Project 2: Windows Upgrade Proof of Concept

 

If you didn’t last week:

  • Download VMware Player, Virtual Box, or use Hyper-V to build a Windows 10 virtual machine. These free applications can be placed on your personal computer:
  • Download the Windows Upgrade Proof of Concept Template and follow the instructions in the document.

In this project, you will practice installing and configuring Windows 10 on a virtual machine and document the process with screenshots and written explanations. You will need to take screenshots from the virtual machine (VM) from this project for the Project 3 presentation, so do not delete the VM.

Follow the Windows Installation Instructions to create the proof of concept. Once you have completed these tasks, write a report that documents the steps you followed in installing Windows 10, detailing which version you installed as well as the steps you completed after the installation.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

IT540 Create a Security Policy

 

Create a Security Policy

Purpose

To help solidify and reinforce the concepts you studied in the unit involving the development of a computer network security policy.

Instructions

Part 1: Devise a Security Policy

Think about a business you are familiar with that uses networks and computers to support business functions. Create a list of 10 important, specific IT/information assets. The list might contain items such as the following:

  • Components — Servers, computers, mobile devices, IoT devices, other equipment, etc.
  • Information — Sales data, client data, financial data, etc.
  • Network configuration

Identify the threats these important items are subject to. Devise a security policy to mitigate that threat. Document your analysis process used to develop this policy. Note that this information will be useful moving forward in the course, so develop it fully at this time.

Example: A company laptop is a portable device which is a trackable asset. A possible threat against this asset is theft or loss. A mitigation for this threat is to require encryption on the device to secure data in the event the device leaves control of an authorized party.

Part 2: Security Policy Assessment

Read the following mini-security policy. Assess this security policy in the following four major areas. What is missing, incomplete, inaccurate, or ill-advised? Provide a rationale for your concerns.

R&D Financial Services, LLC Security Policy

Each document should have a footer or header identifying the level of sensitivity. Suggested sensitivity levels are unrestricted and client sensitive.

Email clients should enable SSL encryption for ActiveSync, POP3 and SMTP. SSL should also be used for web-based email. That way, regardless of where people work, their email traffic will not expose any data to network eavesdropping techniques. If client confidential data must be emailed amongst any third-party firms and/or consultants, the file should be encrypted, perhaps using a cross-platform product such as PGP or S/MIME, so that data cannot be read from email servers along the way.

File servers with shared folders should have access controls enabled to only members of the authorized group. Shared folders should also be encrypted so that physical theft of the server, its hard drives, or the backups will not compromise data confidentiality.

Periodic backups will be made of server hard drives and stored offsite in a secure location such as a safety deposit box. Access to the backups will be shared.

Only a select few consultants under contract with R&D Financial Services, LLC will be given the file server Administrator account password. Laptop computers will not automatically login the administrator and each account will be password protected. Local folders containing client sensitive data should be encrypted so that theft of the laptop or its hard drive will not compromise data confidentiality.

Portable storage devices, such as USB and thumb drives, may be used to store client sensitive documents if they are stored in encrypted folders or drive images.

Laptop computers will have screen savers enabled with password protection. Users will switch on their screen saver to lock the computer when they walk away from it.

Passwords should be chosen wisely, i.e., common dictionary words would not be used.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Assignment 300 words

 You are the web master for the Republican Party National Committee. Prepare a risk assessment analysis for your website. Some questions to consider:

  • Who is likely to attack your site?
  • When are attacks likely to occur?
  • What sort of attacks might take place?
  • How can you best minimize attacks and protect the integrity of your site?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

6-7 page APA paper and 7 references and Summary

In a 6-7-page, APA 7th Edition  formatted paper, and including at least six external references:

  • Describe the evolution of 802.11x networks 
  • Discuss how both 2.4 GHz and 5 GHz bands are used and vary between the different 802.11x networks. 
  • Research and address current 802.11x standards and future network standards with their proposed benefits and functions. 
  • Finally, address a few of the security concerns with current 802.11x standards.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Own words no plagarism

A portion of the requirements are copied below.

****THE REQUIRED submissions MUST be in the zipped file format – not RAR nor any other format.  The contents MUST be the actual SQL file and the Word document. 

******The Word document must contain full  screen captures – not a cut and  paste of only a section- but the entire screen demonstrating the execution of each step listed in the assignment. 

Please try to follow the listed  naming convention of the files. This may seen minor but following requirements  exactly is critical. 

You MUST use the naming convention listed – YourLastName – really does mean to replace those words with your actual last name.  Example – my submission would be MCMAHON_Project_Ph1_Output as one example. 

If these instructions are not followed – 0 points will be earned. *****

DROP TABLE IF EXISTS STUDENT;

DROP TABLE IF EXISTS CAMPUS;
DROP TABLE IF EXISTS SEMESTER;
DROP TABLE IF EXISTS ROOM;
DROP TABLE IF EXISTS GRADES;
DROP TABLE IF EXISTS COURSE;
DROP TABLE IF EXISTS INSTRUCTOR;
DROP TABLE IF EXISTS APPROVED_INSTRUCTOR;
DROP TABLE IF EXISTS CLASS;
DROP TABLE IF EXISTS STUDENT_GRADE;

CREATE TABLE STUDENT(
STUDENT_ID   INTEGER AUTO_INCREMENT NOT NULL PRIMARY KEY,
Last_Name    VARCHAR(30),
First_Name   VARCHAR(30),
Address      VARCHAR(40),
ZIP          VARCHAR(10),
MAJOR        VARCHAR(20),
CLASS       int(2),
STATUS       VARCHAR(20));

INSERT INTO STUDENT (Last_Name, First_Name, Address, ZIP, MAJOR, CLASS, STATUS)
VALUES(‘Morote’,’Italo’,’P.O. Box 619, 5808 Semper St.’,’32828′,’MATHEMATICS’,2,’FAILING’);
INSERT INTO STUDENT (Last_Name, First_Name, Address, ZIP, MAJOR, CLASS, STATUS)
VALUES(‘Martin’,’Yacky’,’313-6948 Nunc, Ave’,’36702′,’SPANISH’,3,’SATISFACTORY’);
INSERT INTO STUDENT (Last_Name, First_Name, Address, ZIP, MAJOR, CLASS, STATUS)
VALUES(‘Yostin’,’Duglas’,’Ap #593-8291 Id St.’,’26151′,’BUSINESS’,1,’SATISFACTORY’);
INSERT INTO STUDENT (Last_Name, First_Name, Address, ZIP, MAJOR, CLASS, STATUS)
VALUES(‘Dasti’,’Cosimel’,’328-4572 Elit Rd.’,’95886′,’SPANISH’,2,’FAILING’);
INSERT INTO STUDENT (Last_Name, First_Name, Address, ZIP, MAJOR, CLASS, STATUS)
VALUES(‘Dixon’,’Steve’,’Ap #547-7314 Feugiat. Street’,’42756′,’PHIL’,1,’FAILING’);
INSERT INTO STUDENT (Last_Name, First_Name, Address, ZIP, MAJOR, CLASS, STATUS)
VALUES(‘Alfaro’,’Patricia’,’P.O. Box 977, 6922 Sed Street’,’52838′,’ENGLISH’,1,’FAILING’);
INSERT INTO STUDENT (Last_Name, First_Name, Address, ZIP, MAJOR, CLASS, STATUS)
VALUES(‘Farruco’,’Rose’,’Ap #179-4485 Lectus Road’,’10816′,’ENGLISH’,3,’FAILING’);
INSERT INTO STUDENT (Last_Name, First_Name, Address, ZIP, MAJOR, CLASS, STATUS)
VALUES(‘Pope’,’Vector’,’Ap #878-2252 Curabitur Av.’,’53175′,’PHYSICS’,3,’SATISFACTORY’);
INSERT INTO STUDENT (Last_Name, First_Name, Address, ZIP, MAJOR, CLASS, STATUS)
VALUES(‘Los’,’Angeles’,’Ap #552-758 Convallis St.’,’56968′,’FINANCE’,3,’FAILING’);
INSERT INTO STUDENT (Last_Name, First_Name, Address, ZIP, MAJOR, CLASS, STATUS)
VALUES(‘Diaz’,’Cameron’,’Ap #145-1961 Sed Street’,’63397′,’BUSINESS’,3,’SATISFACTORY’);
INSERT INTO STUDENT (Last_Name, First_Name, Address, ZIP, MAJOR, CLASS, STATUS)
VALUES(‘Gonzalez’,’Andew’,’Ap #141-9425 In Road’,’87521′,’BUSINESS’,4,’SATISFACTORY’);
INSERT INTO STUDENT (Last_Name, First_Name, Address, ZIP, MAJOR, CLASS, STATUS)
VALUES(‘Michael’,’Jordan’,’Ap #412-5802 Venenatis Rd.’,’77696′,’MARKETING’,2,’FAILING’);
INSERT INTO STUDENT (Last_Name, First_Name, Address, ZIP, MAJOR, CLASS, STATUS)
VALUES(‘Chelerson’,’Scholy’,’911-8666 A Rd.’,’32829′,’CIS’,2,’SATISFACTORY’);
INSERT INTO STUDENT (Last_Name, First_Name, Address, ZIP, MAJOR, CLASS, STATUS)
VALUES(‘Payton’,’Tanya’,’5759 Nec, Street’,’23461′,’SPANISH’,3,’FAILING’);
INSERT INTO STUDENT (Last_Name, First_Name, Address, ZIP, MAJOR, CLASS, STATUS)
VALUES(‘Jorge’,’Michael’,’Ap #642-7393 Ut, Ave’,’33186′,’PHIL’,1,’SATISFACTORY’);
INSERT INTO STUDENT (Last_Name, First_Name, Address, ZIP, MAJOR, CLASS, STATUS)
VALUES(‘Cretiza’,’Noitus’,’8659 Arcu. Avenue’,’91267′,’PHYSICS’,2,’FAILING’);
INSERT INTO STUDENT (Last_Name, First_Name, Address, ZIP, MAJOR, CLASS, STATUS)
VALUES(‘Delami’,’Oscar’,’3512 Pellentesque. St.’,’33481′,’MATHEMATICS’,4,’FAILING’);
INSERT INTO STUDENT (Last_Name, First_Name, Address, ZIP, MAJOR, CLASS, STATUS)
VALUES(‘Francisco’,’Zoeter’,’285-9157 Proin Road’,’98674′,’CS’,1,’SATISFACTORY’);
INSERT INTO STUDENT (Last_Name, First_Name, Address, ZIP, MAJOR, CLASS, STATUS)
VALUES(‘Cohen’,’Aurora’,’P.O. Box 957, 9450 Arcu Street’,’30350′,’PHIL’,3,’FAILING’);
INSERT INTO STUDENT (Last_Name, First_Name, Address, ZIP, MAJOR, CLASS, STATUS)
VALUES(‘Black’,’Joshua’,’3655 Sed St.’,’95684′,’FRENCH’,2,’FAILING’);
INSERT INTO STUDENT (Last_Name, First_Name, Address, ZIP, MAJOR, CLASS, STATUS)
VALUES(‘Barber’,’Michael’,’875-9349 Magnis St.’,’66498′,’PSY’,4,’SATISFACTORY’);
INSERT INTO STUDENT (Last_Name, First_Name, Address, ZIP, MAJOR, CLASS, STATUS)
VALUES(‘Preston’,’Inez’,’Ap #829-845 Nisi Av.’,’27404′,’PSY’,1,’FAILING’);
INSERT INTO STUDENT (Last_Name, First_Name, Address, ZIP, MAJOR, CLASS, STATUS)
VALUES(‘Direz’,’Blaster’,’439-1369 Cursus Av.’,’60644′,’MARKETING’,2,’FAILING’);
INSERT INTO STUDENT (Last_Name, First_Name, Address, ZIP, MAJOR, CLASS, STATUS)
VALUES(‘Aiton’,’Valeria’,’7513 Vitae Street’,’61245′,’MARKETING’,2,’FAILING’);

