Assess the availability and trustworthiness of the personal computers in your environment. You
should estimate:
Uptime: hours per day when the computer is operating and connected to the Internet.
Software consistency: is the software managed by a competent technician?
Security: is the computer fully protected against tampering by its users or others?
Based on your assessment, discuss the feasibility of running a data sharng service on the set of computers you
have assessed and outline the problems that must be addressed in a peer-to-peer data sharing service.

What will be an ideal response?


Answer is dependent on your local system environment.

Computer Science & Information Technology

You might also like to view...

Major research style guides, including MLA, APA, Chicago, and CSE, are published regularly, often with minor changes to style requirements

Indicate whether the statement is true or false

Computer Science & Information Technology

LMI uses ____ packets (sent every 10 seconds by default) to verify the Frame Relay link and to ensure the flow of data.

A. keepalive B. discover C. hello D. beam

Computer Science & Information Technology

Describe the normal DHCP process, including the types of messages exchanged.

What will be an ideal response?

Computer Science & Information Technology

Among file and disk management tools, a(n) ____________________ tool copies selected files or the contents of an entire storage medium to another storage location.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology