Nt1330 Unit 3 Assignment

Words: 583
Pages: 3

Mc150200913
1. How does the Information system authenticate its users?
2. What are the measures adopted to make their system fault tolerant?
3. Are the business operations processed through one location or more than one location? 4. Whether they are using web application or Desktop Application?
Ans#1
Information system is very important and popular because information system is easily authentication of its user. The user of information system having a passphrase and busy every time in it. Now a days the pin biometrics to the information System used in common organizations and data also is saved on the system .Authentication is the method of moving the subject identity. When issuing identification values to users or subjects, ensures that each value should b distinctive or unique for user accountability. The values should be no descriptive of the user’s position or goal. The user’s deferent task use to authenticate to the system for example biometric passwords, cryptographic keys cognitive passwords figure prints ECT. The users log in into the information system When correct id and password provides then information system authenticates to its users otherwise you does not use it.
Ans#2
…show more content…
A backup component or system can immediately take its place with no loss of service .Fault tolerance can be provided with software, or embedded in hardware, or provided by some mixture. In the software completion the operating system provides an interface that allows a programmer to “checkpoint serious data at predetermined points within a transaction .In the hardware implementation, the programmer does not need to be aware of the fault tolerant capabilities of the component, Disks are mirrored. Multiple processors are lock stepped together and their output or outgoing is compared for service. But the machine continues to function as