In this project, you will write a Python program for a miniature “Isolation” game on a 3-by-3 board. Your program should make a suggestion about the best possible move for Player 1 (the player represented by Max nodes on the Min-Max search tree), and once Player makes his move, make the best move for Player 2 (the player represented by Min nodes on the Min-Max search tree), and iteratively enter rounds of moves till the end of game, in which one player cannot move and thus become the loser.
First Normal Form Assignment
First Normal Form Assignment
Attached Files:
- exampleData.sql (740 B)
In this exercise you will:1.) Run the attached SQL script “exampleData.sql” in your preferred way (E.g., workbench or from the command line tool in a terminal window.)This script creates a database named FN1 and a table named “VoterData”, and loads three rows of data into the table.Notice that the data are not stored in First Normal Form because two of the columns: “address” and “email” are used in a way that makes their data nonatomic. A valid address is hierarchical: street number, street name, city/town name, state, zip code, etc. The email field is used to store more than one email address. (If you want to know more about postal addresses read this: https://en.wikipedia.org/wiki/Address)2.) Watch Caleb Curry’s youtube video on First Normal Form (https://www.youtube.com/watch?v=JjwEhK4QxRo) and understand what this means and how he redesigns his database. Notice that the database I gave you is similar to his.3.) Redesign the provided example database so that the email information is in first normal form. This means that you will create a new table called “EmailAddresses” that is specialized for storing email address information, and, it has a foreign key relationship with the VoterData table, etc.
Research paper
You have been hired as the CSO (Chief Security Officer) for an organization. Your job is to develop a very brief computer and internet security policy for the organization that covers the following areas:
1. Computer and email acceptable use policy
2. Internet acceptable use policy
Make sure you are sufficiently specific in addressing each area. There are plenty of security policy and guideline templates available online for you to use as a reference or for guidance. Your plan should reflect the business model and corporate culture of a specific organization that you select.
— paper requirements:
Be approximately 2-4 pages in length, not including the required cover page and reference page.
Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
Support your answers with the readings from the course and at least three scholarly journal articles to support your positions, claims, and observations, in addition to your textbook.
Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.
4/3 Discussion
- Read Chapters 7 and 8 in your textbook.
- Using the discussion link below, respond to the following prompts and questions:
- Explain the differences between e-commerce and m-commerce. What are the main points in developing effective e-commerce and m-commerce functionality and policy for an organization? What issues are characteristic of payment for e-commerce and m-commerce capability? Discuss one area of concern you would address as an enhancement in the e- and m-commerce environment.
- Compare and contrast the following enterprise systems: CRM, ERP, and PLM systems. Explain when and how these systems and the features provided by the systems would be used in your workplace. When and why would you implement these software solutions?
- Your initial post should be at least 300 words and supported with credible outside references.
- Your initial post is due by the fourth day of the workshop.
- Conduct a critical analysis and, in at least 150 words, respond to at least two of your classmates’ postings, as well as any follow-up instructor questions directed at you, by the end of the workshop.
- Include citations to at least one credible information source in your replies.
WEEK 4 RESPONSES
All posts must be (4) substantive responses with a minimum of 150 words each for Question 1, 2, 3 and 4. Ensure you list and break down each response in a word document, along with its reference. Response provided should further discuss the subject or provide more insight. To further understand the response, below is the discussion post that’s discusses the responses. 100% original work and not plagiarized. Must meet deadline.
ISSC 341
RESPONSE 1:
For this week’s topic of discussion, Virtual LANs (VLAN), I will discuss a couple reasons why a network engineer would want to implement it in their network. A VLAN is a subnetwork which can group together collections of devices on separate physical local area networks (LANs). Aside from improving the performance of busy networks, VLANs make it easy for network administrators to partition a single switched network to match the functional and security requirements of their systems without having to run new cables or makes major changes in their current network infrastructure.
Secondly, one or more network switches may support multiple, independent VLANs, creating Layer 2 (data link) implementations of subnets. They are usually composed of one or more network switches and associated with a broadcast domain. Advantages to a VLAN include reduced broadcast traffic, security, ease of administration, and broadcast domain confinement. There are three types of VLANS, Protocol, Static, and Dynamic.
Lastly, disadvantages of VLANs includes the limitation of 4,096 VLANs per switching domains. That creates problems for large hosting providers, which often need to allocate tens or hundreds of VLANs for each customer. To address this limitations, other protocols, like Virtual Extensible LAN (VXLAN), Network Virtualization using Generic Routing Encapsulation) and Geneve support larger tags and the ability to tunnel Layer 2 frames within Layer 3 (network) packets. Hope everyone is having a great start to their weeks (Slattery, T., & Burke, J., 2021).
