I have discussions needing to get completed

I have discussions needing to be done. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Survey Instrument

One of the ways in which usability professionals collect data, and for that matter academic professionals, is the use of a Survey Instrument

Create a paper-based survey instrument evaluating the Amazon Website. 

In the assignment, you are expected to include: 

1. Participant Demographic Data (Name, Age, Gender, Location, Education etc.) 

2. Participation Consent

3. 8 – 10 Measurable Quantitative Questions (Using a scale to support measurement, i.e., Likert)

4. 2 – 4 Qualitative Questions 

This survey is a PAPER PROTOTYPE not to be completed using a survey instrument such as Survey Monkey.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Data Protection

  

Some countries have implemented measures to protect the privacy of their citizens. In this assignment, you will examine the General Data Protection Regulation (GDPR) implemented in the European Union to enforce privacy laws. You will then compare these regulations to their U.S. counterparts.

Specifically, in a 3–4-page paper you will:

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Week 6 Assignment – Network Engineer

 

Introduction

In this three-part assignment, you will design a secure network infrastructure. The specific course learning outcome associated with this assignment is: 

  • Plan a deployment of software and/or hardware, including implementation and testing considerations.

Instructions

Part 1

Use Microsoft Visio or an open-source alternative to: 

  • Create a network infrastructure diagram, incorporating the  following devices needed for a secure corporate network, placed where  they will work, and citing specific, credible sources that support the  design. Note: A web search will provide multiple examples of network infrastructure diagrams.     
    • Web server.
    • FTP server.
    • VPN server.
    • Authentication server.
    • Anti-virus server (client-based and server-based).
    • Edge firewall.
    • Firewall.
    • Vulnerability scanner.
    • Intrusion detection system (IDS).
    • Web proxy.
    • Edge router.
    • Core router.
    • Switch.
    • Distribution router.

Note All client- and server-based devices work where a client is installed on a workstation,  which has bi-directional communication with a corresponding server. 

Part 2

Write a 6–10 page paper in which you: 

  • Determine the specific devices you will use in the network, including the following information for each device:     
    • Make or vendor’s name (for example, Microsoft, Redhat, Cisco, Juniper, Netgear, 3Com).
    • Model (for example, Windows 7, ASA 5500, Cisco 3500, Squid).
    • IP address assigned to all devices.
  • Determine the basic configuration of each network device, citing specific, credible sources that support the configuration.     
    • Research each of the devices you chose and provide a basic configuration you would use in your network.
    • Use IP addresses to describe your configuration.
    • Identify the operating system.
    • Highlight at least five security features and the administrative  controls incorporated into each device, including devices in the  network diagram.
    • Explain the impact that each of your configurations has on the security of the entire network.
  • Explain the elements that must be addressed for planning and  testing a network, citing specific, credible sources that support your  assertions and conclusions.     
    • Organizational requirements and expectations.
    • Budget.
    • Modularity for security and testing.
    • Naming conventions that facilitate layering and growth.
    • Determination of required network speed and data capacity.
    • Vendor support.
    • Determination of risk and redundancy.
    • Uptime requirements.
    • Continuous data monitoring for fault, failure, or security-induced changes.
    • Load balancing.
    • Testing for latency.
    • Bandwidth.
    • Throughput.
    • Specific software and tools.
  • Support your main points, assertions, arguments, or conclusions  with at least four specific and credible academic sources synthesized  into a coherent analysis of the evidence.     
    • Cite each source listed on your source page at least one time within your assignment.
    • For help with research, writing, and citation, access the library or review library guides.
    • This course requires the use of Strayer Writing Standards. For  assistance and information, please refer to the Strayer Writing  Standards link in the left-hand menu of your course. Check with your  professor for any additional instructions.
  • Write clearly and concisely in a manner that is  well-organized, grammatically correct, and free of spelling,  typographical, formatting, and/or punctuation errors.
Part 3

Use Microsoft Visio or an open-source alternative to: 

  • Update your initial diagram to create a final network diagram,  incorporating at least four-fifths of the devices needed for a secure corporate network and citing specific, credible sources that support the design. Be sure to include vendor information, model information, and  IP addresses. In addition, ensure that:     
    • VPN sessions (from a laptop) are only allowed to access the desktops in the IT department by IT department employees.
    • All VPN connections from the Internet cloud into the corporate network terminate at the VPN server.
    • Users from Engineering and Finance and Accounting cannot communicate.
    • Vulnerability scans occur daily, with all desktops scanned at least once per day.
Submission Requirements

All diagrams and charts you create for the assignment should be included in the paper. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

HW

 

Your assignment is to find a YouTube video presenting a Mind-Body technique in a professional manner. You can search using keywords like; mind-body, meditation, relaxation, guided imagery, Reiki, Body Talk, Therapeutic Touch, etc. 2. The video should be no longer than 10 minutes. Spend some time viewing different videos in order to provide your classmates with a good learning experience. Please be cautious of inappropriate or unprofessional videos. 3. Provide a transcript like a summary of the YouTube video addressing how the video correlates with the following course competencies: a. How natural systems of the human body function. b. The impact of humans on the environment. c. The impact of ethnicity and culture. d. Correlating illness prevention, health promotion, health restoration, patient education, and empowerment as it relates to alternative and complementary healthcare. 4. Your transcript/summary should use APA Style guidelines. ( include video link)

2.

