Create

 

Week 2: Individual: Testing and Debugging, Section 3.2

PROGRAMMING
1. Write a search method with four parameters: the search array, the target, the start subscript, and the finish subscript. The last two parameters indicate the part of the array that should be searched. Your method should catch or throw exceptions where warranted.

Resource: Ch. 3, “Testing and Debugging”, of Data Structures: Abstraction and Design Using Java.

Complete the Exercises for Section 3.2, Programming #1, in Ch. 3, “Testing and Debugging”, of Data Structures: Abstraction and Design Using Java.

Submit your pseudocode response to the Assignment Files tab.

Week 2: Individual: Testing and Debugging, Section 3.5

PROGRAMMING
1. Write the findLargest method described in self-check exercise 2 in section 3.4 using Test-Driven Development.

Resource: Ch. 3, “Testing and Debugging”, of Data Structures: Abstraction and Design Using Java.

Complete the Exercises for Section 3.5, Programming #1, in Ch. 3, “Testing and Debugging”, of Data Structures: Abstraction and Design Using Java.

Submit your pseudocode response to the Assignment Files tab

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Excel test out

Mark’s Construction and Realty buys and flips houses. They have hired you to look at their sales numbers from last year to analyze the data. They have instructed you to see if there are any trends in the types of houses they typically purchase, if there is a correlation between the number of houses sold and sale date, and which sales should be included in the project managers’ year-end bonus. 

Perform Preliminary Work

You need to open the existing workbook they provided, save it with a new name, and make a few preliminary modifications.

a. Open the e00_cumexam_data workbook and save the workbook as e00_cumexam_LastFirst.

b. Change the width of column E to 15.00.

c. Insert a new row above row 1.

d. Enter the text 2017 Sales Data in cell A1, change the font size to 14 and apply bold.

e. Add a fill color of Blue, Accent 1 for cell A1.

f. Merge and center the range A1:I1.

g. Freeze the headers so when you scroll down the headers are always visible.

Calculate Profit and Determine if Project is Eligible for Bonus

You are ready to calculate the total costs. 

h. Insert two columns after Sale Price named Total Cost and Profit respectively.

i. Insert a function in cell H3 to calculated the total cost of each project. 

j. Insert a function in cell I3 to calculated the profit of each project. 

k. Create an IF statement in cell K3 where if the profit is greater than $50,000 it will display the text Yes, otherwise it will display the text No.

l. Copy the three formulas down their respective columns.

Organize Monthly Data

The company has already collected data about how many of each type of house they sold each month. You will convert the data into a table, apply a table style to make the data more visually appealing, and add total rows for use in the analysis grids later.

m. Click the Sheet2 worksheet and rename it Analysis.

n. Convert the entire dataset into a new table named Date with a table style of Table Style Medium 6.

o. Calculate a total for each house type in column N.

House Type Analysis

You will analyze each house type to determine if the company has a tendency to purchase a certain type of a house.

p. Create a 2D-Pie chart that displays the total number of houses by house type and apply chart type Style 7.

q. Move the chart to the left side of the screen directly under the table data.

r. Change the chart title to House Type.

s. Move the legend to the top-left corner.

t. Explode the largest piece of the pie to a Point Explosion of 20%

u. Add Data Callout data labels to the chart.

Sales Analysis

You will analyze the sales numbers across each month to determine in which months buyers tend to purchase houses.

v. Calculate a new total row for each month.

w. Create a 2D-Line chart that displays total house sales by Month and apply chart style Style 6 and move it to the right of the pie chart.

x. Change the chart title to Total Sales

y. Change the plotted line color to White, Background 1.

z. Add a column to the Date table after House Type called Sparkline.

aa. Add a sparkline for each house type over the 12-month period in the new Sparkline column.

Finalize the Workbook

You will make some small formatting changes.

bb. Set the page orientation to Landscape.

cc. Insert a footer with your instructor’s name on the left side, the date in the center, and your Last,First name on the right side.

dd. Save and close the workbook. Based on your instructor’s directions, submit e00_cumexam_LastFirst. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

On the discussion forum, describe an instance where a government has taken some action the result of which is influence on commerce.

On the discussion forum, describe an instance where a government has taken some action the result of which is influence on commerce.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Java

Hey i have attached the required file for my assignment.

and additionally i have also mentioned the points of assignments below.

this one is based on this concept.

