.NET Questions

Consider a project that you have recently completed. What were some of the challenges that you personally faced

while developing UI/API/DB/any others?

Were you able to overcome those challenges and if so, how were you able to overcome them?

At the same time, did you have to compromise or sacrifice anything in order to overcome the challenge? If so, how

did you justify the compromises/sacrifices?

If there were other possible solutions to address the challenge, why did you pick one over the other?

2. Describe a scenario from one of your recent projects where you used caching (Should be a project where you used

Angular/AngularJS for UI, .NET RESTful Web API and SQL Server for the backend).

What was the reason you chose caching as the solution and how did you implement it?

Please also state the version used in the project for Angular, C# and SQL Server.

3. You have been provided a technical design to implement. Based on your personal contributions on past

assignments, explain your considerations and the analysis you would perform to make contributions or

recommendations to improve the design provided using an example to achieve these

contributions/recommendations and justify how your input added value to the overall result.

4. You have been assigned to a project to modernize a client’s application portfolio. What would you consider

modernization of an application?

What would you consider an appropriate application to modernize and why?

Provide an example of a most recent project that met the scenario mentioned and describe how the modernization

added value.

5. Using an example of a recent project where you personally have developed an entire module on your own. In that

example what are the design considerations that you had to make and what are the advantages and disadvantages

of the design?

Why did you decide to go with the design that you have at this point?

Maintenance/Troubleshooting:

6. Describe a scenario when there was a performance problem in an application deployed to production (Should be an

application where you used Angular/AngularJS for UI, .NET RESTful Web APIs and SQL Server for the backend).

Please describe the tools that you used to troubleshoot the problem and how you found the root cause of the

problem and what was the corresponding resolution. Please also state the version used in the project for Angular,

C# and SQL Server.

7. Users who are using an AngularJS application with REST API backend and SQL server 2016 are reporting that they are

having an issue with the UI taking a very long time to load. How do you go about troubleshooting what the problem

is?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

ITS-630: Organ Leader & Decision Making – Week 1 Research Paper

Reading resource:

Benbya, H., Ning Nan, Tanriverdi, H., & Youngjin Yoo. (2020). Complexity and Information Systems Research in the Emerging Digital World. MIS Quarterly, 44(1), 1–17. https://doi.org/10.25300/MISQ/2020/13304 http://search.ebscohost.com/login.aspx?direct=true&AuthType=shib&db=buh&AN=141995164&site=eds-live&custid=s8501869&groupid=main&profile=eds_new

Research Paper:

This week’s journal article was focused on the Complexity of Information Systems Research in the Digital World.  Complexity is increasing as new technologies are emerging every day.  This complexity impacts human experiences.  Organizations are turning to digitally enabled solutions to assist with the emergence of digitalization. 

Please review the article and define the emerging technologies as noted in the article.  Note how these emerging technologies impact organizations and what organizations can do to reduce the burden of digitalization. 

Please be sure that journal articles are peer-reviewed and are published within the last five years. The paper should meet the following requirements:

  • 3+ pages in length (not including title page or references)
  • APA guidelines must be followed.  The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.
  • A minimum of five peer-reviewed journal articles.

The writing should be clear and concise.  Headings should be used to transition thoughts.  Don’t forget that the grade also includes the quality of writing.

Note: plagiarism check required, APA7 format, include References, within 8hrs

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

SECURITY POLICY & STANDARTS – 06

Part 1: Research Remote Access Policies (0/1 completed)

Note: In this part of the lab, you will review internet resources on remote access policies in order to form a basis for their purpose and usage. Understanding the reason behind a remote access policy is key to understanding the component policies and procedures. Please take the time to review the research thoroughly and think through the concepts of the policy itself.

1. In your browser, navigate to and read the “Remote Access Policy” template at https://www.sans.org/information-security-policy/.

2. Using your favorite search engine, locate a remote access policy for a higher education institution.

3. Using your favorite search engine, locate a remote access policy for a healthcare provider.

4. Write a brief summary of the information during your research. In your summary, focus on the key elements of the remote access policy. You should also identify any unique elements of remote access policies for higher education and healthcare institutions. Be sure to provide links to the remote access policies you identified in steps 2 and 3.

Part 2: Create a Remote Access Policy (0/7 completed)Note: As you found in your research, different industries have similar but different policies. When using a policy template, it is important to ensure that the template matches the needs of your specific industry and business.

