You are on page 1of 2

Joshua P.

Dolores BSIT-102
Scenario:

Lucas plans to start a small BPO company in their newly

renovated garage. He has processed the required business licenses

and the initial hiring process. Currently, his biggest concerns lie

in the network architecture and internet cabling. His budget is

not much of a problem. Still, he wants to ensure that everything

from the devices and network security to the professionals

involved is sufficient to last and not encounter problems for the

next few years.


1. Using an Virtual Private Netwrok(VPN) 2. Network Architectures
-Internet Privacy Techniques -Professional Involved
-Device To be Used -Device to be used
-Cost to Spend -Cost to Spend
I'm considering VPN as a viable option, and
Lucas required Network Architectures,

I'm developing a strategy that includes three


which is why I put Professional Involved

components: Internet Privacy Techniques,


as a plan because he required a

Device to be Used, and Cost to Spend. The


professional to help him build the BPO

purpose of using a VPN is to protect your


as a small business. In addition, he

searches and have access to searches that


required a device to input the work of a

are only available in a few countries, which is


Network Architecture. Finally, the cost to

why I use Internet Privacy Techniques. The


spend to payed the Professional

second option is Device to be Used, because


Involved.
we needed a device to input or place the
4.
Email Security
VPN. Finally, the cost of spending is not an
-Network Technologies
issue for Lucas, which is why I am putting this
-Internet Privacy techniques
here. -Cost to Spend

One of the viable items he

3. Internet Cabling
required was Email Security. As a

-Network Technologies
plan, Lucas should consider the

-Device to be used
following: Network Technologies,

-Internet Privacy Techniques


Internet Privacy Techniques, and

Network cabling is one of the plans Lucas requires

Cost to Spend. Network

when starting a small business, along with Network

Technologies are required because

Technologies, Device to be used, and Internet

you require an internet connection

Privacy Network. The use of Network Technologies

to run email security. And Internet

as a strategy is to have an internet network, the

privacy techniques are especially

Internet Privacy Network is to protect what we are

important in this case because this

browsing, and the Device to be used is the final step.


plan aids in the security of email.

5. Two-Authentication Factor 6. Double-checking Unfamiliar Links


-Network Technologies -Network technologies
-Device to be used -Professionals involved
-Internet Privacy Techniques -Device to be used
Two-Authentication Factor is what I believe
Lucas needed to double-check Unfamiliar

Links in order to help him create a plan. On

is required to assist his BPO business, as

this viable, network technologies,

are Network Technologies, Devices to be

professionals involved, and the device to be

used, and Internet Privacy Techniques.

used are required. We need network

These plans help to secure the accounts


technologies here because we can't tell if

that everyone uses on the BPO. this link is safe to use without one. Next is

Professionals Involved, which we needed

because this is who checked to see if the

link was safe. Finally, the device to be used

is required because without it, the

Professional will not be able to determine

7. Maintenance Cost
whether the link is safe or not.
-Cost to spend
-Professionals Involved
-Device to be used
Maintenance costs are determined by the

budget, the professionals involved, and the

device to be used. The first is the cost to

spend; we all know that Lucas's cost is not

an issue, but this plan must be prioritized

because no cost means no maintenance.


8. Legal Repercussions
The next one is Professional Involved; he
-Professionals Involved
required the services of a professional to
-Network technologies
maintain his business. Finally, there is
-Internet privacy techniques
Deviced to use because you know they will
Professionals Involved, Network

be useless without it. Technologies, and Internet Privacy

Techniques are examples of legal

ramifications that can be used as a plan.

This was especially important for the

Professional because this is the effect or

result, often indirect or remote, of some

event or action: The ramifications of the

quarrel were widespread. the condition of

being pushed back by a resisting body a

rebound or recoil of something following

impact echo; reverberation

You might also like