IT project

 

week 5 assignment is going to be similar to the assignment you completed for Week 4. You will get an opportunity to build a substance-based PowerPoint presentation. If you want to use a video to complete Week 5 Assignment: Build a substance-based PowerPoint presentation (with audio support using MS PowerPoint Voice Over feature, Prezi Video, MyComputer video feature, Zoom or other available audio/video software) that is fine. However, you will need at least 10 slides with an Introduction, Body, and Summary. Be sure to address each item, so you capitalize on all available points. Remember to provide a summary and note that the quality of your presentation will have some bearing on your total points. You want to use images, videos on YouTube, if available, hyperlinks and other supportive diagram where necessary.

 

  • Introduction – provide the reader a bulleted list of all the points your will discuss in the presentation.
  • From the Analog to the Digital Age – discuss how digital and analog data differ and what a modem does
  • Explain Network Architectures
  • Networks – discuss the benefits of networks and three types of networks, their components, and variations 
  • Wired Communication Media – discuss three types of wired communications media
  • Wireless Communication Media – discuss three types of wireless communications media (
  • Cyberthreats, Hackers, & Safeguards – describe areas of concern for keeping a computer system safe 
  • Summary – provide the reader a bulleted list of all the major points you discussed in the presentation.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Cloud Computing

 

  1. Define and describe the mobile web
  2. Describe the different generations of cell phones
  3. Describe how smartphones differ from ordinary cell phones
  4. Select a mobile or traditional website that interests you. Describe the site in terms of the ecosystem that makes up the site’s user experience

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Database Management Systems

 

1. How can the key and foreign key constraints be enforced by the DBMS? Is the enforcement technique you suggest difficult to implement? Can the constraint checks be executed in an efficient manner when updates are applied to the database?

2.What is the FUNCTION operation? For what is it used? And Present a practical example/ scenario.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Programming un C++

 I’m working on a c++ exercise and need a sample draft to help me study.

You are to write a program in C++ that will take the number given on the command line and write it in words. You must have a separate error function and you must have at least one separate function to translate the digits to words. You must store the words for each digit in a vector. If the number in the tens place is one, throw a runtime error. If any of the numbers entered is 0, throw a runtime error. You can assume the number given will not have more than 4 digits.

SAMPLE OUTPUT

[lab5]$ ./process 123
Number 123 is written as one hundred twenty three
[lab5]$ ./process 4375
Number 4375 is written as four thousand three hundred seventy five
[lab5]$ ./process 5
Number 5 is written as five
[lab5]$ ./process 14
Oops! Entered a 1 in the tens place
[lab5]$ ./process 440
Oops! Entered a 0 in the number
[lab5]$ ./process 0
Oops! Entered a 0 in the number
[lab5]$ ./process 0141
Oops! Entered a 0 in the number

REQUIREMENTS

  • You must write the program using C++ constructs.

—————————————————–

  • comments explaining what your program does
  • indent your code so it is readable
  • compiles successfully
  • used a vector to store the words for your number.
  • have at least one function beside main
  • have an error function that will throw a runtime error with a descriptive message
  • pass the input number as a command line argument.
  • throw a runtime error if the second digit of the number is a 1.
  • throw a runtime error if any digit is a zero
  • use cout and cin, not printf and scanf
  • match the example output exactly

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Packet Tracer & Discussion 1 [43]

Instructions

Write 1 thread of at least 250 words. You must support your  assertions with at least 1 citation in current APA format. Acceptable  sources include Cisco material, the Bible, and scholarly journals. You  must also reply to the 2 threads below. Each reply must be at  least 100 words.

Topic: Hierarchal TopologyQuestion/Prompt: At your workplace or school,  research to determine 1–5 network devices in your hierarchal model.  Create a simple network topology using Packet Tracer software. Place 1–5  devices at the appropriate levels of the Cisco three-layer hierarchical  model design. The model must include:

  1. A labeled hierarchical model ( Access layer, distribution layer, and core layer);
  2. Labeled Type, vendor, and model of the devices (ie. Cisco 2911 series router) ; and
  3. 1 Simulated cloud, 1 PC per subnet to represent a subnet of devices.