  1. 1. Review the following risks and threats found in the Remote Access Domain:
    • The organization is a local credit union that has several branches and locations throughout the region.
    • Online banking and use of the internet are the bank’s strengths, given its limited human resources.
    • The customer service department is the organization’s most critical business function.
    • The organization wants to be in compliance with the Gramm-Leach-Bliley Act (GLBA) and IT security best practices regarding its employees.
    • The organization wants to monitor and control use of the internet by implementing content filtering.
    • The organization wants to eliminate personal use of organization-owned IT assets and systems.
    • The organization wants to monitor and control use of the e-mail system by implementing e-mail security controls.
    • The organization wants to implement security awareness training policy mandates for all new hires and existing employees. Policy definitions are to include GLBA and customer privacy data requirements, in addition to a mandate for annual security awareness training for all employees.
  2. 1. Identify a security control or countermeasure to mitigate each risk and threat identified in the Remote Access Domain. These security controls or countermeasures will become the basis of the scope of the Remote Access Domain policy definition to help mitigate the risks and threats commonly found within the Remote Access Domain.
  3. 2. Review the following characteristics of the fictional Healthwise Health Care Provider:
    • Healthwise has several remote health care branches and locations throughout the region.
    • Online access to patients’ medical records through the public Internet is required for remote nurses and hospices providing in-home medical services.
    • Online access to patients’ medical records from remote clinics is facilitated through a virtual private network (VPN) and a secure web application front-end over the public Internet.
    • The organization wants to be in compliance with the Health Insurance Portability and Accountability Act (HIPAA) and IT security best practices regarding remote access through the public internet.
    • The organization wants to monitor and control the use of remote access by implementing system logging.
    • The organization wants to implement a security awareness training policy mandating that all new hires and existing employees obtain remote access security training. Policy definition is to include HIPAA and electronic protected health information (ePHI) security requirements and a mandate for annual security awareness training for all remote or mobile employees.
  4. 1. Create an organization-wide remote access policy for Healthwise Health Care:

Healthwise Health Care

Remote Access Policy for Remote Workers and Medical Clinics

Policy Statement
Define your policy verbiage.

Purpose/Objectives
Define the policy’s purpose as well as its objectives and policy definitions

Scope
Define whom this policy covers and its scope. What elements, IT assets, or organization-owned assets are within this policy’s scope?

Standards
Does the policy statement point to any hardware, software, or configuration standards? If so, list them here and explain the relationship of this policy to these standards. In this case, Remote Access Domain standards should be referenced, such as encryption standards and VPN standards; make any necessary assumptions.

Procedures
Explain how you intend to implement this policy for the entire organization.

Guidelines
Explain any roadblocks or implementation issues that you must overcome in this section and how you will surmount them per defined guidelines. Any disputes or gaps in the definition and separation of duties responsibility may need to be addressed in this section.

Challenge Exercise (0/1 completed)Note: The following challenge exercise is provided to allow independent, unguided work – similar to what you will encounter in a real situation.

For this portion of the lab, you will create training documentation for remote employees of Healthwise Health Care. This training will provide remote employees with methods they can use to secure their home network before connecting a company computer, as well as guidance on how to access the corporate network while traveling.

Use the internet to find information about remote access policies and home network protection, and then use this information to create a training document for remote employees.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

CYBERLAWS & ETHICAL HACKING PROJECT

Project Part 3: SQL Injection Response

Scenario

Aim Higher College just learned that sensitive information has been stolen from a student information system and posted on the Web. After reviewing web server and database logs, the Aim Higher IT security team believes that the source of the problem is a SQL injection vulnerability. The vulnerability appears to exist in a web application used by students to register for courses. As part of the incident response report to be submitted to Aim Higher College’s management staff, your supervisor asks you to provide details about this type of vulnerability, how an attacker might exploit it, and methods of detection and removal.

Tasks

Research SQL injection attacks on the Internet to supplement your existing knowledge. Using the information you discovered during this research, in conjunction with what you learned in class, write an incident response report for Aim Higher College’s management detailing the following information:

-A non-technical description of SQL injection vulnerabilities intended for a college management audience.

-The threat that SQL injection poses to the college’s data. Include three possible scenarios that describe how an attacker might conduct this type of attack, the information that they may be able to obtain, and how they might use it maliciously.

-An implementation plan to fortify the college’s web applications against SQL injection attacks

-A monitoring plan that will provide:

-Early warning to developers and security administrators that a SQL injection vulnerability exists in a web application

-Detection of successful and unsuccessful attempts to conduct SQL injection attacks against college systems

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Business Intelligence DSS Discussion

How do you know when you have included enough “intelligence” in a decision support

system? Provide 3 examples of user interfaces that support your answer.

Need about 2-3 pages with peer-reviewed references. APA formatted. Attached chapter for the week.

Note: No AI generated content. It gets filtered out in plagiarism check!

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Ideas and Business System Types

1. Write a research paper of four pages, not including the title and reference pages. Follow APA 7 Guidelines for in-text citations and references. A minimum of two scholarly journal articles are required.

Textbook Reference: Cloud Computing by Dr. Kris Jamsa 

ISBN: 9781284248203 

Publisher: Jones & Bartlett Learning, 2nd Edition 

  • What is identification as a service (IDaaS)? 
  • What are some of the challenges related to identity management? 
  • What are some of the IDaaS solutions offered by various companies? 

2. Write a paper about the below topic in 250-300 words. Provide at least two APA references for your resource and corresponding in-text citations. 

Textbook Reference: Systems Analysis and Design by Kenneth E. Kendall and Julie E Kendall, 10th Ed.

ISBN: 13: 978-0-13-478555-4 

“System Types”: Describe the type of systems that exists in a Business.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

mini week project week 3

 

Primary Task Response

Within the Discussion Board area, write 400–600 words that respond to the following questions with your thoughts, ideas, and comments. This will be the foundation for future discussions by your classmates. Be substantive and clear, and use examples to reinforce your ideas.

How do you manage concurrency in a distributed and embedded computing environment? Based on the concurrency mechanism you select, how can you effectively handle communication and synchronization at the operating system level?

  • Investigate the library and Internet for information about distributed and embedded computing environments and concurrency mechanisms.
  • Select either a distributed or embedded computing environment (such as cluster computing, cloud computing, or grid computing), and discuss the challenges of supporting communications and synchronization in the selected environment.
  • Research at least 2 concurrency mechanisms, and describe how each mechanism handles communications and synchronization in the selected environment.

week 3 mini  project 

 

Describe the proposed mechanism solution for operating system concurrency and how it handles communication and synchronization in the environment that most closely aligns with your selected project.

Assignment:

Describe the concurrency mechanism from the ones you researched in the Discussion Board assignment that are best suited for the enterprise and for the distributed environment that your enterprise will function in.

The project deliverables are:

  1. Update the Operating Systems Design Document title page with the new date and project name.
  2. Update the previously completed sections based on instructor feedback.
  3. New Content ( 2–3 pages):
    1. Operating system concurrency mechanism
      • A description of the enterprise’s environment (distributed or embedded)
      • Thorough description of the selected concurrency mechanism
      • How it effectively supports communication and synchronization
  4. Name the document “Yourname_CS630_IP3.doc.”
  5. Submit the document for grading.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

FTK help

  

1. What user has the SID which ends with 1003?

2. On page 8 of the document “Daniel Ocean Bio.doc” is a reference to an MD5.  What is the name of the file which matches that MD5?

3. What software was used to edit the picture, f_000631?

4. Using the Prefetch file for the executable, Windirstat.exe; What was the last date and time it was run?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

On the discussion forum, describe your expectations for finding law from anywhere in the world by use of the internet. Why is it important to have a uniform method of citation of that law?

 On the discussion forum, describe your expectations for finding law from anywhere in the world by use of the internet. Why is it important to have a uniform method of citation of that law? 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Ethical Hacking

1. Explain in your own words what “FOOTPRINTING” (or digital reconnaissance) is and how you would go about gathering the information you need to determine the location of a recently stolen late model car that was last seen in the parking lot of our college.

2. After the topic on FOOTPRINTING, you now have an idea as to how to conduct a digital investigative project. For this assignment, you are asked to develop your own crime scenario. Explain the incident that occurred, and then list the steps you would follow to solve this case (examples might include: a lost child, an unauthorized charge on your credit card, an unidentified charge made with your EZ PASS, etc.)

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now