华南俳烁实业有限公司

考試首頁 | 考試用書 | 培訓課程 | 模擬考場 | 考試論壇  
  當前位置:考試網(wǎng) >> ACCA/CAT >> 備考指導 >> 文章內(nèi)容
  

ACCAP3知識點:INFORMATIONTECHNOLOGY(二)

考試網(wǎng)  [ 2016年8月26日 ] 【

  ACCA P3考試I:NFORMATION TECHNOLOGY

  NETWORKS

  Only the very smallest of businesses will have stand-alone computers, computers not connected to other computers. Even in small businesses employees need to share data and very soon after personal computers were invented networks of computers were introduced. There are two main types:

  • Local area network (LAN): Here the network extends over only a relatively small area, such as an office, a university campus or a hospital. The small area means that these networks use specially installed wiring to connect the machines.

  • Wide area networks (WAN): Here the network can extend between several cities and countries. Each office would have its LAN, but that connects to LANs in other offices and countries using commercial, public communications systems. At one time this would have been done by the organisation leasing telephone lines for their private use to transmit data from office to office. However, this is expensive and inflexible and the common system now used is known as a virtual private network (VPN)

  VPN’s allow data to be transmitted securely over the internet between any two locations. For example, an employee working from home or a hotel can access the company system as though being in the office. Information will pass over many different circuits and connections but the system gives the impression that you are operating over a dedicated, private communications link. Hence, the name: virtual private network. Because data is being transmitted over public systems it is particularly vulnerable to interception and it is very important that adequate security measures are in place to safeguard the data. There are three essential steps in the security measures:

  1. Access control and authentication – this ensures that unauthorised users do not access the system. Typically this will be accomplished through a log-in procedure. Many organisations, such as banks, may require a password, answers to security questions (such as ‘What is the fourth letter of your secret word?’), and also a code number generated by a security device that has been issued to the user. Use of the latter technique means that anyone logging on has both to know a password and to be in possession of the security device.

  2. Confidentiality – this ensures that data cannot be intercepted and read by a third party whilst being transmitted. This is achieved using encryption.

  3. Data integrity – this ensures that the data has not been altered or distorted whilst in transit. To ensure this, the message could have special check digits added to ensure that the data complies with a mathematical rule.

  CENTRALISED AND DECENTRALISED (DISTRIBUTED) ARCHITECTURES

  Consider an office local area network. There are three main ways in which the data and processing can be arranged: centralised, decentralised (distributed) and hybrid.

  Centralised systems

  In these systems there is a powerful central computer which holds the data and which carries out the processing. The main advantages of such systems are:

  • Security: all data can be stored in a secure data centre so that, for example, access to the data and back-up routines are easier to control.

  • One copy of the data: all users see the same version of the data.

  • Lower capital and operational costs: minimal hardware is needed at each site. There is also less administrative overhead.

  • The central computer can be very powerful: this will suit in processing-intensive applications.

  • They allow a centralised approach to management. For example, a chain of shops needs to keep track of inventory in each shop and to transfer it as needed. There is little point in a shop that is running low ordering more of a product if another branch already has a surplus of that product.

  The main disadvantages of such systems are:

  • Highly dependent on links to the centralised processing facility. If that machine fails or communication is disrupted then all users are affected.

1 2
本文糾錯】【告訴好友】【打印此文】【返回頂部
將考試網(wǎng)添加到收藏夾 | 每次上網(wǎng)自動訪問考試網(wǎng) | 復制本頁地址,傳給QQ/MSN上的好友 | 申請鏈接 | 意見留言 TOP
關于本站  網(wǎng)站聲明  廣告服務  聯(lián)系方式  站內(nèi)導航  考試論壇
Copyright © 2006-2019 考試網(wǎng)(Examw.com) All Rights Reserved  營業(yè)執(zhí)照
易门县| 横峰县| 高安市| 红桥区| 南投市| 噶尔县| 新安县| 高邮市| 特克斯县| 牟定县| 景德镇市| 万盛区| 青田县| 昭苏县| 青河县| 隆回县| 万山特区| 宁波市| 班戈县| 手机| 南靖县| 琼海市| 合作市| 南宫市| 射洪县| 澜沧| 砚山县| 灵山县| 汉源县| 阳东县| 仁布县| 岳阳县| 南昌市| 阿拉善左旗| 乐东| 宣恩县| 本溪| 金湖县| 夹江县| 呼图壁县| 安徽省|