Free Essay

Network Admin

In:

Submitted By nelson7
Words 1686
Pages 7
Titulo: Development Strategies
1. Describir la tendencia que considera el software como un servicio más que un producto. ¿Qué efecto ha tenido esta tendencia sobre las opciones de adquisición de software?
Tendencias de software basadas en la Web se han disparado los proveedores de servicios de aplicaciones (ASP), y las empresas que ofrecen servicios comerciales de Internet (SII) a una prominencia en la industria del software que cree en el software como un servicio en lugar de un producto. Con la popularidad y las ventajas de Internet, las empresas están viendo esta tendencia como una opción para el desarrollo de software estándar y adquisición. En lugar de comprar una aplicación de software de una empresa de desarrollo, producción que en la casa, o la contratación de un consultor o un recurso externo para producir un paquete de software de estas empresas basadas en la Web han proporcionado una nueva alternativa basada en tres modelos distintos. Estos modelos son un modelo de modelo de tarifa fija, el modelo de suscripción o uso. Cuota fija hace exactamente eso, ofrece una tarifa fija o coste basado en un nivel de servicio requerido por el usuario. El modelo de suscripción varía de costes basado en el número de usuarios y estaciones de trabajo con el acceso a la aplicación. El modelo de uso cobra una tarifa en función del volumen de transacciones o el número de operaciones realizadas por las aplicaciones.
2. Explicar la diferencia entre el software de aplicación horizontal y software de aplicación vertical.
Aplicaciones horizontales difieren de las aplicaciones verticales ya que proporcionan una solución para muchas empresas en base a una necesidad común. Aplicaciones tales como contabilidad, nómina, inventario, y los paquetes de integración de oficina son aplicaciones horizontales. Aplicaciones verticales son las escritas para una industria o mercado específico. Ejemplos como un sistema de salud de un hospital, el procesamiento de reclamaciones de una compañía de seguros son las aplicaciones verticales.
3. ¿Cuál es la razón más común para una compañía escoger para desarrollar su propio sistema de información?
Da dos razones por las que una empresa puede elegir el enfoque de la casa. La razón más común para una empresa para desarrollar su propio sistema de información es que se necesita para satisfacer las necesidades únicas de negocio, lo que significa que no hay software disponible en el mercado para satisfacer sus necesidades. Otras dos razones para un enfoque de la casa sería minimizar los cambios en los procedimientos y las políticas existentes y para permitir la interconexión con un sistema heredado y sus muchas constraits.
4. ¿Qué es una solicitud de propuesta, y en qué se diferencia de una petición de oferta?
Una solicitud de propuesta es una solicitud de propuesta. Una solicitud de propuesta difiere de un RFQ (Solicitud de Cotización) en el que se supone que un diseño no es de hormigón o las características específicas del producto o servicio que necesita no se conoce. En concreto un RFP describe su empresa, se enumeran los servicios o productos que se requieren, y especifica las características que se requieren, junto con el nivel de servicio y soporte que se requiere. Una petición de oferta por el contrario es más específico que una solicitud de propuesta en que usted sabe lo que quiere y necesita y sólo necesita una cotización de precios o la oferta del proveedor de software.
5. ¿Cuál es el propósito de una prueba de referencia?
Las pruebas de referencia se utilizan para poner un paquete de software a través de sus pasos transaccionales para mostrar cómo un sistema funcionará bajo estrés o carga. Por lo general, los puntos de referencia proporcionan un TPS o transacciones por segundo calificación. Estos diagramas o gráficos también muestran el número de usuarios y el número de transacciones.
6. Explicar las licencias de software y contratos de mantenimiento.
Las licencias de software permiten al usuario utilizar el software, dándoles permiso o los derechos y los estados límites de esta autorización, tales como el número de equipos que se puede utilizar en forma concurrente, el tiempo o no la aplicación puede ser modificada por el usuario por cualquier razón, y capear se puede copiar o archivada. Contratos de mantenimiento de software proporciona los medios para el proveedor de software para ser pagado por el apoyo de un paquete de software, y protección para el usuario en el que si hay mejoras o actualizaciones o errores en el software, que serán corregidos sin costo o en el determinado acordados sobre las tasas. También se prevé la asistencia al usuario cuando hay preguntas o problemas.
7. ¿Qué decisiones puede llegar a la gestión al final de la fase de análisis del sistema, y cuál sería el siguiente paso en cada caso?
En general, existen cinco alternativas para la gestión para elegir junto con el siguiente paso:
1. Ir con una alternativa de externalización. Esto requiere trabajar con el proveedor de servicios para proporcionar una transición suave al nuevo entorno.
2. Ve con una solución interna. Esto requiere la terminación de la SDLC desde la fase de diseño de sistemas.
