Computer Science
The Design Level
Each network (e.g : Switches, Routers, Firewalls) used must have an explanation for the drawings.Also, at the end , explain:1) the feasibility of the proposed Network Design (e.g : whether this network diagram is technically viable or not?)2) Suitability of the proposed Network Design for the given scenario (e.g : Is the proposed Network Designsuitable for the given scenario?)The most important is the drawing/diagram of the network and the explanation for each network used.
Revenue Per Share
W1 JournalFor each problem on the application assignment, write a paragraph discussing your problem-solving process. Talk about your thought process, not the actual steps you took. Talk about your errors, where you struggled, what resources you used, how you knew you were on the right track, etc.Make sure you answer each question.Problem 1: Revenue Per Share· How did you know what values were x and what values were y for your ordered pairs? Explain.· What resources did you use to solve this problem? Be very specific.· Did you make any errors that you had to correct? If so, how did you know you made errors, and what did you do to correct them?· Other things to reflect on: where you struggled, how you knew you were on the right track.Problem 2: Resistance· What was your thought process for your estimate in part b? Explain in detail how you came up with your estimate.· What resources did you use to solve this problem? Be very specific.· Did you make any errors that you had to correct? If so, how did you know you made errors, and what did you do to correct them?· Other things to reflect on: where you struggled, how you knew you were on the right track.Problem 3: Depreciation· What resources did you use to solve this problem? Be very specific.· Did you make any errors that you had to correct? If so, how did you know you made errors, and what did you do to correct them?· Other things to reflect on: where you struggled, how you knew you were on the right track.Problem 4: Game Manufacturing· What was your thought process behind coming up with your equations for part a and part b? Explain in detail.· What resources did you use to solve this problem? Be very specific.· Did you make any errors that you had to correct? If so, how did you know you made errors, and what did you do to correct them?· Other things to reflect on: where you struggled, how you knew you were on the right track.Problem 5: Analyzing a Function· What resources did you use to solve this problem? Be very specific.· Did you make any errors that you had to correct? If so, how did you know you made errors, and what did you do to correct them?· Other things to reflect on: where you struggled, how you knew you were on the right track.
The Toll Booth
The number of vehicles which are passing through the toll booth requires the use of anautomated system to keep track of the revenues which are being observed daily. Yourassignment is to simulate the traffic through a single booth and to record the revenues collected.There are 3 categories of vehicles which travel through the booth represented by the vehiclecode: 1, 2 and 3 respectively. The fee charged – varies daily based on the exchange rate, as such arate sheet is to be used to identify the fees for vehicles within each category.You and your classmates are required to flesh out a solution by using flowcharts andpseudocode.Required:A. A classmate has rightly suggested the use of a loop to process the vehicles. Describe theTHREE (3) types of loop structures at your disposal and provide a rationale for the ONE(1) you will use to solve the problem. (4 marks)B. What other control structure is going to be essential in generating a solution and why?(2 marks)C. How would you appropriately represent the rate sheet as described, given your knowledgeof storage elements? Provide a diagram to explain your answer. (4 marks)D. Construct a flowchart that will solve the problem described. (5 marks)E. Convert your flowchart into an appropriate pseudocode. (5 marks)
Automotive Electric Vehicle
The team paper must be at least 10 pages in length. This does not include the APA formatted cover page or the references. There must be at least 10 APA references to support the findings in the submission. Correct use of APA guidelines for sources and citations is required. If supporting evidence from outside resources is used those must be properly cited. The paper must address the following answers (Format the paper with headings to note the following information):1. How will you obtain funds for the project? (are you asking for funds or obtaining from another source)2. How many funds are required to start?3. What is the timeframe to launch?4. Resource requirementso Hardwareo Softwareo Other support IT to get the systems up and running (networking, database, etc )o Peopleo Equipmento Office Spaceo Etc 5. Key concepts to address to ensure the organization is running efficientlyo Organizational Learning Concepts and Theorieso Integration of IT Resourceso Virtual Teams? Local Teams? Why?o Ethical and Legal Implicationso Cyber Security and Privacy of Information§ What do you have to account for? (managing data or credit card information?)o Best Practices that you are going to implement in your organization and whySummary and Next StepsThe company should be EON and its electiric vehicle and concept is interchangeable batteriesYour team is starting a NEW company and want to ensure organizational success through operational efficiency and strategic vision. The plan for this project is to understand where there is a need in the market to create a new product/service, understand the components that need to be addressed or factored when managing operational efficiencies (to include resource management), and present the work as though asking for approval to proceed with the project.
