PhD. Interview Questions

 

Note: My Area of Interest in information Technology for Phd. Currrently I’m working as software Engineer who is working on Aws and javascript. You can use the following document.

WRITTEN INTERVIEW QUESTIONS

DOCTORAL CANDIDATES SHOULD PROVIDE AN AUTHENTIC PERSONAL STATEMENT TO EACH OF THE FIVE FOLLOWING QUESTIONS/PROMPTS REFLECTING ON THEIR INTERESTS. IN THE EVENT THAT ANY OUTSIDE RESOURCES ARE USED, RESOURCES SHOULD BE CITED IN APA FORMAT. SUBMISSIONS SHOULD BE A MAXIMUM OF 500 WORDS OR 125 WORDS PER QUESTION/PROMPT. IT IS BEST TO RESPOND TO EACH PROMPT/QUESTION INDIVIDUALLY FOR CLARITY OF THE REVIEWER. WRITING SAMPLES SHOULD BE SUBMITTED IN MICROSOFT WORD FORMAT AND INCLUDE THE CANDIDATE’S NAME.

1. PROVIDE A BRIEF INTRODUCTION FOCUSING ON YOUR EDUCATION, CAREER, AND DECISION TO APPLY TO UNIVERSITY OF THE CUMBERLANDS.

2. IN RELATION TO YOUR DOCTORAL PROGRAM APPLICATION, WHAT AREA OF RECENT RESEARCH IN THE FIELD WOULD YOU WANT TO STUDY, AND WHY?

3. HOW DOES YOUR CURRENT VOCATION RELATE TO YOUR APPLICATION TO THE DOCTORAL PROGRAM?

4. HOW WILL YOUR EXPERIENCES AND PERSONAL SKILLS HELP YOU TO BE SUCCESSFUL IN YOUR PROGRAM?

5. WHAT LONG-TERM GOALS DO YOU HAVE FOR APPLYING YOUR LEARNING FROM YOUR DOCTORAL PROGRAM?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

CMIT 391

 

Linux Implementation Proposal: Migration Proposal Presentation (due at the end of Week 3)

Faster Computing has contacted Go2Linux and requested a brief proposal presentation for migrating its systems from Windows to Linux. The company is specifically interested in seeing the following information:

  • Based on your current understanding of Faster Computing’s business, what are some potential benefits of Linux?
  • The company is aware that many different Linux distributions exist. Which would Go2Linux recommend, and why?
  • Are there graphical interfaces available for the Linux workstations that would provide similar functionality to Windows? Some users are concerned about working with a command-line interface.
  • What steps will be required to migrate the systems from Windows to Linux?
  • What tools are available on Linux for the servers to provide file sharing, web servers, and email servers?

The deliverable for this phase of the project is a three- to five-slide PowerPoint narrated presentation. For each slide, you will embed your own audio recording as if you were presenting the content to the Faster Computing team. Faster Computing has not yet committed to the project, so this should be presented as a proposal. The presentation should be visually appealing; inclusion of at least one image that supports the content and adds value to the proposal is required. You must cite at least two quality sources.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Windows hardening recommendations

  

Windows Hardening Scenario

As a security administrator for Always Fresh, you have been instructed to ensure that Windows authentication, networking, and data access are hardened. This will help to provide a high level of security.

The following are issues to be addressed through hardening techniques:

§ Previous attempts to protect user accounts have resulted in users writing long passwords down and placing them near their workstations. Users should not write down passwords or create passwords that attackers could easily guess, such as words founds in the dictionary.

§ Every user, regardless of role, must have at least one unique user account. A user who operates in multiple roles may have multiple unique user accounts. Users should use the account for its intended role only.

§ Anonymous users of the web server applications should only be able to access servers located in the demilitarized zone (DMZ). No anonymous web application users should be able to access any protected resources in the Always Fresh IT infrastructure.

§ To protect servers from attack, each server should authenticate connections based on the source computer and user.

Tasks

Create a summary report to management that describes a hardening technique that addresses each issue listed above. Provide rationale for each selection.