Lab 4 (Collection Framework, Exception,

IO Handling, Generic method and GUI Programming)

  

NOTE: You should properly format your source code files for better readability and write appropriate comments in the code. 

Exercise 1 [10 points]: 

Write a program that asks a user for a file name and prints the number of characters, words (separated by whitespace), and lines in that file. Then, it prints the frequency of each word (case insensitive) containing in the file (Test1.txt); Your program should handle exceptions related to file opening and reading from the file. 

This is a test this 

Hi there hi hi hi 

Output at the console: 

Number of characters: 35 

Number of words: 10 

Number of lines: 2 

Data written to the file (Test1.txt): 

 this  2 

 is  1 

 a  1 

 test  1 

 hi  4 

 there  1 

Hint: you may use a HashMap to store and count the frequency of the words in the file. 

Exercise 2 [20 points]: 

Your task is to write a program that uses a textfile containing any number of lines of double values as input. Each line in the file is supposed to have no more than 15 values on it. If the file exists and each line in the file does in fact contain 15 or fewer double values, then the program processes and reports on each line in turn by displaying its line number, the number of values on that line, and the range of values on the line. 

But, as you know, things are not always as they seem, or as they are supposed to be. For example, the file your program is looking for may not be there, there may be no double values at all on some lines, some lines may contain more values than the allowed maximum of 15, and some lines may contain “values” that aren’t even doubles (i.e., badly formatted “invalid” double values). The program must recognize and respond appropriately to each of these problems. 

Note: You must implement exception handling. Not only am I requiring it, but Java itself will also require it since you will have to use Java resources that force you to deal with the IOException. In addition to this exception, you are also required to handle the ArrayIndexOutOfBounds and the NumberFormatException at appropriate points in your program. 

This program reads in, from the command line, the name of a textfile containing any number of lines of doubles and then processes each line in turn. Processing a line means computing and then reporting, for that line, its line number, along with the range of values on the line. 

The program can recognize a number of problems that may occur when trying to process such a file. First, the file itself may not be present. If so, the following message is displayed (the first line comes from the system, the second from the program itself): 

filename.ext (The system cannot find the file specified) Program will now terminate. 

If the file exists, and contains lines of double values, possibly with blank lines, possibly lines with too many values, and possibly lines with invalid doubles on them, then the following messages, each followed by a pause, are output, as appropriate: 

Line #: Number of values = # and value range = [#, #]. 

Line #: This is a blank line. 

Line #: This line contains more than the maximum of 15 allowed data values. Line #: This line contains an invalid double value. 

For example, if a file name “text.txt” contains the following texts: 

1.0 2.2 30.3 

3.0 4.12 5.25 2 3.3 4.4 5s 6.5 7 abs sej jdh& 4 

1.1 2.2 3.4 4.3 5.5 6.6 6.5 6.5 8.2 99.2 0.0 0.0 -1.1 

 34.2 34.0 23.1 

24.1 

1.1 2.2 3.3 4.4 5.5 6.0 7.7 8.0 9.0 10.1 -2.1 3.2 4.3 5.4 6.5 7.6 

1.0 

Output: 

Then the output should be like this: 

The file test.txt was successfully opened. 

The data in it will now be processed. 

Press Enter to continue … 

Line 1:Number of values = 3 and value range is [1.0, 30.3]. Line 2:This is a blank line. 

Line 3:Number of values = 3 and value range is [3.0, 5.25]. 

Line 4:This line contains an invalid double value. 

Line 5:This line contains an invalid double value. 

Line 6:Number of values = 13 and value range is [-1.1, 99.2]. Line 7:Number of values = 3 and value range is [23.1, 34.2]. Line 8:Number of values = 1 and value range value range consists of this single value. 

Line 9:This line contains more than the maximum of 15 allowed data values. 

Line 10:Number of values = 1 and value range value range consists of this single value. 

  

Exercise 3 [10 points]: 

Define a FixdLenStringList class that encapsulate a list of strings and a string length. All string in a FixdLenStringList have the same length. There is not limit on number of strings (dynamic array) that a FixdLenStringList can hold. For example, 

The FixdLenStringList list1 may contain the strings aa, bb, cc, and dd (all strings of length 2). 

