Computer Science
Cisco Systems
Please search the internet for an answer to the following question.Why did Cisco Systems transition from standalone access control systems to IP networked systems?What challenges did Cisco face in order to solve the physical security problems?
Database Information
ENG 123 Annotating Your Sources Guidelines and Rubric Overview: Now that we’ve discussed the importance of using credible secondary sources for your project, let’s start annotating! Don’t worrywe’re going to walk through the process one step at a time. This week, you’ll be guided through the writing-plan process with specific questions. In this section, we’ll first focus on finding sources. Then we’ll help you summarize those sources, evaluate their credibility, and explain how they will help support your argument. If you found a source that passed the C.R.A.A.P. test earlier in this module, feel free to use that as one of your sources. If you decided to alter your keywords and you’d like to start your research from scratch, that’s totally fine too! Prompt: In this activity, you’ll create an annotated bibliography by following the steps below and answering the questions as thoroughly as possible. The questions will prompt you to engage in a conversation with your sources. You will need to follow the steps below three times (for your three different sources). Before you begin, make sure you have:? Selected sources from the Opposing Viewpoints database or the Academic Search Ultimate database? At least one of your three sources should present a counterargument, a position that an opponent of your argument might make.? Applied the C.R.A.A.P test to the sources to determine if they are credible and reliable (You can download a copy of The C.R.A.A.P. Test Worksheet. Remember that credible sources should score 35 points or more on the test.)Specifically, the following critical elements must be addressed:1. Identify your sources, including author, title, and the database information or website.2. Summarize your source. (Use the template below.)? It seems this source is arguing ____________________. This source is using the following evidence to support the argument:____________________.? A counterargument for one of the provided sources could be: _________________________________________________________.3. Credibility and Relevance? Explain the rationale for the credibility of the source by providing supporting evidence. (Use the template below.)o Personally, I believe the source is doing a (good job / bad job) of supporting its arguments because ____________________.? Explain the relevance of the source to your argument. (Use the template below.)o I think this source will be very helpful in supporting my argument because ________________________.RubricGuidelines for Submission: Your annotations must include at least three sources. Save your work in a Microsoft Word document with double spacing, 12-point Times New Roman font, and one-inch margins. Then, check your writing for errors. Once you have proofread your document, submit it via the Assignment: Annotating Your Sources link in Brightspace.Critical Elements Proficient (100%) Needs Improvement (85%) Not Evident (0%) ValueSources Clearly identifies sources selected from appropriate databasesClearly identifies sources but does not use indicated databasesDoes not identify sources 20Summarize Clearly identifies arguments and includes at least one counterargumentClearly identifies arguments but does not include at least one counterargumentDoes not identify arguments 35Credibility and RelevanceExplains the credibility of the sources and their relevance to the argumentExplains the credibility of the sources and their relevance to the argument, but does not provide supporting evidence
Introduction to Linux
– Simple and Short answers are best.1. You work for a large manufacturing company that is considering Linux as a solution for some or all servers in its IT Department. The company hosts an Oracle database on UNIX, and the UNIX servers that host this database contain several small programs that were custom-made. Furthermore, Windows 8 is currently used on desktops throughout the company, and users store their data on Windows Server 2012 file servers. What considerations must you keep in mind before migrating your companys servers to Linux? Which distribution(s) and Open Source Software would you choose to accomplish this? If you need to create a report detailing the benefits of moving to an open source solution using Linux, what benefits would you list in the report to persuade others in the company that Linux lowers the total cost of ownership?
Data Structure
Implement simple binary tree data structure with following operations, (assume data elements)InsertLeft InsertRight RemoveLeft RemoveRight Traverse (pre-order, in-order and post-order)
Information Gathering Techniques
Create a report for your Manager on Information-Gathering Techniques. Gathering information for a new system is important and sets the tone of the development cycle. If not done thoroughly, the project could be a failure before it begins. You are the Project Manager of XYZ Enterprises. Your manager gives you the task of researching the different techniques used to gather information as the company is going to replace their Case Management System. He would like a report of all the different type of information gathering listed below. For each technique, give reasons to use it and the best ways to accomplish using each information-gathering method. Interviewing users and stakeholders. Distributing and collecting questionnaires. Observing and documenting business procedures. Collecting active user comments and suggestions. Researching vendor solutions. This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. The specific course learning outcome associated with this assignment is: Research the techniques used to collect and gather information for the design of a new system.
Modern Day Attacks Against Firewalls and VPN’s
Research paper Topic for research paper is Modern Day Attacks Against Firewalls and VPN’s. Requirements: Prepare a report on your approved topic from Week 2 with a minimum of 8 pages 2000 words, no less, but more is acceptable. References (10 minimum). You may use resources from the Online Library, any library, government library, or any peer-reviewed reference (Wikipedia and any other publicly-reviewed source are not accepted). The paper must have a title page, reference list and be in APA format. The information within your title page and reference list will not count towards the minimum word count. The paper will be subjected to checking against plagiarism. The paper must follow acceptable originality criteria (no more than 15% max total, and 2% per individual source match are allowed). Correct spelling and grammar. APA formatting: Title page, in paragraph citations, and the Reference list. At a minimum include the following: · Detailed description of the area researched · Technology involved · Future trends · Global implications
Systems Autonomy and Automation
Development ProjectIn this course, you will be required to prepare and submit a project paper demonstrating an understanding of the course topics by creating an autonomous unmanned system design/configuration and theory of operation (for 50% of your final grade). For this project you will need to perform the following: Discuss the perceived need of a new autonomous control subsystem as it relates to a current unmanned system application, management practice, or operational policy and the need for safety, efficiency, and effectiveness (why is it needed?). Identify innovative new technologies, methods, processes, or concepts relating to your perceived need. Provide a requirements specification associated with your perceived need (what it must be capable of, design imposed limits, etc.). Present possible autonomous control and processing options for unmanned systems based on the operational environment and availability of new technology, methods, processes, or concepts. Discuss the appropriateness of considered elements/components to support the intended use, including the benefits, limitations, and constraints. Formulate a specific solution or research strategy to address the perceived need, including a theory of operation, any appropriate recommendations or conclusions, and supporting references. Utilize an appropriate research method and statistical analysis (if applicable) to obtain data and reference materials to support your work. Recommend future research strategies to better understand the issue and add to the collective body of knowledge associated with unmanned systems.Work is assessed in four parts: The Proposal (due in Module 2, Jan 24 for 5% of final grade), Outline (due in Module 5, Feb 14 for 5% of final grade), Project Paper (due in Module 8, Mar 7 for 20% of final grade), and Project Presentation (due in Module 9, 14 Mar for 15% of final grade). The narrated presentation should include diagrams or multimedia materials depicting an overview of the research, designs, operations, proposed changes, and supporting information. Select one type of environment for the project: land, sea, air, or space. Discuss the perceived need of a new autonomous control subsystem as it relates to a current unmanned system application, management practice, or operational policy and the need for safety, efficiency, and effectiveness (why is it needed?). Identify innovative new technologies, methods, processes, or concepts relating to your perceived need. Provide requirement specifications associated with your perceived need (what it must be capable of, design-imposed limits, etc.). Present possible autonomous control and processing options for unmanned systems based on the operational environment and availability of new technology, methods, processes, or concepts. Discuss the appropriateness of considered elements/components to support the intended use, including the benefits, limitations, and constraints. Formulate a specific solution or research strategy to address the perceived need, including a theory of operation, any appropriate recommendations or conclusions, and supporting references. Utilize an appropriate research method and statistical analysis (if applicable) to obtain data and reference materials to support your work. Recommend future research strategies to better understand the issue and add to the collective body of knowledge associated with unmanned systems. Your paper must use APA formatting and include a title, abstract and reference pages. The paper must be eight pages minimum, 10 pages maximum (title, abstract, and reference pages, images, tables, diagrams, and graphs do not count towards paper length, only full pages of text), and must contain at least five credible references.
Computer Based Crime
The Internet facilitates a wide range of criminal behavior. The websites that facilitate or promote these crimes fall into two categories: sites that deliberately facilitate crime, and sites that conduct legitimate business but are used by some for illegal purposes. Examples of the first category are sites where prostitutes advertise their services, and sites to teach you how to grow marijuana or make bombs. In the second category are legitimate businesses that can be misused, such as a site to help customers open an offshore bank account.Search the Internet for an example of each category described above. Do not enter any site related to illegal pornography. Prepare a 4- to 5-page report in Microsoft Word that addresses these points:Part I:Describe the deliberately-illegal site. What illegal activities are promoted by this site?How open is this operation? How easy or difficult was it to locate this site?What should be done about the site?Which law enforcement agencies (in the United States or abroad) would have the responsibility of taking action against the owners of the site?Part II:Describe the legitimate site. What are its legitimate purposes?What illegal activities are facilitated by this site? What type of criminal might be tempted to make use of this website?Does it appear that the owners of the site are complicit in law-breaking? Has the website taken any steps to discourage or prevent being used for illegalpurposesConclusion:Discuss the different forms that Internet-based crime can take (fraud, provision of illicit goods, money laundering, etc.).Examine the reasons why sites like those you examine are able to continue to operate. Why hasnt lawenforcement taken action? (Keep in mind the constitutional protections regarding free speech, as well as the laws of the location where the site is hosted).In your report, be sure to apply the concepts and terminology from the course wherever possible.Support your responses with examples.Cite any sources in APA format.
Digital Multimeter
Research and describe in around 400-500 words about the correct use in order to perform measurements and for which electronic measurements the Digital Multimeter can be used. Include your references in APA style
Database Case Study
Please answer the questions on Case Study 2 pdf, based on the case study provided.In addition to the five questions, kindly answer an additional question which is discuss how Business Intelligence can be applied in your business domain. Which technique (classification or associations) and why? The business domain should be Risk Management in banking.
Use Promo Code: FIRST15