Wk 1 – West Consulting Customer Design Summary

 You work as a network consultant for West Consulting, a graphic design and printing company. West Consulting is growing in customer and sales volume and, therefore, is expanding its local campus in Des Moines IA, and adding a test location in Australia.

You are tasked with designing a network to support their growth and expansion plan and drafting a proposal. You will work on this project over the next five weeks. The first task is to confirm your understanding of the project and outline your high-level plan to approach the design.

Refer to the West Consulting Network Design Summary document, which lists the network requirements and configuration details.

 

Create a Customer Design Summary that includes the following: 

  • Project Summary
  • A description of the organization, the business environment, and the project purpose
  • Design Requirements
  • Desired functional network requirements, any technical constraints, and network performance or design goals
  • Existing High-Level Network Infrastructure Survey
  • Include both a logical topology diagram (layer 3) and a physical network diagram of current infrastructure and routing.
  • Implementation Plan
  • Description of a high-level network upgrade plan based on Cisco’s network design lifecycle principles and an explanation of how your plan addresses West Consulting’s goals and strategies

Diagram your current network survey in Microsoft® Visio®.

Document the remainder of your Customer Design Summary as a 2- to 3-page Microsoft® Word document

Note: You will complete assignments related to this project throughout this course. The assignments build on one another. Therefore, it is recommended that you select the delivery method of a Microsoft® PowerPoint® presentation or a Microsoft® Word document to use throughout these assignments. Also, you will use this completed assignment as you work on next week’s assignment.

Submit your assignment a DOC/DOCX word document and a separate diagram in VSD/VSDX format.  Microsoft Visio file. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Digital Intellectual property

 

The Internet is an ideal communication mechanism because of its openness and anonymity but people must make ethical decisions about how to use this power. Intellectual property is a work of the mind, such as art, books, formulas, inventions, and processes that are distinct and created by a single person or group.  Copyright law protects authored works such as art, books, film, and music. Patent law protects inventions, and trade secret law helps safeguard information that is mission critical in an organization

Discuss how freedom of expression and intellectual property rights might ethically conflict. In your reply, consider how your own freedom of expression might affect your privacy or personal intellectual property. Please provide examples when possible.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Journal Article review- Week 6- Monitoring

Choose a journal article related to project status reporting, budgeting, or risk analysis (do not re-use a journal from a prior course).   Write a 2-3 page review of your chosen journal article.  Please choose a peer reviewed journal, and an article that has been published in the past five (5) years.

The review should contain the journal article title, author’s name and year of publication. 

Your paper should contain the following headings:

  •      Introduction
  •      Summary of the article
  •      Relevant points made by the author
  •      Critique of the article
  •      Application of the concepts in the article

You are going to review a single journal article, therefore your reference page should only contain the information from the article you reviewed.  There is no need to introduce other journals into this paper. 

Text-

A Guide to the Project Management Body of Knowledge (PMBOK® Guide) – Seventh Edition and The Standard for Project Management (RUSSIAN) 

ISBN: 9781628257007 

Authors: Project Management Institute Project Management Institute 

Publisher: Project Management Institute 

Publication Date: 2021-08-01

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

software comparison

 Compare SSE-CMM, DSOMM, and BSIMM Version 11 with OWASP SAMM 2.0. Instructions: • Provide an overview of: o SSE-CMM o DSOMM o BSIMM Version 11 • Compare each of the 3 with OWASP SAMM 2.0. Describe in full detail. Requirements: • Should target your organization’s senior leadership • 2–3 page APA paper excluding title and reference pages  • Provide at least two references and in-text citations in APA format (these will preferably  be in addition to the main text)  • College level writing  • Should be your own work in your own words 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Biometrics

Using the Internet and other sources, research the topic of biometrics. What type of biometrics is the most accurate? The lease accurate? Are specific biometric devices more realistic than others? 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

research paper 12-15 pages as mention in document attached

  Cloud Security 

1) Chapter 1 – Introduction 

  Background/Introduction

  Problem Statement

  

Goal 

Research Questions 

Relevance and Significance 

Why is there a problem? What groups or individuals are affected? 

How far-ranging is the problem and how great is its impact? What’s the benefit of solving the problem? 

What has been tried without success to correct the situation? Why weren’t those attempts successful? What are the consequences of not solving the problem? 

How does the goal of the study address the research problem and how will the proposed study offer promise as a resolution to the problem? 

How will the research add to the knowledge base? 

What is the potential for generalization of the results? 

What is the potential for original work? 

Barriers and Issues  

2) Chapter 2 – Literature Review (Only peer reviewed articles are accepted. Summarize the articles in a paragraph)

3) Chapter 3 – The body of the paper. Deep research.

4) Chapter 4 – Conclusion

6) References – APA (not included in page count)

7) Appendices (not included in page count)

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Data in Each bytes

  In this question, you are going to assume the following data type and its corresponding sizes: char: 1 byte and int: 3 bytes. From a C-like snippet of a code below, answer the rest of this questions. Note: use a lost of casting in the second half of this snippet to make sure things are clearly declared. typedef struct type1{int i[3];} typeA; typedef struct type2{typeA j[2];} typeB; typeA *a; typeB *b; unsigned long *c; int i; a = malloc(2*sizeof(typeB)); b = a; c = a; for(i=0;i<18;i++) { *(c+i) = (unsigned char)(i%8); } Assuming that the actual location of a after malloc is called is at the physical address 0x10000 in DRAM. Using the concept of address we learn from our class, the table below shows our DRAM starting from the address 0x10000. Please put in the values inside each bytes in our DRAM starting at address 0x10000 up to the end of where a is malloced for. Write XX in the byte that is unknown/unassigned, and write YY on the byte that is not in the range that a covers. I gave you the first byte, finish the rest. Hint: Draw the organization of the struct out on a piece of paper. Pair this up with the concept of an array and type casting. This question is actually very easy but you need to be a bit careful. Hint2: Please note that our table is actually 1D. Each row is 8 bytes in size and the address of the next row basically continue from the end of the earlier row. I just have no method to draw a very long 1D table so I need to resort to a 2D table here. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

6/1 Devotional

In this course, we have been talking about principles related to the privacy of those that use information systems and technology. Whether the person is our customer or one of our fellow employees, we must work to assure they are being protected from various security concerns in using the cyberspace we provide. The issues can come from using a website or giving others our personal data so we can do business with them. 

We have looked at biblical principles related to sin, privacy, and malicious activities, but what does God have to say about His concern for us? Romans 8:28 says, “And we know that in all things God works for the good of those who love him, who have been called according to his purpose” (New International Version). In God’s wisdom, far beyond anything we could think possible, He is wanting our full happiness and for good to prevail. In exchange, He wants us to love Him and accept the provision of salvation from sin He made possible through the life and death of Jesus Christ His Son who came to Earth to live among us.

  1. Be sure to address the following prompts in your paper:
    1. How would you apply the scripture to your professional and personal life?
    2. How should we respond to God’s goodness?
    3. How might this be applied as we approach best practices in information systems policies and governance?
  2. Your paper should be at least 250 words in length.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

6/3 discussion

  1. Upload your second paper (assignment 6.3 Second Paper) (compliance and governance plan) to the discussion for the workshop.
  2. Give a short summary of the paper and the subjects you covered in the document.
  3. Your initial post should be a minimum of 300 words

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Blockchain Project

 Introduction/Background:  Provide  context for the research article.  What led the author(s) to write the  piece? What key concepts were explored? Were there weaknesses in prior  research that led the author to the current hypothesis or research  question?

Methodology:  Describe  how the data was gathered and analyzed.  What research questions or  hypotheses were the researcher trying to explore? What statistical  analysis was used?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now