The FixdLenStringList list2 may contain the strings cat, dog, pig, fox, bat, and eel (all strings of length 3). 

An incomplete implementation of the FixdLenStringList.java class is provided with this exercise: 

Here are the required methods in the FixdLenStringList class that you need to implement. 

i) Public constructor – This constructor will have one parameter that will indicate the length of each string in FixdLenStringList’s list. The constructor will initialize strLength with this value and will initialize FixdLenStringList’s list of strings, possibleStrings, to have 0 entries. 

ii) You are to implement the found method. This method returns true if its String parameter key is found in the list of strings, false otherwise. 

iii) You are to implement the addString method. This method will add a string to the FixdLenStringList’s list if it is the correct length and not already in the list. If the string is already in the list or if the string is not the correct length, it is not added. 

HINT: you may call method found that is specified in next part of this problem. iv)  You are to implement the method removeRandomString that will remove and return a random string entry from FixdLenStringList’s list of strings. 

Write a client test class for testing the FixdLenStringList class. Supply, your client class along with screen shots of some test runs. 

Exercise 4: [20 Points] 

In this exercise, we will create a memory game called “Mind Game”. In this game, even number of tiles are placed face-down in rows on a “Mind Game Board”. Each tile contains an image. For each tile, there is exactly one other tile with the same image. The player is to pick a tile, see which image it has, and try to find its match from the remaining face-down tiles. If the player fails to turn over its match, both tiles are turned face-down and the player attempts to pick a matching pair again. The game is over when all tiles on the board are turned face-up. 

In this implementation of a simplified version of Mind Game, 

• Images will be strings chosen from a FixdLenStringList. (Use the FixdLenStringList class from exercise 3). 

• The mind game board will contain even number of Tiles. 

• The board will be implemented as a one-dimensional array of Tiles. 

For example, if the size of the mind game board is requested to be 4, then the board will have 16 tiles. The one dimension array, gameBoard, can be viewed as a 4-by-4 mind game board as follows: 

gameBoard[0] gameBoard[1] gameBoard[2] gameBoard[3] gameBoard[4] gameBoard[5] gameBoard[6] gameBoard[7] gameBoard[8] gameBoard[9] gameBoard[10] gameBoard[11] gameBoard[12] gameBoard[13] gameBoard[14] gameBoard[15] 

An incomplete implementation of the Tile and Board classes are provided with this exercise (Tile.java, Board.java). 

You should examine these classes and complete them with the following methods. To implement the methods, see the specifications provided in the comments of the methods. 

a) Write the implementation of the Board method fillBoard, which will randomly fill the mind game board with Tiles whose images (strings) are randomly chosen from the strings contained in the FixdLenStringList. A tile image that appears on the board appears exactly twice on the board. 

b) Write the implementation for the Board method lookAtTile. This method will call the appropriate method of the Tile class to turn the Tile face-up. 

c) Write the implementation for the Board’s method checkMatch. This method will check whether the tiles in its two integer parameter positions on gameBoard have the same image. If they do, the tiles will remain face-up. If they have different images, then tiles will be turned face-down. (See the comments that were given in the problem specification). 

d) Complete the implementation for printBoard so that the Mind Game board is printed as described in the comment. For example, you should call the Board method format to right-justify the printing of the Tile image or the printing of the Tile position. An example of printBoard for a 4 by 4 mind game board that is partially solved is shown below after 4 matches have been found. The FixdLenStringList passed as a parameter to Board constructor contains strings of length 3. 

fox fox dog dog cow 5 6 7 cow cat  10 11 12 13 14 15 

Write a MindGame.java class that will handle user input and simulate the mind game to the user. An example run of the mind Game is provided below: 

0 1 

2 3 

Choose positions:1 2 

pig , cat 

0 1 

2 3 

Choose positions:0 1 cat , pig 

0 1 

2 3 

Choose positions:0 3 cat , pig 

0 1 

2 3 

Choose positions:1 3 

pig , pig 

0 pig 

2 pig Choose positions:0 2 

cat , cat cat pig cat pig 

These exercises are based on GUI, and are extracted from https://www3.ntu.edu.sg/home/ehchua/programming/java/GraphicsExercises. html#zz-4.1 Exercise 5 [5 points]: 

SwingTemperatureConverter 

Write a GUI program called SwingTemperatureConverter to convert temperature values between Celsius and Fahrenheit. User can enter either the Celsius or the Fahrenheit value, in floating-point number. 

Hints: To display a floating-point number in a specific format (e.g., 1 decimal place), use the static method String.format(), which has the same form as printf(). For example, String.format(“%.1f”, 1.234) returns String “1.2”. 

Exercise 6 [5 points]: 

Write a number guessing game in Swing (as shown in the Figure). The program shall generate a random number between 1 to 100. It shall mask out the random number generated and output “Yot Got it”, “Try Higher” or “Try Lower” depending on the user’s input. 

Hints: 

• You can use Math.random() or rnd.nextInt(100) to generate a random number in double in the range of [0.0, 1.0). 

Exercise 7 [5 points]: 

Write a generic static method called “search” that will take two parameters, i) an array containing generic objects and ii) a reference to a generic object. The search method should look for the index of the passed object in the array. If the passed object is not found in the array, then the method should throw a java.util.NoSuchElementException (notice that this is a RunTimeException) exception. 

Hint: In the search method, you should use the Object.equals method for finding the object in the array. 

Now, create a main method in the same class and test the functionality of the search method by passing some “Point” objects and some “String” objects respectively. You should also handle the exception in the main method and show an appropriate message in case the object is not found in the array, otherwise print the index where the object is found in the array. 

Note: you may need to override the .equals method in the Point class for the search method to find a particular Point in the Point array. Here is a sample Point class, which you are free to modify. 

class Point { private int x, y; 

public Point(int x, int y) { this.x = x; this.y = y; 

public Point(){ this(0, 0); 

public int getX() { return x; 

public void setX(int x) { this.x = x; 

public int getY() { return y; 

public void setY(int y) { this.y = y; 

@Override public String toString() { 

return “Point{” + “x=” + x + “, y=” + y + ‘}’; 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Privacy and Data Protection Assessment

 

The Department of Administrative Services (DAS) provides a number of services to other departments in an Australian State Government. These services include HR and personnel management, payroll, contract tendering management, contractor management, and procurement. These services have all been provided from the Department’s own data centres.

As a result of a change in Government policy, DAS is moving to a “Shared Services” approach. This approach will mean that DAS will centralise a number of services for the whole of Government (WofG). The result of this move will be that each Department or Agency that runs one of these services for its own users, will be required to migrate its data to DAS so that it can be consolidated into one of the DAS centralised databases. DAS will then provide these consolidated services to all other Departments and Agencies within the Government.

Another Government policy mandates a “Cloud first” approach to the process of updating or acquiring software or services. Following these strategic policy changes from Government, DAS has decided to:

  • Purchase a HR and personnel management application from a US based company that provides a SaaS solution. 
    • The application will provide DAS with a HR suite that will provide a complete HR suite which will also include performance management. The application provider has advised that the company’s main database is located in a Cloud datacentre based in California in the United States, with a replica database located in a cloud datacentre in Dublin, Ireland. However, all data processing, configuration, maintenance, updates and feature releases are provided from the application provider’s processing centre in Bangalore, India.
    • Employee data will be uploaded from DAS daily at 12:00 AEST. This will be initially transferred to Bangalore in India for processing before being loaded into the main provider database in California.
    • Employees will be able to access their HR and Performance Management information through a link placed on the DAS intranet. Each employee will use their internal agency digital ID to authenticate to the HR and Performance management system. The internal digital ID is generated by each agency’s Active Directory instance and is used for internal authentication and authorisation.
  • Move the DAS payroll to a COTS (Commercial Off The Shelf) application that it will manage in a public cloud;

Tasks 

After your successful engagement to provide a security and privacy risk assessment for the DAS, you have again been engaged to consider some additional questions that DAS management has raised. 