If you are unable to do research at your workplace or school, or you  do not have one to research, then create your own hierarchical model.  Share your .pka in the Discussion Board Forum. Do you agree with the way  the network is designed? If so, explain why. If not, state 1 way to  improve the design and why you would make improvements.

Replies(100 words each)Thread 1 Reply

  Signal flow

        From my understanding we are only a fraction of the pie. We do not  have full access of the network we fall under. The hierarchy can be  related to how the infantry is broken down to fire teams of 4. Yet in an  a platoon theres about 100 people which means theres about 20 fire  teams, creating 20 fire team leaders reporting to the Platoon Sgt who  then reports to the Platoon Commander and then he passes it to the  Company Commander etc. The purpose of having multiple bosses helps to  not overload the main boss with meaningless questions or information not  protaining to them. The way our network is design is to  mitigate unnecessary mistakes made on the network, only affecting us at  our level not disrupting the entire network enterprise.  It also brings a  sense of organization, structure, and management. If anyone has the  proper (AAA) Authorization, Authentication, and Access to be in our  domain to can be part of all broadcasting that may be informative to  them. Also file sharing and the access to the share drive on lower  networks can help not overload the pipeline to the higher echelon of the  network. If you don’t have any business with management or the boss  then just avoid it, communicate between those at your level and later  with the proper authorities your message Will make it to Mr.CEO. The  Hierarchical Model we use in the military could improve if there was a  way to communicate with everyone that shares your Military Occupational  Specialty, is the only improvement I would try to implement

Thread 2 Reply 

 Importance of Redundancy  

      Since  I was not able to examine a network at school or work, I went to a  small business owned by a family member to see what kind of setup they  had. It turned out that only three employees worked there, so they only  had a very simple point-to-point architecture that consisted of a modem,  a router, and a switch (attached packet- “Office Hierarchy”). Because  of the limited budget and needs, I believe this basic setup fulfilled  their needs adequately. However, one of the downsides of this setup is  that each device is a single point of failure. A key factor of network  stability is implementing redundancy (Yeh & Fiondella, 2017). There  is no device redundancy on this network. As such, I decided I would make  a second diagram that implemented redundancy (“Three Tier Hierarchy”),  even though realistically it would not be possible to implement in the  business I examined. Another benefit that this setup provides is  additional scalability if the company were to hire more employees. In  its current state, this company only has one small switch, meaning the  amount of traffic that can flow through is extremely limited, and it  would be unwise to try to add a lot more users to this network. The  high-capacity switches used in the “Three Tier” diagram would allow more  users to easily connect in. Another way to identify that the smaller  network is not scalable is not only to see if its hardware exceeds its  userbase, but also to ask: If I were to expand my company, would I need  to raze my entire network design and start over? In this case, the  answer is yes—a significant size increase would mean that a fully  different scalable topology, such as a virtual bus, would need to be  created. The business could not function with its current topology. In  conclusion, because the business has not grown in size for fifty years  and is not planning to, I see no need for them to change anything;  however, I would advise them to place a high priority on keeping their  security up-to-date because of the vulnerability of the point-to-point  network.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Discussion 13- Exe Project

Assigned Readings:Chapter 13. Project Evaluation and Control Initial Postings: Read and reflect on the assigned readings for the week. Then post what you thought was the most important concept(s), method(s), term(s), and/or any other thing that you felt was worthy of your understanding in each assigned textbook chapter.Your initial post should be based upon the assigned reading for the week, so the textbook should be a source listed in your reference section and cited within the body of the text. Other sources are not required but feel free to use them if they aid in your discussion.Also, provide a graduate-level response to each of the following questions:

  1. It has been said that Earned Value Management (EVM) came about because the Federal Government often used “Cost-plus” contractors with project organizations.  Cost-plus contracting allows the contractor to recover full project development costs plus accumulate profit from these contracts.  Why would requiring contractor firms to employ earned value management help the government hold the line against project cost overruns?

[Your post must be substantive and demonstrate insight gained from the course material. Postings must be in the student’s own words – do not provide quotes!]  [Your initial post should be at least 450+ words and in APA format (including Times New Roman with font size 12 and double spaced). Post the actual body of your paper in the discussion thread then attach a Word version of the paper for APA review]

Text 

Title: Project Management 

ISBN: 9780134730332 

Authors: Pinto 

Publisher: Pearson 

Edition: 5TH 19

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

AOS

Advanced Operating Systems (CS 5500)

Assignment 1 (60 points)

Process and Threads

Due by 17th February (Monday) 11:59pm

You are allowed to discuss the problem and solution design with others, but the code/answer you

submit must be your own. Your solution must include the certification of authenticity “I certify

that the codes/answers of this assignment are entirely my own work.”

For this first assignment, you won’t be writing code; instead, you will be reading and executing

the given below codes. Read the README instruction below for directions on how to compile

and link the programs. Submit your answer in writing onto Blackboard.

• Experiment 1. Thread and Process Creation

Study the programs thr_create.c and fork.c. These programs measure the average time to

create a thread using thr_create() and to create a process using fork(). Compile and

execute the programs. What do you conclude from this experiment? Describe the reasons

for the difference in timings.

• Experiment 2. Processes vs Threads

Study the two programs thr_shared.c and proc_shared.c. These programs are identical

except that one uses threads and the other uses processes. Compile and execute the

programs. What do you conclude from this second experiment? Explain the reason for the

difference in behavior.

• Experiment 3: The Update Problem

Study the programs shared_data.c and SharedData.java. In these examples, multiple

threads are both updating (i.e., modifying) a shared variable. Compile and execute both.

Are the programs behaving “correctly”? What do you conclude from this experiment?

README Instructions

• Run the program on Linux platform.

• To compile and run a C program (e.g., thr_create.c):

gcc -o thr_create thr_create.c -lpthread

thr_create

• To build and run a classfile from the java code:

javac SharedData.java

java SharedData

Submission Guidelines and Requirements

• Submit your answers for all the experiments as a PDF file onto Blackboard

• Include your name, UCM ID and Certification statement in your solution:

//Your name

// Your UCM ID

//Certificate of Authenticity: “I certify that the codes/answers of this assignment are

entirely my own work.”

thr_create.c

#include <sys/time.h>

#include <stdio.h>

#include <pthread.h>

#include <errno.h>

main()

{

struct timeval start,end;

long forktime;

double avgtime;

pthread_t last_thread;

int i;

int iters = 250;

void *null_proc();

gettimeofday(&start,NULL);

for (i = 0; i < iters – 1; i++) /* create (iters-1) threads */

pthread_create(&last_thread,NULL,null_proc,NULL);

pthread_create(&last_thread,NULL,null_proc,NULL); /* create last thread */

gettimeofday(&end,NULL);

pthread_join(last_thread, NULL); /* wait for last thread */

forktime = (end.tv_sec – start.tv_sec)*1000000 +

(end.tv_usec – start.tv_usec);

avgtime = (double)forktime/(double)iters;

printf(“Avg thr_create time = %f microsec\n”, avgtime);

}

void *null_proc()

{}

fork.c

#include <sys/time.h>

#include <stdio.h>

#include <errno.h>

main()

{

int pid;

struct timeval start,end;

int i;

long forktime;

double avgtime;

int iters = 250;

int status;

gettimeofday(&start,NULL);

for (i = 0; i < iters; i++) /* create iters processes */

{

if ((pid = fork()) == 0) /* child process */

{

null_proc();

exit(1);

}

else if (pid == -1) /* error */

{

printf(“error %d\n”,errno);

exit(-1);

}

else /* parent process */

continue;