CREATE TABLE CAMPUS
(
CAMPUS_NAME  VARCHAR(45)  NOT NULL,
Address      VARCHAR(40),
ZIP          VARCHAR(10),
PHONE_NO     VARCHAR(20),
UNIQUE(CAMPUS_NAME),
PRIMARY KEY(CAMPUS_NAME));

INSERT INTO CAMPUS (CAMPUS_NAME, Address, ZIP, PHONE_NO)
VALUES(‘New York Campus’,’405-6298 In Street’,’62840′,’1-639-674-3520′);
INSERT INTO CAMPUS (CAMPUS_NAME, Address, ZIP, PHONE_NO)
VALUES(‘Chicago’,’820-7808 Risus, Rd.’,’51852′,’1-824-430-8362′);
INSERT INTO CAMPUS (CAMPUS_NAME, Address, ZIP, PHONE_NO)
VALUES(‘San Francisco Campus’,’505-182 Luctus, Ave’,’21345′,’1-460-439-2331′);
INSERT INTO CAMPUS (CAMPUS_NAME, Address, ZIP, PHONE_NO)
VALUES(‘Seattle Campus’,’P.O. Box 215, 1469 Eu Rd.’,’52681′,’1-448-789-7971′);
INSERT INTO CAMPUS (CAMPUS_NAME, Address, ZIP, PHONE_NO)
VALUES(‘Washington Campus’,’631-5139 Leo. St.’,’29402′,’1-282-625-5720′);
INSERT INTO CAMPUS (CAMPUS_NAME, Address, ZIP, PHONE_NO)
VALUES(‘Los Angeles Campus’,’6161 Nostra, Road’,’83643′,’1-547-459-9473′);
INSERT INTO CAMPUS (CAMPUS_NAME, Address, ZIP, PHONE_NO)
VALUES(‘Denver Campus’,’9309 Cras Road’,’23421′,’1-680-673-7298′);
INSERT INTO CAMPUS (CAMPUS_NAME, Address, ZIP, PHONE_NO)
VALUES(‘Austin Campus’,’P.O. Box 878, 7621 Donec Road’,’73261′,’1-755-573-0468′);
INSERT INTO CAMPUS (CAMPUS_NAME, Address, ZIP, PHONE_NO)
VALUES(‘Houston Campus’,’P.O. Box 406, 9600 Odio Ave’,’32802′,’1-721-423-4315′);
INSERT INTO CAMPUS (CAMPUS_NAME, Address, ZIP, PHONE_NO)
VALUES(‘Detroit Campus’,’7574 Semper St.’,’21211′,’1-583-233-9026′);
INSERT INTO CAMPUS (CAMPUS_NAME, Address, ZIP, PHONE_NO)
VALUES(‘San Diego Campus’,’6939 Ligula. St.’,’75022′,’1-941-394-7241′);
INSERT INTO CAMPUS (CAMPUS_NAME, Address, ZIP, PHONE_NO)
VALUES(‘San Antonio Campus’,’7422 Vel Avenue’,’63763′,’1-604-359-7505′);
INSERT INTO CAMPUS (CAMPUS_NAME, Address, ZIP, PHONE_NO)
VALUES(‘Memphis Campus’,’P.O. Box 328, 5280 Donec Rd.’,’75068′,’1-865-208-5487′);
INSERT INTO CAMPUS (CAMPUS_NAME, Address, ZIP, PHONE_NO)
VALUES(‘Portland Campus’,’788-7924 Tellus. Street’,’75088′,’1-260-552-0600′);
INSERT INTO CAMPUS (CAMPUS_NAME, Address, ZIP, PHONE_NO)
VALUES(‘Miami Campus’,’518-7627 Ac Avenue’,’89090′,’1-262-155-0231′);
INSERT INTO CAMPUS (CAMPUS_NAME, Address, ZIP, PHONE_NO)
VALUES(‘Phoenix Campus’,’921-4825 Nullam Rd.’,’23117′,’1-324-211-7180′);
INSERT INTO CAMPUS (CAMPUS_NAME, Address, ZIP, PHONE_NO)
VALUES(‘Dallas Campus’,’Ap #202-6418 Eleifend Ave’,’54674′,’1-663-374-3235′);
INSERT INTO CAMPUS (CAMPUS_NAME, Address, ZIP, PHONE_NO)
VALUES(‘Atlanta Campus’,’927-3569 Id Road’,’71661′,’1-315-710-9509′);
INSERT INTO CAMPUS (CAMPUS_NAME, Address, ZIP, PHONE_NO)
VALUES(‘San Jose Campus’,’8637 Ullamcorper Rd.’,’10001′,’1-224-161-4524′);
INSERT INTO CAMPUS (CAMPUS_NAME, Address, ZIP, PHONE_NO)
VALUES(‘Las Vegas Campus’,’P.O. Box 169, 7139 Arcu Rd.’,’83588′,’1-789-125-9687′);
INSERT INTO CAMPUS (CAMPUS_NAME, Address, ZIP, PHONE_NO)
VALUES(‘Indianapolis Campus’,’744-3904 Vulputate, Road’,’37762′,’1-640-455-9785′);
INSERT INTO CAMPUS (CAMPUS_NAME, Address, ZIP, PHONE_NO)
VALUES(‘Baltimore Campus’,’2849 At Ave’,’40882′,’1-299-696-4483′);
INSERT INTO CAMPUS (CAMPUS_NAME, Address, ZIP, PHONE_NO)
VALUES(‘Cleveland Campus’,’P.O. Box 785, 7330 Urna. St.’,’55794′,’1-789-114-1794′);
INSERT INTO CAMPUS (CAMPUS_NAME, Address, ZIP, PHONE_NO)
VALUES(‘Oklahoma Campus’,’172-3924 At Ave’,’31619′,’1-111-206-2900′);

CREATE TABLE SEMESTER
(
SEMESTER_NAME ENUM(‘FALL’, ‘SPRING’, ‘SUMMER’));

DROP TABLE IF EXISTS ROOM CASCADE;

CREATE TABLE STUDENT_GRADE
(
Student_ID    MEDIUMINT NOT NULL AUTO_INCREMENT,
Class_ID      VARCHAR(10),
Student_Grade ENUM(‘A’,’B’,’C’,’D’,’F’,’I’,’W’),
PRIMARY KEY(Student_ID)
);

Commit;

SHOW TABLES;

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

CBSC630: Midterm 2

 

  • Write a 3 to 4-page paper where you discuss the uses of Python in hacking. This will require you to find an article on the use of Python in Hacking and explain how the article covers the use of Python in the hacking process.       
  • Build a PowerPoint presentation on the uses of Python in hacking. You will use the information from your individual midterm papers and build a PowerPoint presentation. This will require you to put together the presentation based on the work from your research papers.

Writing Requirements: 

  • PowerPoint presentation 10-20 slides
  • Use APA V& formatted citations and references

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Salesforce

Explain Salesforce in a Layman’s term. Why do we need it ? Briefly summarize the services provided by Salesforce.How is Salesforce different than traditional CRM solution 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Java code program

 

Program Specifications Write a SelfPayKiosk class to support basic operations such as scan item, cancel transaction, checkout, and make payment. SelfPayKiosk.java is provided with method stubs. Follow each step to gradually complete all methods.

Note: This program is designed for incremental development. Complete each step and submit for grading before starting the next step. Only a portion of tests pass after each step but confirm progress. The main() method in LabProgram.java includes basic method calls. Add statements in main() as methods are completed to support development mode testing.

Step 0. Declare private fields for number of customers served (int), total sales (double), and current amount due (double). Note the provided final variable for sales tax of 7%.

Step 1 (1 pts). 1) Complete the constructor to initialize all private fields to zero. 2) Complete the accessor methods to return the number of customers served, total sales, and current amount due. Submit for grading to confirm 1 test passes.

Step 2 (2 pt). Complete the scanItem() method. Increase the amount due by parameter price. Do not update amount due if parameter price is negative. Submit for grading to confirm 3 tests pass.

Step 3 (1 pt). Complete the checkOut() method. Multiply amount due by SALES_TAX and add to amount due. Submit for grading to confirm 4 tests pass.

Step 4 (2 pts). Complete the makePayment() method. If parameter payment is enough to pay the amount due, increase total sales by amount due, increment number of customers served, and reset amount due to zero in preparation for the next customer. However, if parameter payment is not enough, update total sales by payment and reduce amount due by payment. Do not make any changes if parameter payment is negative. Submit for grading to confirm 6 tests pass.

Step 5 (1 pt). 1) Complete the resetKiosk() method to reset all private fields to zero. 2) Complete the cancelTransaction() method to reset amount due to zero. Submit for grading to confirm 7 tests pass.

Step 6 (2 pts). Complete the simulateSales() method to perform multiple transactions with increasing prices. Use a loop to simulate parameter numSales transactions. Within the loop, call scanItem() with parameter initialPrice. Call checkOut() and makePayment() to make a payment of $1 more than the amount due. Finally, increase the item price by parameter incrPrice in preparation for the next transaction. Submit for grading to confirm 8 tests pass.

Step 7 (1 pt). Add a boolean private field to indicate if the customer has checked out and is ready to make a payment. Only allow payment after customer has checked out. The cancelTransaction() method should not reset amount due if the customer has checked out. Update the following methods by inserting assignment statements and if statements related to the boolean filed: constructor, checkOut(), makePayment(), and cancelTransaction(). Ex: Set the boolean field to false only after full payment has been made. Submit for grading to confirm all tests pass.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Assignment

Using your knowledge of how an ATM is used, develop a set of use cases that could serve as a basis for understanding the requirements for an ATM system. The use cases should cover 5 principal functions of Withdraw Cash, Display Balance, Print Statement, Change PIN, and Deposit Cash. For each function, list Actors, Inputs, Outputs, Normal Operation, and Exceptions. This will include creating a diagram and more specific detail written to describe each use case funtion. Use the example Figure 4.15 diagram and the following example brief Setup Consultation use case description listed on page 111 of the textbook.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Artificial Intelligence

 PLEASE READ QUESTION BEFORE BIDS!!

IT IS DUE IN 2 HRS

7.15 This question considers representing satisfiability (SAT) problems as CSPs. 

a. Draw the constraint graph corresponding to the SAT problem

(¬X1 ∨ X2) ∧ (¬X2 ∨ X3) ∧ … ∧ (¬Xn−1 ∨ Xn) 

for the particular case n = 5. 

b. How many solutions are there for this general SAT problem as a function of n? 

c. Suppose we apply BACKTRACKING-SEARCH (page 215) to find all solutions to a SAT CSP of the type given in (a). (To find all solutions to a CSP, we simply modify the basic algorithm so it continues searching after each solution is found.) Assume that variables are ordered X1,…,Xn and false is ordered before true. How much time will the algorithm take to terminate? (Write an O(·) expression as a function of n.) 

d. We know that SAT problems in Horn form can be solved in linear time by forward chaining (unit propagation). We also know that every tree-structured binary CSP with discrete, finite domains can be solved in time linear in the number of variables (Section 6.5). Are these two facts  

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now