Principles of Information Security (MindTap Course List)
6th Edition
ISBN: 9781337102063
Author: Michael E. Whitman, Herbert J. Mattord
Publisher: Cengage Learning
expand_more
expand_more
format_list_bulleted
Expert Solution & Answer
Chapter 9, Problem 17RQ
Explanation of Solution
UPS systems:
The full form of UPS is “Uninterruptable Power Supply”. They act as a backup power supply for computers. The powering capacity of UPS is usually measured in volt-ampere. A normal computer uses 200 VA and during interruptions or power fluctuations, it gets efficient power supply from UPS which provides up to 1,000 VA.
Types of UPS:
There are four primary types of UPS. They are as follows:
- Standby UPS
- Standby ferroresonant UPS
- Line-interactive UPS
- Double conversion online UPS
Types of UPS | Definition | Advantages | Disadvantages |
Standby UPS | It is also called as offline UPS. This UPS finds out the fluctuations and feeds its battery power through inverter. | It is low in cost, efficient. | It has poor output voltage regulation and it has minimal voltage protection. |
Standby ferroresonant UPS |
Though it overcomes standby UPS system, it is also an offline UPS. The updated part is that it replaces the transfer switch. It provides power via electrical service and it uses UPS as the battery backup... |
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
Briefly explain the basic working principle of a UPS.
Subject: INFORMATION SYSTEM PLANNING
Note|: Please type the answer. thanks
IssCo, is a company that manufactures furniture and has been in the industry for 20 years. The board of directors realized that they are facing stiff competitions not only from the new entrants but also from the existing furniture manufacturer. Therefore to sustain in the industry the company has to come up with a new strategy to be more competitive. The board of directors has agreed to produce exclusive office furniture for companies based on customization. In order to achieve the new strategy the company has to be more selective in looking for suitable candidates to fulfill the assembly line positions with strict screening process.
The Human Resource Manager requests a new job application form to be filled by candidates before entering an interview. The figure given above is a proposed Application Performance Management (APM) drafted by the team from Information System Planner (ISP) Unit and to be presented…
Answer Q1(a) and Q1(b) based on Figure Q1.
Your team received a system request by the Principal of Tuition Center located at Malacca. The management ask to improve their current management system. In the first week, your team comes to the place to see the staffs' routine works using the current system.
They sit at the receptionist counter, monitor the staffs and students there. In the meantime, they also make copies all the forms they use like subjects' registration form, fees payment form and exam marking form. They notice a list of pass years exam results was display in glasses notice bord. On the following weeks, they organize a meeting to collect all requirements.
FIGURE Q1
(a)
Based on the Figure Q1, analyze THREE (3) types of requirements gathering.
(b) Interview is the best technique to elicitation the requirements for this case.
State FOUR (4) suitable users to be selected as the interviewees.
Chapter 9 Solutions
Principles of Information Security (MindTap Course List)
Ch. 9 - Prob. 1RQCh. 9 - Prob. 2RQCh. 9 - Prob. 3RQCh. 9 - Prob. 4RQCh. 9 - Prob. 5RQCh. 9 - Prob. 6RQCh. 9 - Prob. 7RQCh. 9 - Prob. 8RQCh. 9 - Prob. 9RQCh. 9 - Prob. 10RQ
Ch. 9 - Prob. 11RQCh. 9 - Prob. 12RQCh. 9 - Prob. 13RQCh. 9 - Prob. 14RQCh. 9 - Prob. 15RQCh. 9 - Prob. 16RQCh. 9 - Prob. 17RQCh. 9 - Prob. 18RQCh. 9 - Prob. 19RQCh. 9 - Prob. 20RQCh. 9 - Prob. 1ECh. 9 - Prob. 2ECh. 9 - Prob. 3ECh. 9 - Prob. 4ECh. 9 - Prob. 5ECh. 9 - Prob. 6ECh. 9 - Prob. 1CEDQCh. 9 - Prob. 2CEDQCh. 9 - Prob. 1EDM
Knowledge Booster
Similar questions
- As the head buyer for a major supermarket chain, you are constantly being asked by manufacturers and distributors to stock their new products. More than 50 new items are introduced each week. Many times, these products are launched with national advertising campaigns and special promotional allowance to retailers. To add new products, the amount of shelf space allocated to existing products must be reduced or items must be eliminated together. Develop a MIS report that you can use to estimate the change in profits from adding or deleting items from an inventory. Your analysis should include input such as estimated weekly sales in units, shelf space allocated to stock items, total cost per unit, and sales per unit. Your analysis should calculate total annual profit by items and then sort the rows in descending order based on total annual profit.arrow_forwardSystem: Investment Customer Relationship Management (CRM) Rosil Capital is a Johannesburg based boutique investment management company