IT 505-1 week2

BUSINESS CASE: New-Horizon Insurance Company needs your service to establish a new IT network.  Main parameters of the given case.

New-Horizon company has a four-story office building in the city. There are four offices in that building.  In each office, there will be

  • 25 desktop computers
  • 10 portable/laptop computers and need a wireless connection (WiFi)
  • One network printer for all employees in each section.
  • All office computers must have access to the network 

So, there are four local area networks in the building.

You should be developing and drawing network diagrams. Your name and the company name must be written on each diagram. You should label all network devices in your diagrams.

Question 1: 

Develop and draw a network diagram of LOCAL AREA NETWORK for one Office Section only. You will be presenting only one of the LANs in the building. Draw only one LAN considering one of the offices in the main building.

Question 2: 

Draw the block diagram for INTRANET to connect all LANs in the main building. All computers in the main building will be connected to each other with this network. There is one database for customer all transactions. All computers in the main building should have access to this database.  This is your Backbone Network Diagram.

Here you should represent all LANs by using a simplified LAN diagram that was covered during the virtual class. 

Question 3: 

Finally, you should be connecting all computers in the main building to the INTERNET as well.

Use https://www.draw.io  to develop/draw three network diagrams. And place them in your MS Word document and upload them.  

In your network diagram; You should write your name on the upper right section of the DRAW.io diagram and export it as JPEG. And insert into your answer MS Word document.

Rules and guidelines 

Follow proper guidelines 

If there is a diagram(s) then the word count is between min 100 and max 400 words.

msit

  • What server(s) are the most important to protect and why?
  • What criteria would you use to determine which servers to protect first?
  • What are some of the methods you would use to protect the different services?

Tradmark Violations

 

In order to complete assignment #3 you will need to answer the below questions. Please complete the questions in a Word document and then upload the assignment for grading. When assigning a name to your document please use the following format (last name_Assignment #3). Use examples from the readings, lecture notes and outside research to support your answers. The assignment must be a minimum of 1-full page in length with a minimum of 2 – outside sources. Please be sure to follow APA guidelines for citing and referencing source. Assignments are due by 11:59 pm Eastern time on Sunday.

Chapter 41. Should dissatisfied consumers have the right to establish gripe sites that use the trademark of the offending company in the domain name? How likely is it that consumers will be confused as to the “origin, sponsorship, or approval” of the gripe site by the offending company? Whether or not you think that confusion is likely, should a gripe site be considered to tarnish the targeted company’s trademark and thereby violate the Federal Trademark Dilution Act? Why or why not? Chapter 52. It is common practice for recipients of email messages to sometimes forward those messages to others. Does such forwarding constitute copyright infringement? In your answer, be sure to specify which, if any, of the exclusive rights may have been violated by the act of forwarding and whether the doctrine of fair use applies. What remedies, if any, might a successful plaintiff be able to obtain

3. Read the following laws and standards:

  1. Sarbanes-Oxley and
  2. PCI DSS .

Develop a plan for an imagined “online payment company” to comply with Sarbanes-Oxley law and implement the Payment Card Industry Data Security Standard (PCI DSS)

A designer described the following interface for

  

A designer described the following interface for a save operation.
The users initially see a screen with a box where they can type the file name (see screen 1). The screen also has ‘list’ button that they can use to obtain a listing of all the files in the current directory (folder). This list appears in a different window. When the user clicks the ‘save’ button the system presents a dialogue box to ask the user to confirm the save (see screen 2).

Two programmers independently coded the interface using two different window managers. Programmer A used an event-loop style of program whereas programmer B used a notifier (callback) style.

(a) Sketch out the general structure of each program.
(b) Highlight any potential interface problems you expect from each programmer and how they could attempt to correct them.

INSY DATABASE MANAGEMENT SYSTEMS Homework….Objectives-To explore Database Operations in MS Access

 INSY DATABASE MANAGEMENT SYSTEMS Homework 

1Objectives-To explore Database Operations in MS Access

 -Provide data analysis for the NGO Sixty and better

 -Understand and identify the different areas of improvement and write optimized queries

 -Provide project report as an instruction manual for the NGO Sixty and better 

 Requirements 

This Project might require adding columns in the table if necessary. But removing the columns would disturb the existing queries.

1.Provide the health concerns by zip code which can help decision-making while trying to setup a particular class in a particular location. 

Hint: CDSMP and AMOB paperwork ask the question: would you like to be contacted about future health care education classes and events, include that information in the health concerns by zip code.

2.Provide the number of class participants/graduates by zip code.

3.Provide the number of participants enrolled in a class (AMOB/CDSMP/DSMP), the number of sessions they attended, the number that graduated, and their demographics in a time period.

4.You are encouraged to identify the areas of improvement by considering the forms data, Pre-Survey data, and Post – Survey data available. Make sure to add columns if needed and write queries.

5.Some Participants might choose not to answer some questions and hence some data can be empty in the table.

6.Provide an instruction manual that would help the administrator at NGO Sixty and better effectively utilize the new implementations. 

HTML

In this assignment, you will create a table in the webpage you previously created. Create a table similar to the following attached screenshot with the three pictures on your webpage, include a paragraph of description for each picture, and another column showing the title of the picture.

In your HTML and CSS codes, you will need to use the following properties:

1. border-bottom
2. padding
3. min-width
4. width
5. box-shadow
6. font-family
7. font-weight
8. background-color
9. cellspacing

Private Sector Organizations

 Instructions

The chief technology officer (CTO) has indicated that your organization has been requested by the National Security Council (NSC) to comment on the upcoming National Cybersecurity Strategy. The NSC has asked for specific recommendations as it relates to the next cybersecurity strategy, private/public partnerships, and comments on how specific technologies should be incorporated into the assessment.

The CTO has asked you to collaborate with your team to provide the organizational input.

Research Paper

 Topic: Computer Networking and Machine Learning

Format: APA, 15 pages (excluding tables of content, charts, pictures)

Rules: please find below titles, format  and explanation on how a research paper is expected to be done. For extra reference I will add my college, research paper guide, which has detailed explanation of how the work is expected with examples.

 

The research paper must be supported by evidence (citations from peer-reviewed sources). 

A minimum of five (5) peer-reviewed journal citations are required. 

Formatting should be double-spaced, one-inch boarders, no extra space for headings, no extra white space, no more than two levels of heading, page numbers, front and back matter).

A minimum of 15 full pages is required (no extra whitespace, does not include appendices)

Required Table of Contents. Images and charts are not considered in 15 page-paper.

Required titles:

1. Abstract

2. Literature review- 5 peer-reviewed literature sources 

Description of the research including who the target population was (if available)

Research Method used to conduct the research (describe what the researcher(s) did to gather data for the research)

a.      Was survey distributed? How many questions? How many participants

b.      Was it a focus group? Was it a case study

c.      Be explicit

  • 3. Problem statement
  • 4. Relevance and significance  
  • 5. Research questions- Add no more than 2 research questions as they relate to your research focus
  • 6. Barriers and Issues

7. Approach/Methodology

8. Findings, Analysis, and Summary of Results

The following topics are intended to serve as a guide: 

  Data analysis

  Findings & discussion 

 Analysis 

 Summary of results & discussion

9. Conclusions

10. References

Write a method with the signature

  

Write a method with the signature “public static int findMax(int[][] data)” which finds the maximum value in the given array and returns it. Is there a limit to the number of dimensions can an array have? Why might you use a two-dimensional array?