Functional Network
Each network (e.g : Switches, Routers, Firewalls) used must have an explanation for the drawings.Also, at the end , explain:1) the feasibility of the proposed Network Design (e.g : whether this network diagram is technically viable or not?)2) Suitability of the proposed Network Design for the given scenario (e.g : Is the proposed Network Designsuitable for the given scenario?)The most important is the drawing/diagram of the network and the explanation for each network used.
Computer Networks and Security
CMIT 495: Current Trends and Projects in Computer Networks and Security[PROFESSOR NAME]By:[NAME]This white paper should include the following sections:· introduction to software-defined networking (SDN) (discussed in Week 3)· introduction to intent-based networking (IBN) (discussed in Week 4)· discussion on how virtualizing the desktop and now back-end infrastructure are complementary and related· discussion of how SDN and IBN are related
Linux System Scan
Previous NextAs part of your Vulnerability Management project last week, you analyzed a report on a Windows system within the company network vulnerable to the MS17-010 exploit. That report was created using OpenVAS, a free vulnerability scanner designed to run on Linux operating systems (https://www.openvas.org/). Now that youve examined a vulnerability assessment report for a Windows machine, its time to see what the same tool produces from a Linux system. OpenVAS was used to scan a Linux machine on the network running the companys database applications. This machine is using an older version of Linux because the companys database applications are not supported with the latest Linux shared libraries. This system contains critical data and cannot be taken offline.Your analysis of these two reports should provide you with a good understanding of the OpenVAS tool and the reports you will encounter in the workplace. The report used for this discussion limits the scope to a single host to allow you to focus on the vulnerabilities you would encounter on a Linux machine in the workplace. You will also be able to compare/contrast the vulnerabilities across the two OS platforms.Looking ahead to Project 2s VM Scanner Background Report (due at the end of Week 5), you will analyze the results from a commercial VM scanner. Youll be better prepared to assess the output from the two different vulnerability scanning tools and to form the basis of your recommendation to management.Review Report of Linux Server (OLD) and answer the following questions in your response:1. For this Linux system, what do you recommend fixing right away? Are there dangers if the vulnerabilities and associated threats are not fixed? 2. How do you fix the problem(s) identified? Can you defer mitigation for another time? How can the problem(s) be fixed if the system cannot be taken offline?Judy is considering asking the pen tester to rescan the company systems using the commercial tool, Nessus. The organization has an evaluation version that can be used for 30 days. After that, the company will need to purchase the tool. The cost is significant.3. Since some machines were already scanned with OpenVAS, should you also consider scanning the same systems with Nessus? Why or why not? 4. Conduct open source research using the internet. Roughly, what is the cost to license Nessus for one year?
Developer Documentation
Case 1: Reviewing Oracle SQL Developer DocumentationIn this course, you will use SQL Developer as the primary tool to write PL/SQL code. Hence, it is important for you to get familiar with the tool.Visit OTN (Oracle Technology Network) web site or search on the net for Oracle SQL Developer Users Guide. Review the document and describe at least two features that you think will be helpful in creating PL/SQL code.Case 3: Working with More Movie RentalsThe More Movie Rentals Company wants to display a rating value for a movie based on the number of times the movie has been rented. The rating assignments are outlined in Table 1.Create a PL/SQL block to address the processing needed. The block should determine and then display the correct rental rating. Test the block, using a variety of rental amounts.
Network Penetration Testing
Do a bit of research on penetration testing techniques. Investigate and document the following1. Five network penetration testing techniques2. Advantages and disadvantages of each3. One notable social engineering test4. Possible negative implications of penetration testingWrite you answer using a WORD DOCUMENT in about 300-350 words. Use your own words. Note your safe assign score. Score must be less than 15 to get full grade.
Agile Events
There are several agile events. If you have to eliminate one to save time for the team, which one would you recommend to be a candidate for removal and why? How did you decide?250-300 words
Use Promo Code: FIRST15