Thursday, February 20, 2020

Cloning Devices Research Paper Example | Topics and Well Written Essays - 2500 words

Cloning Devices - Research Paper Example In this scenario, IBM compatible computers can be considered as an excellent example of computer cloning for the reason that they are a clones of IBM's original machines. In addition, the Compaq portable is known as the first IBM clone (TechTerms, 2013; Computer Hope, 2013). The history of the "cloning" can be traced back to mid-1980s when it was first used to define Windows-based or DOS (disk operating system) computers developed by organizations other than IBM. In this scenario, the machines developed by the third parties were referred to as "IBM compatible" or "IBM clones," computers. The reason for using the term clone to describe these computers was that these computers worked accurately in the same way as the ones developed by IBM Corporation. In fact, these machines ran the same software and used the same hardware as was used in their original versions. Additionally, PC clones are still useful and are built frequently. In addition, now the trend of making clones has attained t o an extensive growth and more than dozens of development firms have already working in this domain. For instance, some of the well-known firms such as Dell, HP, Gateway, Sony and Compaq as well as many other manufacturers all make Windows-based computers. In fact, the trend of using clones has also increased to a huge extent. For instance, PCs (personal computers) are actually used to refer to the IBM clones. Up till now, the concept of cloning was used in the context of hardware however the term "clone" can also be utilized to express software that is built for the same purpose as another more typical software program. In fact, the term cloning can be used for a variety of types such as electronic devices excluding computers that work similar to other electronics (TechTerms, 2013; The SCO Group, Inc., 2004). The research has shown that the development of a clone provides a variety of advantages. Some of the common uses of cloning are outlined below: Reinstatement of computer after a crash Without a doubt, a clone of boot drive is believed to be a critical tool for retrieval from a state that occurs due to a system crash or failure. If a person or a company does not develop a clone, then the recovery from a system crash or failure can take a lot of time (i.e. from a few hours to a few weeks), even though they have implemented a proper back up plan. Basically, the development of a bootable clone allows the company to clone a variety of bootable files which encompass programs (normally), system operating system, user settings, and a variety of updates, software customizations, passwords, and many more. Even though an organization has made sure that all its applications and programs are available on readily-available optical disc, they can still take days to load again, configure and update everything. On the other hand, if the firm or an individual has developed a latest bootable clone, it will require you only a few minutes to get your business or routine acti vities back on the track. Repair of previous operating system or programs after a failed upgrade There are many cases when an individual or an organization attempts to upgrade their operating system or major functions of some critical application and they go extremely off-center, and their computer may fail to perform critical operations. In many cases it happens due to inefficiency of a hardware component that is required to support an upgraded component

Tuesday, February 4, 2020

CIS 21 U2 Review Essay Example | Topics and Well Written Essays - 250 words

CIS 21 U2 Review - Essay Example NAT is a short form of Network Address Translation. As the name suggests, it translate IP address. It tightens network security as it unmasks all the incoming and outgoing addresses. It ensures a standard address is used in communication worldwide. PBX, it stands for Private Branch Exchange. It allows for private telephone networking in an organization. Usually, it uses open interfaces thus making it more flexible than other systems. Its flexibility invites telephones, emails, and fax, web and computer actions to function together. 3. Your organization is in the testing phase of a new accounting application and he needs to verify functionality on various operating systems before deploying it to the customers, but is dealing with hardware availability issues. What network design component would suggest in this scenario? Organization’s data is the core of its business. Personal information, employee credentials, and sensitive files are kept on a company’s network. Therefore, the security backup system should be deployed. The system helps businesses to run smoothly even in case of hardware fail. 2. What data encryption method should you implement when you need to send data for the company’s annual earnings report as an attachment in an email from your mobile device to the board of directors of your organization? Business partners may choose to leave the company. Several employees, however, may get scrutinized from their job. Also, it invites significant financial losses. Unfortunately, it drives organizations into the enormous risk that hinders successful continuity of a