Prepare a presentation for DAS Management using the TRA you recently completed on the security and privacy of employee data. Your presentation is to show:

  1. Discuss how the operational solution using an SaaS application, and the location(s) of the SaaS provider for HR management may affect the security posture of DAS. (20 marks)
  2. Explain if either the operational solution, or the operational location(s), or both, increase or mitigate the threats and risks identified for the security and privacy of employee data? (20 marks)
  3. Discuss the security and privacy implications for DAS of the data processing location? (20 marks)
  4. Discuss any issues of data sensitivity that you think should be considered with either the chosen solution or the storage/processing locations? (20 marks)
  5. Discuss any issues of data sovereignty that should be considered? (20 marks)

Your presentation is to be completed in either PowerPoint or Google slides. Your presentation must not exceed 25 slides of content. 

  • The presentation should be a maximum of 25 slides, including introduction, conclusions and recommendations.
  • Each slide should have speaking notes in the Notes section which expand on the information in the slide.
  • Images and quotations used in slides must be referenced on that slide.
  • The slide deck does require a reference list. References are to be included on a Reference list slide(s), but these are not counted as part of the slide deck limit.

Your presentation should highlight the significant points of your argument, but you should include the detail in the speaking notes section of your slides.

Rationale

back to top

This assessment task will assess the following learning outcome/s:

  • be able to examine the legal, business and privacy requirements for a cloud deployment model.
  • be able to evaluate the risk management requirements for a cloud deployment model.
  • be able to critically analyse the legal, ethical and business concerns for the security and privacy of data to be deployed to the cloud.

Marking criteria and standards

back to topQuestionsHDDICRPSFLQ1. Does the operational solution and locations affect DAS security (20 marks)Comprehensive exploration of the use of SaaS and given locations affect the existing security of data that includes well considered and argued reasoning
Thorough   exploration of the use of SaaS and given locations affect the existing security of data that includes good reasoning
Detailed    exploration of the use of SaaS and given locations affect the existing security of data that includes some good reasoning
Adequate    exploration of the use of SaaS and given locations affect the existing security of data that includes some reasoning
Incomplete or irrelevant    exploration of the use of SaaS and given locations affect the existing security of data that includes little or no reasoning
Q2. Does the operational solution and locations increase or mitigate threats and risks to DAS security (20 marks)Comprehensive discussion of how this solution and its locations will increase or mitigate threats and risks to security of DAS that includes  well considered and argued reasoningThorough   discussion of how this solution and its locations will increase or mitigate threats and risks to security of DAS that includes  good reasoningDetailed    discussion of how this solution and its locations will increase or mitigate threats and risks to security of DAS that includes some good reasoningAdequate    discussion of how this solution and its locations will increase or mitigate threats and risks to security of DAS that includes  some reasoningIncomplete or irrelevant    discussion of how this solution and its locations will increase or mitigate threats and risks to security of DAS that includes little or no reasoningQ3. Implications for DAS of data processing location (20 marks)Comprehensive discussion of the security and privacy implications for DAS of the chosen data processing location that includes  well considered and argued reasoningThorough  discussion of the security and privacy implications for DAS of the chosen data processing location that includes  good reasoningDetailed   discussion of the security and privacy implications for DAS of the chosen data processing location that some good reasoningAdequate  discussion of the security and privacy implications for DAS of the chosen data processing location that includes some reasoningIncomplete or inadequate  discussion of the security and privacy implications for DAS of the chosen data processing location that includes  little or no reasoningQ4. Issues of data sensitivity (20 marks)Comprehensive exploration of data sensitivity issues that includes well thought out reasoningThorough exploration of data sensitivity issues that includes good reasoningDetailed exploration of data sensitivity issues that includes some good reasoningAdequate exploration of data sensitivity issues that includes some reasoningInadequate or incomplete exploration of data sensitivity issues that includes little or no reasoningQ5.  Issues of data sovereignty (20 marks)Comprehensive exploration of data sovereignty issues that includes well thought out reasoningThorough exploration of data  sovereignty issues that includes good reasoningDetailed exploration of data  sovereignty issues that includes some good reasoningAdequate exploration of data  sovereignty issues that includes some reasoningInadequate or incomplete exploration of data  sovereignty issues that includes little or no reasoningReferencing & Presentation
Up to 5 marks can be deducted for incorrect or incomplete referencing Up to 5 marks may be deducted for poor presentation, spelling and grammar

Presentation

back to top

Your presentation is to be completed in either PowerPoint or Google slides. Your presentation must not exceed 30 slides of content. 