Instructions

  1. After reading the articles on meditation and viewing the videos, try out meditation. Here are the guidelines:
    1. Perform Self-Meditation for six (6) days.
    2. Monitor and record your heart rate before and after each meditation session.
    3. Then, video record yourself performing the self-meditation session, and attach to this post. (Optional)
  2. After you have experienced practicing meditation, report on the following:
    1. How did you feel about this assignment?
      • Were you comfortable or not performing the task on meditation? Explain why or why not.
    2. Describe the health benefits and different types of meditation therapies available?
    3. Describe the effects of meditation throughout your day-to-day activities and work.
    4. Do you believe mediation is a useful alternative and complimentary alternative to healthcare? Explain why or why not.
    5. Would you continue to use meditation?
  3. Find evidenced-based research article on meditation and attach to this post
  4. Remember to include your heart rate tracking before and after each meditation section to this post.
  5. Post must be 200-300 words.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

analyzing model and design

 

1) Define Business Case and explain the difference between a Business Case and a Business Plan.

2) What is the relationship between systems analysts and stakeholders?  This relationship has a significant impact on a business case that is developed around and idea or proposal. 

3) Identify 7 common reasons why projects fail and explain how a business case can mitigate the risks associated with them. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Build a Computer Online and Compile Assembly Code

  

Part 1: 1–2 pages; Part 2: 1–2 pages

Part 1 Tasks: Week 4 IP Final Draft

Using any national known computer manufacturer, finalize the outline of a computer configuration for your use. Your outline should include the following:

  • Explain in detail why you chose that      specific hardware. It should have the type and speed of the central      processing unit (CPU), the hard disk type, memory, cache memory, and so      forth.
  • You should have enough configuration      details to explain how you came about the desired specifications.
  • Click here (http://notepad-plus-plus.org/download/v6.6.3.html)      for a computer configuration worksheet you can use to help evaluate      various computers.

Part 2 Tasks: Week 5

The Assembly code compilation may be challenging, but the program has to be saved and submitted through a Notepad++ document. You can download notepad++ if you do not have a current copy. Click here to download the Notepad++ software. After you download the Notepad++ editor, type in your code and save it. Then it can be copied and pasted and run in an online compiler

Click here (http://www.compileonline.com/compile_assembly_online.php) to compile and execute assembly code.

  1. Compile and execute the existing      Assembly code on the left side of the screen. The following is the code      that should be displayed: (Complineonline, n.d.) 

section .text

global _start ;must be declared for using gcc

_start: ;tell linker entry point

mov edx, len ;message length

mov ecx, msg ;message to write

mov ebx, 1 ;file descriptor (stdout)

mov eax, 4 ;system call number (sys_write)

int 0x80 ;call kernel

mov eax, 1 ;system call number (sys_exit)

int 0x80 ;call kernel

section .data

msg db ‘Hello, world!’,0xa ;our dear string

len equ $ – msg ;length of our dear string

When you click on the compile and execute button, the following results in the right screen will display:

Compiling main.asm source code….
$nasm -f elf main.asm 2>&1

Linking the program….
$ld -m elf_i386 -s -o demo *.o 2>&1

Executing the program….
$demo

Hello, world!

2. Modify the code to display the following four lines:

Hello, world!

CE 242 is an awesome and fun class!

CTU is a great University!

I love the USA!

Part 3 Tasks: Week 5

  1. Convert the following binary code      into ASCII Text. Please show your work and do not use an online converter.

01001001 00100000 01101100 01101111 01110110 01100101 00100000 01000011 01010100 01010101

Write your full name in Binary code separated in bytes. For example, the name of the president of the USA in binary code is

Barak Obama

01000010

01100001

01110010

01100001

01101011

00100000

01001111

01100010

01100001

01101101

01100001

Show your work.

