Vajad kellegagi rääkida?
Küsi julgelt abi LasteAbi
Logi sisse

Diagnostika vahendid (0)

1 HALB
Punktid

Esitatud küsimused

  • Mille abil saab hoia pilk peal võrgu liiklusel?
  • Milline tarkvara on arvutisse installeeritud?
  • Millist riistvara täpselt arvutis kasutatakse?
  • Mida kujutab endast teenustaseme leping arvutite kindluse tagamises?

Lõik failist

Diagnostika vahendid
Kirjeldage interneti põhjal
1. 3 tarkvaralist võrgu monitooringu vahendit:
  • Mille abil saab hoia pilk peal võrgu liiklusel?

  • PRTG Network Monitor - PRTG Network Monitor includes more than 50 sensor types for all common network services (e.g. PING, HTTP, SMTP, POP3 , FTP, etc.), allowing to monitor your network systems for speed and failures. As soon as outages occur the software will alert you by sending emails, SMS, pager messages and other notifications. Request times and downtimes are constantly recorded in the database and you can compile performance, downtime and SLA reports at any given time.
  • NetCrunch 6 - AdRem NetCrunch 6 is a Network Monitoring Software for diverse network environments. It can be configured remotely using Administration Console. Highly optimized remote access protocol (with encryption and compression) gives to multiple administrators’ fast accesses to NetCrunch’s data. Multiple NetCrunch servers can be also easily accessed from a single workstation.
  • Stinga Monitoring System - The STINGA Monitoring System consist of a number of powerful Linux - based monitoring probes which can operate as stand- alone protocol analysers, or as distributed monitoring probes in a centralised Link Monitoring System.

2. 3 tarkvara , mille abil saaks teada:
  • Milline tarkvara on arvutisse installeeritud?
      • Millist riistvara täpselt arvutis kasutatakse?

  • Speccy - Speccy is an advanced System Information tool for your PC.
  • CCleaner - CCleaner is the number-one tool for cleaning your Windows PC. Use this small, fast software utility to delete unneeded temporary files and logs, clean out your Registry, and protect your browsing privacy.
  • Aida32 - AIDA32 is a professional system information, diagnostics and benchmarking program running on Win32 platforms.

      • EVEREST Ultimate Edition - EVEREST Ultimate Edition is an industry leading system diagnostics and benchmarking solution for enthusiasts PC users , based on the award -winning EVEREST Technology.
      • PC Wizard - PC WIZARD 2008 is a powerful utility designed especially for detection of hardware, but also some more analysis. It's able to identify a large scale of system components and supports the latest technologies and standards. This tool is periodically updated ( usually once per month ) in order to provide most accurate results.
      • Dr. Hardware - Since 1994 Dr. Hardware is among the most advanced system information programs being on the market for 15 years now. This program for beginners and professional users, for your desktop computer as well as for your notebook or netbook.

Hooldus lepingutüübid
3. Mida kujutab endast teenustaseme leping arvutite kindluse tagamises?
4. Mida kujutab endast tugiteenuse leping (ik Operating Level
Diagnostika vahendid #1 Diagnostika vahendid #2
Punktid 10 punkti Autor soovib selle materjali allalaadimise eest saada 10 punkti.
Leheküljed ~ 2 lehte Lehekülgede arv dokumendis
Aeg2012-10-11 Kuupäev, millal dokument üles laeti
Allalaadimisi 19 laadimist Kokku alla laetud
Kommentaarid 0 arvamust Teiste kasutajate poolt lisatud kommentaarid
Autor Gerit Õppematerjali autor
küsimused-vastused

Sarnased õppematerjalid

thumbnail
140
pdf

Thesis Kivimaa August 2022

Thesis “How is it possible to calculate IT security effectiveness?” Kristjan Kivimaa August 2022 1 Abstract In IT Security world, there is lack of available, reliable systems for measuring security levels/posture. They lack the range of quantitative measurements and easy and fast deployment, and potentially affects companies of all sizes. Readily available security standards provide qualitative security levels, but not quantitative results – that would be easily comparable. This deficiency makes it hard for companies to evaluate their security posture accurately. Absence of security metrics makes it complicated for customers to select the appropriate measures for particular security level needed. The research question for this research project is – “How is it possible to calculate IT security effectiveness?”. The aim of this research is to use this reference m

Infotehnoloogia
thumbnail
120
doc

Lühendite seletus

A... AA Auto Answer AAA Authentication, Authorization and Accounting AAB All-to-All Broadcast AAC Advanced Audio Coding AACS Advanced Access Control System AAL Asynchronous Transfer Mode Adaption Layer AAM Automatic Acoustic Management AAP Applications Access Point [DEC] AARP AppleTalk Address Resolution Protocol AAS All-to-All Scatter AASP ASCII Asynchronous Support Package AAT Average Access Time AATP Authorized Academic Training Program [Microsoft] .ABA Address Book Archive (file name extension) [Palm] ABAP Advanced Business Application Programming [SAP] ABC * Atanasoff-Berry Computer (First digital calculating machine that used vacuum tubes) ABEND Abnormal End ABI Application Binary Interface ABIOS Advanced BIOS ABIST Automatic Built-In Self-Test [IBM] ABLE Adaptive Battery Life Extender + Agent Building and Learning Environment [IBM] ABM Asynchronous Balanced Mode ABR Available Bit Rate ABRD