Works Cited:
Slattery, T., & Burke, J. (2021, May 31). VLAN (virtual LAN). SearchNetworking. https://www.techtarget.com/searchnetworking/definition/virtual-LAN
– ALI
RESPONSE 2:
A virtual local area network (VLAN) is an inattentive LAN that is formed to function through the data link layer (layer 2) of the OSI network model. Dissimilar from a physical local area network or LAN, in which a hardware arrangement houses point-to-point identification and admittance byway of physical network, VLANs are created with remote partitions in workstations so that separate node report interchanges with the virtual partition, not the physical workstation.
One of the chief benefits of establishing VLANs is the energetic nature of road maps on modern networks. This particular model is outdated when it comes to smartphones. Operators submit data from numerous points: such as a personal or a business may provide the mobile device, from the field, or from a different segment of an office.
The VLAN fundamentally explains this problem of “musical chairs.” In addition, with the upsurge of distant work and disseminated models, most associates can be eliminated from using a desk or desktop within an office: the VLAN unravels that problem by linking the user’s distinctiveness to the virtual network divider. Another benefit of a VLAN comprises plummeting traffic.
By segmenting network traffic into non-connected VLANs, overseers can reduce network traffic. For instance, messages intended for one group of workstation users can go solely to the computer group in a sole VLAN. VLANs can also benefit from user provisioning, as stated above, the use of a partition helps to attain improved types of tracking for distinct user processes. VLANs may also support the management of appropriate enterprise ethics and protocols.
A company may have numerous operations or departments functioning in identical physical buildings. With a simple LAN, all network traffic would travel diagonally throughout the whole network. To wall off operations, administrators can form diverse VLANs for two unalike departments that are not hypothetically to interconnect with each other. One example is finance, where unlike arms of a financial organization are proposed to be autonomous of one another for the resolutions of the Sarbanes-Oxley Act or other guidelines or standards.
References
Mitchell, B. (2021). What Is a Virtual LAN (VLAN)? Retrieved from https://www.lifewire.com/virtual-local-area-network-817357
Stoltzfus, J. (2021). What is a virtual local area network (VLAN) and why would I use one? Retrieved from https://www.techopedia.com/7/32107/technology-trends/virtualization/what-is-a-virtual-local-area-network-vlan-and-why-would-i-use-one
– JARED
RESPONSE 3:
1. What are the functional control types? provide an example for each type.
Functional control types include controls such as preventive controls. Preventive controls are designed to keep an undesired event from occurring. These forms of control include measures such as door locks and access controls.
Detective controls are controls which are designed to recognize an undesired event once it has occurred. These controls include intrusion detection systems and log analysis.
Corrective controls repair and limit damages caused by an undesired action, such as a firewall (Weiss, Solomon, 2015).
2. What is the principle of least privilege? Why is it important to implement?
The principle of least privilege is the concept that a user has only the level of access they need in order to carry out their job function, it is a need-to-know approach to resource access. It is important to protect both the confidentiality and integrity of information within the system as it governs unauthorized access and unauthorized changes to information within the system (Weiss, Solomon, 2015).
3. List and briefly discuss the User Domain Compliance Requirements.
User domain compliance requirements include documentation of laws and standards within the corporation, Acceptable Use Policies for IT services and equipment, background checks, user security training, security awareness assessments, acknowledgement of confidentiality agreements, unique logons, the principle of least privilege, two-deep supervision for business-critical processes, and periodic audits. Each of these standards are created to help control the uncontrollable. The human link is the most difficult to control in network security situations, this is why there are so many standards created to help ensure security for the user domain (Weiss, Solomon, 2015).
Alysha Macleod
Weiss M. Solomon M. (2015) Auditing IT Infrastructures for Compliance. Jones & Bartlett
https://learning-oreilly-com.ezproxy1.apus.edu/library/view/auditing-it-infrastructures/9781284090703/
RESPONSE 4:
1. What are the functional control types? provide an example for each type.
Our textbook lists the functional control types as follows:
• Preventive controls (stop actions) locked doors or computer access controls, keep an undesired action from happening.
• Detective controls (recognize actions) motion detectors or usage log analysis tools, recognize when an undesired action has occurred.
• Corrective controls (fix the result of actions) the procedure to remove viruses or a firewall to block an attacking system, repair damage caused by an undesired action and limit further damage.
2. What is the principle of least privilege? Why is it important to implement?
The principle of least privilege is ensuring that users only have access to the resources that they need in order for them to adequately perform the job they are required to do, and nothing more. It is important because it decreases the attack surface, helps prevent insider threat, and improves data security.
3. List and briefly discuss the User Domain Compliance Requirements.
• Separation of Duties requires that users from at least two distinct roles be required to accomplish any business-critical task.
• Least Privilege ensures that unnecessary user privileges are removed.
• Need to Know means that you have a need to access an object to do your job.
• Confidentiality Agreements allow organizations to disclose sensitive information to a small number of parties without concern that an information leak might cause harm.
• Employee Background Checks uncover any evidence of past behavior that might indicate a prospect is a security risk.
• Security Awareness and Training for New Employees is simply educating them on your organization’s security policies and procedures.
• Information System Security Accountability is holding employees accountable for security violations.
• Adherence to Documented IT Security Policies, Standards, Procedures, and Guidelines consists of examining user actions and comparing those actions with security policies, standards, procedures, and guidelines. If you find any differences with organizational requirements, you should report the differences and analyze their impact.
Weiss, M., & Solomon, M. G. (2011). Auditing IT Infrastructures for Compliance, 1st ed. MA: Jones & Bartlett
-JAMIE
Cloud Computing Research
Using the Web, research Sarbanes-Oxley. Discuss three reasons why Sarbanes Oxley should remain in effect and three reasons why it should be abolished. This paper should be written in third-person. The third-person point of view belongs to the person (or people) being talked about. The third-person pronouns include he, him, his, himself, she, her, hers, herself, it, its, itself, they, them, their, theirs, and themselves (Not I, we, us, our).
looking for python project
I want project on python with this I suggested for example, to make Caesar encryption as an education application for students
How to add some pleasant features and show it as a game-based program to students
Machine Learning
Attached Files:
- ufo_sightings_large.csv (839.589 KB)
- HW2.ipynb (7.887 KB)
- HW2.ipynb.txt (7.887 KB)
1. Please download the attached Jupiter notebook HW2.ipynb. Please complete all 10 steps in the Jupyter notebook file according to the instructions. 2. Please download the attached dataset ufo_sightings_large.csv to complete HW2
Server Virtualization and Cloud Computing
This week, you have read about server virtualization and cloud computing in chapter 6 of your textbook. For your written assignment this week, complete a case study of the organization you work for (use a hypothetical or “other” organization if more applicable) that will address the following prompts:
- Describe the organization’s environment, and evaluate its preparedness for virtualization.
- Explain Microsoft (or another product) licensing for virtualized environments.
- Recommend a configuration for shared storage; make sure to discuss the need for high availability and redundancy for virtualization for the organization.
- Explain Windows Azure capabilities for virtual machines and managing a hybrid cloud, including Windows Azure’s Internet as a Service (IaaS) and storage capabilities
Make a recommendation for cloud computer use in the organization, including a justification for your recommendations.Submit your midterm research paper as a single document. Your paper should meet the following requirements:
- Be approximately four to five pages in length, not including the required cover page and reference page.
- Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
- Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
- Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.
Blockchain in business
Industry experts believe blockchain is a technology that has the potential to affect the business of most IT professionals in the next five years. Pick an industry you feel will be most affected by blockchain and how blockchain may be used in that industry. As an IT manager, how would you embrace blockchain? For instance, how would training occur for your team, what strategies might you use, what security methods may you recommend be used?Your paper should meet the following requirements:
- Be approximately four to six pages in length, not including the required cover page and reference page.
- Follow APA7 guidelines.Use font Calibri, 11 pt.Your paper should include an introduction, a body with fully developed content, and a conclusion.
- Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
- Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.
Extra Reference :
Stoyanovich, M., & Tanz, F. E. (2019). Coming to Grips with Blockchain. Benefits Magazine, 56(5), 20-25.
Waldo, J. (2019). A Hitchhiker’s Guide to the Blockchain Universe. Communications of the ACM, 62(3), 38–42. Retrieved from https://doi.org/10.1145/3303868
Burns, S. (2019). Blockchain: Hype Vs Reality. Computer Weekly, 21-24.
Tarzey, B. (2019). Inside Blockchain and Its Various Applications. Computer Weekly, 16-20
Carson, B., Romanelli, G., Walsh, P., & Zhumaev, A. (2018). Blockchain beyond the hype: What is the strategic business value? McKinsey Quarterly, (4), 118–127.