1.) etc, system administrators should not abuse their

1.)   Explain NetiquetteA.)   Definition – the new rules of etiquette havebeen stabilised into a term NETIQUETTE. The word netiquette was created bycombining words NET and ETIKETA (a set of rules of social behaviour andhabits). Netiquette constitutes the rules of the behaviour of users on anetwork. Although the netiquette is merely “an unwritten set ofrules”, people not using it can be understood as a type of disrespect. (Kozík,T and Slivová,J.

, 2014)B.)   Three rules of Netiquette One can research a topic beforeasking a question to an expert or correct a work before posting use spell checkand check grammar through correctness and care withboth your language form. (Vincent, J , 2008)  Etc, proofread and check for errors alwaysspell check your email, proofread for errors, capitalize your sentences, anduse appropriate punctuation and grammar. (Kallos, J. 2004)  Knowing more than others, orhaving more power than they do, does not give you the right to take advantageof them.

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!

order now

For example, sysadmins should never read private email etc, systemadministrators should not abuse their power by taking advantage of it. (Shea, V. 1994; Vincent, J . 2008; Kozík,T and Slivová,J. , 2014 )   (Everyone’sa newbie sometime, so if you feel that you must point out an error to someone,do so politely (Shea, V. 1994; Vincent, J . 2008; Kozík,T andSlivová,J. , 2014 ) 2.

)   Describe two types of InternetAccess Providers·        ISP- Internet Service Provider which first began to emergein the late 1980s and early 1990s, these providers connect customers tocustomers of other service providers by way of networks (xfinity, 2017) connectend-users and businesses to the public Internet. They compete on price,performance, reliability, etc. but they also must cooperate with each other toprovide global connectivity to all other attachments on the Internet. (Norton, B,W. 2001) ·        WIP- Wireless Internet service provider is an Internet service provider with a network based on wireless networking.Technology may include commonplace Wi-Fi wireless mesh networking, or proprietary equipmentdesigned to operate over open 900 MHz,2.4 GHz,4.

9, 5, 24, and 60 GHz bands or licensed frequencies in the UHF band, LMDS, and other bands from 6Ghz to 80Ghz. (Shelly, G,B. 2008) 3.)    Explainthe purpose of a WebsiteThe main purpose of a Website: Different kinds ofwebsites have different purposes depending on who the intended audience is. Respondentsin our survey selected two purposes well above the rest: to provide informationto current and potential clients (30%) and to promote and market theorganization (27%). These two purposes accounted for more than the restcombined (see Graph 9). What this tells us is that the Web is considered primarilya means of communication, first to inform and second to promote.

(Bauer, M.2009) 4.)    Suggestionof a browser with justificationsUber mayconsider the following recommendations to improve the security, time managementand storage to their organization. Cloud StorageOnecloud software product which provides features common in larger public StaaSproducts while being a freely available software package is ownCloud, which hasseen rapid development and is now one of the major open source StaaS products.

For example, Google Trends shows a significant rise in popularity for the search term “own-cloud” in the last two years (Martini, B and Choo,K, K, Y. 2013). Security·        The severityof vulnerabilities. By sandboxing their renderingengine, browsers can reduce the severity of vulnerabilities. Sandboxes limitthe damage that can be caused by an attacker who exploits a vulnerability inthe rendering engine. ·        The windowof vulnerability.

Browsers can reduce this window byimproving the user experience for installing browser updates, thus minimizingthe number of users running old versions that lack security patches. ·        Thefrequency of exposure. By warningusers before they visit known malicious sites, browsers can reduce thefrequency with which users interact with malicious content.  (Reis, C and Barth, A and Pizanol, C. 2009)


I'm Simon!

Would you like to get a custom essay? How about receiving a customized one?

Check it out