OCR (b) describe the hardware needed to connect stand-alone computers into a local area network, including hub/switches, wireless access points

Size: px
Start display at page:

Download "OCR 2.1.6 (b) describe the hardware needed to connect stand-alone computers into a local area network, including hub/switches, wireless access points"

Transcription

1 Candidates shuld be able t: OCR (a) explain the advantages f netwrking stand-alne cmputers int a lcal area netwrk AQA understand what a cmputer netwrk is and be able t discuss the advantages and disadvantages f using a cmputer netwrk A netwrk is defined as a cllectin f cmputers and peripheral devices (such as printers) cnnected tgether. A lcal area netwrk (LAN) is a netwrk that intercnnects cmputers in a limited area such as a hme, schl, cmputer labratry, r ffice building. The cnnectins can be cable, fibre-ptic, r wireless (infra-red, micrwave r radi). Advantages f netwrks Sharing resurces: Sharing flders and files s yu can access them anywhere n the netwrk frm any cmputer Sharing peripheral devices such as printers and scanners Sharing an internet cnnectin Cmmunicatin: Using t cmmunicate with clleagues Using messaging systems t chat while yu are wrking n ther things Transferring files between cmputers Centralised management: User prfiles and security can all be managed centrally Sftware can be distributed acrss the netwrk rather than having t install it n each individual cmputer Users can use any PC n the netwrk but still see their wn files Data can easily be backed up centrally. Sme Netwrking Fantasy Read Terry Pratchett s bk 'Ging Pstal' fr a fun fantasy abut inventing and making mney frm netwrking technlgy n DiscWrld. Lads f cmputer scientists wh've read any Terry Pratchett's bks like them instantly even if they dn't read much else.

2 OCR (b) describe the hardware needed t cnnect stand-alne cmputers int a lcal area netwrk, including hub/switches, wireless access pints A netwrk interface card (NIC) is needed in each cmputer and peripheral cnnected in a LAN. This interface allws the devices t cmmunicate ver the netwrk either by using cables r wirelessly. Cabling is needed in a nn-wireless netwrk t cnnect the cmputers and peripherals tgether, either directly r thrugh a hub/switch. The amunt f cabling needed depends n the netwrk tplgy (the way cmputers and peripherals are physically cnnected tgether). A hub is used t link cmputers and peripherals tgether in a cabled netwrk that uses a star netwrk tplgy. A hub is a srt f junctin bx but des nt manage any f the traffic that cmes thrugh it, any data packet entering any prt is bradcast ut t all the ther prts resulting in data packet cllisins which slw the netwrk cnsiderably as the amunt f data traffic rises.

3 A switch is used in the same way as a hub but the data entering the device is switched t the prt it is meant t g t, rather than being bradcast t all the prts. This greatly reduces data packet cllisins resulting in a faster netwrk than the equivalent ne using a hub. A wireless access pint is a device that allws cmputers and printers etc. t cnnect t a wired netwrk using radi waves rather than cabling, prvided they are equipped with a wireless NIC. This allws a netwrk t be built with few r n cables and makes it simple t add further wireless devices. Student Activity If pssible it is best t get the students t make cnstruct a simple wired netwrk. Yu need 2 cmputers (sme decmmissined nes are ideal) a switch r hub, netwrk cards and patch cables. If the students ask questins such as What is CAT 5? r What is the difference between ISA and PCI? yu can write all these dwn and set them a task t research. Yu d nt have t cnnect this t yur schl netwrk s it shuld nt present a security threat t yur administratin staff. Hw t make a patch cable

4 OCR (c) explain the different rles f cmputers in a clientserver and a peer-t-peer netwrk AQA understand the client-server mdel Client-server netwrks On a client-server netwrk there are tw types f cmputers with tw distinct rles. One r mre server cmputers have the rle f cntrlling access t shared resurces like files and printers. Multiple client cmputers are then cnnected t the server cmputers and these are where the user actually wrks. The user lgs nt a client cmputer which then cnnects t the server, verifies the user and then allws them access t the files stred n the server that they have permissin t access. All the data is stred n the servers, which generally have far greater security cntrls than the client cmputers. Since data strage is centralised, security is easier t manage, updates t the data are far easier t administer and it is far easier t backup the data centrally in cmparisn t a peer-t-peer netwrk. Other servers may have a mre specialised rle such as a print server, dedicated t cntrlling access t shared printers and queuing print jbs. Peer-t-peer netwrks In a peer-t-peer netwrk cmputers are simply linked tgether, either using cables and a hub r wirelessly. Such netwrks d nt have cmputers with particular rles; instead, each cmputer has equivalent respnsibilities and status. This means that any cmputer n the netwrk can lad infrmatin frm the hard disk f any ther cmputer and a cmputer n the netwrk can use any printer cnnected t any ther cmputer. Peer-t-peer netwrks are cheaper t set up and easier t manage than server based netwrks but they are less secure than a client-server netwrk.

5 OCR (d) describe, using diagrams r therwise, the ring, bus and star netwrk tplgies AQA be able t describe and explain the bus, ring and star netwrking tplgies and be able t discuss the advantages and disadvantages f each f these tplgies Cmputers can be cnnected tgether in different layuts, r tplgies. There are three main tplgies but these may be cmbined in a large netwrk. Ring netwrk This is typically a peer-t-peer netwrk. The ndes are cnnected in a ring and data travels in ne directin using a cntrl signal called a 'tken'. Advantages: Cnsistent perfrmance when adding further ndes r heavy netwrk traffic as nly the nde with the 'tken' can transmit data s there are n data cllisins. Relatively cheap t install and expand. Tken passing prtcl is simple and reliable. Nt dependent n a central cmputer Disadvantages: Slwer than a star tplgy under nrmal lad. If the cable fails anywhere in the ring then the whle netwrk will fail because if any nde fails then the tken cannt be passed arund the ring. The hardest tplgy t trublesht because f the difficulty f tracking dwn where in the ring the failure has ccurred. Incnvenient t mdify r expand because t add r remve a nde yu must shut dwn the netwrk temprarily. In rder fr the ndes t cmmunicate with each ther they must all be switched n. Are ring netwrks still in use? Bus netwrk Ndes are cnnected t a main (bus) cable. Cmputers are cnnected t a single backbne (bus) cable. The cmputers all share this cable t transmit t each ther but nly ne cmputer can transmit at any ne time. This is fine mst f the

6 time if the netwrk is nt t busy but if there is a lt f traffic then transmissins interfere with each ther. In an Ethernet netwrk if data is being sent between ndes then the ther ndes cannt transmit. If t many ndes are cnnected then the transfer f data slws dramatically as the ndes have t wait lnger fr the bus t be clear. Advantages: The simplest and cheapest t install and extend. Well suited fr temprary netwrks with nt many ndes. Very flexible as cmputers can be added r taken away withut disturbing the rest f the netwrk. Failure f ne nde des nt affect the rest f the bus netwrk. Simpler than a ring tplgy t trublesht if there is a cable failure because sectins can be islated and tested independently. Disadvantages: If the bus cable fails then the whle netwrk will fail. Perfrmance f the netwrk slws dwn rapidly with mre cmputers r heavy netwrk traffic. Slwer than a ring netwrk as data cannt be transmitted while the bus is in use by ther cmputers. Star netwrk A central cmputer (server) and the subsidiary cmputer are cnnected t each ther thrugh a switch r hub. Advantages: The mst reliable because the failure f a cmputer r a cable des nt affect ther cmputers. Simple t trublesht because nly ne cmputer is affected by a brken cable. Adding further cmputers des nt greatly affect perfrmance because the data des nt pass thrugh unnecessary ndes. Easily upgraded by replacing a hub with a switch. Easy t expand with extra cmputers.

