Q |
: |
|
Ans |
: |
For normal functions, a Server is similar to Workstation. But Server is designed for continues operation and included additional features to support this. First hardware monitoring and alert, most of the Server include hardware monitoring to keep logging the temperature, usage, fan speed etc, if abnormal status happened, it will send an alert for IT staff take action to fix the problem.
Most of the Server use hot swap hard disk and RAID technology to protect data. If one of the hard disk failed, other disks will continues working without data loss. IT staff can replace the damaged disk without stopping the Server. The cooling system inside the Server is well design to working for continue working. It can let the system in a stable temperature. If high CPU and temperature growing up, it will increase the fan speed to cool down the system. Moreover, the design of the fan also ensure air flow inside the case go to the same direction. Most of the Server will have a monitor panel. IT staff can check the alert signal on the monitor panel very easily. Security lock on the server can prevent unauthorized user or staff access the Server. For example, they cannot shutdown the server without the server key or take out the hard disk. Due to above feature, most of the company will use Server to store their data and as a central point of data sharing. |
Q |
: |
|
Ans |
: |
Anti-virus software is used to protect your computer from virus. But it is not 100% guaranteed all virus, spam, ransomware can be scan and detected. It is your responsibility to ensure all application run on your computer is coming from reliable sources. And do not visit unknown web site and always validate the URL of the web site and email. You cannot 100% depend on Anti-virus software to protect your computer.
Nowadays, technology is growing very fast, AI, cloud service, big data are commonly using in our business. Anti-virus software are using that services to improve their accurately and predict possible virus. At the same time, hackers can also using that kind of tools to produce virus, spam etc. It let hackers more easy to create new virus, new ransomware and send out mass spam. For example, they can use big data to guess your password. They can use AI to create phishing web site which same as original automatically. They can use cloud service to share their hacking tools and software. Anti-virus software is only a tool to help us prevent from virus or other hacking tools. We need to rely on ourselves to protect our computer. As said before, DO NOT download or use application on internet, ALWAYS validate your email and URL of web site. |
Q |
: |
|
Ans |
: |
The main different of SSD and HDD is the speed. HDD is mechanical disk, its speed is depend on the rotational speed of the disk. Normally its speed is between 90-190 MB/s (7200rpm disk). If it is notebook or low speed HDD (5400rpm disk), its speed may be around 50-90MB.
For SSD is flash memory, its speed is depended on connection interface. For SATA SSD, its speed is around 500MB/s. For PCIe 3.0 x4 / M.2 interface, its speed can be up to 3000MB/s. For some latest M.2 SSD, it claimed can be reached to 5000MB/s. So we can foresee that, the speed of SSD still not reach its limit, the speed of new SSD is keep growing. Currently, its speed is limited by the interface connected to motherboard. For computer that using HDD, we will suggest to change to use SSD. Since for the computer using HDD, most of the bottleneck was found in the read/write speed of the HDD. It cause performance problem of the computer. After changing to SDD, it can greatly improve the performance of the computer. |
Q |
: |
|
Ans |
: |
It may be due to number of reason. First, if you are using mechanical hard disk (HDD), After using for few year, your data becomes more spread out. It means that the mechanical hard disk’s read/write heads will have to move more to gather the same amount of data and slow down the speed.
Secondly, it may be due to lack of memory(Ram). For newly application or software update, the application may use more memory, it caused your memory used up very quickly. After memory is not enough, it will switch the job to disk drive, if you are using mechanical hard disk (HDD), the performance will be significantly decreased, since it increased much read/write time on HDD. Thirdly, if you are using 3D application or 3D graphic, newly 3D may require higher GPU graphic card in order to support higher 3D calculation. Otherwise, the 3D drawing will take longer time to render. For first two problem, it may be solved by change the hard disk to SSD. For the last problem, it may be improved by replace a newer graphic card. |
Q |
: |
|
Ans |
: |
Answer
|
Q |
: |
|
Ans |
: |
Phishing is a type of cyber attack in which attackers trick individuals into divulging their sensitive information, such as usernames, passwords, and credit card numbers. Phishing attacks can occur through emails, phone calls, text messages, or social media messages that appear to be from a trusted source.
