Answer: A flowchart is a graphical representation of decisions and their results mapped out in individual shapes.
Explanation:
These shapes were first developed by Herman Goldstine and John von Neumann in the 1940s.
Flowcharts can provide a step-by-step diagram for mapping out complex situations, such as programming code or troubleshooting problems with a computer.
To take breaks and not do all the work at once.
Answer:
See explanation below.
Explanation:
File organization is very important especially when one is working with numerous files from different applications.
When you are working with spreadsheets, word processing documents, presentation slides, images and sound files, it is important to create folders and sub-folders to make locating your files a lot easier.
- Make sure you have all your files saved with names that are relevant to your school project.
- Create a sub-folder to store all spreadsheets files, create a sub-folder to store all word processing files, create a sub-folder to store all presentation slides and create another folder to store images and sound files. You do this to make it easy for you to locate whichever file you want.
- You create the sub-folder by right clicking on your documents section and clicking on new folder. Type in the name of the folder and save.
- After creating sub-folders, create a general folder for all your folders by using the same method in step 3. Copy all your sub-folders into this major folder. You can name this folder the name of your school project.
This way, you never have to look for any files for your school project.
Seven Domains of IT Infrastructure Seven domains can be found in a typical IT infrastructure. They are as follows: User Domain, Workstation Domain, LAN Domain, LAN-to-WAN Domain, Remote Access Domain, WAN Domain, and System/Application Domain.
Explanation:
User Domain : The User Domain covers all theusers (of any rank) that haveaccess to the other six domains.
RISKS:
-
User can destroy data in application(intentionally or not) and delete all
- User can insert infected CD or USBflash drive into the work computer
Workstation Domain : A computer of an individual user where the production takes place
RISKS:
- The workstation’s OS can have a known software vulnerability thatallows a hacker to connect remotelyand steal data.
- A workstation’s hard drive can fail causing lost data
LAN Domain : Contains all of the workstations,hubs, switches, and routers. TheLAN is a trusted zone
RISKS:
-
A worm can spread through the LANand infect all computers in it.
- LAN server OS can have a knownsoftware vulnerability.
WAN Domain : Stands for Wide Area Network and consists of the Internet and semi-private lines
RISKS:
- Service provider can have a major network outage.
- Server can receive a DOS or DDOS attack.
- A FTP server can allow anonymously uploaded illegal software
LAN / WAN Domain : The boundary between the trusted and un-trusted zones.The zones are filtered with a firewall
RISKS:
- Weak ingress/egress traffic filteringcan degrade performance.
- A firewall with unnecessary portsopen can allow access from the Internet
System / Application Storage Domain : This domain is made up of user-accessed servers suchas email and database
RISKS:
- A fire can destroy primary data
- A DOS attack can cripple the organization’s email
Remote Access Domain :The domain in which a mobileuser can access the local network remotely, usually through a VPN
RISKS:
- Communication circuit outage candeny connection.
- Remote communication from officecan be unsecured.
- VPN tunneling between remotecomputer and ingress/egress routercan be hacked
Answer:
a. open port
Explanation:
Based on the information provided within the question it can be said that the port state that represents this is an open port. Like mentioned in the question below, this state refers to a TCP or UDP port that has been configured to receive packets, or in other words listen to oncoming instructions that are being sent from other computers or servers.