7 Disadvantages: Uses the mst cable which makes it mre expensive t install than the ther tw tplgies. The extra hardware required such as hubs r switches further increases the cst. As the central cmputer cntrls the whle system, the whle system will be affected if it breaks dwn r if the cable link between it and the switch fails. If the switch, the link t the server r the server itself fails then the whle netwrk fails Netwrk tplgies presentatin Get students t prduce an animated presentatin shwing hw data packets are transmitted arund a ring, bus netwrk and a star netwrk with a hub r a switch. Find ut which layut is used in yur schl Get students t talk t the netwrk technicians t find ut what netwrk layuts are used in yur schl. This is usually sme srt f cmbined setup: Cmputer science fr fun Slve a netwrking prblem: fix the pipes. One f the majr issues in netwrking is finding the best way fr data t travel rund the netwrk. With ld-style telephne calls, when yu made a call t a friend there was a physical link made s that everything yu said travelled alng the same path frm start t finish. With digital netwrks, yur data (whether yur vice, s, a mvie r the cntents f a web page) desn't have t all g the same way. It is brken int parts knwn as data packets. Each part can g whichever way is best fr the netwrk r the persn. One issue is finding ways t send data between tw pints s that as many data packets can travel at nce as pssible. What is needed is an algrithm that cmputers cntrlling the netwrk can fllw that guarantees t slve this prblem. Pinky's Pipes Pickle is a game t maximise the flw in a pipe netwrk.

8 Cmparisn Grid Tplg y Perfrmanc e with few cmputers Perfrmanc e with many cmputers Ease f trubleshtin g Cst f installati n Ease f setting up and mdifyin g Prblems caused by cable r cmputer failure LINE (BUS) Medium Mst affected Fairly easy Lw Easy t set up and mdify Failure f the bus cable causes ttal failure. Failure f a cmputer has n affect. RING Slw Least affected Hard High Easy t set up but harder t mdify Cable r cmputer failure causes ttal netwrk failure. STAR Fast Sme affect but the switch/hub can be upgraded easily Easy High Easy t set up and mdify Cable r cmputer failure nly affects that nde. Failure f the hub/switc h r the server causes ttal netwrk failure.

9 OCR (e) describe the differences between a lcal area netwrk and a wide area netwrk such as the Internet A Wide Area Netwrk, r WAN, is a cllectin f cmputers and netwrks ver a gegraphically wide area. The Internet is the largest WAN.. Smaller examples f a WAN wuld include a natinal ATM netwrk used by a bank t allw custmers t access cash. Many supermarkets and ther large cmpanies perate their wn natinal WANs. WANs use hired infrastructure t cnnect the LANs tgether. A business with ffices in Lndn and Manchester will lease cnnectins frm a netwrk service prvider t cnnect the ffice LANs tgether. OCR (f) explain the terms IP addressing, MAC addressing, packet and prtcls AQA be able t explain, in simple terms, the handshake prcess used in mst mdern netwrking prtcls IP Addressing An Internet Prtcl (IP) address is a unique 32-bit reference number that is allcated t devices n a cmputer netwrk that uses the Internet Prtcl. Althugh IP addresses are stred as 32-bit numbers, fr ur cnvenience they are usually displayed as a series f 4 decimal numbers, each ne representing 8 bits f the riginal binary address. 32-bit binary versin: decimal versin: Sme IP addresses are reserved fr private netwrk ranges e.g MAC Addressing In cmputer netwrking, a Media Access Cntrl address (MAC address) is a unique 48-bit number assigned t a netwrk interface card (NIC) t identify it n a LAN. Because they are s lng, MAC addresses are usually displayed in hexadecimal. 48-bit binary versin: hexadecimal versin: C-F1-F7-85 MAC addresses are limited t being used n a LAN while IP addresses can be used n multiple types f netwrks including the Internet. On a LAN, data packets that use a prtcl such as TCP/IP will be packaged inside data packets that use the MAC address t deliver them crrectly. Anther use fr the MAC address is as a security feature n cabled and wireless systems, nly allwing cmputers with authrised MAC addresses t have access t the netwrk. This wrks by inspecting the data packet that is sent frm a cmputer t see if its MAC address matches ne f the apprved nes in a pre-defined table.

10 Packets Mdern cmputer netwrks, including the Internet, carry data by breaking it dwn int a series f distinct units called packets, rather than sending it as a cntinuus stream f data. A typical packet might cntain 1,000 t 1,500 bytes and has tw parts: Cntrl infrmatin - this prvides the data that the netwrk needs t deliver the paylad, fr example the surce and destinatin addresses. It will als have errr checking data and the number f the packet s they can be reassembled in the crrect rder. The cntrl infrmatin is fund in the packet headers and fters Data - this is the user data that is t be delivered and is lcated between the packet headers and fters. In cmplex netwrks such as the Internet, a series f packets sent frm ne cmputer t anther may fllw different rutes t reach the same destinatin. This technlgy is called packet switching and makes the netwrk mre efficient because the netwrk can balance the lad acrss varius pieces f equipment and if there is a prblem with ne piece f equipment in the netwrk then packets can be ruted arund it. Prtcls A prtcl is the set f rules that define hw devices cmmunicate. As lng as the cmputers n a netwrk are using the same prtcl then they will be able t exchange data crrectly. A prtcl will cver: hw the cmmunicatin will start the transmissin speed the significance f the bits being transmitted hw the bits will be delivered (ne at a time r in grups f 16 fr example) errr checking prcedures used The Internet Prtcl is knwn as TCP/IP, named frm tw f the mst imprtant prtcls in it: the Transmissin Cntrl Prtcl (TCP) the Internet Prtcl (IP). The TCP prvides the service f exchanging data directly between tw netwrked cmputers while the IP is used t rute data packets between netwrks and ver the Internet. Accessing Websites n the Internet Websites are stred n web servers cnnected t the internet. The site will have an IP address s peple can access the pages using their brwser sftware. Hwever, when yu want t access a site yu dn t type the IP address, yu type in a dmain name such as This is because humans are quite bad at remembering numbers and typing them in crrectly s the dmain name is a text reference t a site that can be translated int the numerical IP address. When yu type the dmain name, int the brwser the web page request is sent t a Dmain Name System (DNS) server in the internet. The DNS server has a database f dmain names and IP addresses s it can translate the dmain name int an IP address. Student Research What Is the IP Address f yur schl website? What Is the IP Address f Facebk?

