
1. Cost Savings - By leveraging third party networks, with VPN, organizations no longer
have to use expensive leased or frame relay lines and are able to connect remote users to
their corporate networks via a local Internet service provider (ISP) instead of via
expensive 800- number or long distance calls to resource-consuming modem banks.
2. Security - VPNs provide the highest level of security using advanced encryption and
authentication protocols that protect data from unauthorized access.
3. Scalability - VPNs allow corporations to utilize remote access infrastructure within ISPs.
Therefore, corporations are able to add a virtually unlimited amount of capacity without
adding significant infrastructure.
4. Compatibility with Broadband Technology - VPNs allowmobile workers, telecommuters
and day extenders to take advantage of high-speed, broadband connectivity, such as DSL
and Cable, when gaining access to their corporate networks, providing workers
significant flexibility and efficiency.
5. VPNs enable you to create secure, business-critical communication links over the
Internet.
6. Give telecommuters and mobile workers secure access to your LAN
7. Share resources with partners.
Kavungya answered the question on May 14, 2019 at 08:46
-
(i)Define the term "protocol" in the context of computer networks.
(ii)Illustrate two types of wireless media necessary when setting up a network.
(Solved)
(i)Define the term "protocol" in the context of computer networks.
(ii)Illustrate two types of wireless media necessary when setting up a network.
Date posted:
May 14, 2019
.
Answers (1)
-
Explain three modes of data communication and their practical use.
(Solved)
Explain three modes of data communication and their practical use.
Date posted:
May 14, 2019
.
Answers (1)
-
(i) Define the term "mobile computing”
(ii) Outline five limitations of mobile computing devices
(Solved)
(i) Define the term "mobile computing”
(ii) Outline five limitations of mobile computing devices
Date posted:
May 14, 2019
.
Answers (1)
-
Analyse the following modes of communication with reference to-cost, speed of transmission
and reliability:
(i) Serial mode.
(ii) Parallel mode.
(Solved)
Analyse the following modes of communication with reference to-cost, speed of transmission
and reliability:
(i) Serial mode.
(ii) Parallel mode.
Date posted:
May 14, 2019
.
Answers (1)
-
Information systems controls consist of all methods, policies and organizational procedures that
ensure the safety of the organization’s assets, the accuracy and reliability of its accounting
records...
(Solved)
Information systems controls consist of all methods, policies and organizational procedures that
ensure the safety of the organization’s assets, the accuracy and reliability of its accounting
records and operational adherence to management standards.
Required:
Describe five types of general information systems controls.
Date posted:
May 14, 2019
.
Answers (1)
-
Differentiate between information systems (IS) and information technology (IT).
(Solved)
Differentiate between information systems (IS) and information technology (IT).
Date posted:
May 14, 2019
.
Answers (1)
-
Identify three vital services which information systems can provide to a business organization.
(Solved)
Identify three vital services which information systems can provide to a business organization.
Date posted:
May 14, 2019
.
Answers (1)
-
a) Identify three roles of- information systems in-an. organisation.
b) State and explain the components of an information system.
(Solved)
a) Identify three roles of- information systems in-an. organisation.
b) State and explain the components of an information system.
Date posted:
May 14, 2019
.
Answers (1)
-
Explain four security concerns that personal computer users face in an organization.
(Solved)
Explain four security concerns that personal computer users face in an organization.
Date posted:
May 14, 2019
.
Answers (1)
-
Briefly explain four authentication techniques that could enhance security of information
systems in an organisation.
(Solved)
Briefly explain four authentication techniques that could enhance security of information
systems in an organisation.
Date posted:
May 14, 2019
.
Answers (1)
-
(i) Define the term "management information systems" in the context of information systems.
(ii) Explain three advantages of management information systems to the banking sector.
(Solved)
(i) Define the term "management information systems" in the context of information systems.
(ii) Explain three advantages of management information systems to the banking sector.
Date posted:
May 14, 2019
.
Answers (1)
-
Discuss the evolution of information systems.
(Solved)
Discuss the evolution of information systems.
Date posted:
May 14, 2019
.
Answers (1)
-
Describe six guidelines for managing computer passwords.
(Solved)
Describe six guidelines for managing computer passwords.
Date posted:
May 14, 2019
.
Answers (1)
-
List seven application packages of a computer system.
(Solved)
List seven application packages of a computer system.
Date posted:
May 14, 2019
.
Answers (1)
-
Data are raw facts which are further processed into useful information.
Required:
i) Identify data generated in a purchasing transaction.
ii) Briefly explain five main uses of information...
(Solved)
Data are raw facts which are further processed into useful information.
Required:
i) Identify data generated in a purchasing transaction.
ii) Briefly explain five main uses of information to a business organisation.
Date posted:
May 14, 2019
.
Answers (1)
-
Identify six facilities which are required by data processing applications
(Solved)
Identify six facilities which are required by data processing applications
Date posted:
May 14, 2019
.
Answers (1)
-
Outline six data processing operations in an organisation
(Solved)
Outline six data processing operations in an organisation
Date posted:
May 14, 2019
.
Answers (1)
-
Briefly explain five features of a spreadsheet package.
(Solved)
Briefly explain five features of a spreadsheet package.
Date posted:
May 14, 2019
.
Answers (1)
-
Explain three advantages of a centralized database.
(Solved)
Explain three advantages of a centralized database.
Date posted:
May 14, 2019
.
Answers (1)
-
Outline four major steps/or mail merging a document in word processing.
(Solved)
Outline four major steps/or mail merging a document in word processing.
Date posted:
May 14, 2019
.
Answers (1)