3. Ir con un paquete de software existente con o sin personalización. Si el software se compra sin personalización, las negociaciones con el proveedor para obtener el mejor precio serían los siguientes. Si se elige el software empaquetado con la personalización, y que iba a ser modificado en la empresa, la fase de diseño de los sistemas de otro modo sería casi el vendedor haría modificaciones y el siguiente paso sería la prueba y la documentación como parte de la fase de implementación de sistemas.
4. Realizar análisis de sistemas adicionales de trabajo. Para ello sería necesario volver a la mesa de dibujo con la fase de Análisis de Sistemas y re-presentar el trabajo de gestión para su aprobación.
5. Detener el proyecto. No hay tareas adicionales que deben realizarse a excepción de la presentación de distancia del proyecto para su posible reapertura futuro.
8. ¿Qué es un prototipo, y cómo los desarrolladores de sistemas de uso de prototipos?
Un prototipo es una versión de trabajo rápidamente construido de un sistema de información propuesto. Hay dos métodos de creación de prototipos diferentes; Prototipado y Diseño de Sistemas de prototipos. Prototipado sistema produce un modelo completo, trabajando del sistema de información mientras que el diseño de prototipos produce una versión desechable del sistema que es un modelo aprobado por el usuario que los documentos y los puntos de referencia las características del sistema de acabado. Diseño de prototipos permite a los usuarios tocar y sentir la interfaz del sistema antes de que el sistema es completo para proporcionar retroalimentación de ellos para mejorar la experiencia del usuario en el sistema. La satisfacción de los requisitos del sistema es el objetivo final del desarrollo de sistemas, y la creación de prototipos es una herramienta extremadamente valiosa durante el proceso.
9. ¿Qué es un entorno de cuarta generación?
Entornos de cuarta generación proporcionan un marco para el desarrollo de software es rápido, eficaz utilización de prototipos con herramientas CASE, generadores de aplicaciones, generadores de informes, generadores de pantalla y lenguajes de cuarta generación (4GL).
10. ¿Qué es un código? Enumeración y descripción de cada uno de los esquemas de codificación comunes.
Un código es cualquier conjunto de letras o números que representan un elemento de datos.
Hay 8 tipos de códigos:
1. Códigos de Secuencia - Los números o letras asignadas en un orden específico - normalmente utilizados para las secuencias consecutivas de tal manera que sigue 2 1 o D sigue C. Un número o una letra puede mostrar el orden y la historia como en el caso de un número de empleado, 100 ser contratado antes 101, etc.
2. Los códigos de bloque de secuencia - Números asignados al grupo - por ejemplo, todos los números de la serie 100 se refieren a los principiantes, intermedios y 200 serie 300 expertos serie.
3. Los códigos alfabéticos - Las letras utilizadas para distinguir sobre el tema desde otro basado en una categoría, una abreviatura o una fácil de recordar valor, llamado un código nemotécnico. a. Códigos de categoría identifican un grupo de elementos relacionados. Una tienda de informática podría utilizar HDD para unidades de disco duro, o HW para hardware o software SW para. segundo. Códigos abreviatura abreviaturas son alfabéticos. Abreviaturas de los estados son códigos. Códigos de ciudades pueden ser considerados como los códigos mnemotécnicos LAX, CLE, o DFW.
4. Códigos dígito significativo - los números en subgrupos para distinguir artículos. Una etiqueta de hurgar en la basura en un almacén puede utilizar 0041532, donde 004 es lo que la fila que está en en la plataforma 15 en el puesto 32.
5. claves de derivación - construir un código mediante la extracción o la combinación de datos de diferentes atributos de elementos. Un sistema de facturación podría utilizar FEDJO44256 como un número de cliente que consta de las 3 primeras letras del apellido, las 2 primeras letras del nombre de pila y los 5 dígitos del código postal.
6. Códigos de cifrado - codificación (cifrado) números utilizando una palabra clave. Por ejemplo, usando el alfabeto para codificar los números 0 - 9, donde A = 0 y J = 9. El número 123 se BCD.
7. Códigos de acción - utilizando una letra o número que se asocia con una acción en un menú. Por ejemplo, 1. Ejecutar, 2. lenta, 3. Detener, 4. Ir. Utilice 3 para detener o 4 to Go.
8. autocontrol de los códigos - dígitos de control utilizan para verificar la validez de un código numérico. Cualquier elemento que tiene un UPC (Universal Product Code) utiliza un dígito de control. Los primeros 11 números son manipuladas matemáticamente la producción de un dígito de control, este número de 12 dígitos ahora se puede validar matemáticamente que un número correcto era de entrada. Los nueve cosas a tener en cuenta en el desarrollo de un código se mantenga códigos concisa, permitir la expansión, mantener los códigos estable, que los códigos únicos, utilizar códigos que se pueden ordenar, evite códigos confusos, hacer que los códigos significativa, utilizar un código para un solo propósito, y mantener los códigos coherentes .