Required Resources

§ Internet access

§ Course textbook

Please follow book for sure

Chapter 11: Hardening the Microsoft Windows Operating System

Solomon, Michael G. (October 2019) Strategies in Window Platforms and Applications, Edition 3rd, Jones & Bartlett Learning

Submission Requirements

§ Format: Microsoft Word (or compatible)

§ Font: Times New Roman, size 12, double-space

§ Citation Style: APA

§ Length: 2 to 4 pages

Self-Assessment Checklist

§ I addressed all issues required for the summary report.

§ I created a well-developed and formatted report with proper grammar, spelling, and punctuation.

§ I followed the submission guidelines.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Formulas and Functions in Excel

Precision Products specializes in custom-manufactured metal parts. The production manager has asked you to create an Excel spreadsheet to help manage operations. The company needs a way to calculate staffing requirements (number of employees) based on different levels of production.

The five manufacturing operations are fabrication, welding, machining, assembly, and packaging. One unit of production requires 1.5 hours for fabrication, 2.25 hours for welding, 0.7 hours for machining, 3.2 hours for assembly, and 0.5 hours for packaging. This is what you will do:

  1. Download the PrecisionProducts.xlsx file to your computer.  
  2. Enter a formula in cell D4 to calculate the weekly production for the first row of 200 units. Copy the formula to cells D5 through D7.
    1. Example:  =C4*1.5
    2. You can also use absolute cell reference: Example:  =C4*$D$3
  3. Repeat this for cells E4 through H7.
  4. Use the SUM function to calculate the total production hours in cell I4 and copy to remaining cells.
    1. Example:  =SUM(D4:H4)
  5. Enter a formula in cell D10 to calculate the number of workers needed for a 40-hour week.
  6. Copy the formula to the remaining cells.
  7. Use the SUM function to calculate the Total Requirements in column I.
  8. Make the necessary change(s) to show the total required for each level of production if Precision Products operates a 45-hour production schedule.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Discussion forum on Article readings

Required Text: Stair, R. M., & Reynolds, G. W. (2018). Principles of information systems. Boston, MA: Cengage Learning. 

Discussion:

After reading articles(given below) on Information System Success and Satisfaction. How do you believe an organization should measure information system success and satisfaction in the enterprise?

Article-1

Doll, W., & Torkzadeh, G. (1988). The Measurement of End-User Computing Satisfaction. MIS Quarterly, 12(2), 259–274. https://doi.org/10.2307/248851

Article-2

Davis, F. (1993). User acceptance of information technology: system characteristics, user perceptions and behavioral impacts. International journal of man-machine studies, 38(3), 475-487.  doi:10.1006/imms.1993.1022

Article-3

DeLone, W. H., & McLean, E. R. (1992). Information systems success: The quest for the dependent variable. Information systems research, 3(1), 60-95.

Write two pages APA format paper

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Bank Enterprise Information Security Policy (EISP)

  

The organization that we will use is a small community bank. This type of organization was selected because everyone in the course should have some familiarity with banks, a community bank has a smaller scope, the banking industry has regulatory requirements to follow, and public trust in banking is very important. (Maryland SECU is an example of this type of bank.)

Here are some technical parameters of the Bank of Bowie.

· Headquarters is located in Bowie, MD

· Headquarters building has corporate offices and a branch on the lower level

· Two branch offices are located in Bowie and Laurel

· Each of the three branches employees the following staff

o Branch Manager

o Branch Security Officer

o Six Tellers

o Two Loan Officers

· Corporate Headquarters employs the following staff

o Officers and Directors

§ Chairman/CEO/President/Director

§ Vice-President/Secretary/Director

§ Financial Officer/Treasurer

§ Assistant Treasurer 

§ Six Directors – Corporate Strategy, Branch Oversight, Personnel Oversight, Regulatory Implementation, Customer Focus, Policy/Standards/Processes

§ Chief Compliance Officer

o Employees

§ Head Loan Officer 

§ Senior Loan Administrator

§ Two Loan Processors

§ Escrow Processor

§ Eight Customer Service Representatives

§ Internal Auditor

§ Compliance Officer

§ Two Human Resources Personnel

§ Five Information Technology Personnel

· Bank Offerings

o Savings and Checking Accounts

o Loans

o Deposit Products such as IRAs

o Online Banking

Information Technology Landscape

· Primary corporate databases are maintained at the Headquarters and a backup location

· Data is replicated routinely from the branches to the Headquarters

· Headquarters and branch personnel use desktops for their day-to-day activities

· Software consists of a number of standard applications, e.g., Office, and customized banking applications

· The Bank of Bowie website provides static information about the bank

· Electronic banking activities are outsourced to other providers

· Data is archived by a third-party provider

· Data protection mechanisms include encryption, digital signatures, access control firewalls, and other measures

Vision/Mission

Bank of Bowie is built on weeks of dedication to the community, Bank of Bowie will “continue in our rich tradition of providing impeccable customer service within a community environment.”[1]

Regulation

We will simplify the government regulations for this activity. You must account for federal requirements for the following.

· All financial transactions must have integrity.

· All financial transactions must be audited and audit data must be retained for a period of six years.

· Social Security Numbers must be kept confidential.

· Customers must have access to their accounts at least every 48 hours.

· Interest rates and other loan terms and conditions must be clearly disclosed to customers.

Submission One – Policies

Bank of Bowie requires a set of policies to guide their efforts. 

Write an Enterprise Information Security Policy for the Bank of Bowie. See Page 148, Table 4-1 for an example. Make certain the policy includes what the information security needs are and not how to achieve them. Include the five federal requirements and three additional requirements based on market competitors (local banks – such as MECU, SECU, PointBreeze Credit Union, 1st Mariner Bank, Rosedale Federal Savings and Loan). Please detail the mission, vision, and values to support the justification for the “information security needs”. 

Create an Issue-specific security policy (ISSP) on a relevant topic of your choosing. It can be for internal system users or for customers or services provided to customers. 

Create a system specific policy that addresses audit logs and backup of the audit logs. Make certain that it is compliant with the laws indicated in the background. 

Each policy document should be well organized per the outlines presented in the text or another reference. Each policy should be between 2 and 4 pages and it will be graded based on its completeness in addressing the topic, not on its length. Finally, it should follow all of the guidelines for each policy type in the text.

 .

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

CS 3377 Project

The goal: create several versions of a process that updates and saves a binary file as a new file.

The Setup

This project will be done in 4 parts. To keep them separate, I implemented a factory pattern so

that you (and the autograder) can test each copying method separately. It will look like this:

FileModifierFactory: creates

1. Part1SimpleFileModifier: fill in during part 1

2. Part2MultiProcessModifier: fill in during part 2

3. Part3ThreadedModifier: fill in during part 3

4. Part4SocketModifier: fill in during part 4

You will be given (and not need to modify):

1. main.cpp. Launches the appropriate test based on the arguments

2. Util.cpp/h. Includes some useful attributes.

3. FileModifierFactory.cpp & .h. These build the proper PartXModifier based on

the argument.

4. PipeCopier.cpp & .h. Helps you with the pipe for part 2.

While each part will be tested separately, you are encouraged to reuse code as much of it will

be useful for multiple parts.

The File

The file you are to read, modify, and save is a binary file that contains a sales list. A binary file is

a non-text file, meaning some things (like numbers) aren’t stored as digits but as the ints/floats

you use as variables. The name of the files to read and write will be in Util.h.

The file will be structured like this:

Field

Size

HEADER

NumEntries

4 bytes

Type Purpose

Integer Tells you how many

entries you need to

read

Timestamp (#

seconds since

1/1/1970)

Item’s code

Name of the item

sold

ENTRY (repeated

NumEntries times)

Date/Time sizeof(time_t) Time

Item ID

Item Name Sizeof(int)

50 bytes Integer

char*Item Quantity

Item Price

Sizeof(int)

Sizeof(float)

Integer

Float

Number sold

Price of the

products

What You’ll Do

In each part, the goal is to copy the file, adding two additional sales:

1. The Sobell book:

a. Time 1612195200 (2/1/2020 4 PM GMT)

b. ID 4636152

c. Name “A Programming Guide to Linux Commands, Editors, and Shell

Programming by Sobell” [warning: this is more than 49 characters, so you have

to truncate it—I say 49 because you need a null terminator]

d. Quantity: 70

e. Price: 70.99

2. The Advanced Programming book

a. Time 1613412000 (2/15/2020 6 PM GMT)

b. ID 6530927

c. Name “Advanced Programming in the UNIX Environment by Stevens and Rago”

[warning: more than 49 characters again]

d. Quantity: 68

e. Price: 89.99

Be sure to update the total number of entries to account for these new ones.

Part 1 (Due 3/29)

You will read in the file (Util::inputFileName), add the two entries, and save the file

(Util::outputFileName) using open(), close(), read(), and write().

You must use the low-level functions we will talk about in APUE chapter 3 (open, close, read,

write). Failure to do so will result in 0 points for this part of the project.

It is highly recommended that you do the file reading and writing in class(es) outside

Part1SimpleFileModifier, as that code will be useful later.

Part 2 (Due 4/12)

In this case you will spawn a new process using fork() and exec(), and split the responsibilities

like this:

1. The original process will read the file (2 nd argument=2) and then write the data over a

pipe to the child process.

2. The child process will read the file from the pipe (which will be set to standard input)

and write the data to the output file.

3. PipeMaker will take care of the pipe setup for you:a. Create PipeMaker before the fork.

b. In the parent process, call setUpToWrite() to ready this process for writing. You’ll

get back the file descriptor to write to. Write the file data to that file descriptor

(hint: it’s just like writing to a file).

c. In the child process, before execing, call setUpToRead() to dup the pipe output

to standard input. You can then exec the process (21S_CS3377_Project) with the

write option (2 nd argument=3), read the data from standard input (just a file

descriptor, remember!), and write to the output file.

d. Either the parent or the child process can do the update (but not both,

obviously).

When calling exec, use the command 21S_CS3377_Project 2 3. This will trigger main to

give you the proper setup for the child process. You will be responsible for spotting the

Util::IOType of WRITE (3), and read from standard input rather than the input file.

Part 3 (Due 4/26)

In this part you will create a thread and pass the file data from one thread to the other. The

threads will be like this:

1. Main thread: read the data, create the thread, and pass the data along

2. Created thread: receive the data and output it to the file

I did all of this inside of Part3ThreadedModifier. Create a mutex and condition for both threads

to share, and pass a pointer to the Part3ThreadedModifier object to pthread_create (and read

it in the other thread). Then you can use the shared mutex and condition to coordinate passing

the data.

The easiest way to pass the data is to use a variable inside Part3ThreadedModifier (type

EntryInfo). The main thread should lock the mutex before creating the receiving thread (and the

receiving thread should attempt to lock the mutex right after it starts up) to ensure the proper

ordering. Then do a loop in each thread like this:

Main (sending) thread

Wait on shared condition (for writing

thread to be ready)

Receiving thread

Signal condition to say we’re ready

Wait on condition (for an entry to be

ready)

Update the variable with the next entry

Signal the condition

Loop around and wait on the condition

again

Retrieve the info, save it for later writingLoop around and signal the condition

again

Once you’ve passed all the entries (5 or 7 depending on where you want to add the new ones),

unlock the mutex on both sides.

Part 4 (Due 5/10)

Here you will use two processes again, this time with a socket connecting them.

A port number to use (12345) is at Util::portNumber.

• Note: if you get an error that the port is already in use, it’s likely because you just ran

the project and the operating system hasn’t released the port yet. You can either wait a

bit (a few minutes at most) or change the port number (12346, etc.).

When I did this step, I reversed the setup from part 2: the main process here reads from the

socket (writing to the output file) and the spawned process writes to the socket (reading from

the input file). Again, it is up to you where you want to add the two new entries.

When you spawn the 2 nd process, use 21S_CS3377_Project 4 3.

After the fork, the socket reading process (parent process for me) creates a socket and listens

on that socket using the port number above. The socket writing process (child process for me)

creates a socket and connects to the listen socket. Depending on the timing of things the listen

socket may not be ready the first time; here is code to repeatedly wait for the listen socket to

be available:

int amountToWait = 1;

while ( connect(fileDescriptor, (struct sockaddr*) &serverAddress,

sizeof(serverAddress))) {

if ( errno != ECONNREFUSED) {

// Something unexpected happened

throw FileModifyException(“Error connecting”);

}

std::cout << “Not ready to connect yet…\n”;

// Exponential backoff

sleep(amountToWait);

amountToWait = amountToWait * 2;

}

Once the connection is made (reader gets back a file descriptor from accept() and the writer

gets out of the loop above) you can transfer the data. Remember that a socket is just a file

descriptor, so your code to write/read from earlier parts will work here, too.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Appcelerator Titanium Discussion

Class,

Appcelerator Titanium was released in December 2008, and has been steadily growing in functionality since its release.  Starting with its Titanium Developer product, Appcelerator provides a single-point interface to run applications.  Titanium Studio is a full-featured IDE which provides a single place to handle all steps of the development environment including a debugging solution.   Titanium is not a magic bullet; however, it does include a solid framework for developing a single codebase to deploy to multiple platforms.   In addition, it allows developers to use a language they are more familiar with to create apps in a domain outside of their knowledge.

  • What are some advantages to using Appcelerator Titanium?
  • Though Appcelerator is reasonably priced, why do some mobile app developers feel that the bugs don’t make it worth the effort?.
  • How is Appcelerator different from other mobile application developers?

To participate in the Discussion, respond to the Discussion prompt by Day 3. Then, read a selection of your colleagues’ postings. Finally, respond to at least two classmates by Day 5 in one or more of the following ways:

  • Complete the Week #6 Discussion by the assigned due date.  Late assignments will not be accepted. 
  • This is a required assignment and is worth 25 points.
  • You must apply and use the basic citation styles of APA.
  • Do not claim credit for the words, ideas, and concepts of others.
  • Use in-text citation and list the reference of your supporting source following APA’s style and formatting
  • Do not copy and paste information or concepts from the Internet and claim that is your work.  It will be considered Plagiarism and you will receive a zero for your work.
  • Use this link to access the Discussion Board

Return to this Discussion in a few days to read the responses to your initial posting. Note what you have learned and/or any insights you have gained as a result of the comments your colleagues made.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

CYB 670 Draft analytical summary

 Using your research and analysis from steps 1-6, prepare an eight-to-10-page analytical summary of your research in which you identify and discuss how wealthy nations and developing nations can and should work together to protect their homelands by improving cyber capacity at the national level. Your summary should address the following: 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

implementation Plan

You will now submit a detailed implementation plan and timeline for your policies and code of ethics. Your plan must include the potential problems with implementation and how you plan to overcome them. Your implementation plan will include, at a minimum:

  • Establish an implementation team and each member’s role.
  • Identify tasks required in implementation and assign them to each role(s).
  • Identify risks involved in the implementation. (This refers not to the risks that were developed for the framework but to the risks involved with a successful rollout of the policies and ethics frameworks.)
  • Define and reference key documents needed in the rollout.
  • Identify any software and hardware requirements relevant to the rollout.
  • Define training requirements and a training plan.
  • Develop a step-by-step timeline for each task in the implementation plan.
  • Implement a metric or test to measure rollout success.

Any implementation plan will run into some problems, so it is very unlikely that none will be identified as you develop the plan. Be sure to include and address any difficulties that might transpire.

Be sure to review the content on the Course Project Overview page to gather all necessary information.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now