APA format 12pt font Time New Romans
14 pages
Abstract-Main Body- Conclusion
APA format 12pt font Time New Romans
14 pages
Abstract-Main Body- Conclusion
need in 5 days
please see attached file
Exercise : Write a program in C or C++ or Java to display the following information.
1. Time information.
In this section you will print out how long the system has been up and how busy it has been. Once you have some baseline numbers printed, you will run a short program that places a load on the system. You will then take a second set of numbers and calculate the load that your program placed on the system.
a. Duration of uptime # get these information from /proc/uptime
b. Duration of idletime
Calculating load average.
Write a function that does some work (to put some load on the system) and make a note of the uptime and idletime before and after the call of the function. The following can be used as sample code for the work function. This program simple runs a math calculation a large number of times, just trying to keep the CPU busy. You can include it as a function in your overall program. Note that because you are using a math function (pow) you will need to explicitly include the math library when you compile your program, i.e., “gcc –o test test.c –lm”. (the –lm option for program compiling in C or C++.)
void work()
{
double y;
double x = 3.0;
double e = 2.0;
int i,j;
for (i = 0; i < 5; i++)
{
for (j = 0; j < 400000; j++)
{
y = pow(x, e);
}
printf(“Loop %d of work cyclen”, i );
// pause for one second between loops so that the work cycle takes a little time.
sleep (1); // in C or C++ you will need to include the unistd.h library for this function
}
}
The skeleton of the program
(1) read file “/proc/uptime” to obtain beginTotaltime and beginIdletime
(2) call work( ) to put some work into the system
(7) read file “/proc/uptime” to obtain endTotaltime and endIdletime
(8) Calculate the percentage of the time that CPU was busy during this program:
programTotalTime = endTotalTime – beginTotalTime;
programIdleTime = endIdleTime – beginIdleTime;
programWorkTime = programTotalTime – programIdleTime;
percentage = (programWorkTime / programTotalTime)* 100;
Items to turn in to Week 7 dropbox:
1. Source code with filename (linuxtime.c or linuxtime.cpp or linuxtime.java)
2. Sample output from your program
NOTE: (IMPORTANT !!!)
1. All the source file should be with enough documentation either embedded in the code or in a separate file. Insufficient documentation leads to minus points.
2. Be sure to write your name, date, assignment name and a brief description of the project on the top of the file in comments.(All of this counts towards the documentation)
3. Use the same file name as mentioned above (linuxtime.c or linuxtime.cpp or linuxtime.java) and submit it to Week 7 dropbox.
Percentage Distribution
Total : 100%
• Execution of the program with required output : 70%
• Enough Documentation : 20%
• Submitting the sample output : 5%
• Using the same file name as mentioned above : 5%
Save it as uptime.c
Compilation, as stated before: gcc -lm -o uptime uptime.c
Running: ./uptime
Here are my results:
Loop 0 of work cycle
Loop 1 of work cycle
Loop 2 of work cycle
Loop 3 of work cycle
Loop 4 of work cycle
Total time: 8.78 seconds
CPU idle time : 5.09 seconds
CPU busy time : 3.69 seconds
CPU % of time busy/total : 42%
Sep 06, 2021 – Oct 31, 2021
Beth Subero : Instructor
This course provides an overview of cyber warfare and the potential impact of its use by military, terrorist, and criminal organizations. By studying the operation of computer networks, the student will gain an appreciation of how they have both benefited society and made portions of its infrastructure more vulnerable. An overview of cyber weaponry will be presented, and various offensive and defensive strategies will be examined via case studies
Course Materials: What will I need on day one?
This assignment will be submitted to Turnitin®.
InstructionsInstructions: This assignment designed to assess your knowledge and assimilation of the course objectives. The assignment rubric is included for your review. Grading will be based on the rubric. Make sure you follow AMU’s writing policies and the Chicago writing style guide (cover page, page numbering, double space, headings/subheadings, etc). Your essay should be 4-6 pages in length, not counting the cover page and bibliography.
Essay Question: We are a highly technical society. Our everyday lives revolve around the Internet: we benefit from the Internet, but we can also be victims of cyber criminals. To understand how criminals use the Internet to their advantage, one must understand how we communicate on the Internet. In this paper, you are required to describe in detail how we communicate on the Internet, based upon your readings. Discuss the major networking building blocks and their functions. Secondly, discuss software applications’ vulnerabilities, such as those found in web browsers.
Assignment #2
This assignment consists of two questions (below) to test your knowledge and assimilation of the course objectives. You are to pick ONE and answer it in 6-8 page essay. Grading will be based on the rubric. Make sure you follow AMU’s writing policies and the Chicago writing style guide (cover page, page numbering, double space, headings/subheadings, etc). YOU MUST CITE YOUR SOURCES AND INCLUDE A BIBLIOGRAPHY. You must also have a strong introduction, thesis statement and conclusion.
Essay Question #1: Select one of the studies presented in weeks 6 or 7 of this class or another case of your choosing with instructor approval. You might have to look ahead. Write an analysis paper providing more details of the attack, to include the following:
a. Victim, attacker, and probable motivation for the attack.
b. Nature and sophistication of the attack.
c. What was the desired outcome of the attack?
d. How successful was it?
e. How effective were the attackers in covering their tracks?
f. How did the victim respond?
OR
Essay Question #2: Discuss the future of cyber warfare. Include the following as part of your discussion:
a. How future wars will be fought.
b. How ethical is cyber warfare?
c. How the United States is preparing defensively to counter cyber-attacks?
d. What is next?
The answers of the problems already there
slide 6-10 have problems COLOR/PUT A MARK LIKE THE FIRST 5 SLIDES FOR THESE PROBLEMS IN EACH YOU WILL FIND THE ANSWERS IN THE LAST SLIDE ,
USE THE SAME FILE TO DO IT
AT FIRST YOU WILL SEE EXAMPLES THAT HELPS 1-5
Please view the following video and answer the following questions:
Cyber-Protecting Critical Infrastructure
https://m.youtube.com/watch?v=yCkip3GRAwM
1) What insights did you get from the presentation?
2) What did you learn about ICS/SCADA systems?
3) What is the US approach to protecting Critical Infrastructure?
Complete your answers on a WORD Document,
Activity 1 & 2
Review the “Reference List Example” in the topic study materials.
This assignment will help you prepare for the Topic 3 “Annotated Bibliography” and the Topic 4 “Three Pillars and Future Impact” assignments. Review the directions in Topic 3 and Topic 4 assignments for details.
Pick an industry (health care, marketing, retail, technology, etc.) with which you are familiar. Using Google Scholar, the GCU Library, or another reputable site, identify industry-relevant scholarly sources that support the three pillars concepts: servant leadership, ethics, and entrepreneurism. Refer to the topic study materials to determine what is considered a scholarly resource. Create a title page and a references list that cites nine references from the past five years. Include at the following types of references:
Five journal articles (include at least one article for each of the three pillars: servant leadership, ethics, and entrepreneurism)
One book
One website
One dissertation/thesis from a database
One book chapter
Prepare this assignment according to the guidelines found in the APA Style Guide, located in the Student Success Center. An abstract is not required.
You are required to submit this assignment to LopesWrite. A link to the LopesWrite technical support articles is located in Course Materials if you need assistance.
1) Wireless Topology Paper: Wireless communication, generally, useless three configuration topologies (1) point to point; (2) point to multipoint; and (3) multi-point to point. In this paper, (a) define each topology, (b) provide a scenario for using each topology, and (c) identify at least one disadvantage of using each topology.
Support your information and make sure all information sources are appropriately cited.
The paper must use APA 7th ed. formatting and contain a title page, 3 to 5 pages of content, and a minimum of three peer-reviewed references
2) WAN Technologies Paper: Research Point-to-Point (dedicated), Packet Switched, and Circuit Switched WAN protocols/circuits/types. Define each protocol and describe at least two data transmission technologies associated with the protocol. Include the bandwidth limitations of each technology and protocol.
Support your information and make sure all information sources are appropriately cited.
The paper must use APA 7th ed. formatting and contain a title page, 3 to 5 pages of content, and a minimum of three peer-reviewed references.
Assignment Resources:
3) Network Security Paper: In this paper, you will define the security strategies of Defense in Depth and Layered Security along with comparing and contrasting the strategies by explaining, at least, two advantages and disadvantages of implementing each security strategy. Support your information and make sure all information sources are appropriately cited.
The paper must use APA 7th ed. formatting and contain a title page, 3 to 5 pages of content, and a minimum of 3 peer-reviewed references.
Assignment Resource(s):
4)
Network Management Paper: In this paper, you will research and report on network management tools associated with (1) policy compliance, (2) bandwidth management, and (3) asset management. Compare and contrast, at least, one tool for each of the three network management areas. What is the best tool for each area? Can one tool be used for managing more than one area? Why or why not? Support your information and make sure all information sources are appropriately cited.
The paper must use APA 7th ed. formatting and contain a title page, 3 to 5 pages of content, and a minimum of three peer-reviewed references.
5) Networking Trends Paper: In this paper, you will research and report on network design and management trends over the last three years (present year minus 2) in the areas of virtualization, security, hardware, network management tools, software defined networking, and wireless. Choose, at least, three areas and explain the general trend and trends within two subsets of the area (i.e., security has subsets of physical, perimeter, monitoring) over the last three years. Use at least one figure from Google Trends showing a trend discussed in your paper. Support your information and make sure all information sources are appropriately cited.
The paper must use APA 6th ed., 7th printing formatting and contain a title page, 5 to 7 pages of content,and a minimum of 4 peer-reviewed references.
Assignment Resource(s):
****While submitting includes question numbers in given file name, it should five different files****