Similar Documents

Premium Essay

Network Systems Admin. (in Training)

...Address Class Historical Significance of the address classes: Class A: the first of the address classes, which is responsible for the value ranges of IP from 0-126 and also has 16,177,214 hosts. It also has 256 networks and the most significant bits are 0000. Class B: The second of the address classes, which is responsible for the value ranges of IP from 128-191. It also has 65,534 hosts and 65,536 networks. The most significant bits are 1000 and it is also a common class among most IP addresses. Class C: the third of the address classes, which is responsible for the value ranges of IP from 192-223 the most significant bits are 1100. It only has 254 hosts but it also has 16,177,216 networks since a lot of people have their IP addresses starting with 192.xxx.xxx.xx. Class D: the fourth of the address classes, which is responsible for the value ranges of IP from 224-239. Its most significant bits are 1110, and it does not have any networks or hosts because this class is rarely considered since the start of IP addresses don’t often start with 224 and above. Class E: the fifth of the address classes, which is responsible for the value ranges of IP from 240 and above. The significant bits of this class are 1111 and just as Class D does not have any hosts or networks, the same is with this class since IP addresses do not go above 192 usually. http://www.inetdaemon.com/tutorials/internet/ip/addresses/classful.shtml Address space A: the value range is from 0-126 so that means...

Words: 639 - Pages: 3

Free Essay

Network Admin

...1. What three numbering systems are used in computing? Decimal, Binary and Hexadecimal 2. What is the BASE of Decimal? How many characters? 10 is the base of Decimal and its 10 characters. 3. What is the base of Binary? How many characters? 2 is the base of Decimal and its 2 characters 4. What number system is used for everyday math? Decimal 5. What number system is used to store data by computers? Binary 0 and 1 6. List the decimal to binary conversion methods. Binary conversion charts methods and Division by 2 methods 7. Practice Decimal to Binary conversion. 47÷ 2 = 23 with a reminder of 1 23 ÷2 = 11 with a reminder of 1 11 ÷ 2 = 5 with a reminder of 1 5 ÷ 2 = 2 with a reminder of 1 2 ÷ 2 = 2 with a reminder of 0 1 ÷ 2 = 1 with a reminder of 1 the Binary will be 101111 8. State the powers of 2 from exponent 0 through 7. 27 26 25 24 23 22 21 20 9. What method can be used for Binary to Decimal conversion? The conversion charts methods. 10. Practice Binary to Decimal conversion. 10011 24 23 22 21 20 16 8 4 2 1 1 0 0 1 1 16 0 0 2 1 16 + 2 + 1 = 19 11. State the basic units of measurements for bytes...