11 Handshaking When a cmputer cmmunicates with anther device like a mdem, printer, r netwrk server, it needs t handshake with it t establish a cnnectin. A simple handshaking prtcl might nly invlve the receiver sending a message meaning "I received yur last message and I am ready fr yu t send me anther ne." A mre cmplex handshaking prtcl might allw the sender t ask the receiver if he is ready t receive r fr the receiver t reply e.g. "I did nt receive yur last message crrectly, please resend it" (if the data was crrupted en rute). Establishing a nrmal TCP cnnectin requires three separate steps: 1. The first cmputer (Alice) sends the secnd cmputer (Bb) a "synchrnize" (SYN) message, which Bb receives. 2. Bb replies with a synchrnize-acknwledgment (SYN-ACK) message, which Alice receives. 3. Alice replies with an acknwledgment message, which Bb receives, and desn't need t reply t. OCR (g) explain the need fr security measures in netwrks, such as user access levels, suitable passwrds and encryptin techniques Usernames/Passwrds The file server must ensure that peple can nly access files that they are permitted t. Mst file servers d this by making each user lg n with a user name and passwrd befre they can access any files. The user name that a user lgs n with will determine which files the user can access and change. Passwrds are the mst cmmn way f securing a netwrk. A user will have a public username and a private passwrd. Anyne can knw, r guess, a username, but nly the user will knw the passwrd. The passwrd shuld be smething that that the user will remember, but very difficult fr anyne else t guess (r crack). A username is smetimes likened t the address f a huse and the passwrd as the frntdr key anyne can find the address, but very few will have the frnt-dr key. A passwrd and username are a set f characters that need t be typed in. The strnger the passwrd, the harder it is fr smene else t find the passwrd. Passwrds shuld be a mixture f upper case, lwer case, digits and punctuatin marks (e.g. Hell79_?!). The numerus ways in which permanent r semi-permanent passwrds can be cmprmised has prmpted the develpment f ther techniques. Sme alternatives t passwrds: Single-use passwrds. Mst users find single use passwrds extremely incnvenient. They have, hwever, been widely implemented in persnal nline banking, where they are knwn as Transactin Authenticatin Numbers (TANs). Access cntrls based n public key cryptgraphy. The necessary keys are usually t large t memrize and must be stred n a lcal cmputer, security tken r prtable memry device, such as a USB flash drive r even flppy disk. Bimetric methds prmise authenticatin based n unalterable persnal characteristics, but currently have high errr rates and require additinal hardware t scan, fr example, fingerprints, irises, etc. Nn-text-based passwrds, such as graphical passwrds r muse-mvement based passwrds. Graphical passwrds are an alternative means f authenticatin fr lg-in intended t be used in place f cnventinal passwrd; they use images, graphics r clurs instead f letters, digits r special characters. One system

12 requires users t select a series f faces as a passwrd, utilizing the human brain's ability t recall faces easily. Cgnitive passwrds use questin and answer cue/respnse pairs t verify identity. Research There are lts f pprtunities fr research. Spf fingerprints: Pster Create a pster n creating strng passwrds. Access levels Netwrk managers can set up grups f users with different levels f access t the netwrk. At the highest level, the netwrk manager can install and remve sftware, access all user areas and change permissins. At lwer levels, a grup f users may nly be able t access particular pieces f sftware and their files stred in their wn areas.

13 Different levels f access help t ensure that the netwrk remains secure and that nly licenced sftware is used n it. Yur level f access is linked t yur User ID What levels f access are there in yur schl? Netwrk Managers, The Headmaster, Teachers, Students Encryptin This is the prcess f cnverting data t be sent ver a netwrk int smething that is unreadable by a human. Data is first encrypted by sftware then sent ver the netwrk. The receiver will knw hw t decrypt the message int smething that is recgnisable. Encryptin uses very advanced mathematical techniques, cmmnly relying n prperties f prime numbers. The best encryptin (harder t crack) uses a lt f bits t stre the key (a number that is used t decipher the encrypted data). Typically 128 r 256 bits are used. When yu buy smething n the internet r use internet banking yu may have nticed that instead f HTTP in frnt f the dmain name it changes t HTTPS.It wrks in the same way as HTTP but is encrypted s yur payment details are kept secure. Firewalls A firewall is a device r set f devices designed t permit r deny netwrk transmissins based upn a set f rules and is frequently used t prtect netwrks frm unauthrized access while permitting legitimate cmmunicatins t pass. Many persnal cmputer perating systems include sftware-based firewalls t prtect against threats frm the public Internet. Many ruters that pass data between netwrks cntain firewall cmpnents and, cnversely, many firewalls can perfrm basic ruting functins. OCR (h) describe and justify netwrk plicies such as acceptable use, disaster recvery, failver, back up, archiving.

14 Acceptable Use Plicy (AUP) An acceptable use plicy (AUP; als smetimes acceptable usage plicy r Fair Use Plicy) is a set f rules applied by the wner/manager f a netwrk, website r large cmputer system that restrict the ways in which the netwrk site r system may be used. AUP dcuments are written fr crpratins, businesses, universities, schls, internet service prviders, and website wners ften t reduce the ptential fr legal actin that may be taken by a user, and ften with little prspect f enfrcement. Acceptable Use Plicies are an integral part f the framewrk f infrmatin security plicies; it is ften cmmn practice t ask new members f an rganizatin t sign an AUP befre they are given access t its infrmatin systems. Fr this reasn, an AUP must be cncise and clear, while at the same time cvering the mst imprtant pints abut what users are, and are nt, allwed t d with the IT systems f an rganizatin. It shuld als define what sanctins will be applied if a user breaks the AUP. What is the AUP in yur schl? When d yu have t cmply with the rules? D yu think all the rules are reasnable? Shuld sme rules be added? Is it clear and cncise? What sanctins are applied if yu break the rules? Disaster Recvery Disaster recvery is the prcess, plicies and prcedures related t preparing fr recvery r cntinuatin f technlgy infrastructure critical t an rganizatin after a natural r human-induced disaster. It is estimated that mst large cmpanies spend between 2% and 4% f their IT budget n disaster recvery planning, with the aim f aviding larger lsses in the event that the business cannt cntinue t functin due t lss f IT infrastructure and data. Of cmpanies that had a majr lss f business data, 43% never repen, 51% clse within tw years, and nly 6% will survive lng-term. Disasters can be classified in tw brad categries. The first is natural disasters such as flds, hurricanes, trnades r earthquakes. While preventing a natural disaster is very difficult, measures such as gd planning which includes mitigatin measures can help reduce r avid lsses. The secnd categry is man made disasters. These include hazardus material spills, infrastructure failure, r bi-terrrism. In these instances surveillance and mitigatin planning are invaluable twards aviding r lessening lsses frm these events. Failver

15 In cmputing, failver is the capability t switch ver autmatically t a redundant r standby cmputer server, system, r netwrk upn the failure r abnrmal terminatin f the previusly active applicatin, server, system, r netwrk. Failver happens withut human interventin and generally withut warning, unlike switchver. Systems designers usually prvide failver capability in servers, systems r netwrks requiring cntinuus availability and a high degree f reliability. At server-level, failver autmatin takes place using a "heartbeat" cable that cnnects tw servers. As lng as a regular "pulse" r "heartbeat" cntinues between the main server and the secnd server, the secnd server will nt initiate its systems. There may als be a third "spare parts" server that has running spare cmpnents fr "ht" switching t prevent dwn time. The secnd server will immediately take ver the wrk f the first as sn as it detects an alteratin in the "heartbeat" f the first machine. Sme systems have the ability t page r send a message t a pre-assigned technician r center. Sme systems, intentinally, d nt failver entirely autmatically, but require human interventin. This "autmated with manual apprval" cnfiguratin runs autmatically nce a human has apprved the failver. Failback, cnversely, invlves the prcess f restring a system/ cmpnent/ service in a state f failver back t its riginal state (befre failure). Back up In Cmputing, a backup refers t making cpies f data s that the cpy may be used t restre the riginal after a data lss event. The primary purpse is t recver data as a reactin t data lss. Data lss is a very cmmn experience f cmputer users. 67% f internet users have suffered serius data lss. Thugh backups represent a simple frm f disaster recvery, and shuld be part f a disaster recvery plan, by themselves, backups shuld nt be cnsidered disaster recvery. Nt all backup systems and/r backup applicatins are able t recnstitute a cmputer system. Since a backup system cntains at least ne cpy f all data wrth saving, the data strage requirements are cnsiderable. Organizing this strage space and managing the backup prcess is a cmplicated undertaking. In the mdern era f cmputing there are many different types f data strage devices that are useful fr making backups. There are als many different ways in which these devices can be arranged t prvide gegraphic redundancy, data security, and prtability. Archiving Archiving means t mve files t a lng-term strage medium. Backup and archiving are tw different prcesses. The strage media used within an archive shuld be stable and lng lasting. T cmply with crprate and gvernment regulatins n data, cmpanies will archive data nt in used but may be needed. Archiving can result in tw majr benefits:

16 It lets yu reclaim disk space n the primary strage. Saving disk space, alng with ther factrs, can lwer strage csts. This als means a significant reductin in csts f backup media. It can imprve perfrmance. By separating inactive data frm active data, database scans and ther data access peratins becme faster.