with Investors from all over the world. Rosil Capital is run by a Chief Investment Offer and a number of Fund Managers. The company is in the process of launching an Investment Customer Relationship Management (CRM) System to improve their online interaction with Investors and to automate any manual processes in the business. One of the main processes they are looking forward to automating through the Investment CRM System, is the enrolment of new Investors by a Fund Manager. At the moment, Fund Managers use excel spreadsheets to manage investment funds, capture and update investor details and to view investor details. All these functions are going to be performed through the Investment CRM. The Investor will be allowed to view fund performance, capture comments and view statements. The Investment CRM System is web-based and hosted on the cloud to…arrow_forwardExplain what a "hot spot" is, how it works, and any risks that might come with using one.arrow_forward
- When deciding to adopt the AOP and OOP Mix Strategy, why do you plan to do so? Explain the benefits. (2) What exactly is the root of the issue?arrow_forwardWhat are the key metrics used to measure system reliability?arrow_forwardIs there a particular reason you plan to employ both AOP and OOP simultaneously? Explain the benefits.2) What exactly is the root of the issue?arrow_forward
- When should a company use CBIS? How was CBIS developed? When should a company establish its own CBIS? When should companies invest in CBIS?arrow_forwardCreate a list of the factors that are most important to your satisfaction at work, and explain why they are so important.arrow_forwardMr. Art Pang is in charge of Receivables. His subordinates must provide information to help us collect system needs for a new billing system. Although Mr. Pang has indicated his desire to assist us in our fact-finding efforts, he has voiced worry about the fact that his employees are very busy and must get their tasks done.What is the best way to get the most out of your fact-finding efforts while requiring the least amount of time from his subordinates?The requirements should be documented after they have been collected. For the new billing system, what methods would we employ? Your reasoning should be explained.arrow_forward
- Security breaches in information systems are very commonplace these days even though some organizations have what they believe is good security controls. Because of their vulnerability to threats from hackers, internal personnel, and poor management of Hardware and software devices, security controls always need revisiting.From my perspective as manager of the Accounts and Finance department, every security breach affects this department even if it is just down time to be at meetings, to discuss strategies and costs to repair damages. When the breaches occur, unauthorized access is gained to either, do something malicious to the organization's resources to steal or sabotage data for financial gain.This usually results in the company's reputation/integrity being damaged, Loss of revenue during downtime, high costs to repair and restructure. legal ramifications are expected as well if guilty persons are found or if customers decide to sew for breach of contract and losses.Two Reasons…arrow_forwardWrite down the factors most important to your satisfaction in the workplace, and give reasons for including each.arrow_forwardRead the following Case Study Leah Jones is the IT manager at Rock Solid Outfitters, a medium-sized supplier of outdoor climbing and camping gear. Steve Allen, the marketing director, has asked Leah to develop a special web-based promotion. As Steve described it to Leah, Rock Solid will provide free shipping for any customer who either completes an online survey form or signs up for the Rock Solid online newsletter. Additionally, if a customer completes the survey and signs up for the newsletter, Rock Solid will provide a $10 merchandise credit for orders of $100 or more. Leah has asked you to develop a decision table that will reflect the promotional rules that a programmer will use. She wants you to show all possibilities. 1) create decision treearrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Principles of Information Security (MindTap Cours...Computer ScienceISBN:9781337102063Author:Michael E. Whitman, Herbert J. MattordPublisher:Cengage LearningManagement Of Information SecurityComputer ScienceISBN:9781337405713Author:WHITMAN, Michael.Publisher:Cengage Learning,Principles of Information Systems (MindTap Course...Computer ScienceISBN:9781285867168Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
- Principles of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningEnhanced Discovering Computers 2017 (Shelly Cashm...Computer ScienceISBN:9781305657458Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. CampbellPublisher:Cengage Learning
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning