Linux Implementation Proposal: Migration Proposal Presentation

 Linux Implementation Proposal: Migration Proposal Presentation 

 

Faster Computing has contacted Go2Linux and requested a brief proposal presentation for migrating its systems from Windows to Linux. The company is specifically interested in seeing the following information:

(10.1.1: Identify the problem to be solved.)

  • Based on your current understanding of Faster Computing’s business, what are some potential benefits of Linux?
  • The company is aware that many different Linux derivatives exist. Be very specific and choose only one version (e.g., Ubuntu, Mint, Zorin, Redhat, CentOS, Kali). Which would Go2Linux recommend, and why? Give specific reasons for your choice (e.g., security features, support, updates, user interface).

(10.1.2: Gather project requirements to meet stakeholder needs.)

  • What steps will be required to migrate the systems from Windows to Linux?
  • Are there graphical interfaces available for the Linux workstations that would provide similar functionality to Windows? Some users are concerned about working with a command-line interface.

(10.1.3: Define the specifications of required technologies.)

  • What tools are available on Linux for the servers to provide file sharing, Linux services, and printing? (e.g., Apache/Nginx, Samba, CUPS, SSH/SCP). Ensure you identify what the functions/services are used for (e.g., Samba is used for file sharing).

(1.1.3: Present ideas in a clear, logical order appropriate to the task.)

The deliverable for this phase of the project is a three- to five-slide PowerPoint narrated presentation.

  • An introductory slide
  • A summary slide
  • Voice narration on every slide

For each slide, you will embed your own audio recording as if you were presenting the content to the Faster Computing team. Faster Computing has not yet committed to the project, so this should be presented as a proposal. The presentation should be visually appealing; the inclusion of at least one image that supports the content and adds value to the proposal is required.

(1.3.3: Integrate appropriate credible sources to illustrate and validate ideas.)

You must cite at least two quality sources.

You used at least 2 references and your references were cited properly following an accepted style. Ask your instructor for clarification.

Use the Migration Proposal Presentation template to get started.

(2.3.1: State conclusions or solutions clearly and precisely.)

You should present your proposal as if you are selling to the company. Revisit all of these important reasons in the summary slide.

How Will My Work Be Evaluated?

As you progress in your IT career, you may find yourself making presentations to customers, client audiences, and professional peers. By creating an effective presentation, you are showing how you use your technical knowledge and convey your ideas to others in a professional setting, an important workplace skill. 

The following evaluation criteria aligned to the competencies will be used to grade your assignment:

  • 1.1.3: Present ideas in a clear, logical order appropriate to the task. 
  • 1.3.3: Integrate appropriate credible sources to illustrate and validate ideas. 
  • 2.3.1: State conclusions or solutions clearly and precisely. 
  • 10.1.1: Identify the problem to be solved. 
  • 10.1.2: Gather project requirements to meet stakeholder needs. 
  • 10.1.3: Define the specifications of required technologies. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Week 3 Research Paper: Electronic innovation and the government

Find a peer-reviewed scholarly journal article discussing electronic innovation and the government. Complete a review of the article by writing a 3-4 page overview of the article. This will be a detailed summary of the journal article, including concepts discussed and findings. Additionally, find one other source (it does not have to be a peer-reviewed journal article) that substantiates the findings in the article you are reviewing. 

You should use the UC library (https://www.ucumberlands.edu/library) and/or Google Scholar to find these types of articles (https://scholar.google.com/ )

Once you find the article, you will read it and write a review of it.  This is considered a research article review.

Your paper should meet these requirements: 

  • Be approximately three to four pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

assignment 4 IT510

  

ASSIGNMENT

Reference Mini Case 2 and Mini Case 3 found in your module resources. Students will submit a context diagram for the order system, and create a decision table, to be submitted as a Word document.

Kitchen Gadgets (MINI CASE 2)

Kitchen Gadgets sells a line of high-quality kitchen utensils and gadgets. When customers place orders on the company’s Web site or through electronic data interchange (EDI), the system checks to see if the items are in stock, issues a status message to the customer, and generates a shipping order to the warehouse, which fills the order. When the order is shipped, the customer is billed. The system also produces various reports. 

Tasks

1. Draw a context diagram for the order system. 

Big State University (MINI CASE 3)

The Big State University course catalog reads as follows: “To enroll in MIS 260, which is an advanced course, a student must complete two prerequisites: MIS 120 and MIS 222. A student who completes either one of these prerequisites and obtains the instructor’s permission, however, will be allowed to take MIS 260.” 

Tasks 

1. Create a decision table that describes the Big State University course catalog regarding eligibility for MIS 260. Show all possible rules.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Terry Childs Case Review

Terry Childs Case Review – 1 page 

Firion Simtray Report    one-page report. 

Standards, Policies, and Guidelines Definition – 2-3 page comparison report. 

Profile Matrix – Include a short paragraph about your findings to the matrix. 

Case issues and Solutions Template – attached

After completing the exercise, answer the following question: 

  • Could specific standards, policies, and guidelines or other countermeasures have prevented these fraudulent transactions? Please explain.    (answer will be posted to discussion board)

Cybersecurity Recommendations Presentation –  10-15 slides

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Linux System Scan

 

Linux System Scan

Must post first.