To prevent phishing attacks, individuals can follow these steps: 1.Be cautious of emails or messages that ask for personal information, especially if they are from an unknown source. 2. Verify the authenticity of the sender by checking the email address or phone number. 3. Avoid clicking on links or downloading attachments in suspicious emails or messages. 4. Use two-factor authentication to protect your accounts. 5. Keep your software and security systems up to date. 6. Educate yourself and others on the latest phishing techniques and how to avoid them. |
Q |
: |
|
Ans |
: |
Yes, you can use NAS to replace server. But we do not suggest to use NAS to replace server.
First, on hardware side, server is more stable and reliable. If hardware failure occur, if you purchase the warranty, hardware vendor will help you to replace the parts onsite. But for NAS, if some parts failed except hard disk, they may request to you to send the hardware to repair center for repairing. It may take few days or weeks. Most of our client will not accept that down time and purchase a new one. It will take installation charge and time. At software level, if you are using Windows OS, Windows server provide many tools to help you manage the network and workstation. For examples, "Group Policy" can help you deploy computer setting automatically. Active Directory can help you manage users and workstations, e.g. when you create a user in Active Directory, they can use the same account to access all workstations. On the other hand, when you disable user's account, they will not be allow to access the network. By using NAS, you will need to create users' account in NAS, then on workstation, you need to create another users' account. when user change password on workstation, it will NOT apply to NAS's account. It make the management job more complex, duplicate or non-manageable. Moreover, many software support Windows Server, many backup software, ERP software can be installed to the server to support your daily operation. But for NAS, compare to Windows server, less software or application can be chosen. On the other word, most of the application or feature provided by NAS can be found or installed on Windows server too. But most of the application or software run on Windows Server cannot be installed on NAS. In a more complex environment, a server cluster consists of a group of servers working simultaneously. Windows Server platform provide high availability services. If one of the server stopped, other server can take up the role at the same time. Your operation can be continue without problem. Honestly, NAS is a cost effective equipment. For small scale network, the advantage of NAS is more attractive. It is small in size, easy to setup, lower cost, server grade security file system, many useful application provided. It is suitable for company with 10 staffs or below. But as your business keep growing, we will suggest you to use server in order to provide a more reliable file storage and a manageable computer network. |
Q |
: |
|
Ans |
: |
Nowadays, technology is changing very fast. Cloud service, AI, Big data can support our business operation. On the other hand, Those services also support hackers to automate the hacking process. It helps them create and send out phishing email, monitor which computer system is infected, scan the security hole in internet, auto guess the password etc.It is Indiscriminate attack. Whether your company is big or small, if your staffs is using computer careless or any security hole in your network, you will be under attack.
Hacking is a big business, for examples, ransomware have been generated billions of dollars in payments to cyber criminals. They have a lot of money to invest into new hacking tools. Hackers are working together to share tools over the cloud, and using AI to provide more complex and continuous attack to our computer network. We always need to carefully use our computer. |
Q |
: |
|
Ans |
: |
Wi-Fi Extender: A Wi-Fi extender is a device that extends the range of your existing Wi-Fi network. It picks up the signal from your router and re-broadcasts it to areas of your home that may not be getting a strong signal. However, this can result in slower internet speeds as the extender is essentially acting as a relay between your devices and the router.
Mesh Wi-Fi: Mesh Wi-Fi is a system of multiple access points that work together to provide seamless Wi-Fi coverage throughout your home. Instead of relying on a single router, mesh systems use multiple nodes that communicate with each other to create a single, seamless network. This results in faster speeds and better coverage, as the nodes can adjust the signal strength and channel to optimize performance. Additionally, mesh systems often come with advanced features like parental controls, guest networks, and more. |
Q |
: |
|
Ans |
: |
Enterprise Wi-Fi AP: Enterprise Wi-Fi APs are typically designed for large offices or public spaces such as hotels, airports, and schools. These devices have higher capacity and greater coverage, allowing them to support more simultaneous connections. Additionally, they typically have higher security and more management features such as remote management, user authentication, and traffic monitoring.
Wi-Fi router: Wi-Fi routers are typically used in homes or small offices. These devices typically have smaller coverage areas and capacity, allowing them to support fewer simultaneous connections. Additionally, they typically have fewer management features such as user authentication and traffic monitoring. However, they are typically easier to install and use than enterprise Wi-Fi APs. Overall, enterprise Wi-Fi APs are suitable for large locations that require high capacity and security, while Wi-Fi routers are suitable for homes and small offices. |
Q |
: |
|
Q |
: |
|
Q |
: |
|
Q |
: |
|
Q |
: |
|
Q |
: |
|
Q |
: |
|
Q |
: |
|
Q |
: |
|
Q |
: |