HIPAA HITECH ACT Compliance, Review and Training Services

HIPAA HITECH ACT Compliance, Review and Training Services Cmpliance, Review and Training Services Risk Assessment and Risk Mitigatin: The first and mst imprtant step is t undertake a hlistic risk assessment that examines the risks and cntrls related t fur critical

More information

Serv-U Distributed Architecture Guide

Serv-U Distributed Architecture Guide Serv-U Distributed Architecture Guide Hrizntal Scaling and Applicatin Tiering fr High Availability, Security, and Perfrmance Serv-U Distributed Architecture Guide v14.0.1.0 Page 1 f 16 Intrductin Serv-U

More information

System Business Continuity Classification

System Business Continuity Classification Business Cntinuity Prcedures Business Impact Analysis (BIA) System Recvery Prcedures (SRP) System Business Cntinuity Classificatin Cre Infrastructure Criticality Levels Critical High Medium Lw Required

More information

Understand Business Continuity

Understand Business Continuity Understand Business Cntinuity Lessn Overview In this lessn, yu will learn abut: Business cntinuity Data redundancy Data availability Disaster recvery Anticipatry Set What methds can be emplyed by a system

More information

How to deploy IVE Active-Active and Active-Passive clusters

How to deploy IVE Active-Active and Active-Passive clusters Hw t deply IVE Active-Active and Active-Passive clusters Overview Juniper Netscreen SA and SM series appliances supprt Active/Passive r Active/Active cnfiguratins acrss a LAN r a WAN t prvide high availability,

More information

Disk Redundancy (RAID)

Disk Redundancy (RAID) A Primer fr Business Dvana s Primers fr Business series are a set f shrt papers r guides intended fr business decisin makers, wh feel they are being bmbarded with terms and want t understand a cmplex tpic.

More information

System Business Continuity Classification

System Business Continuity Classification System Business Cntinuity Classificatin Business Cntinuity Prcedures Infrmatin System Cntingency Plan (ISCP) Business Impact Analysis (BIA) System Recvery Prcedures (SRP) Cre Infrastructure Criticality

More information

OCR LEVEL 2 CAMBRIDGE TECHNICAL

OCR LEVEL 2 CAMBRIDGE TECHNICAL Cambridge TECHNICALS OCR LEVEL 2 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN IT SETTING UP AN IT NETWORK M/601/3274 LEVEL 2 UNIT 6 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 SETTING UP AN IT NETWORK

More information

In addition to assisting with the disaster planning process, it is hoped this document will also::

In addition to assisting with the disaster planning process, it is hoped this document will also:: First Step f a Disaster Recver Analysis: Knwing What Yu Have and Hw t Get t it Ntes abut using this dcument: This free tl is ffered as a guide and starting pint. It is des nt cver all pssible business

More information

BackupAssist SQL Add-on

BackupAssist SQL Add-on WHITEPAPER BackupAssist Versin 6 www.backupassist.cm 2 Cntents 1. Requirements... 3 1.1 Remte SQL backup requirements:... 3 2. Intrductin... 4 3. SQL backups within BackupAssist... 5 3.1 Backing up system

More information

Data Protection Policy & Procedure

Data Protection Policy & Procedure Data Prtectin Plicy & Prcedure Page 1 Prcnnect Marketing Data Prtectin Plicy V1.2 Data prtectin plicy Cntext and verview Key details Plicy prepared by: Adam Haycck Apprved by bard / management n: 01/01/2015

More information

Department of CSIT Organizes a 2-Day Skill Development Workshop On Basic Networking Tools and Concepts. On 14-15 March 2016

Department of CSIT Organizes a 2-Day Skill Development Workshop On Basic Networking Tools and Concepts. On 14-15 March 2016 Department f CSIT Organizes a 2-Day Skill Develpment Wrkshp On Basic Netwrking Tls and Cncepts On 14-15 March 2016 In Jint Cllabratin With Skill Develpment Cell Guru Ghasidas Vishwavidyalaya, Bilaspur

More information

Firewall/Proxy Server Settings to Access Hosted Environment. For Access Control Method (also known as access lists and usually used on routers)

Firewall/Proxy Server Settings to Access Hosted Environment. For Access Control Method (also known as access lists and usually used on routers) Firewall/Prxy Server Settings t Access Hsted Envirnment Client firewall settings in mst cases depend n whether the firewall slutin uses a Stateful Inspectin prcess r ne that is cmmnly referred t as an

More information

Chapter - 3. Cable Connections

Chapter - 3. Cable Connections Chapter - 3 Cable Cnnectins One bradband alternative is thrugh cable TV, where yur Internet cnnectin is delivered t yur hme thrugh yur televisin cable. Many cable prviders wn't qute yu an exact speed,

More information

Often people have questions about new or enhanced services. This is a list of commonly asked questions and answers regarding our new WebMail format.

Often people have questions about new or enhanced services. This is a list of commonly asked questions and answers regarding our new WebMail format. Municipal Service Cmmissin Gerald P. Cle Frederick C. DeLisle Thmas M. Kaul Gregry L. Riggle Stanley A. Rutkwski Electric, Steam, Water Cable Televisin and High Speed Internet Service since 1889 Melanie

More information

How do I evaluate the quality of my wireless connection?

How do I evaluate the quality of my wireless connection? Hw d I evaluate the quality f my wireless cnnectin? Enterprise Cmputing & Service Management A number f factrs can affect the quality f wireless cnnectins at UCB. These include signal strength, pssible

More information

Improved Data Center Power Consumption and Streamlining Management in Windows Server 2008 R2 with SP1

Improved Data Center Power Consumption and Streamlining Management in Windows Server 2008 R2 with SP1 Imprved Data Center Pwer Cnsumptin and Streamlining Management in Windws Server 2008 R2 with SP1 Disclaimer The infrmatin cntained in this dcument represents the current view f Micrsft Crpratin n the issues

More information

GUIDANCE FOR BUSINESS ASSOCIATES

GUIDANCE FOR BUSINESS ASSOCIATES GUIDANCE FOR BUSINESS ASSOCIATES This Guidance fr Business Assciates dcument is intended t verview UPMCs expectatins, as well as t prvide additinal resurces and infrmatin, t UPMC s HIPAA business assciates.

