack even the most basic mechanisms for security, such as authentication or encryption. As usage of the Internet and TCP/IP protocols increases, their lack of built-in security has become more and more problematic. This paper describes a variety of basic flaws in TCP/IP protocols and their implementations, and discusses solutions and work-arounds to these problems. Also covered is the new IPv6, the next-generation Internet pr
I. STATEMENT & BACKGROUNDI. STATEMENT & BACKGROUND The college of Business (COB) server is now being used to support deliver to the Computer Information System (CIS) department. The CIS professors would be using the server for various operations. Assignments, e-mail, and other types of information would be easier for the students to access. Network users are able to share files, printers and other resources; send electronic messages and run programs on other computers. However, certain important issues need to be addres
Background: To determine whether or not WinNT 4.0Background: To determine whether or not WinNT 4.0 is within year 2000 compliance. From the outlined testing procedures found in the \'YEAR 2000 Testing memo\', it was decided that since WinNT is an OS it is \'date sensitive\'. From this, all outlined tests were performed. The data gathered is represented in table form. Equipment: To test, a Compaq Prolinea 590 was used with the latest bios installed (04/09/97). The machine had WINNT 4.0 installed with Service Pack 3.0 patch for the OS. Testing P
The Anti-Trust Case Against MicrosoftThe Anti-Trust Case Against Microsoft Since 1990, a battle has raged in United States courts between the United States government and the Microsoft Corporation out of Redmond, Washington, headed by Bill Gates. What is at stake is money. The federal government maintains that Microsoft\'s monopolistic practices are harmful to United States citizens, creating higher prices and potentially downgrading software quality, and should therefore be stopped, while Microsoft and its supporters claim that th
Sympathetic HemingwaySympathetic Hemingway The most striking feature of the short story Hills Like White Elephants is the manner in which it is told. It is not typical in the classical sense with an introduction, a development of the story and an end. Instead, we get some time in the life of two people, as if it were just a piece of a film where we have a lot to deduce. This tale does not get everything done for the reader; we only see the surface of what is going on. It leaves an open end because readers can have
WatergateWatergate The Watergate Complex is a series of modern buildings with balconies that looks like filed down Shark\'s Teeth (Gold, 1). Located on the Potomac River in Washington, D.C. it contains many hotel rooms and offices. What happened in the complex on June 17, 1972 early in the morning became a very historical event for our nation that no one will ever forget. The Watergate Scandal and constitutional crisis that began on June 17, 1972 with the arrest of five burglars who broke into the Democr
Jason NikouyehJason Nikouyeh Professor Willis English 111, Section 133 4 November 1999 Technology is Changing the Way We Listen to Music Downloading MP3s from the Internet should be made legal. An MP3 is a near CD quality digital recording of a musical piece that is compressed so it can be distributed through the Internet (Simple Net). High prices, new technology, and availability are causing most music lovers to turn to the Internet to listen to their music. It\'s convenient to search a computer database for
Sun Microsystems, Inc.Sun Microsystems, Inc. Introduction By 1998 Sun had become a global Fortune 500 leader in enterprise network computing with operations in 150 countries and generating $8 billion in revenues. Sunís competitors in the technical markets were primarily Intel, Hewlett-Packard (HP), International Business Machine (IBM), Compaq Computer Corporation (CPQ) and Silicon Graphics, Inc. (SGI). The information technology industry, the market for Sunís services and products, was extremely competitive in 1998.
What Is Marijuana? Marijuana is a drug obtained frWhat Is Marijuana? Marijuana is a drug obtained from dried and crumpled parts of the hemp plant Cannabis sativa (or Cannabis indica). It can be smoked by rolling in tobacco paper or placing in a pipe. It is also otherwise consumed worldwide by an estimated 200,000,000 persons for pleasure, an escape from reality, or relaxation. The main active principle of cannabis is tetrahydrocannabinol. Marijuana is not a narcotic and is not mentally or physically addicting drug. One can use mild cannabis pr
There isn't hardly anybody around who can say theiThere isn\'t hardly anybody around who can say their lives haven\'t been influenced by computers. Computers have all but taken over society as we know it. Everywhere you look, computers have greatly improved our lives. It can be as simple as going through a carwash, a computer processes the information that we feed it and adjusts the machine accordingly to give us the particular wash we paid for. Computers also play an extremely complicated role in one of the things that everybody uses in their
Client/Server computing has become the model for nClient/Server computing has become the model for new information architecture. This technology will take enterprise wide computing into the 21st century. Computing power has rapidly become distributed and interconnected throughout many organizations through networks of all types of computers. Networked computer systems are taking the form of client/server computing. With client/server computing, end users can handle a broad range of information processing tasks. This included data entry, inquiry
Small SystemsSmall Systems Research Paper Hard Drives In this day and age of faster computers and high-speed processors, it should only stand to reason that hard drives meet the same requirements as the rest of the computer technology world. A technological look and some tips on maintaining or troubleshooting hard drives is included below. By keeping up with the standard of needs of the industry we can be assured that our personal computers will have all the necessary space and the ability to access and save
Forget the browser wars. This year's big nerd battForget the browser wars. This year\'s big nerd battle is the server shootout between Linux and Windows NT - and it\'s not just a bunch of geeks nit-picking. While both offer more affordable platforms for Web service than in the past, Linux and NT are polar opposites on almost every other level. They look different, run differently, support different software, and cost money in different places. So far though, most press coverage of the Linux-NT debate has focused on the competing business models
Programming LanguagesProgramming Languages A programming language is a set of English-like instructions that includes a set of rules for putting the instructions together to create commands. A translator changes the English-like commands into numeric code that the computer can understand. The most common type of translator is a compiler. The compiler is program that reads English-like commands in a file and than creates another file containing computer readable numeric code or commands. I will be talking about some
Censor the Internet?Censor the Internet? The freedom of speech that was possible on the Internet could now be subjected to governmental approvals. For example, China is attempting to res5trict political expression, in the name of security and social stability. It requires users of the Internet and e-mail to register, so that they can monitor their activities (Gates). In the United Kingdom, state secrets and personal attacks are off limits on the Internet. Laws are strict and the government is extremely interested i