Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Non - functional requirements. Redundancy would be important for the business, this will guarantee bring reliability and ability to overcome failures. The network can maintain

Non-functional requirements.
Redundancy would be important for the business, this will guarantee bring reliability and ability to overcome failures. The network can maintain the services when failures occur by having a fault tolerance. This can be done by multiple data flow paths and backup devices or connections. Extra redundancy in place forms a backup that saves the network from malfunctioning case one component fails and makes a network down time less possible for the company.
Performance monitoring will certainly be important as this will certainly permit the users to track crucial metrics such as response time, throughput and sources use. devices that are utilizing even more CPU power than you expected will certainly signal you to the existence of viruses inside computer. Task manager can be used to monitor performance of the pcs and server whereas syslog messages can be created to monitor performance of switches and routers. Syslog messages offer information regarding actions and events. Devices like Kiwi Syslog Server or Splunk can be utilized for syslog tracking.
Compliance to the law can be important as it guarantees attention to data protection policies and guidelines. There are laws like GDPR and Computer misuse act that give specific instructions for managing and storing data in line with privacy regulations. Also, there's waste electrical and electronic Equipment (WEEE) will teach employees on how to properly recycle electronic products. It will ensure that the employees are informed about the regulation regarding electronic waste and guide them how to properly disposal end of life devices. These first two laws will guide them about risk punishment if they attempt to unauthorised log into another person's computer.
Risk mitigation actually works as backup plan to handle problems that may occur while implementing the project. Through risk mitigation, we are able to uncover and solve potential problems in advanced. It points out the issues correctly to allow us to act and develop solutions as a plan. this will minimize the negative impact on project progress, simplifying recovery and it will be facilitating the continuation of initiative.
so i wrote all those points can you add two more points such as future expansion etc and also write about remote access

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

The Accidental Data Scientist

Authors: Amy Affelt

1st Edition

1573877077, 9781573877077

More Books

Students also viewed these Databases questions

Question

Differentiate the function. r(z) = 2-8 - 21/2 r'(z) =

Answered: 1 week ago

Question

How do Dimensional Database Models differ from Relational Models?

Answered: 1 week ago

Question

What type of processing do Relational Databases support?

Answered: 1 week ago

Question

Describe several aggregation operators.

Answered: 1 week ago