As part of your Vulnerability Management project last week, you analyzed a report on a Windows system within the company network vulnerable to the MS17-010 exploit. That report was created using OpenVAS, a free vulnerability scanner designed to run on Linux operating systems (https://www.openvas.org/). Now that you’ve examined a vulnerability assessment report for a Windows machine, it’s time to see what the same tool produces from a Linux system. OpenVAS was used to scan a Linux machine on the network running the company’s database applications. This machine is using an older version of Linux because the company’s database applications are not supported with the latest Linux shared libraries. This system contains critical data and cannot be taken offline.

Your analysis of these two reports should provide you with a good understanding of the OpenVAS tool and the reports you will encounter in the workplace. The report used for this discussion limits the scope to a single host to allow you to focus on the vulnerabilities you would encounter on a Linux machine in the workplace. You will also be able to compare/contrast the vulnerabilities across the two OS platforms.

Looking ahead to Project 2’s VM Scanner Background Report (due at the end of Week 5), you will analyze the results from a commercial VM scanner. You’ll be better prepared to assess the output from the two different vulnerability scanning tools and to form the basis of your recommendation to management.

Review Report of Linux Server (OLD) and answer the following questions in your response:

1. For this Linux system, what do you recommend fixing right away? Are there dangers if the vulnerabilities and associated threats are not fixed?
2. How do you fix the problem(s) identified? Can you defer mitigation for another time? How can the problem(s) be fixed if the system cannot be taken offline?

Judy is considering asking the pen tester to rescan the company systems using the commercial tool, Nessus. The organization has an evaluation version that can be used for 30 days. After that, the company will need to purchase the tool. The cost is significant.

3. Since some machines were already scanned with OpenVAS, should you also consider scanning the same systems with Nessus? Why or why not?
4. Conduct open source research using the internet. Roughly, what is the cost to license Nessus for one year?

You must start a thread before you can read and reply to other threads 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Testing Framework and Basic Security Controls

THE DETAILS OF THIS ASSIGNMENT ARE IN THE ATTACHED FILE.

Develop a testing framework with these phases as guidelines for your organization or an organization you would like to work for in the future. 

• Before development begins 

• During definition and design 

• During development 

• During deployment 

• Maintenance and operations

You will need to fill in the details for each phase by 

1) describing what each phase encompasses and 

2) 3 or more activities you will engage in for each phase. 

In addition, you will apply part of this framework in the phase “During development” by engaging in three tests/security controls.

 1. Fingerprint Web Server (OTG-INFO-002)

 2. Review webpage comments and metadata for information leakage (OTG-INFO-005). Manually review the sample HTML/PHP application provided in the zip file attached in this project.  

 3. Test HTTP Methods (OTG-CONFIG-006) – See which HTTP methods are available on the sample website. 

Deliverables: You should submit your source testing framework document along with the results testing the three security controls listed above. Your document should be well-organized, well-written using paragraph style that includes page numbers, includes all references used and contains minimal spelling and grammar errors. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Summative Assessment:Cyberspace Presentation

You have joined a new company as Trainee Cybersecurity Analyst. After your first 2 weeks of intense training, you are expected to ensure the security of the internal systems and critical internal data protection. Your reporting manager has asked you to research a cyberspace model, compare it to the OSI model, and prepare a presentation.

Create a 6- to 8-slide presentation with speaker notes and visuals.

  • Research a cyberspace model to compare to the OSI model.
  • Define each layer and provide a brief description of each.
  • Compare your chosen model with the OSI model.
  • Discuss the similarities and differences, such as how the layers overlap, and so on

Format any references according to APA guidelines.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Micrsoft Access help

How to create database?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Project Cost Management why technical people are not interested

Project Cost Management. Why do you think it’s difficult to understand some of the basic cost terms in this chapter?  Why aren’t many technical people interested in cost-related subjects? What could be done to change this?

Assignment Requirement

1. Minimum 5 references. 

2. APA format is required. 

3. All references listed at the end of paper need to be cited in the text.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Web-Based Business Application

  

34) What JavaScript object and method is used to write HTML to the web page?

a. document.println()

b. document.writeln()

c. window.write()

d. window.print()

35) How many DOM nodes are created from the paragraph?

<p>Feed the dog.</p>

a. None

b. One for the p element

c. One for the p element and one for the paragraph text

d. One for the p element, one for the paragraph text, and one for the whitespace within the paragraph text

36) Which statement changes the Pinterest link to a YouTube link?

<!DOCTYPE html>
<html lang=”en”>
<meta charset=”UTF-8″>
<title>DOM example</title>
<body>
 <p>
 <a href=”https://pinterest.com/”>Pinterest</a>
 </p>
 <script>
  let para = document.querySelector(“p”);
 let link = document.querySelector(“a”);
 </script>
</body>
</html>

a. para.href = “https://www.youtube.com/”;

b. link.href = “https://www.youtube.com/”;

c. para.innerHTML = “https://www.youtube.com/”;

d. link.innerHTML = “https://www.youtube.com/”;

37) What is the preferred way to register an event handler that allows multiple handlers for the same event?

a. myButton.addEventListener(“click”, clickHandler);

b. myButton.onclick = clickHandler;

c. <button onclick=”clickHandler()”>Click Me</button>

d. <button onclick=”clickListener”>Click Me</button>

38) An event that occurs when someone enters their name in an input field is a(n) _____ event.

a. click

b. load

c. input

d. submit

39) On a given keypress event, the event object’s _____ property is used to access the object where the keypress event occurred.

a. event

b. click

c. target

d. element

40) The _____ is required to cancel the interval:

let timerId = setInterval(repeatMe, 1000);

a. clearInterval(repeatMe)

b. clearInterval(timerId)

c. stopInterval(timerId)

d. setTimeout(timerId)

41) What code would be used to call a function called repeat every 3 seconds?

a. setTimeout(repeat, 3)

b. setInterval(repeat, 3000);

c. setInterval(repeat, 3);

d. setTimeout(repeat, 3000)

42) How many times isshowMe()called when the following code is executed?

let timerId = setTimeout(showMe, 3000);
 

function showMe() {
 let div1 = document.getElementById(“div1”);
 div1.style.display = “block”;
 alert(“called”);
 let timerId = setTimeout(showMe, 3000);
}

a. indefinitely

b. 1

c. 2

d. 3

43) In the following JSON, the datatype associated with friends is _____.

{“friends”: [{ “name”:”Bobby”}, {“name”:”Celia”},{“name”:”Judy”}]}

a. string

b. object

c. array

d. char

44) How is the age field accessed after the following is executed:

let obj = JSON.parse(‘{“name”:”Bobby”, “age”:20}’);

a. this.age

b. age

c. obj.age

d. obj.name.age

45) What doesstringify()return?

JSON.stringify({“friends”: [{ “name”:”Bobby”}, {“name”:”Celia”},{“name”:”Judy”}]});

a. single string

b. string array

c. JSON object

d. undefined

46) A(n) _____ allows older browsers to function with newer features by providing missing functionality.

a. trifill

b. backfill

c. polyfill

d. altfill

47) A polyfill is engineered to:

a. Use JavaScript to implement a feature whenever possible

b. Replace HTML to implement a feature after checking if a feature exists

c. Use JavaScript to implement a feature after checking if a feature exists

d. Use Ajax to implement a feature whenever possible

48) The _____ website shows what features are supported by major browsers and frequency of use.

a. W3C

b. Tiobe

c. CanIUse

d. W3Schools

49) Which strings match the regex?

let words = [“dapper”, “paper”, “cat”, “flack”];
let re = /pa|ac/;

a. dapper, paper

b. paper, flack

c. flack, cat

d. dapper, flack

50) Which regular expression matches only the words burp, dirt, and right?

let randomWords = [“burp”, “try”, “dirt”, “right”];

a. let re = /[a-i]/

b. let re = /[e-i]/

c. let re = /[i-u]/

d. let re = /[r]/

51) Which string inwordNumsmatches the regex?

let wordNums = [“blahblah!!”, “yea”, “N()P3”, “H!”];
let re = /\wa\S!/;

a. blahblah!!

b. yea

c. N()P3

d. H!

52) Which line of code instantiates Adele and the album 21?

function PlayList(artist, album) {
 this.artist = artist;
 this.album = album;
};

a. Adele.PlayList = (“Adele”, “21”);

b. Adele = new PlayList(“Adele”, “21”);

c. Adele new PlayList = (“Adele”, “21”);

d. Adele = PlayList (“Adele”, “21”);

53) Which line of code creates a prototype method for PlayList called showCollection?

function PlayList(artist, album) {
 this.artist = artist;
 this.album = album;
};

a. PlayList.prototype.showCollection = function() {
 console.log(“My playlist so far: ” + this.artist + ” : ” + this.album);
};

b. prototype.PlayList.showCollection = function() {
 console.log(“My playlist so far: ” + this.artist + ” : ” + this.album);
};

c. this.prototype.showCollection = function() {
 console.log(“My playlist so far: ” + this.artist + ” : ” + this.album);
};

d. PlayList.showCollection.prototype = function() {
 console.log(“My playlist so far: ” + this.artist + ” : ” + this.album);
};

54) In strict mode, _____ variables must be declared.

a. most

b. some

c. all

d. no

55) Which function is in strict mode?

a. function abc123() {
 “restrict”;
}

b. function abc123() {
 “use strict”;
}

c. function abc123() {
 “strict”;
}

d. function abc123() {
 “strict mode”;
}

56) http://www.google.com and https://www.google.com are _____.

a. different origins

b. the same

c. data sharers

d. web storage objects

57) Which line of code deletes all data fromlocalStorage?

a. localStorage.clear();

b. localStorage.delete();

c. localStorage.remove();

d. localStorage.clearAll();

58) What does this line of code do?

localStorage.removeItem(“name”);

a. Removes the “name” key and associated value from storage

b. Removes the “name” key from storage

c. Removes all values from storage

d. Deletes a local variable named “name”

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now