[Solved] Computer Network

Consider a shared Ethernet network with only two computers. Each computer transmits at 10 Mbps10Mbps. At time t=0t=0, each computer attempts to transmit a packet for the first time, but these packets collide. Computer #1 chooses a back-off time of 0 mini-slots, whereas computer #2 chooses a back-off time of 1 mini-slot. Here is information that you might need: The length of a mini-slot is equal to the time required to transmit 512 bits. Each packet contains 10,000 bits. A jam signal consists of 32 bits. The propagation delay from each computer to the Ethernet hub is 0.20.2 milliseconds.

Read more

[Solved] Software Product Liability

Write a 4-5 page paper (deliverable length does not include the title and reference pages) Why must companies place an increased emphasis on the use of high-quality software in business systems, industrial process control systems, and consumer products? What potential ethical issues do software manufacturers face in making trade-offs between project schedules, project costs, and software quality? What are the four most common types of software product liability claims? For more information on Software Product Liability read this: https://en.wikipedia.org/w/index.php?search=Software+Product+Liability&title=Special%3ASearch&go=Go&ns0=1

Read more

[Solved] Network Traffic Analysis

It is expected that your report will be in the region of 1500 words. You are expected to conduct an analysis of this network packet capture— (will provide) using Wireshark. You are required to present your findings in a factual manner, to convince decision-makers of a large corporation on business strategies.  For more information on Network Traffic Analysis read this: https://en.wikipedia.org/wiki/Network_traffic

Read more

[Solved] Corporate Portfolio

Assignment Content The director of Information Technology (IT) has indicated that the Board of Directors is compiling a corporate portfolio on ethics and has asked all departments to contribute information on how to write policy statements that reflect a code of ethics. The director of IT has asked for you to provide an example of a policy statement that reflects the work you do in IT administration. Research the cultural and global political considerations for the use of a sharing service as presented in the lab and the data which could be hosted and made available via the Internet. Reflect on the idea that some issues, such as keeping data unalterable, could transcend cultures, while other IT choices could depend on your cultural perspective. Consider the following: How cultural perspective could impact the security decisions of an administrator setting up SharePoint® Server 2013 citing choices that were made in the labs Global political issues, such as corruption, human rights, and rights to privacy in the U.S. and Key Nations, based on your readings and discussions this week Write a 1- to the 2-page example of a policy statement using Microsoft Word. Complete the following in your document: A brief description of the types of data that are hosted and made available via the Internet using SharePoint® Server 2013. Include at least 2 types. At least 2 cultural or global political considerations for sharing services (e.g., privacy rights) Your opinion regarding any IT choices that seem to transcend culture At least 1 example of choices you have when administering SharePoint® Server 2013 that could depend on your ethical stance A brief policy statement for configuring SharePoint® Server 2013 that aligns with your ethical stance on data integrity (e.g., “The organization will seek to protect confidential and proprietary information when configuring SharePoint® Server 2013.”)  Cite any references to support your assignment. Format your assignment according to APA guidelines. For more information on Corporate Portfolio read this: https://en.wikipedia.org/wiki/IT_portfolio_management

Read more

[Solved] Information-Technology

 1) Welcome to week 15 of your course. In this discussion question, you have the opportunity to be creative and to relate what you have learned to your professional lives. Please explore and critically think about some of the learning objectives and concepts presented in this course. Please effectively communicate how you would lead an organization (or a group of people within the organization) by applying the knowledge you have learned ethically and responsibly. Your discussion should also include innovative thinking, and information-technology aspects (such as the Internet, social media, computers, and so forth) that may assist you in decisionmaking. You may frame your discussion around any functional component of business, and in any context; problem-solving, management, leadership, organizational behavior, and so forth.   2)  Prepare 3 to 5 questions for your interview about your subject’s position, responsibilities and practices. Use two different types of interview/survey questions if possible, obtained through your investigation of research question formats, such as open-ended, rank, and Likert scale questions that would work in your interview.   Arrange to interview a manager related to your marketing and/or sales department(s). If that is not possible then arrange your interview with your immediate supervisor, or a manager at the company where you intern. Do not interview the same subject from a previous course.  3) Do you already have 100 percent career/profession clarity? If so, please elaborate on how and why you chose your current profession. If you are still curious about other professions, what occupations or industries still interest you and why? Did the videos help provide more clarity on alternative career paths you may take? CHALLENGE: If you were curious about a new profession, is there someone in your network (or your network’s network) for more information? Explain.  For more information on Information-Technology read this: https://en.wikipedia.org/wiki/Information_technology

Read more

[Solved] Disaster Plan

Disaster Plan: Write a memo to Brendan McAlister, the owner of Home-Start Realty explaining the need for the plan and the differences between hot, warm, and cold sites and why they may be necessary.  Make sure you explain it in a way the owner will understand.  Use a Microsoft template for the memo so it looks professional.  A simple paragraph with no heading information to send to the appropriate person is not acceptable! Background  You are the sales manager of a real estate office with a dual role as the database administrator.  Home Start Realty sells real estate in California, mainly in the Orange County area.  The office also provides property management services and is currently managing several apartment buildings in the area.  Brendan McAlister is the owner of Home Start Realty and employs 17 real estate agents.  He would like you to not only manage the office, but take care of any concerns with the company databases, especially when it pertains to security.  He is concerned that the company controls a lot of data, for renters, employees, and buyers and is depending on you to make it secure. For more information on Disaster Plan read this: https://en.wikipedia.org/wiki/Disaster_Plan

Read more

[Solved] Common Vulnerabilities

Your non-technical manager is delighted with the idea of referring to common vulnerabilities by their nicknames, such as “Heartbleed” instead of CVE-2014-0160 or “Shellshock” instead of CVE-2014-6271, and insists that no one can possibly remember those long CVE names. Present reasons both for and against this conclusion. Which side of the issue do you agree with, explain your opinion and reasoning. This should be written as a recommendation email to your manager with a list of backup sources at the bottom. When you list these sources, include more information than only a URL. 250 words For more information on Common Vulnerabilities  read this: https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures

Read more

[Solved] AI Machine

Run the code several times and show the intended output…you also need to EXPLAIN the output…You will also need to provide output for the following:Python file containing your code…Dimensions of the data…Sample of the data…Statistical summary of the data…Class distribution…One univariate and one multivariate diagram…Decision Tree…explain the best depth and why?… Results of training and new data, 80%-20% split…Accuracy report…what is it telling us?…Confusion matrix…what is it telling us?…Classification report…what is it telling us?…Results of training and new data, 50%-50% split…Accuracy report…what is it telling us?…Confusion matrix…what is it telling us?…Classification report…what is it telling us?…Part 2 – Updated Code…Now that you have a working base of code, let’s apply it to a “real world” scenario…Find an article or video that shows a potentially SIMILAR usage of the application you created in Part 1…Update the original application so that it “works” for the NEW application…In this “Movie Recommendation” project, you might find an article on “book recommendations” …you would then update the original program to handle the new scenario…YOU MUST UPDATE THE ORIGINAL CODE…do not provide entirely new code base.Run the code several times and show the intended output…you also need to EXPLAIN the output…You will also need to provide the same output for THIS application, as you did for the ORIGINAL application…specifically:Python file containing your code…Dimensions of the data…Sample of the data…Statistical summary of the data…Class distribution…One univariate and one multivariate diagram…Decision Tree…explain the best depth and why?…Results of training and new data, 80%-20% split… Accuracy report…what is it telling us?… Confusion matrix…what is it telling us?… Classification report…what is it telling us?… Results of training and new data, 50%-50% split… Accuracy report…what is it telling us?… Confusion matrix…what is it telling us?… Classification report…what is it telling us?… For more information on AI Machine read this: https://en.wikipedia.org/wiki/Artificial_intelligence

Read more

[Solved] IT Administration.

Assignment Content The director of Information Technology (IT) has indicated that the Board of Directors is compiling a corporate portfolio on ethics and has asked all departments to contribute information on how to write policy statements that reflect a code of ethics. The director of IT has asked for you to provide an example of a policy statement that reflects the work you do in IT administration. Research the cultural and global political considerations for the use of a sharing service as presented in the lab and the data which could be hosted and made available via the Internet. Reflect on the idea that some issues, such as keeping data unalterable, could transcend cultures, while other IT choices could depend on your cultural perspective. Consider the following: How cultural perspective could impact the security decisions of an administrator setting up SharePoint® Server 2013 citing choices that were made in the labs Global political issues, such as corruption, human rights, and rights to privacy in the U.S. and Key Nations, based on your readings and discussions this week Write a 1- to the 2-page example of a policy statement using Microsoft Word. Complete the following in your document: A brief description of the types of data that are hosted and made available via the Internet using SharePoint® Server 2013. Include at least 2 types. At least 2 cultural or global political considerations for sharing services (e.g., privacy rights) Your opinion regarding any IT choices that seem to transcend culture At least 1 example of choices you have when administering SharePoint® Server 2013 that could depend on your ethical stance A brief policy statement for configuring SharePoint® Server 2013 that aligns with your ethical stance on data integrity (e.g., “The organization will seek to protect confidential and proprietary information when configuring SharePoint® Server 2013.”) Cite any references to support your assignment. Format your assignment according to APA guidelines. For more information on IT Administration read this: 

Read more

[Solved] Malware Attacks

Assignment Content Playbooks, sometimes known as Standing Operating Procedures (SOP) or runbooks, are used for troubleshooting common issues. They are often created by a team of employees who are trained to manage security issues. Playbooks often include bulleted lists, step-by-step instructions, or diagrams, all of which make it easy to follow troubleshooting instructions.  Throughout the next 4 weeks, you will develop a playbook for a fictional company that hired you to write their playbooks and manage the team. The first portion of the playbook is a response to malware at the company.   Outline a 2- to the 3-page playbook in which a malware attack of your choice occurs.   Complete the following in your outline:  Provide details of the malware.  Identify the exploited vulnerability and its attack vector.  Analyze the vulnerability to determine 2 risks of this malware.  Outline step-by-step instructions on how to resolve the malware attack.  Remember, numbered or bulleted steps or guidelines make the document easy to for others to follow under potentially stressful situations. Paragraphs can be used to help support the steps and guidelines.  Note: You will use content from your Week 2 assignment as part of the Signature Assignment you will submit in Week 3 Cite at least 2 resources to support your assignment. Format your assignment according to APA guidelines. Submit your assignment.  Resources Center for Writing Excellence Reference and Citation Generator Grammar and Writing Guides 

Read more
Enjoy affordable prices and lifetime discounts
Use a coupon FIRST15 and enjoy expert help with any task at the most affordable price.
Order Now Order in Chat

Ensure originality, uphold integrity, and achieve excellence. Get FREE Turnitin AI Reports with every order.