Question

Q.4.1 Describe the differences between EBCDIC, ASCII, and Unicode? (9) Q.4.2 When designing or updating computer network syst
0 0
Add a comment Improve this question Transcribed image text
Answer #1

Q:4.1

The American Standard Code for Information Interchange and the Extended Binary Coded Decimal Interchange Code are two character encoding schemes; which are more commonly known by their respective acronyms, ASCII and EBCDIC. The main difference between the two is the number of bits that they use to represent each character.The EBCDIC, ASCII, and Unicode encoding systems each use a different sort order for numbers, upper case alpha characters, lower case alpha characters, and special characters. As a result, if you load a partitioned table based on these characters, rows can be assigned to different partitions in the target table than they were in the original ASCII or EBCDIC source table, which might lead to unbalanced partitions in your database. You must determine if the partitioning keys need to be reevaluated when you migrate to Unicode.

The main difference between ASCII and EBCDIC is that the ASCII uses seven bits to represent a character while the EBCDIC uses eight bits to represent a character.IBM’s hold of the EBCDIC coding has led to many problems when it comes to updates. ASCII and EBCDIC later had updates to increase the number of characters that they can accommodate. ASCII pages had some code points replaced while maintaining most of the other code points. With EBCDIC, the different versions are highly incompatible with each other.

Differences:

ASCII EBCDIC & UNICOCE
A character encoding
standard for electronic
communication
An eight-bit character
encoding used mainly on IBM
mainframe and IBM midrange
computer operating systems
Stands for American
Standard Code for
Information Interchange
Stands for Extended
Binary Coded Decimal
Interchange Code
Uses 7 bits to represent a
character
Uses 8 bits to represent a
character
Represents 128 characters Represents 256 character
Arranges the characters in
consecutive order
Represents 256 character
Arranges the characters in
consecutive order
Not compatible with modern
encodings such as Unicode
More efficient Less efficient

Q:4.2

Connectivity and Security:

Network connectivity today means more than Ethernet cables and wireless access points. People today are more connected while mobile than ever before and many of them want access to company email and data while they are out of the office. Balancing those needs while maintaining security is a challenge that needs to be addressed in the design phase of any network.This includes where data is stored, either in-house or offsite with cloud-based solutions, what types of information should be accessible, who should be able to access it, and which types of devices should be included. Firewalls and access servers need to be secure without slowing down operations.

Training, security, and scalability:

Training your staff on newly established policies is important and another aspect that determines how successful an IT network venture is. This goes double for security policies. Speaking of, security is not something to overlook. Properly assessing the strengths and weaknesses of your IT network will determine its stability in the future. It’s important to stress test the IT infrastructure and security against various threats. Otherwise, all the investment involved in creating the network will be threatened by malicious third parties. Scalability is also a crucial element. IT resources need maintenance, upgrades, and updates. Understanding expected network growth will help prevent surprise costs. It will also prepare your organization for necessary expansion, if/when the situation occurs.

Redundancy and Backing Up:

Redundancy means having backup devices in place for any mission-critical components in the network. Even small organizations should consider using two servers. Two identical servers, for example, can be configured with fail-safes so that one will take over if the other fails or requires maintenance. A good rule of thumb is to have redundant components and services in place for any part of a network that cannot be down for more than an hour.If an organization hosts it own Web servers, or cannot be without Internet connectivity, a second connection should be in place. Having an extra switch, wireless router, and a spare laptop onsite is a good practice for ensuring that downtime is kept to a minimum

Disaster Recovery Plan:

A detailed disaster recovery plan should be a part of any network design. This includes, but is not limited to, provisions for back-up power and what procedures should be followed if the network or server crashes. It should also include when data is backed up, how it is backed up and where copies of the data are stored. A comprehensive disaster recovery plan includes office disasters, building disasters, and metropolitan-wide disasters.In most cases, important data should be backed up daily. Many organizations do a full weekly backup, with daily incremental backups that copy any files that have been modified since the last weekly backup. Backup files should be stored in a secure location off-site in the event of a building disaster, such as a fire.

Add a comment
Know the answer?
Add Answer to:
Q.4.1 Describe the differences between EBCDIC, ASCII, and Unicode? (9) Q.4.2 When designing or updating computer...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • a) Briefly explain the differences between firmware, operating system software and application software. t b) Briefly...

    a) Briefly explain the differences between firmware, operating system software and application software. t b) Briefly explain THREE ways in which organisations can acquire software + t t c) Jamin is a small firm that manufactures New Zealand souvenirs. Jane is in charge of manufacturing and has the responsibility of purchasing a new inventory management software package for her company. 1) Identify and carefully describe THREE criteria (or factors) that Jane should consider when evaluating the software packages that are...

