Intro to Networking: Assignment 1

Submit these answers as a single Word document. APA style with references. 100% original work. no plagiarism.

Answer the following questions:

1. Map the layers of the TCP/IP model to the OSI model

2. Each layer of OSI has a body/group that is responsible for the standards, please name them

3. Describe the progression through the OSI model of the following:

  – A web browser request and connection to www.cnn.com

  – An email being sent from Outlook on a Windows machine from your APUS email account to [email protected]

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Current Events

Consider a specific current malware in the news or blogs and discuss these questions:

  • Describe the malware. Include a reference to your (public) source material. Be sure to answer the following questions
    • Who does the malware typically target? 
    • What might be the attacker’s goal?
    • What types of mechanisms or exploits do the attackers use to gain access? 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Vulnerability Scanner

You will be using your virtual machine from last week and installing, configuring, and then running a vulnerability scanner to scan your virtual machine.  

You will be using a free open-source scanner named Vuls. To help you get it installed and running, you can follow these instructions, which recommend that you use an account named “Sammy.” I did these instructions using my root account and ignored the Sammy parts. (Admittedly, this is poor practice, but for a virtual machine we are deleting at the end of the course, we can bend the rules of best practices a bit.) Follow steps 1 through 6. 

In our instructions for the week, we need to edit a couple commands along the way. This is due to the author of the utilities changing the way that certain command arguments are processed. The functionality still works but the commands will differ. Please make sure you use these modifications in order to not have errors. Again, copy/paste will be the easiest way to capture the changes so you don’t miss a dash or space.

ORIGINAL: for i in `seq 2002 $(date +”%Y”)`; do sudo go-cve-dictionary fetchnvd -dbpath /usr/share/vuls-data/cve.sqlite3 -years $i; done

CHANGE: sudo go-cve-dictionary fetch nvd –dbpath /usr/share/vuls-data/cve.sqlite3

ORIGINAL: sudo goval-dictionary fetch-ubuntu -dbpath=/usr/share/vuls-data/oval.sqlite3 18

CHANGE: sudo goval-dictionary fetch ubuntu –dbpath=/usr/share/vuls-data/oval.sqlite3 18

At the conclusion of Step 6, you will have run the scanner against your virtual machine. There will be vulnerabilities, many of which will be unpatchable. Attach a screenshot to your submission of your results screen. Pick one of the vulnerabilities and answer the following questions: 

  • What is the CVE number of your chosen vulnerability?
  • What year was this CVE discovered? (Hint: this is part of the CVE number!)
  • What software programs are affected?  
  • In your own words, what is the summary of this vulnerability?  
  • Perform an analysis of the likelihood of this vulnerability being exploited. In other words, would this program’s vulnerability be easily exposed to an attacker or would it require a complex scenario to make this exposed?
  • In your opinion, given the CVE criticality and the likelihood, do you feel comfortable with this vulnerable software on your system? 

Parameters

  • The assignment should be double-spaced, 12-point Times New Roman font, with one-inch margins
  • Use APA for citing references and quotations

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Informática

Piensa en la posibilidad de comenzar un negocio propio. ¿Qué tipo de negocio te gustaría tener? Prepara una presentación en PowerPoint donde expongas una descripción de ese negocio que te gustaría tener, la localización, el objetivo de la presentación y otra información relevante que te ayude a lograr que el Banco SYSAN te considere como cliente y apruebe el préstamo que necesitas para establecer tu negocio.

Instrucciones:

  • 8 “slides” * 
  • seleccionar un “template” (“Themes”)
  • en el primer “slide” debes escribir el título que le darás a la presentación utilizando la opción de “WordArt”.
  • incluir un “Footer” con tu nombre y número del “slide” en todos los “slides” menos en el primero.
  • utiliza los “bullets” o la enumeración en 2 de los “slides”.
  • colocar imágenes o fotos en las láminas (con créditos a autores)–[Buscar imágenes en unsplash.com].
  • integrar una foto utilizando la opción de “Background” (fondo) en uno de los “slides”
  • integrar un hiperenlace (“hyperlink”) en un texto o imagen en un “slide” (que no sea el primero) que conecte a una dirección en la Internet
  •  incluir un vídeo de un negocio similar al que tú deseas establecer en uno de los “slides”
  • la penúltima lámina debe tener un listado de los puntos más importantes de la presentación.
  •  el último “slide” debe contener datos de contacto para tu empresa, email, redes sociales, etc.

* Nota: Los términos “slides”, transparencias o diapositivas se estarán utilizando como sinónimos en las tareas de PowerPoint.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Urgent 2

 