  1. What are the advantages of using      Fixed-Length number representation in Assembly in contrast to JAVA?      Explain, and give examples.
  2. What are the benefits and drawbacks      between assigning a real number and an integer in Assembly? Why do you      need either or both? Give examples.
  3. Compile this assembly code that uses      arrays. (Tutorialspoint, n.d.)

section .text

global _start ;must be declared for linker (ld)

_start:

mov eax,3 ;number bytes to be summed

mov ebx,0 ;EBX will store the sum

mov ecx, x ;ECX will point to the current element to be summed

top: add ebx, [ecx]

add ecx,1 ;move pointer to next element

dec eax ;decrement counter

jnz top ;if counter not 0, then loop again

done:

add ebx, ‘0’

mov [sum], ebx ;done, store result in “sum”

display:

mov edx,1 ;message length

mov ecx, sum ;message to write

mov ebx, 1 ;file descriptor (stdout)

mov eax, 4 ;system call number (sys_write)

int 0x80 ;call kernel

mov eax, 1 ;system call number (sys_exit)

int 0x80 ;call kernel

section .data

global x

x:

db 2

db 4

db 3

sum:

db 0

Click here to compile and execute assembly code.

Change the program to display F as a sum of the array.

References

Compileonline.com. (n.d.). Compile and execute assembly online (NASM version 2.10.07). Retrieved from http://www.compileonline.com/compile_assembly_online.php

Notepad++. (n.d.). Download Notepad++ 6.6.3. Retrieved from http://notepad-plus-plus.org/download/v6.6.3.html

Tutorialspoint. (n.d.). Assembly – Environment setup. Retrieved from http://www.tutorialspoint.com/assembly_programming/assembly_environment_setup.htm

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

C programming language

I need someone who know what to do in C Language!! 

I need a basic Linux shell in C!! The shell must explicitly recognize two commands: exit and cd. 

Create a basic Linux shell in C using the algorithm described in class.  The shell must explicitly recognize two commands: exit and cd. 

1) The exit command will cause the shell to end. 

2) The cd command will change the current directory.  The directory will be a command-line argument.  For example:

cd workspace/lab1/src

will change the current directory to workplace/lab1/src.  (Unless an absolute path is specified, the path given is relative to the current directory…you don’t have to do anything about this, I’m just letting you know.)  Your shell will change the directory using the chdir() function.

3) Your shell will assume all other commands entered are programs the user wishes to run.  In this case, the shell creates a child process and uses the execvp() function to cause the child to execute the specified program with the given command-line arguments.  The parent process (the shell) must wait until the child process terminates.  Be careful here: the execvp() function will fail if provided invalid parameters.  In case of failure, the child process should print an error message and terminate.

NOTES:

* Use the function fgets() to read input.

* You must build the args array (the second parameter to execvp()) yourself.  Do not use a function to do this for you.

* Certain features you are used to using in a Linux shell will not work in your shell.  Examples include using Tab to auto-complete a command or the Up Arrow to repeat the previous command.  This is fine.  Your shell doesn’t have to do all that.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

IT infrastructure

You have just been hired as the CIO of an organization that has been in business for a while and has recently acquired another smaller organization in order to increase market share.  The original organization operated a fleet of buses that conducted tours and travel packages along the northern portion of the U.S. eastern coast.  All of its computer applications existed on a central mainframe at company headquarters in Baltimore, Maryland.  The acquired organization conducted helicopter tours around New York City and Washington D.C.  All of its systems were client-server based (primarily thick clients accessing thin database servers) and they were based outside Baltimore, near the BWI airport.  Due to the mergers, the organization’s IT architecture is now a disparate combination of computer systems and manual procedures.  Given the general description of the stakeholder groups below and using the general client-server classes defined in Figure 9.5, prepare a cohesive IT architectural plan for the new organization and present it to the CEO for approval.  Address all potential advantages and disadvantages of the plan from the perspectives of the various groups of stakeholders.

Please review the following youtube video about client-server architecture as part of your research:  http://www.youtube.com/watch?v=JzR9qfszU3E

  1. Bus/helicopter maintenance workers and mechanics (10 employees)
    1. System for ordering parts
  2. Drivers/pilots (20 employees)
    1. Logs and rout/schedule information
  3. Administration/HR (5 employees)
    1. Employee records
    2. Financial records
  4. Marketing (8 employees)
    1. Marketing activities
    2. Customer interactions (CRM)
  5. Management (9 employees)
    1. reports

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

6 discussions

1 . 

Explain information management.

Why do organizations still have information deficiency problem?

2.

 

1.  What are the business costs or risks of poof data quality?

2.  What is data mining?

3.  What is text mining?

3.

 1.  What is an IP address?

2.  What are bandwidth and broadband?

4.

 1.  Why is it important that businesses maintain a high level of visibility on search engine results pages?

2.  Explain how search engines determine if websites contain relevant information or content.

5.

 1.  Discuss the ethical issues of social networks and anytime, anywhere accessibility.

2.  What are the four primary factors described in the text that set the state for Web 2.0 or the social Web that we enjoy today?

6.

 1.  Why is technology potentially important to the banking industry? What consumer needs does it fulfill?

2.  Continue to work on your group paper.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now