More information

Data Protection Act Data security breach management

Data Protection Act Data security breach management Data Prtectin Act Data security breach management The seventh data prtectin principle requires that rganisatins prcessing persnal data take apprpriate measures against unauthrised r unlawful prcessing

More information

Information Services Hosting Arrangements

Information Services Hosting Arrangements Infrmatin Services Hsting Arrangements Purpse The purpse f this service is t prvide secure, supprted, and reasnably accessible cmputing envirnments fr departments at DePaul that are in need f server-based

More information

Deployment Overview (Installation):

Deployment Overview (Installation): Cntents Deplyment Overview (Installatin):... 2 Installing Minr Updates:... 2 Dwnlading the installatin and latest update files:... 2 Installing the sftware:... 3 Uninstalling the sftware:... 3 Lgging int

More information

Treasury Gateway Getting Started Guide

Treasury Gateway Getting Started Guide Treasury Gateway Getting Started Guide Treasury Gateway is a premier single sign-n and security prtal which allws yu access t multiple services simultaneusly thrugh the same sessin, prvides cnvenient access

More information

Serv-U Distributed Architecture Guide

Serv-U Distributed Architecture Guide Serv-U Distributed Architecture Guide Hrizntal Scaling and Applicatin Tiering fr High Availability, Security, and Perfrmance Serv-U Distributed Architecture Guide v15.1.2.0 Page 1 f 20 Intrductin Serv-U

More information

STIOffice Integration Installation, FAQ and Troubleshooting

STIOffice Integration Installation, FAQ and Troubleshooting STIOffice Integratin Installatin, FAQ and Trubleshting Installatin Steps G t the wrkstatin/server n which yu have the STIDistrict Net applicatin installed. On the STI Supprt page at http://supprt.sti-k12.cm/,

More information

Helpdesk Support Tickets & Knowledgebase

Helpdesk Support Tickets & Knowledgebase Helpdesk Supprt Tickets & Knwledgebase User Guide Versin 1.0 Website: http://www.mag-extensin.cm Supprt: http://www.mag-extensin.cm/supprt Please read this user guide carefully, it will help yu eliminate

More information

COPIES-F.Y.I., INC. Policies and Procedures Data Security Policy

COPIES-F.Y.I., INC. Policies and Procedures Data Security Policy COPIES-F.Y.I., INC. Plicies and Prcedures Data Security Plicy Page 2 f 7 Preamble Mst f Cpies FYI, Incrprated financial, administrative, research, and clinical systems are accessible thrugh the campus

More information

Personal Data Security Breach Management Policy

Personal Data Security Breach Management Policy Persnal Data Security Breach Management Plicy 1.0 Purpse The Data Prtectin Acts 1988 and 2003 impse bligatins n data cntrllers in Western Care Assciatin t prcess persnal data entrusted t them in a manner

More information

Information & Communications Technology ICT Security Compliance Guide (Student)

Information & Communications Technology ICT Security Compliance Guide (Student) Infrmatin & Cmmunicatins Technlgy ICT Security Cmpliance Guide (Student) RESTRICTED Dcument ID: ICT-SSG Versin 1.1 Effective Date 1 Nv 2011 Dcument Cntrl Revisin Histry Versin Date Descriptin Authr 1.0

More information

First Global Data Corp.

First Global Data Corp. First Glbal Data Crp. Privacy Plicy As f February 23, 2015 Ding business with First Glbal Data Crp. ("First Glbal", First Glbal Mney, "we" r "us", which includes First Glbal Data Crp. s subsidiary, First

More information

Wireless Light-Level Monitoring

Wireless Light-Level Monitoring Wireless Light-Level Mnitring ILT1000 ILT1000 Applicatin Nte Wireless Light-Level Mnitring 1 Wireless Light-Level Mnitring ILT1000 The affrdability, accessibility, and ease f use f wireless technlgy cmbined

More information

Connecting to Email: Live@edu

Connecting to Email: Live@edu Cnnecting t Email: Live@edu Minimum Requirements fr Yur Cmputer We strngly recmmend yu upgrade t Office 2010 (Service Pack 1) befre the upgrade. This versin is knwn t prvide a better service and t eliminate

More information

Systems Support - Extended

Systems Support - Extended 1 General Overview This is a Service Level Agreement ( SLA ) between and the Enterprise Windws Services t dcument: The technlgy services the Enterprise Windws Services prvides t the custmer. The targets

More information

Flash Padlock. Self-Secured and Host-Independent USB Flash Drive White Paper. April 2007 Prepared by ClevX, LLC for Corsair Memory

Flash Padlock. Self-Secured and Host-Independent USB Flash Drive White Paper. April 2007 Prepared by ClevX, LLC for Corsair Memory Flash Padlck - White Paper Flash Padlck Self-Secured and Hst-Independent USB Flash Drive White Paper April 2007 Prepared by ClevX, LLC fr Crsair Memry 1 INTRODUCTION Millins f USB Flash Drives (UFDs) are

More information

Exercise 5 Server Configuration, Web and FTP Instructions and preparatory questions Administration of Computer Systems, Fall 2008

Exercise 5 Server Configuration, Web and FTP Instructions and preparatory questions Administration of Computer Systems, Fall 2008 Exercise 5 Server Cnfiguratin, Web and FTP Instructins and preparatry questins Administratin f Cmputer Systems, Fall 2008 This dcument is available nline at: http://www.hh.se/te2003 Exercise 5 Server Cnfiguratin,

More information

Plus500CY Ltd. Statement on Privacy and Cookie Policy

Plus500CY Ltd. Statement on Privacy and Cookie Policy Plus500CY Ltd. Statement n Privacy and Ckie Plicy Statement n Privacy and Ckie Plicy This website is perated by Plus500CY Ltd. ("we, us r ur"). It is ur plicy t respect the cnfidentiality f infrmatin and

More information

AML Internet Manor Court, Manor Farm House, London Road, Derby, Derbyshire, DE72 2GR. Tel: 01332 650 009 Fax: 01332 650 850 Email:

AML Internet Manor Court, Manor Farm House, London Road, Derby, Derbyshire, DE72 2GR. Tel: 01332 650 009 Fax: 01332 650 850 Email: AML Internet Manr Curt, Manr Farm Huse, Lndn Rad, Derby, Derbyshire, DE72 2GR. Tel: 01332 650 009 Fax: 01332 650 850 Email: Backup@AmlInternet.c.uk Cntents Page Situatin Analysis 3 AML Internet - The Slutin

More information

990 e-postcard FAQ. Is there a charge to file form 990-N (e-postcard)? No, the e-postcard system is completely free.

990 e-postcard FAQ. Is there a charge to file form 990-N (e-postcard)? No, the e-postcard system is completely free. 990 e-pstcard FAQ Fr frequently asked questins abut filing the e-pstcard that are nt listed belw, brwse the FAQ at http://epstcard.frm990.rg/frmtsfaq.asp# (cpy and paste this link t yur brwser). General

More information

State of Wisconsin. File Server Service Service Offering Definition

State of Wisconsin. File Server Service Service Offering Definition State f Wiscnsin File Server Service Service Offering Definitin Dcument Revisin Histry Date Versin Creatr Ntes 2/16/2008 1.0 JD Urfer First pass 2/16/2008 2.0 Tm Runge Editing changes 2/19/2009 2.1 Tm

More information

edoc Lite Recruitment Guidelines

edoc Lite Recruitment Guidelines edc Lite Recruitment Guidelines Intrductin OneStart & the Academic Psitin Search Channel edc Lite Ruting and Wrkgrups Ruting Actin List Ruting Cntrls Wrkgrups Dcument Search edc Lite Dcuments Vacancy Ntice

More information

Welcome to Remote Access Services (RAS)

Welcome to Remote Access Services (RAS) Welcme t Remte Access Services (RAS) Our gal is t prvide yu with seamless access t the TD netwrk, including the TD intranet site, yur applicatins and files, and ther imprtant wrk resurces -- whether yu