Case Study
LH Medical Company (LHM)
LHM is a London based privately owned hospital which provides healthcare to its patients. The hospital uses in-house software to manage and service its patients which they refer to as clients. It is an expanding venture and needs to accommodate for processing its information globally. The practice management system is web enabled and multi-platform for connectivity via web services, in addition it has connectivity to existing legacy systems. An enterprise document management system ensures patient documents are replicated globally and available per demand.
In addition to medical treatments, medicine and drugs, consultation and vaccinations are offered to its patients (with a variable additional fee) the company offers medical instruments to other companies either to purchase or to lease. LHM records the details of its clients with possibly their full medical history in their computer system. When a new patient requests an appointment (walk-in or on-line) a treatment course begins and a practitioner is allocated to the patient. A full history and previous medical records are printed showing different categories of Treatments during different time intervals. Analyses are drawn in terms of any possible allergies and previous histories. Treatments may involve many surgeons and consultants depending on its complexity.
The contact practitioner is responsible for estimating the costs of treatments that is agreed by the client at the start of the treatment. The duration of the treatment may be set at any time duration and may also be changed during the treatment depending on the complexity of possible operations. The final cost and completion date are recorded at the end of the treatment.
During a treatment process notifications may be sent to patients and other practitioners.
Repeat prescriptions may automatically be produced by the system if appropriate and are available for collection at any surgery by the patient. At any time a practitioner may suspend or cancel the prescriptions. The cost for a treatment is paid for by the client or an insurance policy provided by a number of insurers. Insurance policies may have additional surcharges and costing depending on treatment types and medicines. Long term treatment courses may be edited or cancelled by practitioners or clients. To re-start an existing treatment an additional fee is applied.
LHM may receive requests for specialise treatments from other hospitals or they may refer clients to other medical centres.
Each treatment course or service may include one or more of the following items:
• Operations and vaccinations
• Consultations and check-up
• Medicine and different types of tablets
• Clinical reports and attached documents and history
• Prescriptions and repeat Prescriptions
Payments by clients may be in full or part payments to cover a range of medical and non-medical services offered by the company. Payments may include possible applied surcharges for late payments and or special discounts for long term treatments. Tax allocations may also vary from one treatment item to another. Payments have to accommodate for price changes for medicines and medical services and track price changes for drugs purchased from pharmaceutical companies.
A treatment course comprising services from other hospitals carry additional changes set by the medical service providers. A full list of Treatment courses with corresponding payments may be requested by the site manager at any time. Clients’ outstanding balances may be retrieved at any time for current treatment and services indicating the payments for the treatment course.
Task Detail
This assignment is accompanied with a case study describing a high level system specification for an application. You are required to provide UML models for ONLY ONE appropriate use case. Your selected use case must be agreed by your module tutor.
Task 1
Develop a Use case model with one use case. As part of your answer produce the use case description and use case scenario.
Produce a Class diagram and domain model with appropriate refactoring and abstraction, related to the selected use case. As part of your model, produce a system class with clear set of public methods.
Produce a Sequence Diagram for the selected use case. Include possible guards, iteration, and message operations in your diagram. 
Task 2
Incorporate OCL to represent the business logic, rules and constraints for the selected use case. As part of your solution include the correct syntax for pre and post conditions, navigation, and multiplicities. 
Task 3
Produce a Component model with associated interface methods. As part of your model, illustrate various possible component composition and discuss the significance of your design. 
Task 4
Produce a software architectural design and associated interface methods. Discuss coupling and cohesion aspects of your design.
Task 5
Enhance your class diagram given as part of Task1 to contain the Mediator design pattern. Illustrate and discuss how your model can be extended with the observer pattern.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Discussion & Assignment

  

Discussion – Analyzing and Visualizing Data – 300 words (PFA)

Assignment –   Analyzing and Visualizing Data. – 2 pages (PFA)

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Unit 2 DB: Programming Languages

A friend of yours is new to computing, and he has learned that you are pursuing a CIS degree.  He asked you about the meaning of a program, the key differences between the generations of programming, and how the open-source software (OSS) comes into play.  How would you answer these questions?

In response to your peers, please fill in any gaps or add more detail to help support their answer with an emphasis on the roles of web programming languages.

1 page apa format cite sources 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Cryptography – DES

Evaluate the history of the Data Encryption Standard (DES) and then how it has transformed cryptography with the advancement of triple DES. 

500 words 

You must use at least one scholarly resource 

APA format needed.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

LIT101 week 4 a

Discussion 4A: Social Commentary

This week, we are delving into how authors use their literary works as social commentary. This can be a general commentary related to what is going on in society such as in Frankenstein; as a means to enact change such as in The Jungle; or as telling of an experience, such as in Persepolis

Initial Response

Choose one of the three works used as examples in Module 4 course content (Frankenstein, The Jungle, or Persepolis). Although I am not opposed to you choosing a different work outside of these, I think these three are good representations of three different types of literary criticisms. I provided videos and/or excerpts of each of these works in the course content area of the course. You are welcome to use this excerpt or find another one online (they are easy to find). I do not expect you to read the entire work although you are welcome to!

In your initial response, answer the following:

What literary work did you choose and who is the author?

Provide a brief 2-3 sentence summary of the work in your own words. 

Why is this work considered a social commentary/literary criticism? 

Give at least three examples of literary devices (i.e. theme, symbolism, etc) that support the idea that the author is commenting on. For example, if you chose Frankenstein, the author has many different themes such as the dangers of science, isolation, creation. How does the author convey one of these themes?

Responses to Others

Review two other responses.  How do the authors compare in how they convey their social commentary?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

LIT101 week 4

The final paper of this course will be due during Module 9. The paper will be a 3-4 page analysis of a literary concept of your choice.

For this week’s proposal, submit 2 page overview discussing the topic you intend to use for your final paper. The paper can be about a specific author, a work of prose, a concept, or poetry. It will include preliminary research (citations, references)

The following are some ideas you can use or you can go on your own:

  • Selected poems from an author (Shakespeare, Langston Hughes, Haiku’s by Basho, etc)
  • Social commentary of a selected work
  • The social context of a work (i.e how did Frankenstein reflect the rise of the Industrial Revolution)
  • Fables (i.e. how did Aesop’s fables convey a message)
  • How did Shakespeare influence modern day English (i.e. Shakespeare made up many new words that still exist today!)
  • How did an author convey a theme (i.e. life, death, love, conflict) in a work or across his/her works?
  • The development of a character in a work. 

There are many ideas, so you are welcome to choose any topic you want. These are just a few. 

CITE AND REFERENCE

Please let me know if you have questions about this assignment. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now