Information Systems homework help
Information Systems homework help.
chapter 5
1)What were the first four locations hooked up to the Internet (ARPANET)?
2)What does the term packet mean?
3)Which came first, the Internet or the World Wide Web?
4)What was revolutionary about Web 2.0?
5)What was the so-called killer app for the Internet?
6)What does the term VoIP mean?
7)What is a LAN?
8)What is the difference between an intranet and an extranet?
9)What is Metcalfe’s Law?
exercise 1)
What is the difference between the Internet and the World Wide Web?
Create at least three statements that identify the differences between the two.
chapter 6
1)Briefly define each of the three members of the information security triad.
2)What does the term authentication mean?
3)What is multi-factor authentication?
4)What is role-based access control?
5)What is the purpose of encryption?
6)What are two good examples of a complex password?
7)What is pretexting?
8)What are the components of a good backup plan?
9)What is a firewall?
10)What does the term physical security mean?
exercise 6)
Find the information security policy at your place of employment or study.
Is it a good policy? Does it meet the standards outlined in the chapter?
exercise 7)
How diligent are you in keeping your own information secure?
Review the steps listed in the chapter and comment on your security status.
text book link : https://opentextbook.site/informationsystems2019/
The above assignments should be submitted in single word document
1)What were the first four locations hooked up to the Internet (ARPANET)?
2)What does the term packet mean?
3)Which came first, the Internet or the World Wide Web?
4)What was revolutionary about Web 2.0?
5)What was the so-called killer app for the Internet?
6)What does the term VoIP mean?
7)What is a LAN?
8)What is the difference between an intranet and an extranet?
9)What is Metcalfe’s Law?
exercise 1)
What is the difference between the Internet and the World Wide Web?
Create at least three statements that identify the differences between the two.
chapter 6
1)Briefly define each of the three members of the information security triad.
2)What does the term authentication mean?
3)What is multi-factor authentication?
4)What is role-based access control?
5)What is the purpose of encryption?
6)What are two good examples of a complex password?
7)What is pretexting?
8)What are the components of a good backup plan?
9)What is a firewall?
10)What does the term physical security mean?
exercise 6)
Find the information security policy at your place of employment or study.
Is it a good policy? Does it meet the standards outlined in the chapter?
exercise 7)
How diligent are you in keeping your own information secure?
Review the steps listed in the chapter and comment on your security status.
text book link : https://opentextbook.site/informationsystems2019/
The above assignments should be submitted in single word document