Please read question in comment section.

  

Describe in 300 words iscuss the benefits of DNS failover as an adjunct to cloud failover. 

300 Words: Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list. Cite your sources. Do not copy. Write in essay format not in bulleted, numbered or other list format. 

3 quotes are required and they must be enclosed in quotation marks and cited in-line by referring to your reference list. 



No plagiarism / need references and should be clickable/ need it by 5 hours from now.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

CyberSecurity Management

1.  Many believe that cloud computing can reduce the total cost of computing and enhance “green computing” (environmental friendly). Why do you believe this to be correct? If you disagree, please explain why? (300 words)

2.  According to recent surveys, China, India, and the Philippines are the three most popular countries for IT outsourcing. Write a short paper (2-4 paragraphs) explaining what the appeal would be for US companies to outsource IT functions to these countries. You may discuss cost, labor pool, language, or possibly government support as your reasons. There are many other reasons you may choose to highlight in your paper. Be sure to use your own words. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Mapping business challenges to types of control

 

Discussion: Mapping Business Challenges to Types of Control

Learning Objectives and Outcomes

  • Identify the business impact of several access controls.
  • Identify mitigation techniques for weaknesses of each of the access controls.

Assignment Requirements

Read the worksheet named “Mapping Business Challenges to Types of Control” and address the following:

Using what you have learned about access controls, identify the business impact of the challenge, and identify an access control method that will mitigate the impact to the business.

Respond to your peers with your point of view on their answers. Respond to at least two of your classmates’ original thread posts with between 100 – 150 words for each reply.  Make sure your opinion is substantiated with valid reasons and references to the concepts covered in the course. In addition, initiate a discussion with the students who comment on your answer.

Required Resources

  • Worksheet: Mapping Business Challenges to Types of Control (ws_businesschallenges)

Self-Assessment Checklist

Use the following checklist to support your work on the assignment:

  • I have engaged in a discussion of the assigned topics with at least two of my peers.
  • I have raised questions and solicited peer and instructor input on the topics discussed.
  • I have articulated my position clearly and logically.
  • I have supported my argument with data and factual information.
  • I have provided relevant citations and references to support my position on the issue discussed.
  • I have compared and contrasted my position with the perspectives offered by my peers and highlighted the critical similarities and differences.
  • I have solicited peer and instructor feedback on my arguments and propositions.
  • I have offered a substantive and critical evaluation of my peer’s perspective on the issues that is opposite of mine, and supported my critical review with data and information.
  • I have followed the submission requirements.

3303

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

ERM Assignment

 

Chapter 5 presented the approach the University of California Health System (UCHS) used to implement ERM, and chapter 6 presented a discussion and case study on implementing ERM in the LEGO Group.

Please explain how ERM adoption and implementation in the UCHS environment differs from the LEGO Group environment. Cite specific examples from this week’s readings. Discussion assignment deliverables:

A) Create a new thread and explain how ERM adoption and implementation in the UCHS  environment differs from the LEGO Group environment. Please discuss at least three points or aspects in which the implementing ERM in the two environments differ. Please submit the initial post by Saturday 1 PM. That will give other students enough time to review and respond. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

complete the list programming assignment . complete the dictionary programming assignment.

 

Python Lists and Dictionaries

Python has several  data types that can be used to work with collections of data, including lists, sets, dictionalries and tuples.  This week we wil work with lists and dictionaries.

Your work includes a Zybooks reading assignment and two programming assignments, one for lists and one for dictionaries.  TheZybooks reading assignment includes some sections from Chapter 3 about data types and from chapter 8 about lists and dictionaries.

Your tasks are to:

1. complete the list programming assignment:

 

Write and submit a program that does the following:

  1. create an empty Python list
  2. Create a count-controlled while loop to generate and append 1,000 random integers to the list. Each integer should be between 1 and 100, including 1 and 100.
     
  3. Using the for statement to iterate the  list,  calculate and print:
    1. the sum of the values in the list.
    2. the minimum of the values in the list.
    3. the maximum of the values in the list.
    4. the average of the values in the list.

