- Join over 1.2 million students every month
- Accelerate your learning by 29%
- Unlimited access from just £6.99 per month
AS and A Level: Policy, Strategy & Systems
Meet our team of inspirational teachers
This function model is often referred to as the FCAPS model after the initials of each of the major functions it describes. TMN function Naive description Fault Management: Fixing what is broken. Configuration Management: Controlling the operational parameters of something so it works the way you want. Accounting Management: Knowing who is using how much of what, and maybe billing them for it. Performance Management: Making sure it all works acceptably quickly. Security Management: Controlling who can do what. The idea is that just about any network management task can be said to belong to one of those management functions.
- Word count: 2344
A computer virus is much the same as a human virus, but whereas flu affects the human body, the wonderfully named viruses Antics, stoned, Notepad A, michealangelo all affect the computer in various ways
Unfortunately, the virus carrier may maliciously pass the virus on, knowing that there is an infection. A virus is a computer program that is intended to copy itself to other programs and causes disruption to the infected equipment. There are different types of virus. The Trojan horse is a virus which hides inside another program, a time bomb is one which is activated on a certain date, a logic
- Word count: 375
You have to be able to envision the problem at hand and resolve it without actually being there. Not a day goes by that does not consist of at least one "why" call. Why did that happen? Why does the programs have errors? It is hard to explain to an "end user that problems occur with all software applications. One thing that helps the day seem to pass faster is the fact that we are like a family here. If someone has a problem, there is always at least one supervisor they can talk to, who can relate to what's going on.
- Word count: 596
There may be many computers on the network and even several servers but they are always on the one site. The servers serve up information and programs as people working at the network stations request them. It is common to share printers and other output devices, so that saves the organisation money.
- Word count: 504
High-tech crime (computer crime) is the use of technology to commit a crime. It is the biggest tech related threat to the society.
High-tech crimes include identity theft, cyber-stalking, hacking confidential systems, pyramid schemes, planting harmful viruses, and many others. Identity theft is a form of fraud in which someone pretends to be someone else by assuming that person's identity. There are five types of identity theft criminal, financial, medical, child, and identity cloning. Criminal identity theft is when a criminal identifies himself as another person when the police arrest him. Not only does the criminal escape, but also he victim may encounter problems for months and even years because of the incorrect criminal records. Financial identity theft is using another person?s identity credit, goods, and services.
- Word count: 592