Informaatika
thumbnail
402
pdf

CPM1A Programmable Controllers Operation Manual 1784470

Cat. No. W317-E1-11 SYSMAC CPM1A Programmable Controllers OPERATION MANUAL CPM1A Programmable Controllers Operation Manual Revised October 2007 iv Notice: OMRON products are manufactured for use according to proper procedures by a qualified operator and only for the purposes described in this manual. The following conventions are used to indicate and classify precautions in this manual. Always heed the information provided with them. Failure to heed precautions can result in injury to people or dam- age to property. ! DANGER Indicates an imminently hazardous situation which, if not avoided, will result in death or serious injury. Additionally, there may be severe property damage. ! WARNING Indicates a potentially hazardous situation which, if not avoided, could result in death or serious inju

Automatiseerimistehnika
thumbnail
40
doc

Introduction of SCM

INTRODUCTION OF SUPPLY CHAIN MANAGEMENT (SCM) A supply chain is a network of facilities and distribution options that performs the functions of procurement of materials, transformation of these materials into intermediate and finished products, and the distribution of these finished products to customers. Supply chains exist in both service and manufacturing organizations, although the complexity of the chain may vary greatly from industry to industry and firm to firm. Supply chain management is typically viewed to lie between fully vertically integrated firms, where the entire material flow is owned by a single firm and those where each channel member operates independently. Therefore coordination between the various players in the chain is key in its effective management. Cooper and Ellram [1993] compare supply chain management to a well-balanced and well-practiced relay team. Such a team is more competitive when each player knows how to

Kategoriseerimata
thumbnail
23
pdf

Games Programming with Java and Java 3D

Games Programming with Java and Java 3D Andrew Davison Dept. of Computer Engineering Prince of Songkla University HatYai, Songkhla 90112 E-mail: [email protected] Draft: 14th January 2003, #2 Abstract This article looks at the advantages and disadvantages of using Java and Java 3D for games programming. It assumes the reader is familiar with Java, but presents short overviews of gaming, the low-level APIs OpenGL and DirectX, and Java 3D. No programming examples are included here, although links to online code are supplied. 1. Background to Gaming Giving a definition for `computer game' is problematic, due to the wide range of game types. For example, the ArcadePod site (http://www.arcadePod.com) divides its hundreds of Java games into more than ten categories: 3D games, multiplayer, action

Java programmeerimine
thumbnail
555
doc

Programmeerimiskeel

Response 1. 100% 2. 0% 3. 0% 4. 0% Score: 0/10 3. Mitu muudatust HTML failis tuleb teha selleks, et Tanel Tammeti näidiskalkulaator mitte ei liidaks vaid korrutaks Student Value Correct Answer Feedback Response 1. 0 0% 2. 1 100% 3. 3 0% 4. 5 0% Score: 0/10 4. Millised vahendid on XML keeles endas väljundi kujundamiseks? Student Value Correct Answer Feedback Response 1. Paremad 0% kui HTML ´s 2. Sarnased 0% HTML´ga 3. Primitiivsed 0% 4. Puuduvad 100% Score: 0/10 5. Kui joonistada 0 taseme lumehelves (snowflake) Ecki xTurtle laboris, siis mis kujund see on Student Value Correct Answer Feedback Response 1

Infotehnoloogia
thumbnail
36
doc

Tarkvara kokkuvõte inglise keeles

tootlikkuse ja kvaliteedit mõõt. On loodud üleorganisatsiooniline protsesside andmebaas, mida kasutatakse protsesside analüüsiks. Projektide parameetrid on määratletavad, kõikumised tootlikkuses, tähtaegades jmt. on reeglina tühised. 4nda taseme organisatsioonid tagavad tarkvaratoodete kõrge kvaliteedi. 5. tase – Optimizing – optimeeriv. 5nda taseme organisatsioon täiustab pidevalt oma protsesse. Organisatsioonil on vahendid protsesside nõrkuste selgitamiseks ja nende preventiivseks parendamiseks. Andmeid tarkvaraprotsessi efektiivsusest kasutatakse uute tehnoloogiate ja protsesside analüüsiks. Tehnoloogia ja protsesside muudatused on planeeritud ja viiakse läbi vastavate protseduuride alusel.…, Kus vajatakseCMMi? •väga suured programmid, mille täitmisest võtab osa palju organisatsioone •virtuaalprojektid või -organisatsioonid •geograafiliselt hajutatud projektid •arendusorganisatsioonid

Tehnoloogia
thumbnail
138
docx

Sissejuhatus infotehnoloogiasse konspekt

Sissejuhatus infotehnoloogiasse 1. Loeng Algoritm on täpne samm-sammuline, kuid mitte tingimata formaalne juhend millegi tegemiseks. Näited: a. Toiduretsept. b. Juhend ruutvõrrandi lahendamiseks Algoritmiline probleem - probleem, mille lahenduse saab kirja panna täidetavate juhendite loeteluna. Programm on formaalses, üheselt mõistetavas keeles kirja pandud algoritm. Arvutid suudavad täita ainult programme. Analoogsüsteem  andmeid salvestatakse (peegeldatakse) proportsionaalselt  Näit: termomeeter, vinüülplaat, foto Digitaalsüsteem  (pidevad) andmed lõhutakse üksikuteks tükkideks, mis salvestatakse eraldi  Näit: CD, arvutiprogramm, kiri tähtede ja bittidena Ühelt teisele: digitaliseerimine  The three major comparisons of computers are:  Electronic computers versus Mechanical computers  Gen

Sissejuhatus infotehnoloogiasse




Kommentaarid (0)

Kommentaarid sellele materjalile puuduvad. Ole esimene ja kommenteeri



Sellel veebilehel kasutatakse küpsiseid. Kasutamist jätkates nõustute küpsiste ja veebilehe üldtingimustega Nõustun