You should be able to do step 3 with a single loop, followed by a statement to find the average and then print statements to show the results.  The statement to find the average should use the list length function, not the number 1,000, which means it should work no matter how many numbers are in the list.

2. complete the dictionary programming assignment:

 

Your task is to use a Python dictionary to provide information about the poinbts scored by a basketball team in one game.

Write a program that does the following:

  1. Using the assignment statement below, create a dictionary with points scored by each of the Philadelphia 76ers against the Brooklyn Nets on April 20, 2019.

points  = dict(Harris=24, Butler=11, Embiid=31, Simmons=15, Reddick =9, Scott=8, Ennis=7, Marjanovic=4, Bolden=1, McConnell=2)

  1. Iterate the dictionary once, resulting in a printout that shows us:
    1. a list of the players and the points they each scored, with one player on each line.
    2. the total number of points they scored.
    3. the name of the highest scorer on the team.

You should submit your properly documents source code.   You should start with documentation as a tool  to help you design your software.

 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Software Construction: Assignment 3

 

Due Date: 10/21, 11:59 pm

Total Points: 100

Implement a use defined class called BankAccount whose objects represents real world bank account entities. Each bankaccount object at a minimum should have a balance field. Supply methods that allow deposit, withdraw and checking balance operations and other necessary operations as you see fit. Also, implement a clone( ) method that creates a copy of bankaccount object. Overwrite the equals( ) method of the Object class that helps to check the contents of two bankaccount objects.

Ensure that you apply Design by Contract principles (preconditions/post conditions … ) and Defensive Programming techniques (assertions, exception handling …) while implementing this user defined class. Make sure to include the preconditions and postconditions, exceptions etc. as part of comments in the code.

Next create a test class that demonstrates the defensive mechanisms that you have put  in place in the use defined class.

Provide a write up in detail describing the Design by Contract principles and Defensive  Programming techniques you have used in your implementation.

Things to Turn in:

Copy and paste your code in courier new font of both the user defined class as well as test program.

Screen shots of the run of the test program with explanations if any on the output.

Write up on application of design by contract and defensive programming principles/techniques.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Throughput Evaluation of Link Layer Flow Control

A brief report containing the throughput table (above) and plot(s) as well as a

maximum ONE-page (not counting space for figures) narrative discussion of the

results, and description of any additional assumptions you made in your simulation.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Ethics, Law and Cybersecurity

 Pay attention to what you are being asked to do (see Grading Rubric below). For example, to describe does not mean to list, but to tell about or illustrate in more than two or three sentences, providing appropriate arguments for your responses using theories discussed in our textBe sure to address all parts of the topic question as most have multiple parts. A verifiable current event (less than 4 years old) relevant to at least one of the topics you respond to is a fundamental component of your quiz as well.  You cannot use information from the text book or any book/article by the author of the text book as a current event.  Make sure that your reference has a date of publication.  For each chapter quiz and final quiz you are required to find and include at least one reference and reference citation to a current event less than 4 years old (a reference with no date (n.d.) is not acceptable) in answer to at least one question.  This requires a reference citation in the text of your answer and a reference at the end of the question to which the reference applies.  You must include some information obtained from the reference in your answer.  The references must be found on the internet and you must include a URL in your reference so that the reference can be verified.  

  1. (a) Has protection for proprietary software gone too far, as some critics suggest? (b) If not, why? (c) If so, what are the implications for innovation and competition in the computer industry? (d) How can we achieve an appropriate balance between those who hold legal rights to proprietary information and ordinary users who wish to access, share, and communicate that information? Defend your answer. Please elaborate (beyond a yes or no answer) and provide your “theoretical” rationale in support of your responses. (knowledge).
  2.  (a) What is meant by “information commons”? (b) How is this commons disappearing in the cyberage? (c) Mr. Boyle’s has suggested that a political movement, similar to the environmental movement in the 1970s, is needed to save the commons.  Does his suggestion merit further consideration? Explain. Please elaborate (beyond a yes or no answer) and provide your “theoretical” rationale in support of your responses. (comprehension) 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Disaster Ricovery

– Provide answers to each of the stated questions Below.

–  Assignment length: 2 pages maximum. No cover page needed.

– Attached the Course Text Book in the attachment for your reference

 1. Using a Web browser, look for the open source and freeware intrusion detection tools listed . Next, identify two to three commercial equivalents. What would the estimated cost savings be for an organization to use the open source or freeware versions? What other expenses would the organization need to incur to implement this solution? 

2. Using a Web browser, search on the term intrusion prevention systems. What are the characteristics of an IPS? Compare the costs of a typical IPS to an IDPS. Do they differ? What characteristics justify the difference in cost, if any? 3. Using a Web browser, visit the site www.honeynet.org. What is this Web site, and what does it offer the information security professional? Visit the “Know your Enemy” whitepaper series and select a paper based on the recommendation of your professor. Read it and prepare a short overview for your class.

 4. Using Table 5-4 and a Web browser, search on a few of the port numbers known to be used by hacker programs, such as Sub-7, Midnight Commander, and WinCrash. What significant information did you find in your search? Why should the information security manager be concerned about these hacker programs? What can he or she do to protect against them? 

5. Using the list of possible, probable, and definite indicators of an incident, draft a recommendation to assist a typical end user in identifying these indicators. Alternatively, using a graphics package such as PowerPoint, create a poster to make the user aware of the key indicators. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

cs340

Operating Systems – Week 6 Assignment

I/O Performance Analysis

Part 1

Start your Linux Partition from a fresh boot and open the Terminal. Do not open any other applications at this time.

NOTE: You may need to install the “sysstat” and “iotop” package for this exercise:

Type command:

apt-get install sysstat

apt-get install iotop

run the following command to create a 50MB test file

dd if=/dev/zero of=test.file bs=1024 count=50000

Now run this command to repeatedly create another file from the first file. This is creating I/O load on the system.

while true; do dd if=/test.file of=test2.file bs=1024;rm test2.file; done

Using iostat watch the I/O for your devices and all of its partitions over 30 second intervals. List the command used and record your findings. Do not display CPU statistics.

Using iotop, report which three processes are the most I/O intensive.

Part 2

Add 3 new 50 MB Fixed Size Virtual Disks to your linux Partition. This is done using the Virtual Box interface while your Linux Virtual Machine is shut down.

Switch to the root user

sudo su –

Using fdisk create 3 new “linux raid auto” partitions. One for each new drive added. Use the full space available on each disk.

i.e. /dev/sdb1 /dev/sdc1 /dev/sdd1

install “mdadm” package

apt-get install mdadm

*If asked for a “mail server” choose “No Configuration”

**This can take a few minutes to install.

Create a striped array (RAID 0) using all three disks.

Create Filesystem on New Raid 0 Array

Mount your new striped filesystem

What is the size of the filesystem? Why?

Repeat Part 1 of this assignment but this time make sure you are using your new striped filesystem. To do that just change to that directory

cd /stripefs

Summarize your findings about your new RAID 0 filesystem and iostat output.

Did you achieve desired results? If not, why not and what would need to be changed in a real world production server to achieve desired results?

Submission Requirements

You will submit a Word or Libre Writer Document which contains results from the above analysis and responses. I do not have access to your system so you need to be sure to provide screenshots for anything I cannot possibly know.

I don’t need screenshots for every piece of output you analyze during this assignment. Just give screenshots which show snapshot information to support your overall findings.

Please insert your screenshots into your word document with supporting documentation which meets all requirements. You will be penalized for any results which are not backed by proof.

Disclaimer

A large portion of this class is exploring and researching solutions on your own! You will continue to operate as a systems administrator / analyst and thus you will be expected to figure out what you need to know on your own.

You will not find exact solutions in your book which give you what you need to know to complete this assignment or future assignments. What you will find in your book is an in depth analysis of how an operating system manages devices at a low level. This is imperative in understanding what the resulting data values mean from your assignment.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now