More information

HP Connected Backup Online Help. Version 8.7.1 04 October 2012

HP Connected Backup Online Help. Version 8.7.1 04 October 2012 HP Cnnected Backup Online Help Versin 8.7.1 04 Octber 2012 Legal Ntices Warranty The nly warranties fr Hewlett-Packard prducts and services are set frth in the express statements accmpanying such prducts

More information

Service Desk Self Service Overview

Service Desk Self Service Overview Tday s Date: 08/28/2008 Effective Date: 09/01/2008 Systems Invlved: Audience: Tpics in this Jb Aid: Backgrund: Service Desk Service Desk Self Service Overview All Service Desk Self Service Overview Service

More information

Best Practice - Pentaho BA for High Availability

Best Practice - Pentaho BA for High Availability Best Practice - Pentah BA fr High Availability This page intentinally left blank. Cntents Overview... 1 Pentah Server High Availability Intrductin... 2 Prerequisites... 3 Pint Each Server t Same Database

More information

Cloud Services Frequently Asked Questions FAQ

Cloud Services Frequently Asked Questions FAQ Clud Services Frequently Asked Questins FAQ Revisin 1.0 6/05/2015 List f Questins Intrductin What is the Caradigm Intelligence Platfrm (CIP) clud? What experience des Caradigm have hsting prducts like

More information

There are a number of themed areas for which the Council has responsibility, and each of these is likely to generate debts of a specific type:

There are a number of themed areas for which the Council has responsibility, and each of these is likely to generate debts of a specific type: Wiltshire Cuncil Crprate Debt Recvery Plicy: 29102010 WILTSHIRE COUNCIL CORPORATE DEBT RECOVERY POLICY 1. Intrductin The Cuncil raises a significant prprtin f its ttal incmes thrugh lcal taxes and charges,

More information

Process of Setting up a New Merchant Account

Process of Setting up a New Merchant Account Prcess f Setting up a New Merchant Accunt Table f Cntents PCI DSS... 3 Wh t cntact?... 3 Bakcgrund n PCI... 3 Why cmply?... 3 Hw t cmply?... 3 PCI DSS Scpe... 4 Des PCI DSS Apply t Me?... 4 What if I am

More information

TrustED Briefing Series:

TrustED Briefing Series: TrustED Briefing Series: Since 2001, TrustCC has prvided IT audits and security assessments t hundreds f financial institutins thrugh ut the United States. Our TrustED Briefing Series are white papers

More information

The Relativity Appliance Installation Guide

The Relativity Appliance Installation Guide The Relativity Appliance Installatin Guide February 4, 2016 - Versin 9 & 9.1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

More information

RECOMMENDATIONS SECURITY ONLINE BANK TRANSACTIONS. interests in the use of IT services, such as online bank services of Société Générale de Banques au

RECOMMENDATIONS SECURITY ONLINE BANK TRANSACTIONS. interests in the use of IT services, such as online bank services of Société Générale de Banques au RECOMMENDATIONS SECURITY ONLINE BANK TRANSACTIONS Best practices IT security refers t the bdy f techniques and best practices t prtect yur cmputers and yur interests in the use f IT services, such as nline

More information

Cisco IT Essentials v4.1. Course Overview. Total Hours: 240

Cisco IT Essentials v4.1. Course Overview. Total Hours: 240 PC Hardware and Sftware Teacher Resurce Cisc Essentials v4.1 Curse Overview Ttal Hurs: 240 Fundamental Chapters 1-10 Chapter 1: Intrductin t the Persnal Cmputer Hurs: 14.00 Gal: Chapter 2: The chapter

More information

X7500 Series, X4500 Scanner Series MFPs: LDAP Address Book and Authentication Configuration and Basic Troubleshooting Tips

X7500 Series, X4500 Scanner Series MFPs: LDAP Address Book and Authentication Configuration and Basic Troubleshooting Tips X7500 Series, X4500 Scanner Series MFPs: LDAP Address Bk and Authenticatin Cnfiguratin and Basic Trubleshting Tips Lexmark Internatinal 1 Prerequisite Infrm atin In rder t cnfigure a Lexmark MFP fr LDAP

More information

AMWA Chapter Subgroups on LinkedIn Guidance for Subgroup Managers and Chapter Leaders, updated 2-12-15

AMWA Chapter Subgroups on LinkedIn Guidance for Subgroup Managers and Chapter Leaders, updated 2-12-15 AMWA Chapter Subgrups n LinkedIn Guidance fr Subgrup Managers and Chapter Leaders, updated 2-12-15 1. Chapters may nt have an independent grup n LinkedIn, Facebk, r ther scial netwrking site. AMWA prvides

More information

The 3Dnet Cloud - are you connected yet?

The 3Dnet Cloud - are you connected yet? The 3Dnet Clud - are yu cnnected yet? 3DnetMedical is a clud-based service that prvides easy, timely access t studies nline. Fllwing IHE standards, any imaging setup can easily be cupled t the clud. Image

More information

Online Banking Agreement

Online Banking Agreement Online Banking Agreement 1. General This Online Banking Agreement, which may be amended frm time t time by us (this "Agreement"), fr accessing yur Clrad Federal Savings Bank accunt(s) via the Internet

More information

Instructions for Configuring a SAFARI Montage Managed Home Access Expansion Server

Instructions for Configuring a SAFARI Montage Managed Home Access Expansion Server Instructins fr Cnfiguring a SAFARI Mntage Managed Hme Access Expansin Server ~ Please read these instructins in their entirety befre yu begin. ~ These instructins explain hw t add a SAFARI Mntage Managed

More information

(in)rl Webcast - Hardware & Technology Checklist

(in)rl Webcast - Hardware & Technology Checklist (in)rl Webcast - Hardware & Technlgy Checklist Checklist fr Meetup Hsts 1. Passwrd t lgin t the webcast- we ll email this t yu the week f the event 2. The link fr viewing the webcast - we ll email this

More information

SolarWinds Technical Reference

SolarWinds Technical Reference SlarWinds Technical Reference Preparing an Orin Failver Engine Installatin Intrductin t the Orin Failver Engine... 1 General... 1 Netwrk Architecture Optins and... 3 Server Architecture Optins and... 4

More information

ViPNet VPN in Cisco Environment. Supplement to ViPNet Documentation

ViPNet VPN in Cisco Environment. Supplement to ViPNet Documentation ViPNet VPN in Cisc Envirnment Supplement t ViPNet Dcumentatin 1991 2015 Inftecs Americas. All rights reserved. Versin: 00121-04 90 02 ENU This dcument is included in the sftware distributin kit and is

More information

Help Desk Level Competencies

Help Desk Level Competencies Help Desk Level Cmpetencies Level 1 Take user calls and manage truble tickets Ability t staff and manage the rganizatins helpdesk and effectively respnd t rutine custmer calls Ability t use prper grammar

More information

CENTURIC.COM ONLINE DATA BACKUP AND DISASTER RECOVERY SOLUTION ADDENDUM TO TERMS OF SERVICE

CENTURIC.COM ONLINE DATA BACKUP AND DISASTER RECOVERY SOLUTION ADDENDUM TO TERMS OF SERVICE CENTURIC.COM ONLINE DATA BACKUP AND DISASTER RECOVERY SOLUTION ADDENDUM TO TERMS OF SERVICE This Agreement, named the Online Data Backup and Disaster Recvery Slutin Addendum t Centuric s Terms f Service

More information

Implementing ifolder Server in the DMZ with ifolder Data inside the Firewall

Implementing ifolder Server in the DMZ with ifolder Data inside the Firewall Implementing iflder Server in the DMZ with iflder Data inside the Firewall Nvell Cl Slutins AppNte www.nvell.cm/clslutins JULY 2004 OBJECTIVES The bjectives f this dcumentatin are as fllws: T cnfigure

More information

Access EEC s Web Applications... 2 View Messages from EEC... 3 Sign In as a Returning User... 3

Access EEC s Web Applications... 2 View Messages from EEC... 3 Sign In as a Returning User... 3 EEC Single Sign In (SSI) Applicatin The EEC Single Sign In (SSI) Single Sign In (SSI) is the secure, nline applicatin that cntrls access t all f the Department f Early Educatin and Care (EEC) web applicatins.