}

/* only parent process reaches this point */

gettimeofday(&end,NULL);

for ( i = 0; i < iters; i++) /* have to do a wait for each child */

wait(&status);

forktime = (end.tv_sec – start.tv_sec)*1000000 +

(end.tv_usec – start.tv_usec);

avgtime = (double)forktime/(double)iters;

printf(“Avg fork time =%f microsec\n”, avgtime);

}

null_proc()

{

}

thr_shared.c

#include <sys/time.h>

#include <stdio.h>

#include <pthread.h>

#include <unistd.h>

#include <stdlib.h>

void *proc();

int shared_number;

main()

{

int i;

pthread_t new_thread;

int sleep_time;

int seed;

shared_number = 1;

printf(“Enter a positive integer for seed: “);

scanf(“%d”,&seed);

srand48(seed); /* initialize seed of random number stream */

/* thr_create(NULL,0,proc,NULL,0,&new_thread);*/

pthread_create(&new_thread,NULL,proc,NULL);

/* create new thread */

for (i = 0; i < 50; i++)

{

printf(“MAIN THREAD: i = %d, shared_number = %d\n”,i,shared_number);

sleep_time = 100000.0*drand48(); /* generate random sleep time */

printf(“sleep time = %d microseconds\n”,sleep_time);

usleep(sleep_time);

shared_number = shared_number + 2;

}

pthread_join(new_thread,NULL);

printf(“MAIN THREAD: DONE\n”);

}

void *proc()

{

int i = 0;

int DONE;

DONE = 0;

while (!DONE)

{

i++;

if (i%10000 == 0)

printf(“CHILD THREAD: i = %d,shared_number = %d\n”,i,shared_number);

if (i > 5000000)

DONE = 1;

}

printf(“CHILD THREAD: DONE\n”);

}

proc_shared.c

#include <sys/time.h>

#include <stdio.h>

#include <pthread.h>

#include <unistd.h>

#include <stdlib.h>

#include <errno.h>

void *proc();

int shared_number;

main()

{

int i;

pthread_t new_thread;

int sleep_time;

int pid;

int status;

int seed;

shared_number = 1;

printf(“Enter a positive integer for seed: “);

scanf(“%d”,&seed);

srand48(seed); /* initialize random number stream */

if ((pid = fork()) == 0)

{ /* child process */

proc();

exit(0);

}

else if (pid == -1) /* error */

{

printf(“error %d\n”,errno);

exit(-1);

}

else

{ /* parent process */

for (i = 0; i < 50; i++)

{

printf(“MAIN PROCESS: i = %d, shared_number = %d\n”,i,shared_number);

sleep_time = 100000.0*drand48(); /* generate random sleep time */

printf(“sleep time = %d microseconds\n”,sleep_time);

usleep(sleep_time);

shared_number = shared_number + 2;

}

wait(&status); /* wait for child process */

printf(“MAIN PROCESS: DONE\n”);

}

}

void *proc()

{

int i;

int DONE;

DONE = 0;

i = 0;

while (!DONE)

{

i++;

if (i%10000 == 0)

printf(“CHILD PROCESS: i = %d,shared_number = %d\n”,i,shared_number);

if (i > 5000000)

DONE = 1;

}

printf(“CHILD PROCESS: DONE\n”);

}

shared_data.c

#include <sys/time.h>

#include <stdio.h>

#include <pthread.h>

#include <unistd.h>

#include <stdlib.h>

void *proc();

int shared_number;

main()

{

int i;

pthread_t new_thread;

int sleep_time;

int number;

int seed;

shared_number = 1;

printf(“Enter a positive integer for seed: “);

scanf(“%d”,&seed);

srand48(seed);

pthread_create(&new_thread,NULL,proc,NULL);

for (i = 0; i < 20; i++)

{

number = shared_number;

printf(“MAIN THREAD: i = %d, shared_number = %d\n”,i,shared_number);

sleep_time = 100000.0*drand48(); /* generate random sleep time */

printf(“sleep time = %d microseconds\n”,sleep_time);

usleep(sleep_time);

shared_number = number + 2;

}

pthread_join(new_thread,NULL);

printf(“MAIN THREAD: DONE\n”);

}

void *proc()

{

int number,i;

int sleep_time;

printf(“CHILD\n”);

for (i = 0; i < 10; i++)

{

number = shared_number;

printf(“CHILD THREAD: i = %d, shared_number = %d\n”,i,shared_number);

sleep_time = 100000.0*drand48(); /* generate random sleep time */

printf(“sleep time = %d microseconds\n”,sleep_time);

usleep(sleep_time);

shared_number = number + 200000;

}

printf(“CHILD THREAD: DONE\n”);

}

SharedData.java

import java.util.Random;

public class SharedData extends Thread {

static Random gRandom = new Random();

static int gSharedNumber = 0;

private int gID;

public SharedData(int id) {

this.gID = id;

}

public void run() {

for(int i=0;i<20;i++) {

int number = gSharedNumber;

System.out.println(“SharedData[“+gID+”](i=”+i+”) = “+gSharedNumber);

try { Thread.sleep(gRandom.nextInt(1000));

} catch (InterruptedException e) { /* ignore */ }

if(gID == 0) gSharedNumber = number + 1;

else gSharedNumber = number + 1000;

}

}

public static void main(String args[]) throws Exception {

SharedData sd1 = new SharedData(0);

SharedData sd2 = new SharedData(1);

sd1.start(); sd2.start();

sd1.join(); sd2.join();

}

}

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

question 20204

  

1) Compare and evaluate in 500 words or more qualitative v quantitative risk assessment.  

2) Discuss in 500 words or more federated systems.

3) Review in 500 words or more the video above called Cloud Security Myths.

Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Write in essay format not in bulleted, numbered or other list format. 

Do not use attachments as a submission. 

Reply to two classmates’ posting in a paragraph of at least five sentences by asking questions, reflecting on your own experience, challenging assumptions, pointing out something new you learned, offering suggestions.   You should make your initial post by Thursday evening so your classmates have an opportunity to respond before Sunday.at midnight when all three posts are due. 

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your post and that you reply to two classmates in a substantive way (not ‘nice post’ or the like).  Your goal is to help your colleagues write better. Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. Please do not use attachments unless requested. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Discussions and Assignment

Discussion 1:   (Emerging Threats and CounterMeasures – Chapter 6 (Depth) )

Requirements: 400 words | APA Format | 2 References

This defense-in-depth discussion scenario is an intentional cybersecurity attack on the water utility’s SCADA system. It occurs during the fall after a dry summer in Fringe City. The water utility’s Information Technology (IT) person did not receive an expected pay raise and decides to reprogram the SCADA system to shut off the high-lift pumps. The operator’s familiarity with the SCADA system allows him to reprogram the alarms that typically notify operators of a high-lift pump failure. In addition, he prevents access to the SCADA system by others. Wildfire breaks out on the outskirts of the city. Please identify what type(s) of new countermeasures should have been implemented to prevent this cyberattack from occurring.

Start a discussion thread and discuss what type(s) of new countermeasures should have been implemented to prevent the cyber attack described above from occurring. Be specific in recommending countermeasures for this scenario

Discussion – 2

subject: Security Architecture and Design 

Requirements: 400 words | APA Format | 2 References

 

Students will be required to create 1 new thread and provide substantive comments on at least 3 threads created by other students. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references.

Your initial posting should be a minimum of 400 words

How should cache handling be accomplished in order to minimize the ability of the attacker to deliver a payload through the cache?

Assignment:

subject: Security Architecture and Design 

Requirements: 600 words | APA Format | 2 References

PFA

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Genex Fuels Case Study – Organ Leader & Decision Making

Introduction

1. What evidence is the CEO using to suggest that Genex is not using technology competitively?

2. Did Devlin need to hire Sandy, a “high-priced technology consultant,” to tell him that technology at Genex was a mess?

3. Devise a strategy to successfully implement enterprisewide systems (such as SAP)  at Genex.

Conclusion<>

References. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now