Words: 576 - Pages: 3

Premium Essay

Network Admin

...Juan J. Morales Network Infrastructure Professor Lambert DB – 2 1 - Explain the concept of a server role in detail. List some of the available server roles, and demonstrate how to configure them. Follow this by a demonstration of adding Windows Server 2008 features how do these features benefit and administrator? A server role is a software program included in a server software that performs a specific function, some of this server roles are as follows. * DNS Server – Provide the IP name resolution to a network * DHCP Server - Provides an Internet Protocol (IP) host with its IP address and other related and configuration information such as the subnet mask and default gateway. Just to name a few. From server manager in the left-hand pane, double-click the Roles node. In the right-hand pane, click add role, and click next to bypass the welcome screen. The add roles wizard windows appears, select the role and click next follow the prompts for the selected role to be install. It makes the management of the server more manageable and integrity of the network.  2 - The installation of Windows Server 2008 can be done in many different methods, list and explain each method in detail. Follow this by stepping through the actual process of this installation of those methods? Minimum Requirement for Installing Windows 2008 Processor 1.4GB – 64 – Bit Rams Minimum 512 MB, Maximum 32 GB Hard disk Requirement Minimum: 32 GB 1. Insert a bootable Windows Server...

Words: 457 - Pages: 2

Free Essay

Network System Admin

...Chapter 7 Key Terms Switched circuit: a circuit created by the phone company in reaction to signaling.(the user tapping telephone keys or a modem sending in the same digits), with the telco tearing down the circuit when the user is finished. Dedicated circuit: Reserved for a specific use. In communications, a dedicated channel is a line reserved exclusively for one type of communication Circuit switching: A type of communications in which a dedicated channel (or circuit) is established for the duration of a transmission. The most ubiquitous circuit-switching network is the telephone system, which links together wire segments to create a single unbroken line for each telephone call. Packet switching: Refers to protocols in which messages are divided into packets before they are sent. Each packet is then transmitted individually and can even follow different routes to its destination. Leased line: A permanent telephone connection between two points set up by a telecommunications common carrier. Typically, leased lines are used by businesses to connect geographically distant offices. Time-division multiplexing:  a type of multiplexing that combines data streams by assigning each stream a different time slot in a set. TDM repeatedly transmits a fixed sequence of time slots over a single transmission channel. T-carrier system: the name of the combination of different physical line standards(DSO, DSI, DS3 and others), plus circuits switches that use time division multiplexing...

Words: 335 - Pages: 2

Premium Essay

Network System Admin

...mobile phone. The original iPhone had a 3.5 inch screen at 320 X480 and 163ppi, a quad-band 2G edge data radio, 802.1b.g Wi-Fi, Bluetooth 2.0 EDR, and a 2 megapixel camera. the iPhone was powered by an ARM-based Samsung 1176 Z-S processor and power VR MBX lite 3D graphics, 128 megabytes of random access memory(RAM), as well as four or eight gigabytes of NAND flash storage, and also could sync to iTunes. The iPhone software was very impressive, Apple used a full version of Safari, based on the exact same web kit HTML rendering engine that powered the desktop version on the Mac. Apple also created the best mobile YouTube and maps implementation ever seen on mobile. Unfortunately the original iPhone didn’t have CDMA and EVDO rev A network compatibility. That meant it couldn’t work on two of the U.S. big four carriers, Verizon and Sprint. This actually didn’t matter; because the original iPhone was exclusive to AT&T. In addition to no hardware keyboard or stylus, the iPhone also didn’t have a...

Words: 821 - Pages: 4

Free Essay

Home Work 1 - Oppenheimer

...1. A network design customer has a goal of 99.80 percent uptime. How much downtime will be permitted in hours per week? How much downtime will be permitted in minutes per day and seconds per hour? Which values are acceptable in which circumstances? Ans: To compute the uptime/downtime is to take in concern merely the number of minutes before now passed for up-to-date month and existing year which is possibly what we need to find. A typical MTBF goal for a network that's extremely relied upon is 4000 hours. In different words, the network mustn't fail additional typically than once each 4000 hours or 166.67 days. A usual MTTR aim is one hour. In another sense the network failure ought to be fastened among one hour. I calculated downtime ratio by dividing occupied time into quantity of downtime. The summation of that number would be the ratio of downtime. Downtime for 99.8 percentile would be: Availability = MTBF / (MTBF + MTTR) SLA level of 99.8 % uptime/availability gives following periods of potential downtime/unavailability: * Daily: 2m 52.8s * Weekly: 20m 9.6s * Monthly: 1h 27m 39.5s 2. Assume you are in New York City in the United States and you are downloading a 100-KB web page from a server in Cape Town, South Africa. Assume that the bandwidth between the two cities is 1 Gbps. Which type of delay will be more significant, propagation delay or transmission delay? Defend your answer. Ans: Delay is pertinent for every data transmission expertise but...

Words: 1445 - Pages: 6

Premium Essay

Issc342

...Running head: Cyber Security Securing Networks Wagner, Juan ISSC342 ABSTRACT As our dependency on technology grows so does the need to protect the data contained in them. We live in a world where digital imaginary data has become just as important if not more than actual physical work these machines perform. One of the biggest jobs for any respectable firm is the ability to protect its information from the unrelenting attacks by hackers, insiders, social engineers and software exploits. this is an on going struggle that will never end. The reality is there is no way to fully and completely protect a network. The second best thing we can do as IT professionals is ensure protocols that have resulted in having a more secure network are being met. Since most of the errors in the world are human errors we must take extra consideration when securing a network. Computers don't make mistakes only people make mistakes. Finally as professionals we must do our job in researching new exploits, tools and reasons why someone would want to perform a cyber attack on said company. INTRODUCTION In the IT world knowledge is power, and there is much to be learned if a corporation is to be able to perform at an AAA level. There are many things that can go wrong in regards to intellectual property. Some of those things are certificates, classification of data, and how computing devices are used. In conjunction with the material professionals also should be actively researching...

Words: 1917 - Pages: 8

Premium Essay

Nt1310 Unit 3 Assignment

...Everything comes with a cost no matter what we try to do, altering an organization’s network topology is not without challenges. A common belief among IT admins is that network topology is an impossible task. Admittedly, the task can be difficult. Changing the network topology would entail pinpointing specific connections between devices and changing aspects such as server IPs, server domain names, and client domain names. Furthermore, changing aspects of the network topology may even affect the connectivity of the whole network. “Lost productivity was the biggest cost driver of successful phishing attacks, whereas clean up and incident response accounted for most of the costs of remediating malware attacks, according to Ponemon’s report, The Cost of Phishing & Value of Employee Training. For the report, Ponemon surveyed 377 IT security employees at a range of organizations.” Another example is a performed action (which the attacker persuades the victim to perform it) for a PayPal user is submitting his/her login credentials to a fake website that looks similar to...

Words: 526 - Pages: 3

Premium Essay

Computer

...in researching   1) Developing a search strategy showed me how to organize my material and stay on topic. It also introduce me to key concepts which I have been using in my classes when studying and taking notes. Ironically I found using this method at work as well. Recently I found a solution to an ongoing network problem and my manager approached me asking me to fully research the resolution draft an email and send it out to the entire team.By using the search strategy I was able to gather the correct information that was needed to draft the email and send it to my team. 2)The Boolean operator AND OR NOT stuck in my head the most. I learned that this method is the main component to an effective statement and to broaden or narrow your search. When I use to search google without using the Boolean operator I always wondered why the search engine always gave me along list of searchs that didnt really relate to what I was looking up. By using this method I was able to get the exact results that I wanted and as I mention above this method was also used when I did my initial search statement for the email I sent to my colleagues on how to properly resolve the network issue. 3)Lastly the most important component of a research project is to cite the resources appropiately. In this course i was introduce to several styles of citing. There are different citing styles for different  documentation styles. I had to go back and really study this method thoroughly as suggested by...

Words: 337 - Pages: 2

Free Essay

There After

...How would one counter an active attack? b) Give examples of two possible scenarios when one cannot be absolutely certain that an adversary is launching a modification-of-message attack or denial-of-service attack, even when the proper security protections are in place. Explain your answer. c) How could traffic analysis jeopardize security? Give an example to illustrate your answer. Question 2 (a) Is it likely to achieve perfect security for a network (i.e. to have a network that will never fail in terms of security) in the real business world? Give three possible reasons to substantiate your answer. (b) The computing speed is much faster these days compared to that some years back. On the other hand, old algorithms and systems are still in use. Give three reasons to explain this situation. Question 3 a) (i) Explain Security Services and Security Mechanisms. (ii) Suppose the main threat of a network is replay attack. Does the use of confidentiality services protect the network against such attack? Explain your answer. (iii) Is it always the case that only one mechanism can be used to achieve the provision of a particular service? Give an example to illustrate and explain the answer. (b) Explain how the following services ensure security of the systems or of data transfers and give possible example or scenario for each: i) Message authentication ii) Non- repudiation iii) Confidentiality ...

