Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

System Analysis You must produce a report on two systems used by the company, a CAD system that runs on a PC and a system

System Analysis
You must produce a report on two systems used by the company, a CAD system that runs on a PC and a system used within a CNC controller. The company currently have two systems, Siemens and Fanuc and you can choose to report on either. For each system your report must include the following:
1) an analysis of the hardware internal and external components associated with the application and their role in the application with a justification of their use,
2) an analysis of the operating, utility and application software used in each case including a justification for their use,
3) an analysis of the security threats and the systems and protection employed to guard against security threats in each case and a justification for the use of the systems employed,
4) an overall evaluation comparing the suitability of the technology and protection measures used in each and an indication of any improvements that would enhance the systems.
The report should be well written in clear, technical language throughout..For Distinction standard, learners will give a detailed and comprehensive evaluation of
the two contrasting systems and will demonstrate how the systems work and why the
hardware components and software are suitable for the application. For example, an
office computer would include a keyboard, mouse and monitor to input and output
data, whereas a CNC machine includes a touch screen input/output device. The office
computer contains sufficient RAM (typically gigabytes (Gb) or terabytes (Tb)), to run
several applications concurrently, whereas the CNC machine runs a restricted set of
instructions that requires less memory (around 1 megabyte). The office computer needs
to load an operating system on start-up, such as Microsoft Windows, before running
applications, while the CNC machine has an embedded control system, such as Siemens
or Fanuc. Other factors will be considered, such as the processor operating speed,
instruction set, hard disk size, and external storage.
A detailed analysis of the security threats and a justification of why the security
measures proposed are suitable will be given. For example, an office computer is likely
to have access to personal and financial details, and make extensive use of the internet,
therefore measures are required to prevent physical sabotage, hacking and malicious
attacks, whereas the CNC machine will access to industrially sensitive design data, but
may have limited connectivity. Learners will suggest how the systems could be improved,
for example to make them more secure or to better perform their intended purpose
such as using firewalls and anti-virus software, and limiting user privileges.
Overall, the evidence, such as a report, will be easy to read and understand by a third
party who may or may not be an engineer. It will be logically structured and use correct
technical engineering terms.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Machine Learning And Knowledge Discovery In Databases European Conference Ecml Pkdd 2019 Wurzburg Germany September 16 20 2019 Proceedings Part 2 Lnai 11907

Authors: Ulf Brefeld ,Elisa Fromont ,Andreas Hotho ,Arno Knobbe ,Marloes Maathuis ,Celine Robardet

1st Edition

3030461467, 978-3030461461

More Books

Students also viewed these Databases questions

Question

Describe the components of optical fiber cable.

Answered: 1 week ago