掃碼下載APP
及時接收考試資訊及
備考信息
ACCA P3考試I:NFORMATION TECHNOLOGY
NETWORKS
Only the very smallest of businesses will have stand-alone computers, computers not connected to other computers. Even in small businesses employees need to share data and very soon after personal computers were invented networks of computers were introduced. There are two main types:
• Local area network (LAN): Here the network extends over only a relatively small area, such as an office, a university campus or a hospital. The small area means that these networks use specially installed wiring to connect the machines.
• Wide area networks (WAN): Here the network can extend between several cities and countries. Each office would have its LAN, but that connects to LANs in other offices and countries using commercial, public communications systems. At one time this would have been done by the organisation leasing telephone lines for their private use to transmit data from office to office. However, this is expensive and inflexible and the common system now used is known as a virtual private network (VPN)
VPN’s allow data to be transmitted securely over the internet between any two locations. For example, an employee working from home or a hotel can access the company system as though being in the office. Information will pass over many different circuits and connections but the system gives the impression that you are operating over a dedicated, private communications link. Hence, the name: virtual private network. Because data is being transmitted over public systems it is particularly vulnerable to interception and it is very important that adequate security measures are in place to safeguard the data. There are three essential steps in the security measures:
1. Access control and authentication – this ensures that unauthorised users do not access the system. Typically this will be accomplished through a log-in procedure. Many organisations, such as banks, may require a password, answers to security questions (such as ‘What is the fourth letter of your secret word?’), and also a code number generated by a security device that has been issued to the user. Use of the latter technique means that anyone logging on has both to know a password and to be in possession of the security device.
2. Confidentiality – this ensures that data cannot be intercepted and read by a third party whilst being transmitted. This is achieved using encryption.
3. Data integrity – this ensures that the data has not been altered or distorted whilst in transit. To ensure this, the message could have special check digits added to ensure that the data complies with a mathematical rule.
CENTRALISED AND DECENTRALISED (DISTRIBUTED) ARCHITECTURES
Consider an office local area network. There are three main ways in which the data and processing can be arranged: centralised, decentralised (distributed) and hybrid.
Centralised systems
In these systems there is a powerful central computer which holds the data and which carries out the processing. The main advantages of such systems are:
• Security: all data can be stored in a secure data centre so that, for example, access to the data and back-up routines are easier to control.
• One copy of the data: all users see the same version of the data.
• Lower capital and operational costs: minimal hardware is needed at each site. There is also less administrative overhead.
• The central computer can be very powerful: this will suit in processing-intensive applications.
• They allow a centralised approach to management. For example, a chain of shops needs to keep track of inventory in each shop and to transfer it as needed. There is little point in a shop that is running low ordering more of a product if another branch already has a surplus of that product.
The main disadvantages of such systems are:
• Highly dependent on links to the centralised processing facility. If that machine fails or communication is disrupted then all users are affected.
• Processing speed: will decrease as more users log-on
• Lack of flexibility: local offices are dependent on suitable software and data being loaded centrally.
歷年樣卷
考試大綱
詞匯表
報考指南
考官文章
思維導(dǎo)圖
安卓版本:8.8.0 蘋果版本:8.8.0
開發(fā)者:北京正保會計科技有限公司
應(yīng)用涉及權(quán)限:查看權(quán)限>
APP隱私政策:查看政策>
HD版本上線:點擊下載>
官方公眾號
微信掃一掃
官方視頻號
微信掃一掃
官方抖音號
抖音掃一掃
Copyright © 2000 - www.electedteal.com All Rights Reserved. 北京正保會計科技有限公司 版權(quán)所有
京B2-20200959 京ICP備20012371號-7 出版物經(jīng)營許可證 京公網(wǎng)安備 11010802044457號
套餐D大額券
¥
去使用 主站蜘蛛池模板: 999久久久国产999久久久 | 日韩欧美亚洲一区二区 | 91一区二区| 久久久久国产一区二区 | 一级黄色免费看 | 国产一区二区av | av黄色免费| 久久成人一区二区 | 国产露脸国语对白在线 | 免费高清日本 | 成人毛片在线播放器 | 久久精品视频一区二区三区 | 国产尤物av| 国产乱码一区二区三区 | 99精品视频免费观看 | 国产精品久久久久久久久久久久久 | 精品国产综合 | 精品久久久久久久 | 亚洲精品日韩综合观看成人91 | www.69国产 | 日韩成人美女视频 | 国产精品久久久久久久久久免费 | 九九九九九九精品 | 国产精品久久久久久模特 | 亚洲欧美久久久 | 久久久久一区 | 日本欧美在线观看 | 欧美午夜精品久久久久免费视 | 精品伦精品一区二区三区视频 | 国产一区二区三区免费观看在线 | 精品国产1区2区 | 久久精品一区二区国产 | 精品在线免费观看 | 国产一级一级国产 | a级片在线免费看 | 在线地址一地址二免费看 | 国产精品免费网站 | 日韩午夜视频在线播放 | 懂色av蜜臀av粉嫩av | 欧美一区二区三区公司 | 色综合久久久久久久久久久 |