Add-on Projects
Answer in 2 paragraph for each question:
What are some of the basic precautions a computer owner or network administrator can take to help make the computing environment secure? What are some of the basic
security threats that a user or administrator might have to face?
What is Linux? When would you use it? How does it differ from Windows? Are there different versions of Linux?
If you were given the task of prioritizing the IT department’s project list, what method would you use to prioritize the projects? What are the advantages and
disadvantages of this method?
Every IT department runs into this every year. The capital and operating budgets are usually set once a year, although they may be reviewed more frequently. What can
we do if a project suddenly appears that was not included on the original budget for that year?