Professional Documents
Culture Documents
Advantages Disadvantages
1. Centralized servers are highly 1. High cost of buying and running a
stable. server
2. Security is server managed. 2. Dependency on a central location
for most operations.
3. Upgrade to new technologies 3. Regular maintenance and updates
and hardware can be easily are required.
integrated into the system.
4. Remote access to servers is
possible from different locations
and type of systems.
b. Security flaws – some software errors leave a door open for the
system to be broken by unauthorized intruders may try to use this gain
illegal access to your system. Patching these flaws often will help keep
your computer secure.
a. Hardware-based Firewalls –
there are physical machines with
network ports. Commonly
installed at the entry point of
your network. These are used to
protect an entire network from
internet threats and are generally
used at offices.
b. Software-based Firewalls –
These are commonly associated
with antivirus software. You can
download it in your Windows
computer and install it yourself.
These are used to protect a single
computer from internet threats.
Generally used for personal use.
Most popular are Norton, McAfee,
Kaspersky and Comodo Firewall
Reference/s:
http://www.gcflearnfree.org/computerbasics/2/print
Norton,Peter.Introduction to Computer, 6th Edition. Tim Mcgraw Hill,
Delhi. 2008. pp. 202-219
http://techtrickle.com/history-of-windows/
http://hsc.csu.edu.au/info_tech/compulsory/os4014/basic_fuctions.html
Computer Science Servicing NC II Module 2015 (SPEED Computer
College)
https://en.wikipedia.orgwiki/Mac_OS_X_Snow_Leopard
https://en.wikipedia.org/wiki/Linux
http://techluminati.com/networking-and-security/what-is-a-firewall/
https://technet.microsoft.com/en-us/windowsserver/cc304052.aspx