logo

Computer System Authentication and Security

   

Added on  2020-02-05

17 Pages2951 Words29 Views
 | 
 | 
 | 
Computer Systems
Computer System Authentication and Security_1

TABLE OF CONTENTSINTRODUCTION...........................................................................................................................4TASK 1............................................................................................................................................41.1, M1.........................................................................................................................................41.2.................................................................................................................................................51.3.................................................................................................................................................8TASK 2..........................................................................................................................................102.1, M2.......................................................................................................................................102.2, D2........................................................................................................................................11TASK 3..........................................................................................................................................123.1, D1........................................................................................................................................123.2, M3.......................................................................................................................................144.2...............................................................................................................................................14TASK 4..........................................................................................................................................154.1, D3........................................................................................................................................15CONCLUSION..............................................................................................................................16REFERENCES..............................................................................................................................172
Computer System Authentication and Security_2

ILLUSTRATION INDEXIllustration 1: Cash drawer...............................................................................................................5Illustration 2: Card swiping machine...............................................................................................5Illustration 3: Receipt printer...........................................................................................................6Illustration 4: Barcode Scanners......................................................................................................6Illustration 5: Windows operating system logo...............................................................................7Illustration 6: Configuration design...............................................................................................12Illustration 7: Cloud computing.....................................................................................................143
Computer System Authentication and Security_3

INTRODUCTIONWhen a set of computers and similar platforms are connected by a common system that iscentralised to a common functioning unit. Every place has a computer system which helps incoping up with the complexities of real time problems. The surroundings where the computersystems are set up are their respective environments. Basic structure of a computer systemincludes hardware, software and peripheral devices. This report aims to understand theimportance of computer systems and how they can help in managing work efficiently at asupermarket named Somerset which has been working on the traditional technique of pen andpaper for recording and managing the documentation.TASK 11.1, M1Computer systems are involved in various environments like government, military,business, education, research, entertainment, personal work, real time applications, etc.(Siewiorek and Swarz, 2014). The role played by these in some of the given environments arediscussed as follows:1.Real time application: Basically, real time environments involve live interaction of thecomputer system with humans through an interface. The basic hardware that is requiredin these systems include sensors, actuators as well as gesture detectors, etc. Some of theactively working real time computer systems include patient monitoring software,systems that are used for tracking the processing of various functions in live animals, etc.(Mobile computing will dominate your future — are you ready for it?, 2015).2.Business: Imagining a multinational or any successful organisation without computer isimpossible. All the businesses need a computer system for managing their day to daywork from keeping employee records to managing the business relations overseas(Gelenbe and Mitrani, 2010). Data sharing, information technology are some of thetechnical ends that business need for performing their tasks efficiently.3.Research: Scientists from any field need to perform complex calculations in theirresearch work. These can be evaluated manually but there are chances that human errors4
Computer System Authentication and Security_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents