Troubleshooting and Tool Report

 

Select one of the seven network problems and develop a troubleshooting and tool report that details the solution.

  1. On Day 2 of full operational capability (FOC), our connection to the internet was becoming intermittent. We could establish connections to our globally hosted servers some of the time. The connection would drop at seemingly random periods and we don’t know why. We have experienced this day and night, and it has been consistent for the past three days.
  2. When our connection to the internet is working, we seemingly cannot reach out to our globally dispersed servers from our hosts. We use the globally dispersed servers for command and control and must be able to connect to them. We need a method to determine where the packets are going and why they are not reaching their destination. Because these servers are globally distributed, we can’t just pick up and deploy to them.
  3. Our internal network servers are also spotty. Sometimes they are up, and sometimes they are down. For example, the DHCP server appears to provide IP addresses to hosts that are turned on sometimes, but other times when the host is turned on, it receives an Automatic Private IP Address (APIPA). These hosts can communicate with our networked hosts locally, but they can’t reach out to our global servers. These hosts enable our persistent engagement capability, so they must be functional, and we need to determine the problem ASAP!
  4. We have a team that can troubleshoot from afar, but the members are located 25 miles west of this location. We have one of the tech support personnel deployed on site, but there are just too many issues for one person. The support team that is 25 miles west is centrally located to support multiple operational outfits. That team has a virtual private network (VPN) and secure access to our internal servers. At times, support team members need to determine which of our hosts are functioning. We use both Microsoft Windows and Linux operating systems, but we don’t know what tool will help determine host functionality from afar.
  5. This next part is classified, but I need your help, and I need it fast. Bottom line, we believe there may be an insider threat. At times, we have reason to believe a nonapproved device is connecting to the network and reaching out to the internet. We need a method to determine what devices exist on the same subnet of our network. What can help us do that?
  6. When we begin operations in 72 hours, it will be of utmost importance for us to know what device name is associated with what IP address. This will allow us to know what exists internally and what we need to defend should the adversary begin operations against us. We need to understand what options exist to achieve this task.
  7. When we first arrived and established our connection to the internet, we noticed inbound connection requests. What tool can we use to determine if any adversary is reaching into our systems through a particular port or protocol?

Your report should be about a page in length and address the following:

  • Choose and restate one of the problems identified as you understand it and explain why it is a problem.
  • Describe how you would apply the steps in the Network+ troubleshooting model to this problem.
  • Name and provide a brief overview of the tool that could solve this problem (refer to Lesson 17 in uCertify).
  • Describe how the tool can be used to solve similar problems in the future.
  • Provide a detailed overview of the tool’s functionality and options.
  • Include a screenshot of your selected tool from the appropriate uCertify lab.

The SITREP (Situation Report) Sample Report is provided so that you can understand what Cyber Command is expecting in your report. Your report will vary depending on the problem and tool selected.

How Will My Work Be Evaluated?

Troubleshooting refers to the process of identifying problems with a network through a rigorous and repeatable process and then solving those problems using testable methods. An important part of your duties in the networking field will be to troubleshoot and solve problems. In fact, most of your time will be spent with this focus to include optimizing performance. Networks are dynamic in implementation and are built to be resilient, but problems arise due to many unforeseen reasons. Developing the knowledge, skills, and experience to successfully troubleshoot and recommend solutions will show you are value-added to the organization.

For this assignment, you are asked to review a scenario, understand the problems, apply your knowledge and skills gained in this class, and propose a solution. Use the template provided and complete the assignment. An example solution is provided for you.

The following evaluation criteria aligned to the competencies will be used to grade your assignment:

  • 1.2.3: Explain specialized terms or concepts to facilitate audience comprehension.
  • 1.3.5: Adhere to required attribution and citation standards.
  • 1.4.1: Produce grammatically correct material in standard academic English that supports the communication.
  • 2.1.1: Identify the issue or problem under consideration.
  • 2.3.1: State conclusions or solutions clearly and precisely.
  • 10.1.1: Identify the problem to be solved.
  • 13.1.1: Create documentation appropriate to the stakeholder.

If you haven’t already done so last week, download the Troubleshooting and Tools Report Template and use it to record your work.

When you are finished, delete the instructional text from the template before you submit. Click “add a file” to upload your work, then click the Submit button.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

LINUS Migration Proposal Presentation

 

Project 1: Migration Proposal Presentation

Hide Assignment InformationInstructions

Faster Computing has contacted Go2Linux and requested a brief proposal presentation for migrating its systems from Windows to Linux.

The company is specifically interested in seeing the following information:

(10.1.1: Identify the problem to be solved.)

  • Based on your current understanding of Faster Computing’s business, what are some potential benefits of Linux?
  • The company is aware that many different Linux derivatives exist. Be very specific and choose only one version (e.g., Ubuntu, Mint, Zorin, Redhat, CentOS, Kali). Which would Go2Linux recommend, and why? Give specific reasons for your choice (e.g., security features, support, updates, user interface).

(10.1.2: Gather project requirements to meet stakeholder needs.)

  • What steps will be required to migrate the systems from Windows to Linux?
  • Are there graphical interfaces available for the Linux workstations that would provide similar functionality to Windows? Some users are concerned about working with a command-line interface.

(10.1.3: Define the specifications of required technologies.)

  • What tools are available on Linux for the servers to provide file sharing, Linux services, and printing? (e.g., Apache/Nginx, Samba, CUPS, SSH/SCP). Ensure you identify what the functions/services are used for (e.g., Samba is used for file sharing).

(1.1.3: Present ideas in a clear, logical order appropriate to the task.)

The deliverable for this phase of the project is a three- to five-slide PowerPoint narrated presentation.

  • An introductory slide
  • A summary slide
  • Voice narration on every slide

For each slide, you will embed your own audio recording as if you were presenting the content to the Faster Computing team. Faster Computing has not yet committed to the project, so this should be presented as a proposal. The presentation should be visually appealing; the inclusion of at least one image that supports the content and adds value to the proposal is required.

(1.3.3: Integrate appropriate credible sources to illustrate and validate ideas.)

You must cite at least two quality sources.

You used at least 2 references and your references were cited properly following an accepted style. Ask your instructor for clarification.

Use the Migration Proposal Presentation template to get started.

(2.3.1: State conclusions or solutions clearly and precisely.)

You should present your proposal as if you are selling to the company. Revisit all of these important reasons in the summary slide.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Wk 5 – Signature Assignment: Case Study: Appliance Warehouse Services – Application maintenance

  

Assignment Content

  1.     Continue your work to support the planning and implementation of the new Service Department for Appliance Warehouse. Incorporate content and feedback from your previous assignments.

    Directions
    In MindTap, review the Appliance Warehouse Case, and do the following:

    • Read the Before You Begin Message and the Module 12 Appliance Warehouse Webmail Client Emails. Read the messages to help determine the tasks you must complete.
    • Review and analyze the weekly Appliance Warehouse case study content and resources.
    • Create a 3- to 4-page document (to submit in Blackboard) that includes the following:
    • Summary: Explain your overall approach to analyzing and addressing the needs of the new Appliance Warehouse Service Department. How did you ensure you met the implementation, integration, and maintenance needs of the new Appliance Warehouse Service Department business case?
    • Work Breakdown Structure (WBS): Design a WBS for the project of planning and implementing the new Service Department. Identify each task needed in order to implement the new Services Department. Include duration times. Refer to the Week 2 Discussion.
    • System Maintenance Plan: Include measures to implement corrective, adaptive, perfective, and preventive maintenance. Include recommendation to maintain the system either using in-house resources or to outsources it. Include pros and cons of both maintenance types.
    • Security Risks: Identify and explain potential security risks for the Service Department business case. Consider physical, network,application, file, user, and procedural types of security risks. Include the backup system method to be used.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

coca cola

 

Coca-Cola is a non-alcoholic carbonated beverage manufactured by «The Coca-Cola Company». There are many achievements of this transnational corporation that make it one of the most expensive brands such as originality, representation worldwide, and powerful advertising campaigns. The drink is sold in more than 200 countries around the world. The company owns one of the most recognizable brands in the history, and almost every nation on the planet has heard of the “Coca-Cola.” However, the company was accused of extensive use of drinking water, so the sustainability became the crucial factor in Coca-Cola’s modern business operations. The purpose of the paper is to analyze the company’s water consumption issue and propose measures to solve it and further recommendations.

Background

The water issue is common for beverage companies. However, no corporation has ever taken that problem as seriously as Coca-Cola has. The causes of the problem are the nature of beverages manufacturing: their basis is high-quality water. Unfortunately, the resources of water are shrinking, and some world regions do not have them at all. Additionally to the production needs, the water is used for other factory’s purposes. Seeking the ways to solve the water issue in 2004, Coca-Cola required 2.7 liters of water to produce one liter of product, and out of that amount; 1.7 liters were necessary to ensure the adequate work of the equipment (Coca-Cola: Drinking the World Dry, 1). The current rate is 2.03l liters of water per one liter of Coca-Cola while the goal is to make the rate 1,7:1 (Improving Our Water Efficiency, 1). Overall, the company made 162.6 billion liters of Coca-Cola beverages from around 305 billion liters of water in 2014 (Moodie, 1).

The goal of Coca-Cola Company is to fulfill its global commitments that are to restore the same amount of water in nature used in the production of beverages up to 2020 (Improving Our Water Efficiency). Coca-Cola and its global partners announced this commitment in 2015. Based on the global projects of Coca-Cola system to refill water in the environment, today, the company estimates this figure to 94% of the volume of water used in the volume of drinks sold in 2014 (Improving Our Water Efficiency). Since 2004, Coca-Cola returned around 153.6 billion liters of water to local communities and nature through the implementation of 209 projects on water in 61 countries (Moodie, 2). Coca-Cola system has compensated about 126.7 million liters of water to nature and local communities used in its production processes in 2014 through the purification of wastewater (Moodie, 1). For the last 12 years, Coca-Cola Company is struggling to find sustainable solutions.

Analysis

Fortunately, the understanding of the importance of moderate water consumption and restoring became obvious to the Coca-Cola managers in 2004 (Coca-Cola. In Hot Water. The World’s Biggest Drinks Firm Tries to Fend off Its Green Critics, 1). Since then, there were many projects and strategies implemented. The company has already created a strategy concerning water resources with several objectives. The first objective was to enhance the efficiency of water use, constantly reducing the amount of water needed for the production of beverages, as well as to monitor that the water returning from the enterprises into the natural environment is suitable for the functioning of aquatic ecosystems. One more goal is to assess the availability of water in the future and reduce the environmental and social risks associated with water use. Additionally, sustainable water management includes work with suppliers, drawing their attention to the need for efficient water use in the processing of agricultural raw materials, in particular, sugar production. Coca-Cola Company was striving to support national and international social projects aimed at preserving water bodies and promoting the rational use of water and to carry out emergency supplies of drinking water to those affected by the disaster. Lastly, together with the shareholders, to make a common contribution to the development of national and international standards, as well as improving water conservation policy. Coca-Cola Company works with organizations and projects aimed at promoting water protection initiatives, such as the Water Mandate (Water Mandate) that is a voluntary UN initiative, spelled out in the Global Agreement (Improving Our Water Efficiency, 2).

Options and Recommendations

There are several opportunities and recommendations for Coca-Cola, namely its managers. The first possible way is to support more the countries that have a greater lack of water than others do. The most suitable regions are Africa and Central Asia. In Central Asia, Coca-Cola annually refills nature and the local communities up to 4,357,840 cubic meters of water that is 300% of the beverages sold in its region (Moodie, 1). Thanks to these joint efforts, Coca-Cola could be the first world-famous manufacturer of soft drinks, which will reimburse nature and local communities the entire volume of water that it uses in the production. The recommendation is to pay more attention to the African countries and collaborate with the UN to increase the scale of cooperation.

The next option is the technical improvement. Significant support was provided to villages where the company carried out the reconstruction of the water supply system. There is intensive work to conserve water resources. Thus, the global leader in beverage production allocated its funds for the reconstruction of the agricultural channel irrigation systems. Coca-Cola Company has installed sensor taps, water filters, and solar collectors (Improving Our Water Efficiency, 1). The manufacturer supported the construction of energy-efficient greenhouses with drip irrigation (Improving Our Water Efficiency, 2). The recommendation is to make water use sustainable by improving the agricultural methods and equipment used in developing countries.

The third recommendation is to control not only the amount of water used but also the water returned to the environment. The company should pay particular attention to the quality of wastewater discharged. Before the water enters the watercourse or sewage system, it would pass several stages of modern purification. There should be measuring equipment, controlling quality, and dynamic parameters of the flow of water to be used at each stage of purification.

One more recommendation is connected to the sphere of media. Coca-Cola can increase the awareness of water issue importance and educate the communities on how every person can save the water in daily life. Moreover, the company should provide more information about its water saving measures in different countries and their outcomes. Among all these recommendations there is no superior one, all they are worth taking into account and implementing.

Coca-Cola Company respects human and environmental water needs. As the manufacturer of beverages, it recognizes the essential role of water in improving the health of ecosystems, communities, businesses, agriculture, and commerce. The Coca-Cola Company products consist of water on more than 90%. Drinking water quality is considered to be the most urgent issue for the health of the population, so the managers of the corporation will put in every effort further to the houses in developing countries to provide clean water, which has beneficial qualities. Therefore, such a resource as water is crucial for Coca-Cola Inc. In addition to the execution of social programs, the company has made a commitment to become water-neutral before 2020; it means planning to return nature every drop taken by the beverage industry. The major recommendations are to improve technical aspects, support developing countries in saving water, increase social awareness of water issue, and work with other organizations in arid regions.

More on  https://essaysbank.com/ 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Problem 1- Planning the Project

1.Everyone has been involved in projects. What is the largest project you have been involved in? (You do not have to have been the project manager, but could have played another role.)

  1. Write one sentence that describes the objective of the project.
  2. Describe specifically how this project meets the definition of a project used in this textbook. (How is it unique? What were the time constraints? If it is over, how did you know it was over? If it is ongoing, how will you know when it is over?
  3. What was your role? Were you the project manager, a volunteer, some other role? If you were not the project manager, who was?
  4. Was the project part of a larger portfolio or program of projects?
  5. Who else was involved?
  6. What was the budget?
  7. Did you anticipate any risks at the outset? Did the project experience any outside forces that caused a change in either the objectives or the approach to achieving those objectives?

2. Go online and search for project life cycle models. Identify at least two that are different from the PMI model, and compare and contrast the phases. Be sure to cite your sources.

Text-

Title: Project Management 

Subtitle: https://opentextbc.ca/projectmanagement/ 

ISBN: 978-1-77420-013-1 

Authors: Adrienne Watt 

Publisher: BCcampus 

Publication Date: August 14, 2014 

Edition: 2nd Edition

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Discussion8

200 words+

Hackers break into systems and disrupt web site services: 

Discuss are they criminals, or are they challenging computer specialists discover faults within computer networks and systems?

                                             Please list your reference/s

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Discussion8-2

200 words+

In your opinion what is/are the most security threats that organizations will have to be prepared for 2020-2021 ?

Please list your reference/s

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Case Study Analysis

 Read the Module 1 Case Study Assignment 1 and address the following question in a word document and then submit/upload your document. Document format is listed below.

Question: In approximately two pages, compare the benefits and drawbacks of Google Wallet and Apple Pay from a consumer’s standpoint, a retailer’s standpoint, and a bank’s standpoint.

Your word document should have the following;

  • Title page, with your name, class, date, and assignment identifier
  • Body of the paper (one or two pages) double spaced, 12 point font, New Times Roman, 1-inch margins on all sides
  • References should be identified/listed on a separate page (last page of submission). All references must follow APA format.
  • Save in Word Document

 Case Study 1:  Digital Wallets on Mobile Devices: Apple and Google

One of the fastest-growing segments of the online payments business is mobile payments. U.S. mobile payments are expected to reach $140 billion by 2019 and purchases using mobile devices could account for half of all online retail sales by 2017.Google introduced one of the first digital wallet products that would work on a mobile device in 2011 when it also introduced support for the operation of NFC chips in its Android mobile operating system. Google Wallet stores a MasterCard account for users that agree to maintain a cash balance with the card’s issuing bank, so it operates essentially as a debit card. Google Wallet does not charge a fee to merchants or the MasterCard issuing banks, nor does it charge a transaction fee. Instead, it generates revenue from advertisers who pay to display ads, offer coupons or other promotions (specific ads are displayed based on the mobile device’s proximity to the stores that are making the offers). Google Wallet has been slow to catch on with users.In 2014, Apple introduced a digital wallet product for its mobile devices called Apple Pay. In operation, Apple Pay is similar to Google Wallet; however, the infrastructure and revenue model is different. Apple Pay charges the issuing banks a fee of 0.05 percent of the transaction amount and guarantees each transaction; that is, if the transaction is fraudulent, Apple will cover the loss. Credit card companies normally charge merchants a fee ranging between 2 and 3 percent of the transaction amount, so the additional Apple Pay fee serves as a low-priced insurance plan for them. Consumers will not be charged at all for using Apple Pay and will not be given advertising messages. Further, Apple has stated that it does not collect information about consumer buying habits from Apple Pay data. Apple arranged for American Express, Discover, MasterCard, and Visa credit cards to be included in their system, along with a group of large card-issuing banks. They also included major retailers such as Bloomingdales, Disney, Staples, Walgreens and Whole Foods. These participants will be able to collect data on consumer buying habits, but only on those consumers that use their card or shop at their stores. Apple reported that more than a million credit cards were registered with Apple Pay in the first three days it was available. After Apple Pay’s introduction, an increase in the number of retailers that accept NFC payments (as you learned in this chapter, NFC technology is used by both Google Wallet and Apple Pay) caused an increase in the use of Google Wallet. 

(Schneider 499)

Schneider, Gary. Electronic Commerce, 12th Edition. Cengage Learning, 20160226.  

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

data encryption

 Do you believe that all data should be encrypted? Many computing professionals think this is a good idea. But a small number of computing experts feel that no data should be encrypted—that all data and software should be openly available to anyone who wants it. Explain your answer in 300 words or more with references(whether you believe all data should or should not be encrypted).  

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Mobile Applications Research Paper

 Find and then evaluate a Research article – Mobile technology preferred; but any technology topic is acceptable (must follow APA and these formatting requirements:) 

 Please use the example “Guidelines for Evaluating your Research Article” as your guide in addressing the questions below: 

  • What is an Information Technology Project?
  • What makes research writing different that ordinary information/observation writing? 
  • Identify & explain the major components of a research paper format.
  • What components of a research format is included in your article, and
  • How does this format contribute to the purpose of the writing?
  • Why use Peer Reviewed journals in research?
  • Why are keywords used during the Literature Review process?
  • Why use/apply APA basic citation style in your writing assignments?
  • Why is academic integrity important (see syllabus)?

Requirements:

 

  • Write a four – six (4-6) page paper that evaluates a research article that you found – your paper should be: typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. See hand-outs provided on graduate and APA style research papers.
  • State the name of the article you found, use the questions below as context for evaluating your article; discuss what this article about; cite this article and include it in your reference list.
  • Use at least four different quality resources in this assignment. Note: Wikipedia, Blogs, Info articles, and similar Websites do not qualify as quality resources for research writing.
  • Include a cover page containing: the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference pages do not count toward the page count. Review the Helpful Information provided related to critical thinking and also follow the hand-outs provided in this folder.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now