PPT assignment

Hi, I have a assignment to make a PPT. Here is the description.

For this assignment, you will identify a computer system you have recently had experience with and prepare and attach a PowerPoint presentation (8-10 slides) describing a potential computer security problem related to that system. The target audience is a manager who you are trying to convince to initiate a project to investigate the potential security issues.

Suggestions:

  • Begin with an description of the organization and the computer system you have chosen.
  • Where necessary, you may make assumptions about any specifics–please note these as such in your presentation notes.
  • Draw from the assigned readings (and independent research) to identify what topics should be included.
  • If you feel that slide information is not self-explanatory, add additional details in the presentation notes.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

c++ programming Data structures and algorithm

The instructions and starting templates for the assignment are attached to this module.  Please download them and follow the instructions.  

There are actually 3 source files/starting templates for this assignment: assg-03.cpp, LargeInteger.hpp and LargeInteger.cpp.  You need to download and use all 3.  assg-03.cpp contains the main function and has tests of your code.  You should not need to add anything to this file, simply uncomment the tests as you are working on your assignment. The files LargeInteger.hpp and LargeInteger.cpp are the header file and implementation file.  You will need to add the function prototypes to the .hpp header file class definitions for the member functions and constructor you create.  And likewise, you will need to write and  implement your constructor and member functions in the LargeInteger.cpp file.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

how would you embrace Blockchain? For instance, how would training occur for your team, what strategies might you use, what security methods may you recommend be used?

 Industry experts believe blockchain is a technology that has the potential to affect the business of most IT professionals in the next five years. This assignment is for you to develop a research paper based on readings and other research you did regarding Blockchain. Pick an industry you feel will be most affected by Blockchain and describe how Blockchain may be used in that industry. As an IT manager, how would you embrace Blockchain? For instance, how would training occur for your team, what strategies might you use, what security methods may you recommend be used? 

 

Your research paper should meet the following requirements:

  • Be approximately 3-4 pages in length, not including the required cover page and reference page.
  • Follow APA6 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 
  •  Be clear and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Alexa skill Discussion

 Discussion (Chapter 12): Examine Alexa’s skill in ordering drinks from Starbucks.

Your response should be 250-300 words.  Respond to two postings provided by your classmates.
There must be at least one APA formatted reference (and APA in-text citation) to support the thoughts in the post.  Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Firewall Questionnaire

 

  • 12.1 List three design goals for a firewall.
  • 12.2 List four techniques used by firewalls to control access and enforce a security policy.
  • 12.3 What information is used by a typical packet filtering firewall?
  • 12.4 What are some weaknesses of a packet filtering firewall?
  • 12.5 What is the difference between a packet filtering firewall and a stateful inspection firewall?
  • 12.6 What is an application-level gateway?
  • 12.7 What is a circuit-level gateway?
  • 12.9 What are the common characteristics of a bastion host?
  • 12.10 Why is it useful to have host-based firewalls?
  • 12.11 What is a DMZ network and what types of systems would you expect to find on such networks?
  • 12.12 What is the difference between an internal and an external firewall?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

iOS Platform

Last week we separated discussion of Android and iOS development platform issues primarily because each platform poses its own set of development tools and associated issues. On closer inspection and from the standpoint of mobile app development, both platforms have similar issues for developers. So, this week we have some of the same questions regarding developing apps for iOS as we did for Android. Developers should develop as if they expect their app to be available for all iOS devices – is this even possible given the proliferation of new “i” devices coming to market, and Apple’s market dominance?

  • Besides cost, why should mobile app developers target the iOS platform?
  • Why is iOS development difficult – in what ways do Apple itself contribute to difficulty for developers?
  • Describe key ingredients (tools, SDKs, etc.) needed to create deployable mobile applications on the  iOS platform. 
  • What improvements are made to mobile development by use of Apple’s xCode-Swift SDK?

Use at least two different in-text citations and list a reference of these supporting sources following APA’s style and formatting 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

C++ Rainbow

Design and implement a program that draws a rainbow. Make sure to use the different colors of the rainbow in order (red, orange, yellow, green blue, purple). Add in a picture of a leprechaun w/ the file name of leprechaun.gif near the rainbow 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Project Part 3: Remote Access and VPNs

  

Project Part 3: Remote Access and VPNs

Scenario

As you are aware, many remote users will soon need access to the internal network and services. A remote access and virtual private network (VPN) plan is needed to connect it all together.

