• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Computer Networks and Security

Computer Networks and Security







Total Views
Views on SlideShare
Embed Views



0 Embeds 0

No embeds



Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
Post Comment
Edit your comment

    Computer Networks and Security Computer Networks and Security Presentation Transcript

    • Education Industry The Manning’s School GROUP 4 Clayton Peterkin, Yanique Dennis, Damion Samuels, Tonique Patrick, Tristan Williams & Samantha Wallace
    • Brief Description of Manning’s School Operation Manning’s is a very large school and hence it requires a very large complement of human and other resources in order to efficiently carry out its day to day activities. Alongside its academic program, Manning’s School operates its own canteen, two tuck shops, a library and a poultry farm.
    • Input Devices  Avervision CP355 Portable Document Camera It provides an enhanced teaching environment in a compact solution The Aver Vision CP355 is ideal for displaying and capturing images at any angle, so for example a would teacher use this camera to capture a printed word document and display it to the entire class without having to print a lot of different copies. It has a 3.2 mega pixel camera head and Auto Focus and a strong 80x total zoom including 5 xs optical zoom.
    • Information Systems  Capture data needed to print customers receipts- Operation Support System (OSS). e.g. Cash register/till  Store data needed for billing creditors- Transaction Processing System (TPS)- e.g. QuickBooks: This is software that is used for the schools accounting purposes.  Assist Manager/Board Members to price goods/services- Decision Support Systems (DSS)
    • Database QuickBooks (TPS) Bill creditors
    • Database Management Systems and Utility Programs  The database administrator makes sure that only the right people can either read or change the data. Database management systems is a computer program that allows the user to create and manage databases and also allows different levels of access to users.  A utility programme used at the institution is ESET Nod32 Antivirus. The acronym NOD stands for Nemocnica na Okraji Disku ("Hospital at the end of the disk"). It is used for the maintenance of your computer’s health
    • The Internet, Intranet & Extranet at the Manning’s School.  Internet- A network of networks. Benefits: E-mails, Voice Over IP (VoIP) is a communication service available for free as long as you have an Internet connection (e.g. Skype) and advertising.  Intranet- An Intranet is a use of Net and Web technology that happens inside your own organization. Benefit: Document distribution - reducing cost improving timeliness of distributed information  Extranet- An Extranet is an Intranet that people outside your formal organization have access to. Benefit Allows the school to make purchases overseas and track the delivery of the items.
    • Role of the Internet, Intranet & Extranet in the Education Industry  Internet- Allows students to access information online( E-learning Jamaica), create e-mail address, and teachers have access to additional notes.  Intranet- allows a place where boundaries are lowered and information exchange is encouraged  Extranet- Providing those on the school’s supply chain, including their customers, with all the information they need to improve their business relationship and it will help the business to grow and develop.
    • Characteristics of Information  Clarity- unambiguous, clear information. It should be easily read, and understood  Accuracy- this refers to information that is correct, truthful, and precise  Conciseness- information should be straight forward, it gets straight to the point and it is in a shortened form.  User- Relatedness- the information should relate to a specific user, not everyone can be in connection with certain information  Relevance- information should serve a purpose, it should be essential to the users  Timeliness- information, it also needs to occur in a timely manner
    • Computer Security Risks  Weak or No Encryption  Wireless networks with weak or no encryption that can be accessed easily by anyone driving by with a wireless-enabled laptop. Reducing the risks to encode data during storage or transmission so that it cannot be understood by someone who does not have the encryption key or software to convert it back to its original form
    • Computer Security Risks  Hardware Malfunction  Hardware malfunction is a risk because data can be corrupted by bad power and over- heating. . Bad power not only damage hardware but it could damage important system file. Reducing the risks the use of uninterruptible power supply (UPS) and surge protectors.
    • Thank You THE END