Words: 284 - Pages: 2

Premium Essay

Harriet's Chocolate Factory

...Case Study 1: Harriet’s Fruit and Chocolate Company Daniel Michovich Dr. Otto CIS532: Network Architecture and Analysis January 26, 2013 Mission Statement: Striving to be number one fruit and chocolate industry area wide. Introduction “Harriet’s Fruit and Chocolate Company was established in 1935 in the Pacific Northwest of the United States to ship gift baskets of locally grown peaches and pears to customers in the United States (Oppenheimer, 2011)” In regards to the physical infrastructure of Harriet’s Fruit and Chocolate Company, my investigation will reveal many important aspects to aid in the planning of the network design. First, I will determine the number of buildings to be used, as well as the distance between them and what equipment they will contain such as wiring closets or computer rooms and the current network devices. Determining the distance will help in the cabling design and wiring as well as the selection of technologies and devices to meet the design goals. My investigation will further reveal any architectural or environmental constraints, such as tall trees within the path that power lines may travel, that will assist in decisions such as whether wireless technologies are feasible as well as if there are any impediments to communications or installation, to include all hazards. Infrastructure architecture consists of the hardware, software, and telecommunications equipment that, when...

Words: 1326 - Pages: 6

Free Essay

Ecss Practice Exams

...| | |The most damaging of the denial of service attacks can be a _______________ attacks, where an attacker uses zombie software distributed | |over several machines | | | | | |[pic] | |Bot | | | | | |[pic] | |Distributed denial of service ...

Words: 2882 - Pages: 12

Premium Essay

Ipremier Case Study

...customer an opportunity to decide if they want the products or not. iPremier Company iPremier is one of the top retail business that sell the luxury items, profiting $2.1 million on sales $32millions in 2006. Since then sale has grown over 20% annually. There was a decrease, but everything works itself out. Upper management describes working at iPremier as intense. .Qdata is the company that host iPremier computer equipment and provided connectivity to the internet (Austin and Murray, 2007). Although Qdata offers monitoring of website for customer and network operation, they had not invested in advanced technology and was not able to keep staff. During 75-minute attack how well did they iPremier perform. What would you have done differently if you was Bob Turley Bob Turley is new Chief Information Officer and is currently in New York on business. AT 4.31 am he received a call, from the network been hack and wired email received with just the word “Ha”. The site was a DoS attack coming from about 30 locations, the purpose of the attack was an attempt to make the computer unavailable. iPremier was not ready for such an attached and didn’t have anything in order which would help them with such an attacked. The situation was poorly handled, and Bob did not contact anyone higher up to let them know what was going on. He didn’t know who to contact, whether to call police or FBI or who to contact at...

Words: 967 - Pages: 4

Free Essay

Trending & Aggregation

... | |*Document Date: |[2013-05-20] | | T&A Handbook [pic] Update Notes |Date |Version |Description |Author | |2013-05-20 |V1 |T&A Handbook |Elham Kalantari | Contents 1 Introduction 3 2 T&A Interfaces 3 2-1 Source Availability 3 2-2 Dashboards 4 2-2-1 General Information 4 2-2-2 Over Time Mode 5 2-2-3 Over Network Elements Mode 9 2-2-4 Dashboards Contextual Menu 9 3 Examples 10 Introduction This document will guide you through the Trending&Aggregation (T&A) user interfaces. Some examples are available at the end. T& A Interfaces 2-1 Source Availability [pic] : This icon allows the visualization of source file availability. By clicking on it, below window appears. [pic] :...

Words: 1080 - Pages: 5

Premium Essay

Computer

...afford to spend and if anyone is technical in the company or are they going to need some outside help to keep up maintenance after the system is in place. (this can add to the cost of the system) My next step would be to start asking some questions about the law firm. I would like to know what the law firm is in charge of doing. Criminal, civil, family or so on; I think this would give me a better understanding of some of the information I may be working with along the way. As a law firm I am sure they spend a lot of time in the courtrooms and in their home offices so other questions I would ask is if they have cell phones and laptops that will need to access information on the network; this will help in a couple of areas, firstly in deciding if we should consider cloud computing or a private network and secondly, how to set up files access and permissions by departments and depending on size of company, maybe servers. Being a law firm a big consideration would have to be security of the information they access and ways of accessing this information. I would like to talk with the employees also, just to get an idea...

Words: 500 - Pages: 2