  • Please answer the following questions: 1) Describe the main functions of a computer network (12 marks)...

    Please answer the following questions: 1) Describe the main functions of a computer network (12 marks) 2) In your own words, compare the three types of files: directories, ordinary files, and special files. Explain what would happen if a user modified a directory file (10 marks) 3)What are the advantages of having a Windows system using the menu-driven interface, instead of typing commands. Give at least one example where having menus is an advantage (6 marks) 4) Identify at least...

  • CHapter 8 from 978-0-13-408504-3 (Security in Computing 5th Edition) 1. Explain the differences between public, private,...

    CHapter 8 from 978-0-13-408504-3 (Security in Computing 5th Edition) 1. Explain the differences between public, private, and community clouds. What are some of the factors to consider when choosing which of the three to use? 2. How do cloud threats differ from traditional threats? Against what threats are cloud services typically more effective than local ones? 3. You are opening an online store in a cloud environment. What are three security controls you might use to protect customers’ credit card...

  • 13.7 please 13.7 Table 13.3 (page 602) identifies three risks typically encountered when updating the general ledger Required (a) Analyse the degree of exposure to each of these risks for...

    13.7 please 13.7 Table 13.3 (page 602) identifies three risks typically encountered when updating the general ledger Required (a) Analyse the degree of exposure to each of these risks for the update the general ledger process at AB Hi-Fi. update general ledger process at AB Hi-Fi. the update the general ledger process is, and how comprehensive the current internal (b) Determine how many of the common controls described in table 13.3 are present in the (c) Prepare a short report...

  • Explain what enterprise resource planning (ERP) systems. Outline several of their key characteristics. Describe in reasonable...

    Explain what enterprise resource planning (ERP) systems. Outline several of their key characteristics. Describe in reasonable detail how a company leverages an ERP system and how its operations are improved after installing an ERP system like SAP. Explain how a supply chain management system helps an organization make its operations more efficient What is Upstream and Downstream management of the supply chain? Explain the concept of “Supply Network”, its benefits, and how technology made this concept available Explain the difference...

  • Designing functions Reminder: When designing functions, follow the given steps to reinforce good software development p...

    Designing functions Reminder: When designing functions, follow the given steps to reinforce good software development practices and problem solving strategies: a) Start by writing the documentation for the function. Use docstrings shown in lecture and lab. b) Write test calls to the function in your main function for the different cases of input the function will encounter. This will help you understand the behavior of the function and later behave as tests for your function. c) Define the function d)...

  • pls answer all questions 1) A step-by-step solution to a problem is called a. hardware b....

    pls answer all questions 1) A step-by-step solution to a problem is called a. hardware b. an operating system c. a computer language d. an algorithm 2) separated the programming task from the computer operation tasks. a. Algorithms b. Data processors c. High-level programming languages d. Operating systems 3) is a 16-bit code that can represent symbols in languages other than English. a. ASCII b. Extended ASCII c. EBCDIC d. Unicode 4) When you want to download music to a...

  • Answer the following questions to the best of your ability. PLEASE ANSWER ALL THIS FOR INFORMATION...

    Answer the following questions to the best of your ability. PLEASE ANSWER ALL THIS FOR INFORMATION TECHNOLOGY MANEGEMENT CLASS, THANK YOU 1) Which company has a higher degree of digitization, Amazon or E*Trade? 2) A reverse auction is common in this type of e-commerce. 3) If you use online bill pay though your bank, what type of electronic payment mechanism is your bank most likely using to transfer funds when executing a bill payment for a utility company? 4) A...

  • The discussion: 150 -200 words. Auditing We know that computer security audits are important in business....

    The discussion: 150 -200 words. Auditing We know that computer security audits are important in business. However, let’s think about the types of audits that need to be performed and the frequency of these audits. Create a timeline that occurs during the fiscal year of audits that should occur and “who” should conduct the audits? Are they internal individuals, system administrators, internal accountants, external accountants, or others? Let me start you: (my timeline is wrong but you should use some...

  • When light passes between media of different densities, it is bent or refracted.​ True False Flag...

    When light passes between media of different densities, it is bent or refracted.​ True False Flag this Question Question 2 3 pts Meniere’s disease is caused by an increase in the​ ​intraocular pressure. ​volume of endolymph. ​none of the above ​volume of blood. Flag this Question Question 3 3 pts An area of the retina that contains only cones, and is the site of sharpest vision, is the​ ​outer segment. ​inner segment. ​fovea. ​optic disc. Flag this Question Question 4...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT