Monday, September 23, 2019
Discussion questions Assignment Example | Topics and Well Written Essays - 500 words - 3
Discussion questions - Assignment Example This can be configured for the home setting so that it can include easy access to different personal files. The same can be done at school setting. It can be configured to include access to student records, for instance. The differences are in the actual content and security access measures. â⬠¢ Internet Explorer is often updated. Imagine you need to explain to a CIO what needs to be explored before deciding whether he / she would need to adopt the new version or stay with the old version and why. The CIO must explore the benefits and drawbacks of IE 8 and to consider how they will affect the business. For instance, the advantages of IE 8 are security because of Smart Screen filter and other built-in security features, reliability, such as through Automatic Crash Recovery, manageability through manageability features, and accurately displaying Web content. Its drawbacks are: 1) as a closed-source system, to have add-ons means paying for a license and 2) it still has security issues. The CIO must think about the time and costs for the adoption of IE 8. â⬠¢ The text implies that restricting the applications users can run on their computers creates a consistent workstation environment and provides increased security. As a CIO, take a position on this topic and support your position with supporting examples. How would your response differ if you were an end user? This is good if only one group of people accesses the computers. What if aside from IT, engineers also need access to the system? Should engineers ask for permission and access every time they need these computers? These restrictions will affect overall productivity. Security should not sacrifice the efficiency and effectiveness of the company as a whole. Restrictions must not be too limited, especially to those who need to use the computers for their various workplace needs. Employees should be able to use these computers according to their functions and security
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.