More information

HIPAA Compliance 101. Important Terms. Pittsburgh Computer Solutions 724-942-1337

HIPAA Compliance 101. Important Terms. Pittsburgh Computer Solutions 724-942-1337 HIPAA Cmpliance 101 Imprtant Terms Cvered Entities (CAs) The HIPAA Privacy Rule refers t three specific grups as cvered entities, including health plans, healthcare clearinghuses, and health care prviders

More information

FREQUENTLY ASKED QUESTIONS ABOUT MOBILE WEB BANKING

FREQUENTLY ASKED QUESTIONS ABOUT MOBILE WEB BANKING FREQUENTLY ASKED QUESTIONS ABOUT MOBILE WEB BANKING What is Mbile Banking? A service that enables yu t access yur accunt infrmatin, cnduct transfers, and pay and manage yur bill payments frm any mbile

More information

BIOS-enabled security features in HP business notebooks

BIOS-enabled security features in HP business notebooks Technical white paper BIOS-enabled security features in HP business ntebks Table f cntents Basics f security prtectin 2 Prtectin against unauthrized access 2 Prebt authenticatin using BIOS 2 Frgtten passwrds

More information

The Importance Advanced Data Collection System Maintenance. Berry Drijsen Global Service Business Manager. knowledge to shape your future

The Importance Advanced Data Collection System Maintenance. Berry Drijsen Global Service Business Manager. knowledge to shape your future The Imprtance Advanced Data Cllectin System Maintenance Berry Drijsen Glbal Service Business Manager WHITE PAPER knwledge t shape yur future The Imprtance Advanced Data Cllectin System Maintenance Cntents

More information

Magenta HR in partnership with breath ehr

Magenta HR in partnership with breath ehr BREATHEHR ONLINE HR SYSTEM AND PORTAL Magenta HR in partnership with breath ehr Magenta HR Cnsulting Ltd. 24 Canning Street, Edinburgh EH3 8EG Tel. 0131 2272769 www.magentahr.cm inf@magentahr.cm 6 December

More information

How Does Cloud Computing Work?

How Does Cloud Computing Work? Hw Des Clud Cmputing Wrk? Carl Mazzanti, CEO, emazzanti Technlgies IT Supprt and Clud Cmputing Services fr Small Business Hbken, NJ and NYC, 201-360- 4400 Owner [Pick the date] Hw des Clud Cmputing Wrk?

More information

ABELMed Platform Setup Conventions

ABELMed Platform Setup Conventions ABELMed Platfrm Setup Cnventins 1 Intrductin 1.1 Purpse f this dcument The purpse f this dcument is t prvide prspective ABELMed licensees and their hardware vendrs with the infrmatin that they will require

More information

Implementing SQL Manage Quick Guide

Implementing SQL Manage Quick Guide Implementing SQL Manage Quick Guide The purpse f this dcument is t guide yu thrugh the quick prcess f implementing SQL Manage n SQL Server databases. SQL Manage is a ttal management slutin fr Micrsft SQL

More information

Exercise 5 Server Configuration, Web and FTP Instructions and preparatory questions Administration of Computer Systems, Fall 2008

Exercise 5 Server Configuration, Web and FTP Instructions and preparatory questions Administration of Computer Systems, Fall 2008 Exercise 5 Server Cnfiguratin, Web and FTP Instructins and preparatry questins Administratin f Cmputer Systems, Fall 2008 This dcument is available nline at: http://www.hh.se/te2003 Exercise 5 Server Cnfiguratin,

More information

Preventing Identity Theft

Preventing Identity Theft Preventing Identity Theft Each year, millins f Americans have their identity stlen. ENG Lending wants yu t have the infrmatin yu need t prtect yurself against identity theft. While there are n guarantees

More information

Tipsheet: Sending Out Mass Emails in ApplyYourself

Tipsheet: Sending Out Mass Emails in ApplyYourself GEORGETOWN GRADUATE SCHOOL Tipsheet: Sending Out Mass Emails in ApplyYurself In ApplyYurself (AY), it is very simple and easy t send a mass email t all f yur prspects, applicants, r students with applicatins

More information

Why Can t Johnny Encrypt? A Usability Evaluation of PGP 5.0 Alma Whitten and J.D. Tygar

Why Can t Johnny Encrypt? A Usability Evaluation of PGP 5.0 Alma Whitten and J.D. Tygar Class Ntes: February 2, 2006 Tpic: User Testing II Lecturer: Jeremy Hyland Scribe: Rachel Shipman Why Can t Jhnny Encrypt? A Usability Evaluatin f PGP 5.0 Alma Whitten and J.D. Tygar This article has three

More information

A96 CALA Policy on the use of Computers in Accredited Laboratories Revision 1.5 August 4, 2015

A96 CALA Policy on the use of Computers in Accredited Laboratories Revision 1.5 August 4, 2015 A96 CALA Plicy n the use f Cmputers in Accredited Labratries Revisin 1.5 August 4, 2015 A96 CALA Plicy n the use f Cmputers in Accredited Labratries TABLE OF CONTENTS TABLE OF CONTENTS... 1 CALA POLICY

More information

Norwood Public Schools Internet & Cell Phone Use Agreement School Year 2015-16

Norwood Public Schools Internet & Cell Phone Use Agreement School Year 2015-16 Yu must read and agree t fllw the netwrk rules belw t use yur netwrk accunt r access the internet. Nrwd Public Schls makes available t students access t cmputers and the Internet. Students are expected

More information

Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013

Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013 Versin: Mdified By: Date: Apprved By: Date: 1.0 Michael Hawkins Octber 29, 2013 Dan Bwden Nvember 2013 Rule 4-004J Payment Card Industry (PCI) Patch Management (prpsed) 01.1 Purpse The purpse f the Patch

More information

Internet Banking Agreement and Disclosure Statement

Internet Banking Agreement and Disclosure Statement Internet Banking Agreement and Disclsure Statement This agreement cntains the terms and cnditins that gvern accessing r using Internet Banking (NetTeller), Bill Payment Services, Mbile Banking and On Demand

More information

Mobile Device Manager Admin Guide. Reports and Alerts

Mobile Device Manager Admin Guide. Reports and Alerts Mbile Device Manager Admin Guide Reprts and Alerts September, 2013 MDM Admin Guide Reprts and Alerts i Cntents Reprts and Alerts... 1 Reprts... 1 Alerts... 3 Viewing Alerts... 5 Keep in Mind...... 5 Overview

More information

Administration of SQL Server

Administration of SQL Server Administratin f SQL Server High Availability RNDr. David Hksza, Ph.D. http://siret.cz/hksza Outline High availability in SQL Server 2008 failver clustering lg shipping mirrring High availability in SQL

More information

A. Early Case Assessment

A. Early Case Assessment Electrnic Discvery Reference Mdel Standards fr the identificatin f electrnically stred infrmatin in discvery http://www.edrm.net/resurces/standards/identificatin A. Early Case Assessment Once a triggering

