Define bioinformatics and give an example of the data used in medical research.
Outline one feature of fuzzy logic which makes it suitable for medical diagnosis.
A school currently has a cabled network but wants to add wireless networking across the whole campus.
There are concerns that unauthorized people could access the data on the wireless network.
The school has decided to implement a virtual private network (VPN) to provide access to its network.
Describe two hardware components the school will need to implement the wireless network.
Identify two advantages to the students of the new wireless network.
Outline two methods the school could employ to prevent network data from being accessed over their wireless system.
Identify two technologies the school would require to provide a VPN.
Explain one benefit to the staff of using a VPN to remotely access the school network.
Outline the reason for compression when transmitting data.
An international company is in the process of moving its Head Office from Europe to Asia.
Identify two possible compatibility issues as a part of data migration.
Outline how a virtual private network (VPN) will allow employees who are in Europe to communicate with the Head Office in Asia.
Outline one social issue associated with this process.
Describe how data is transmitted by packet switching.
An oil and gas company has a networked computer system for use of their employees in the Head Office.
Identify one hardware security measure that will ensure that confidential data from the Head Office cannot be accessed.
Identify one software security measure that will ensure that confidential data from the Head Office cannot be accessed.
Identify one network security measure.
Explain the environmental benefit of using a computer control system to monitor the pipeline.
Explain the relationship between sensors, output transducers and processor in this situation.
Construct a system flowchart to represent the process described above.
An international company is in the process of moving its Head Office from Europe to Asia.
Identify two possible compatibility issues as a part of data migration.
Outline how a virtual private network (VPN) will allow employees who are in Europe to communicate with the Head Office in Asia.
Outline one social issue associated with this process.
Outline why combinatorial optimization is used in the travelling salesman problem.
Outline one potential problem with hill climbing when applied to the travelling salesman problem.
Traditionally, security systems concentrated on the inspection of traffic entering a network. By making reference to specific malware, explain why Intrusion Prevention Systems (IPS) should scan for traffic leaving a network.
Denial of Service (DoS) attacks are designed to overload a system, making it cease to function as normal. By looking at one particular type of DoS attack listed on page 4 of the Case Study, explain both how the attack is designed to interrupt the operation of a company network and the measure(s) that the company should take to counteract such attacks.
Define the term data packet.