You are on page 1of 3

part-2

ANS 1-

QUESTIONS FOR THE INDIVIDUALS

Lead Hardware Technical Expert:

a. Is these person are accountable for designing and developing system


solutions?

b. Does the person need to repair systems on site and provide phone support if there are
any problems occur?

c. Are they providing the robust and stable design with optimum resource in term of the
memory and processor?

d. Do they handle any multiple task and project?

e. How excellent communication and strong fundamental knowledge that they


have to be an expert?

f. Will this person engages with the problem of the hardware and quickly debug and resolve
the complex issue arise regarding the hardware?

Network Manager:

a. Is network manager accountable for setting access to files, email, and internet?

b. Is the network manager need to perform analysis of network needs and contributes to
design of network architecture, integration and installation?

c. Are them responsible for the security system in order to prevent the hackers from getting
into the system?

d. Can this person coordinate with other departments in order to understand and meet
their requirements?

e. In case of system facing any problem or break down, is the network manager responsible
for recovery of the system?

Chief Software Manager:


a. Does the Chief Software manager need to managing the architecture, community and
marketing, and web services.

b. Is the chief software manager responsible for managing and coordinating resource and
process for the software?

c. Is the Chief Software Manager responsible for developing plan to meets the future need
of the organization and the customer?

d .Is these are accountable for monitoring individual employee’s performance and develop
the software to resolve the technical problem as well as human resource issue?

ANS -2

The company should use the N-Tier Architecture for their business. This because N-tier
application architecture provides a model by which developers can create flexible and
reusable applications. By segregating an application into tiers, developers acquire the
option of modifying or adding a specific layer, instead of reworking the entire application.

There is some advantages using this type of HRIS architecture is maintainability, this is
because each tier is independent of the other tiers, updates or changes can be carried out
without affecting the application as a whole. Secondly is scalability that is tiers are based on
the deployment of layers, scaling out an application is reasonably straightforward. Thirdly
is flexibility where each tier can

be managed or scaled independently, flexibility is increased and lastly is availability.

Benefits of N-Tier Architecture

There are several benefits to using n-tier architecture for your software.  These are
scalability, ease of management, flexibility, and security.

 Secure: You can secure each of the three tiers separately using different methods.

 Easy to manage: You can manage each tier separately, adding or modifying each
tier without affecting the other tiers.

 Scalable: If you need to add more resources, you can do it per tier, without affecting
the other tiers.
 Flexible: Apart from isolated scalability, you can also expand each tier in any
manner that your requirements dictate.

So , considering all the sides of N Tier Architecture, we can safely use it for the company.

ANS-3

Bring Your Own Device - Best Practices from a Cyber Security Perspective . it is also known
as BYOD.

BYOD (bring your own device) is quickly becoming the workplace standard. Today, 82
percent of companies allow employees to use personal devices for work, and that number
will only grow.

The recommendations :

1.Consider the device platforms and operating systems to support.

2.Devise a methodology to continuously and regularly patch BYOD program devices.

3.Install a reliable antivirus program on all devices.

4.Prepare a checklist of security upgrades that an employee-owned device has to go


through to be enrolled in the BYOD program.

5.Implement rules for password complexity and auto device-lock after a minimum viable
inactivity period.

You might also like