Question 8

  

After completing the reading this week, we reflect on a few key concepts this week:

1. Discuss what power in the context of leadership is and how it relates to bullying within organizations.  Also note how this impacts productivity.

2. Discuss what organizational culture is and how it impacts work productivity.  Also, note how organizational culture impacts the success of innovation implementation.

3. How does culture impact leadership? Can culture be seen as a constraint on leadership?

Please be sure to answer all the questions above in the initial post. Please ensure the initial post and two response posts are substantive.

· Ask an interesting, thoughtful question pertaining to the topic

· Expand on the topic, by adding additional thoughtful information

At least one scholarly (peer-reviewed) resource should be used in the initial discussion thread.  Use APA references and in-text citations.

Computer And Network Security

 The total word count must be 250 to 300 words in your posting. (20 points)Please also respond to at least two of your classmates with a meaningful reply of 150 words or greater each. (5 points each)Do not cut and paste, please post original work. Please provide references for your original postings in APA format.

  1. What types of networks do you have in-home or workplace? Why do you think that type of topology was chosen?
  2. Do you have a router? Is the router just a router or does it have other functionality? Does it have remote administration capabilities? How have you secured this device?

Questions

 

  • 10.1 What are three broad mechanisms that malware can use to propagate?
  • 10.2 What are four broad categories of payloads that malware may carry?
  • 10.3 What are typical phases of operation of a virus or worm?
  • 10.4 What mechanisms can a virus use to conceal itself?
  • 10.5 What is the difference between machine-executable and macro viruses?
  • 10.6 What means can a worm use to access remote systems to propagate?
  • 10.7 What is a “drive-by-download” and how does it differ from a worm?
  • 10.8 What is a “logic bomb”?
  • 10.9 Differentiate among the following: a backdoor, a bot, a keylogger, spyware, and a rootkit? Can they all be present in the same malware?
  • 10.10 List some of the different levels in a system that a rootkit may use.
  • 10.11 Describe some malware countermeasure elements.
  • 10.12 List three places malware mitigation mechanisms may be located.
  • 10.13 Briefly describe the four generations of antivirus software.
  • 10.14 How does behavior-blocking software work?
  • 10.15 What is a distributed denial-of-service system?

Complete your answers on a WORD Document, 

Application Problem

 

  •  INSTRUCTIONS: Read the paragraph below, then answer the questions following the paragraph.     Janice is a production manager for a company that designs and produces  hydraulic valves that are used in aircraft systems. The company is  concerned that the number of valves not meeting the strict measurement  parameters has increased over the past several months. She implements a  quality control program that includes random inspections. Employees are  notified that these inspections will help the company to reduce  expenses from poor product quality. Janice runs the program for 9 months  and performs a different number of inspection each month. 
  • (check the attachment for this table same info) The table  below shows the number of inspections and the number of faulty hydraulic  valves produced each month.       Inspections Number of faulty valves   6 5   4 11   9 6   4 7   7 9   8 5   3 1   3 7   6 6         
  • Run the analysis and answer the following questions:       1. Does the number of inspections result in fewer faulty valves? (Run the analysis and report the results)      2. What decision should Janice make regarding the quality control inspections?    

You are a network consultant for

 You are a network consultant for a large consulting firm. You are going to design a large network for an enterprise client that sells gourmet candies. The network is going to be for their entire US-based operation. There are seven physical sites to this network, located in New York, Boston, Atlanta, Chicago, Dallas, Los Angeles, and Seattle. The information for each physical site is given below:
 

Site Total Number of Clients Additional Information
New York 1100 WiFi at site, heavy printing needs
Boston 600 WiFi at site
Atlanta 400 public website hosted at this site with e-commerce
Chicago 800 WiFi at site, developers are located at this site
Dallas 500 credit card processing done here
Los Angeles 1000 WiFi at site
Seattle 600 shipping and distribution site is here
 

Deliverables:
 

Your final design must contain:
 

1. A drawing of the overall network with general information so I can see the physical layout of your network. All physical sites should be on this diagram so I can see the “big picture.” You should display the internet connections and their speed, as well as how you choose to connect each site together.
 

1. After completing the physical layout of the network, you will choose a specific site and do a detailed design of that site, similar to the earlier project. You should be absolutely as detailed as possible, including not only a sound physical design, but also a detailed backup and recovery plan. Make sure you are thorough and complete!
 

1. The final part of the project requires you to write a complete analysis of your design, explaining why you chose this particular layout, justifying all of your choices. The writeup has no particular length requirement; however, a good and thorough explanation will likely be at least two to three pages.

 

Week 7 DF

 Spoofing email is a common occurrence these days.  Have you received a spoofed email?  Briefly, describe the email and how did you notice it was not legit?  Anything else that was odd concerning the spoofed email? 

Pseudocode

   

Pseudocode is  very important for programmers. It helps to sort out your thoughts  before coding and is for humans (programmers), not machines. Eventually,  the pseudocode will need to be converted into an actual program for the  machine to read.

Write detailed pseudocode for a program that is designed to organize a  family’s property tax payments for the past 20 years. The program  should accomplish the following tasks:

  1. Prompt the user for the property tax amount and also the year.
  2. Use appropriate data structure to store the property tax amount and the year.
  3. Use a linear search algorithm to determine which year the family paid the highest property tax, and display the result.
  4. Calculate the average amount of property tax paid over the years, and display the result.

SLP Assignment Expectations

The program should:

  • Allow user input
  • Select appropriate data structure
  • Apply linear search algorithm

Write the program in pseudocode in a Word document, and once done,  submit it to the SLP 1 Dropbox. Please note that this is not an actual program but a program in pseudocode which can be converted into a working program.

Question 21

 

Last week, you developed a business case for your SCRUM project. This week, define the scope and the requirements of your project. Then, enter them as product backlog features and user stories (or work items) in the Visual Studio Online (VSO) project that you created in Week 1. 

Your product backlog must include at least 3 backlog features and 10 user stories (or work items) in a nested, hierarchical order. The backlog work items must also be arranged based on the value they provide to the customer.
Summary of the backlog features and their associated user stories, and how they contribute toward the successful completion of the project
Explanation of your approach to this assignment and the decisions you made
Reflection on this learning experience and lessons learned