More information

CallRex 4.2 Installation Guide

CallRex 4.2 Installation Guide CallRex 4.2 Installatin Guide This dcument describes hw t install CallRex 4.2. It cvers the fllwing: CallRex 4.2 Cmpnents. Server Prerequisites. Perfrming the Installatin. Changing the Accunt Used by CallRex

More information

How to put together a Workforce Development Fund (WDF) claim 2015/16

How to put together a Workforce Development Fund (WDF) claim 2015/16 Index Page 2 Hw t put tgether a Wrkfrce Develpment Fund (WDF) claim 2015/16 Intrductin What eligibility criteria d my establishment/s need t meet? Natinal Minimum Data Set fr Scial Care (NMDS-SC) and WDF

More information

LogMeIn Rescue Web SSO via SAML 2.0 Configuration Guide

LogMeIn Rescue Web SSO via SAML 2.0 Configuration Guide LgMeIn Rescue Web SSO via SAML 2.0 LgMeIn Rescue Web SSO via SAML 2.0 Cnfiguratin Guide 02-19-2014 Cpyright 2015 LgMeIn, Inc. 1 LgMeIn Rescue Web SSO via SAML 2.0 Cntents 1 Intrductin... 3 1.1 Dcument

More information

Volume THURSTON COUNTY CLERK S OFFICE. e-file SECURE FTP Site (January 2011) User Guide

Volume THURSTON COUNTY CLERK S OFFICE. e-file SECURE FTP Site (January 2011) User Guide Vlume 1 THURSTON COUNTY CLERK S OFFICE e-file SECURE FTP Site (January 2011) User Guide Table f Cntents C H A P T E R 1 FTP e-filing SERVICE 1 Dcument Requirements 1 Scanners 2 File naming cnventin 2 e-file

More information

Christchurch Polytechnic Institute of Technology Access Control Security Standard

Christchurch Polytechnic Institute of Technology Access Control Security Standard CPIT Crprate Services Divisin: ICT Christchurch Plytechnic Institute f Technlgy Access Cntrl Security Standard Crprate Plicies & Prcedures Sectin 1: General Administratin Dcument CPP121a Principles Infrmatin

More information

BASIC TECHNICAL FEATURE DESCRIPTION

BASIC TECHNICAL FEATURE DESCRIPTION BASIC TECHNICAL FEATURE DESCRIPTION AUDRIGA EMAIL AND GROUPWARE MIGRATION SERVICE Versin 1.3 Datum 20.09.2013 Kntakt Hans-Jörg Happel (happel@audriga.cm) TECHNICAL FEATURE DESCRIPTION This is a basic technical

More information

Remote Desktop Tutorial. By: Virginia Ginny Morris

Remote Desktop Tutorial. By: Virginia Ginny Morris Remte Desktp Tutrial By: Virginia Ginny Mrris 2008 Remte Desktp Tutrial Virginia Ginny Mrris Page 2 Scpe: The fllwing manual shuld accmpany my Remte Desktp Tutrial vide psted n my website http://www.ginnymrris.cm

More information

FundingEdge. Guide to Business Cash Advance & Bank Statement Loan Programs

FundingEdge. Guide to Business Cash Advance & Bank Statement Loan Programs Guide t Business Cash Advance & Bank Statement Lan Prgrams Cash Advances: $2,500 - $1,000,000 Business Bank Statement Lans: $5,000 - $500,000 Canada Cash Advances: $5,000 - $500,000 (must have 9 mnths

More information

The complete notes are available at http://www.eng.uwaterloo.ca/~erick/ad/dns.htm

The complete notes are available at http://www.eng.uwaterloo.ca/~erick/ad/dns.htm Reprt: April 12, 2011 By Erick Engelke I have rganized my tasks arund tw majr prblems: 1. Define the new active directry a. Dmain Name Service fr the dmain - cmplete b. Dmain layut, structuring f Organizatinal

More information

Considerations for Success in Workflow Automation. Automating Workflows with KwikTag by ImageTag

Considerations for Success in Workflow Automation. Automating Workflows with KwikTag by ImageTag Autmating Wrkflws with KwikTag by ImageTag Cnsideratins fr Success in Wrkflw Autmatin KwikTag balances cmprehensive, feature-rich Transactinal Cntent Management with affrdability, fast implementatin, ease

More information

In-House Counsel Day Priorities for 2012. Cloud Computing the benefits, potential risks and security for the future

In-House Counsel Day Priorities for 2012. Cloud Computing the benefits, potential risks and security for the future In-Huse Cunsel Day Pririties fr 2012 Clud Cmputing the benefits, ptential risks and security fr the future Presented by David Richardsn Thursday 1 March 2012 WIN: What in-huse lawyers need Knwledge, supprt

More information

Health and Safety Training and Supervision

Health and Safety Training and Supervision Intrductin: Health and Safety Training and Supervisin University f Nttingham is cmmitted t maintaining and develping standards f excellence in all aspects f its business. T that end, the University aspires

More information

ROSS RepliWeb Operations Suite for SharePoint. SSL User Guide

ROSS RepliWeb Operations Suite for SharePoint. SSL User Guide ROSS RepliWeb Operatins Suite fr SharePint SSL User Guide Sftware Versin 2.5 March 18, 2010 RepliWeb, Inc., 6441 Lyns Rad, Ccnut Creek, FL 33073 Tel: (954) 946-2274, Fax: (954) 337-6424 E-mail: inf@repliweb.cm,

More information

Software and Hardware Change Management Policy for CDes Computer Labs

Software and Hardware Change Management Policy for CDes Computer Labs Sftware and Hardware Change Management Plicy fr CDes Cmputer Labs Overview The cmputer labs in the Cllege f Design are clsely integrated with the academic needs f faculty and students. Cmputer lab resurces

More information

Watson Communications 489 Shoemaker Road Suite 111 King of Prussia Pa 19446 610 631 5454 www.choosewatson.com for service custserv@watsonconnects.

Watson Communications 489 Shoemaker Road Suite 111 King of Prussia Pa 19446 610 631 5454 www.choosewatson.com for service custserv@watsonconnects. Telewrker Supprt Dcument Descriptin The Mitel Telewrker applicatin allws a Mitel IP telephne set t be used ff premise where ever a high speed internet cnnectin is available. All f the features f the Mitel

More information

iphone Mobile Application Guide Version 2.2.2

iphone Mobile Application Guide Version 2.2.2 iphne Mbile Applicatin Guide Versin 2.2.2 March 26, 2014 Fr the latest update, please visit ur website: www.frte.net/mbile Frte Payment Systems, Inc. 500 West Bethany, Suite 200 Allen, Texas 75013 (800)

More information

How Checking Accounts Work

How Checking Accounts Work Hw Checking Accunts Wrk LESSON PREPARATION AND TEACHER INFORMATION Lessn Summary: This lessn is intended fr high schl students during a frty minute time perid. The lessn teaches students the purpse f a

More information

MPDS Configuration Sheet Windows 2000

MPDS Configuration Sheet Windows 2000 MPDS Cnfiguratin Sheet Windws 2000 Cnnecting t the Internet via a Mbile Packet Data service terminal Setting up a Windws 2000 mdem device The PC cmmunicates with the MPDS terminal as if it were a mdem.

More information

Trends and Considerations in Currency Recycle Devices. What is a Currency Recycle Device? November 2003

Trends and Considerations in Currency Recycle Devices. What is a Currency Recycle Device? November 2003 Trends and Cnsideratins in Currency Recycle Devices Nvember 2003 This white paper prvides basic backgrund n currency recycle devices as cmpared t the cmbined features f a currency acceptr device and a

More information