  • The presentation should be a maximum of 30 slides, including introduction, conclusions and recommendations.
  • Each slide should have speaking notes in the Notes section which expand on the information in the slide.
  • Images and quotations used in slides must be referenced on that slide.
  • The slide deck does require a reference list. References are to be included on a Reference list slide(s), but these are not counted as part of the slide deck limit.

Your presentation should highlight the significant points of your argument, but you should include the detail in the speaking notes section of your slides.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Policy,legal and ethics week10

 

This quiz is based on chapter 6 in the text. Answer each question in a paragraph that contains at least five sentences:

1. Should society help workers dislocated when technology, like the Internet, elimlnates their jobs in a process called ‘Creative Destruction‘?

2. are we working more and earning less?

3. Would you want a telecommuting job? Why or why not? 

4. Does the gig economy appeal to you? Why or why not?

5. How is an employee differentiated from a contracter under US law? 

6. Why have some municipalities put restrictions on innovations in the sharing economy and in on-demand services?

7. What has been the effect on the US economy of outsourcing (or offshoring) technical and professional jobs? 

8. How much monitoring of employee activities at work is appropriate? 

9. Should an employer be able to discipline or terminate an employee for on-line behavior in his/her own time? 

10. What is the relationship betwee BYOD (bring your own device) and shadow IT

11. What is cyberloafing?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

IAM in a federated cloud application

Write an essay of at least 500 words discussing discussing IAM in a federated cloud application.

        

Do not copy without providing proper attribution. This paper will be evaluated through SafeAssign. 

Write in essay format not in outline, bulleted, numbered or other list format.  

Do not submit attachments.

Use the five paragraph format. Each paragraph must have at least five sentences. Include 3 quotes with quotation marks and cited in-line and in a list of references.

Include an interesting meaninful title.

Include at least one quote from each of 3 different articles, place the words you copied (do not alter or paraphrase the words) in quotation marks and cite in-line (as all work copied from another should be handled). The quotes should be one  full sentence (no more, less) and should be incorporated in your discussion (they do not replace your discussion) to illustrate or emphasize your ideas. Each quote must be cited in-line and at the end. 

Cite your sources in a clickable reference list at the end. Do not copy without providing proper attribution (quotation marks and in-line citations). 

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your submission Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. I will not spend a lot of my time trying to decipher nonsense. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about.  Please do not submit attachments unless requested

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

c and c++ sed and gawk

In this assignment, you will write sed and gawk commands to accomplish certain requested functionality. Given the many powerful features of sed and gawk, you are provided with a link to a tutorial for sed as well as gawk to assist you in completing this assignment.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Lab Report Please see the attachment

  

1. On your local computer, create a new document. You will use this document as your Lab Report.

2. Review the seven domains of a typical IT infrastructure.( User, Workstation, Local Area Network (LAN), Local Area Network-to-Wide Area

Network (LAN-to-WAN), Wide Area Network (WAN), Remote Access, and System/Application)

3. In your Lab Report file, describe how risk can impact each of the seven domains of a typical IT

infrastructure: User, Workstation, Local Area Network (LAN), Local Area Network-to-Wide Area

Network (LAN-to-WAN), Wide Area Network (WAN), Remote Access, and System/Application

domains.

  

Risks, Threats, and Vulnerabilities

Primary Domain Impacted

 

Unauthorized access from public Internet

 

Hacker penetrates IT infrastructure and gains access to your internal   network

 

Communication circuit outages

 

Workstation operating system (OS) has a known software vulnerability

 

Denial of service attack on organization’s e-mail

server

 

Remote communications from home office

 

Workstation browser has software vulnerability

 

Weak ingress/egress traffic-filtering degrades performance

 

Wireless Local Area Network (WLAN) access

points are needed for LAN connectivity within a

warehouse

 

Need to prevent rogue users from unauthorized

WLAN access

 

User destroys data in application, deletes all les,

and gains access to internal network

 

Fire destroys primary data center

 

Intraoffice employee romance gone bad

 

Loss of production data server

 

Unauthorized access to organization-owned

workstations

 

LAN server OS has a known software

vulnerability

 

User downloads an unknown e-mail attachment

 

Service provider has a major network outage

 

User inserts CDs and USB hard drives with

personal photos, music, and videos on

organization-owned computers

 

Virtual Private Network (VPN) tunneling between

the remote computer and ingress/egress router

 

 

4. Review the left-hand column of the following table of risks, threats, and vulnerabilities that were found in a health care IT infrastructure servicing patients with life-threatening conditions:

Note: Some risks will affect multiple IT domains. In fact, in real-world environments, risks and their direct consequences will most likely span across several domains. This is a big reason to implement controls in more than one domain to mitigate those risks. However, for the exercise in step 6 that follows, consider and select only the domain that would be most affected. Subsequent next steps in the real world include selecting, implementing, and testing controls to minimize or eliminate those risks. Remember that a risk can be responded to in one of four ways: accept it, treat it (minimize it), avoid it, or transfer it (for example, outsource or insurance).

5. In your Lab Report le, complete the table from the previous step by identifying which of the

seven domains of a typical IT infrastructure will be most impacted by each item in the table’s

left-hand column and explain why.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

CSIS Discussion

NEED THIS BY 11PM EASTERN TONIGHT!!!

Instructions:
 

*First, Discuss topic in at least 250 word paragraph.
 

*Second, make 1 reply of at least 100 words for each   paragraph provided below. For your paragraph and replies, you  should    support your assertions with at least 1 source and accompanying    citations in APA format. Acceptable sources include the textbook,    reputable websites, and the Bible.

Discussion Topic:
 

There is a diagnosis of a bad video card on a client’s computer made by  another technician. The client would like to have a new video card  installed on the desktop. How would you ensure that the diagnosis is correct? If it is correct, explain the steps you would take to ensure a new video card is properly installed.
 

100 word Reply to Each Paragraph!
 

Paragraph #1
Video cards have their own  processors called graphic processing units (GPUs) or visual processing  unit (VPUs). (Andrew, West & Dark, 2017) Before installing a new  video card, I would double-check to make sure my diagnosis matches the  other technician diagnosis. First, I would check to make sure that the  video card, in fact, needs to be replaced. Some signs of a bad video  card are screen glitches, stuttering, and fan speed. I would also check  to make sure there is no dust creating problems with the video card and  checking to make sure the cables are good by testing the other cables  and monitors to prove whether or not the video card is bad. “One of the  easiest, and yet most powerful, techniques is to simply swap out the  graphics card for another one and see if the problems go away”. (Hayes,  2019, p. 3) Below are the steps I would take to install a new card:

  1. Turn off the computer and unplug from the wall. 
  2. Open the case to gain access to where the video card is located on the motherboard.  
  3. Unscrew  the screws from the retention bracket to remove the faulty video,  making sure all the wires that are connected to it are unplugged. 
  4. Install the new video card into the open slot making sure all wires are plugged in correctly and close the case side panel. 
  5. Turn  the computer on, checking make sure the video card is working  correctly, and the latest driver package is installed on the PC.  

“The moment of truth for  any PC hardware change – see if it works. Double-check you’ve done  everything correctly so far. Then, before putting your whole PC back  together and plugging everything in, plug in the power cable, your  keyboard and mouse, and a single monitor video cable. Then turn your PC  on and see if you get a picture”.  (Martindale, 2019, p. 13).    
*100 word reply
 

Paragraph 2
  Bad video card           

In order to determine if the diagnosis of a bad graphics card is  correct or not, I would start by first making sure that the graphics  card is properly seated on the motherboard. I would then check all of  the cables and make sure that none of them are loose. I would then check  the graphics settings on the computer to make sure that it is set  correctly. I would uninstall the current drivers for the graphics card  and reinstall the last stable drivers that are available. I would run a  program like MSI afterburner, which monitors the graphics card  temperatures to make sure that it is not overheating. Overheated  graphics cards can cause damage to itself or other components. It is  important to also check the monitors being used as visual issues could  be a symptom that your monitor is about to fail. You can test this by  using a different monitor. I would also recommend checking the device  manager in Windows control panel to see if the graphics card is listed  as working correctly. If there are no problems found with the device, it  will say “this device is working properly” or something similar. I  would also check the fan speeds of the graphics card. If the fans are  constantly running at high speeds or never running at all there could be  a problem with the graphics card. You should clean the fans by spraying  compressed air to make sure they are not covered with dust (Batt,  2017).
*100 word reply

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now