The senior network architect has asked you to create the plan that will allow secure remote access to the internal network while preventing unauthorized access. He specifically requested that all information transferred between remote users and the organizational servers be protected against snooping.

Tasks

For this part of the project, perform the following tasks:

1. Research and recommend the most appropriate VPN technology. The most likely solution is either an Internet Protocol Security (IPSec) VPN or SSL/TLS VPN. Describe the VPN technology and explain why it is the best choice for Corporation Techs.

2. Recommend any other forms of remote access that are relevant and describe how they would be used.

3. Create a draft report detailing all information as supportive documentation.

4. Cite sources, where appropriate.

Submission Requirements

  • Format: Microsoft Word (or compatible)
  • Font:      Arial, size 12, double-space
  • Citation style: Your school’s preferred style guide
  • Length of report: 3–4 pages

Self-Assessment Checklist

  • I researched and recommended an appropriate VPN technology.
  • I described the VPN technology and explained why it is the best      choice.
  • I recommended other forms of remote access that are relevant and      described how they would be used.
  • I created a professional, well-developed report with proper      documentation, grammar, spelling, and punctuation.
  • I followed the submission guidelines.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Segmentation

After reviewing this week’s video choose one of the Major New Themes in Marketing outlined by Professor Kotler and discuss it in detail.  Provide a current day example and how this will withstand environmental impacts of the seven Major Wicked Problems Facing Humankind as presented by Professor Kotler.  The criteria for responses are as follows:

  • Your initial response to the discussion question should be 250-300 words. You must have at least one course (our text) and one non-course scholarly/peer reviewed source in your initial posting.  Sources require in-text citations and must be incorporated into the body of the post in addition to a full APA citation at the end of the post. 

Youtube: https://www.youtube.com/watch?v=lDrja9d0SU4&t=19s

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

What is the Best Way to Connect an Office?

Think of a modern technical support call center. In a call center, there are people who answer phone calls and provide support to end users. Their phones are typically integrated onto the network and/or their computers. Each phone needs a certain amount of bandwidth, and their computers need bandwidth. There are also managers who use the same technology but to a lesser degree, and support staff who manage the office and keep things running smoothly.

Now, move this office from the modern class and cubicle building to an old 1960s office building in Florida. Each office is a concrete block bunker, each team member has their own office, and the walls have SAND for insulation. (No joke – this is super common.) Also, there is a lining of asbestos in the ceiling and floor, so disturbing anything is a major nonstarter. Now, design the network for this call center so it can effectively operate.

Some data to help you out:

  • The instructor feels sorry for any network administrator who needs to operate this network, so this isn’t something we should do in the real world
  • Students are welcome to recommend commercial-grade solutions, but consumer-grade solutions will also receive perfect scores
  • The computers do not have Wi-Fi cards, and most connect using ethernet cables. You need to recommend switches that can work in mesh mode or client mode
  • There are 20 individuals working in the office
  • Each computer requires 50 Mbps of network connectivity during use
  • Each phone requires 0.5 Mbps (VOIP ethernet connection required) 
  • The computers utilize technology in a data center that hides how the phones and computers communicate
  • Phone communications are much more important than computer communication. The phones reboot if they cannot contact the VOIP server for two seconds
  • Telephones are on vlan 1234
  • Computers run on vlan 1235
  • The building has a 10-Gbps connection to the server room, and each access point has multiple 1- or 10-Gbps connections to the switch. This connection to the switch may have a single vlan or both vlans applied to it
  • The project has a $20,000 budget

With this information, design a wired and wireless network solution for this building. Remember, the users are separated by concrete block and SAND.

Parameters: Submit a one-page description of your solution. The solutions must include prices for all products and a two-sentence description of why each product was chosen. The solution must be complete, including, at minimum, ethernet cables, switches, wireless clients, and wireless access points.

Criteria

This criterion is linked to a Learning OutcomeRecommend an access point that distributes multiple SSIDs and allows the SSIDs to be placed on different VLANs.

This criterion is linked to a Learning OutcomeRecommend a wireless switch that can accept multiple SSIDs and place them on multiple VLANs.

This criterion is linked to a Learning OutcomeRecommend a switch and/or wireless client that can support multiple VLANs.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now