.

Wednesday, April 24, 2019

Discussion questions Assignment Example | Topics and Well Written Essays - 500 words - 3

Discussion questions - Assignment ExampleThis arouse be configured for the space setting so that it can include easy access to different personal files. The same can be done at school setting. It can be configured to include access to learner records, for instance. The differences are in the actual content and security access measures.Internet Explorer is often updated. opine you need to explain to a CIO what needs to be explored before deciding whether he / she would need to drive the new version or stay with the old version and why.The CIO must explore the benefits and drawbacks of IE 8 and to consider how they provide affect the business. For instance, the advantages of IE 8 are security because of Smart Screen leach and other built-in security features, reliability, such as by dint of Automatic Crash Recovery, manageability through manageability features, and accurately displaying Web content. Its drawbacks are 1) as a closed-source system, to have add-ons means paying fo r a license and 2) it still has security issues. The CIO must think about the time and costs for the adoption of IE 8.The text implies that restricting the applications users can run on their computers creates a consistent workstation environment and provides increased security. As a CIO, take a position on this topic and support your position with supporting examples. How would your solution differ if you were an end user?This is good if only one group of people accesses the computers. What if aside from IT, engineers excessively need access to the system? Should engineers ask for permission and access every time they need these computers? These restrictions will affect overall productivity. Security should not sacrifice the efficiency and effectiveness of the company as a whole. Restrictions must not be too limited, especially to those who need to use the computers for their various workplace needs. Employees should be able to use these computers according to their functions and security

No comments:

Post a Comment