1. Data and telephone systems generally are under the control of the network manager.
2. User satisfaction, cost effectiveness.
3. Fast response time, minimal error rates, and user-friendly interfaces are important to a network user.
4. Response time is a user’s measure of network performance.
5. Consistent response time means that each time a key is pressed, the user can be assured that the response will occur in the same amount of time.
6. The network conditions that can affect response time are the number of terminals on the line, the number of intermediate nodes, the types of terminals used, network software, and circuit errors.
7. The operational factors that can affect network availability are the host may be down, an application may not be available, preventative maintenance, and system upgrades.
8. Mean Time Between Failures.
9. Mean Time to Repair is the average amount of time needed to fix a component that fails.
10. Network reliability is affected by the number of errors expected on the medium and stability of the hardware and software.
11. Alternative circuits are used as backup to network circuits.
12. Replacing the failed device is an alternative to patching around a network component that fails.
13. Scheduled down time, hardware and software changes, peak operating times, and personnel changes should be discussed with network users.
14. Buy only equipment needed for current needs, buy enough equipment for current and future needs.
15. Modular expansion means buying network components that can be upgraded at a later time.
16. Important skills required by network personnel are design and configuration skills, diagnosis skills, planning, writing documentation, and standards and procedures.
17. A simulation model uses a smaller version of a system to predict what will happen. A workload generator runs a typical, full workload.
18. Transaction mix, circuit utilization, network routing, network errors, and application problems can be examined by the network manager to determine why network response time has changed.
19. Network system parameters are changed periodically to see if the network performance improves during system tuning.
20. Unrestricted.
21. Early computer systems were secured by using locked rooms.
22. Radio transmission is a very insecure type of data transmission.
23. IDs and passwords are the first level of software security.
24. Encryption.
25. A worm causes no damage while a virus is intended to cause damage to a computer system.