Discussion Questions

User Generated

Fjvsgxnl

Computer Science

Description

(Please carefully review and follow the Weekly Discussion Questions requirements and guidelines provided in the Syllabus to insure a substantive level of analysis.)

Unformatted Attachment Preview

ITEC 625 1. Compare and contrast FAT, NTFS and ZFS file systems. (100 word) 2. Which operating system do you think is most vulnerable to attack? Least vulnerable? Explain your answer. (100 word) 3. Compare and contrast two direct file access methods. Examples include index, linked list, sequential access, and random-access method. (100 word) 4. Describe the safeguards for the various file systems and assess how effective they are. (100 word) ITEC 610 Q1: IT-Business Alignment Explain what IT and business alignment means and provide a couple of real-life examples. What is the role of an IT strategic plan in this regard? Q2: Software Development Life Cycle (SDLC) Would you apply SDLC to a team of web developers? Why or why not? (250 word) Q3: Change Management Strategies How can a company use change management to minimize the resistance and maximize the acceptance of changes in business and technology? (100 word) Q4: Prototyping Advantages and Disadvantages Why has prototyping become a popular way to develop business applications? What are prototyping’s advantages and disadvantages? (Not specifically covered in readings, but closely related to 13.4 Systems Development topics.) (100 word)
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Information Systems
Student’s Name
Professor’s Name
Course Title
November 13, 2018

Information Systems
Question 1: Compare and contrast FAT, NTFS and ZFS file systems
The FAT file system cannot be used for the storage of large files unlike the ZFS file
system which can.The ZFS file system is the only one that supports duplication the FAT and
NTFS file systems (Carrier, 2005). Both the NTFS and ZFS file systems support journaling,
encrypting and linking. On the other hand, the NTFS file system uses the method of volume
shadow copy to store data which entails the copying of overwritten data that is new to a shadow
copy. This allows a user to access an old file by overwriting the new file but the new file will
still be in the archives and not lost. ZFS file system uses the checksum system to ensure that data
is not corrupted (Reinhold, 2009).
References
Reinhold, A. (2009). Switching to a Mac for Dummies. John Wiley & Sons.

Carrier, B. (2005). File system forensic analysis. Addison-Wesley Professional.

Question 2: Which operating system is most vulnerable to attack? Least vulnerable?
Explain your answer.
Android Os is the most vulnerable because of their denial of service system that enables
the manipulation of their codes hence hacking of their system is easy. The system is not
customized hence users can easily alter the system. Mac is the least vulnerable as it has an
antivirus that has been in built into the system reducing its vulnerability. In addition, the system
has built in programs such as word processor, web browser and email client hence introducing
foreign programs is hard. The users using this operating system are few, therefore no efforts have
been made in researching about its vulnerabilities and how to penetrate the system (Parsons,
2017).
Reference
Parsons, J. J. (2017). Bundle: New Perspectives Computer Concepts 2018 Introductory, 20th+
MindTap Computing, 2 terms (12 months) Printed Access Card for Parsons' New...
Computer Concepts 2018, Comprehensive, 19th.

Question 3: Compare and contra...


Anonymous
Super useful! Studypool never disappoints.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags