computer architecture jan 17

History of Computer Architecture:
Write a one page summary report that highlights the history of computer architecture and the main events. Use the APA style that includes a cover page and a reference page. Use the APA template document in this folder to help you write your report.

Discussion 5- Planning Project

Assigned Readings:Chapter 11: Resource PlanningChapter 12: Budget PlanningInitial Postings: Read and reflect on the assigned readings for the week. Then post what you thought was the most important concept(s), method(s), term(s), and/or any other thing that you felt was worthy of your understanding in each assigned textbook chapter.Your initial post should be based upon the assigned reading for the week, so the textbook should be a source listed in your reference section and cited within the body of the text. Other sources are not required but feel free to use them if they aid in your discussion.Also, provide a graduate-level response to each of the following questions:

  1. How would a cost management plan address the challenges of managing project costs within the internal financial procedures and accounting codes of an organization?
  2. What benefits do budgeting processes bring to projects, and what weaknesses do they possess?
[Your post must be substantive and demonstrate insight gained from the course material. Postings must be in the student’s own words – do not provide quotes!]  [Your initial post should be at least 450+ words and in APA format (including Times New Roman with font size 12 and double spaced). Post the actual body of your paper in the discussion thread then attach a Word version of the paper for APA review]

Text-

Title: Project Management 

Subtitle: https://opentextbc.ca/projectmanagement/ 

ISBN: 978-1-77420-013-1 

Authors: Adrienne Watt 

Publisher: BCcampus 

Publication Date: August 14, 2014 

Edition: 2nd Edition

HR Management & Blockchain

 What are the benefits and challenges associated with public and private blockchain and which has the most potential for application in human resource management?

References

1. Chapter 3 of Blockchain for Business

2.Berke, A. (2017, March 7). How safe are Blockchains? IT depends

NETWORK SYSTEMS DESIGN AND MANAGEMENT

  

You work for a company that has branches in different cities and you have been tasked to design the network for your organization. Your initial plan is to show a layer three topology diagram and then cascade down to more details.

Task:

a) Your first diagram is as shown below:

Refer to IMG 1

Assuming R1 is for the central site and R2 is for a branch office, draw a detailed diagram that shows more detail about the physical cabling with less detail about the IP subnets and addresses connecting the central office with the branch office. Show all the labels and details appropriately.

6 Marks

b) Armed with the cabling details (a) above, describe in detail how you can physically install a router ( Assumption: because your devices will be in the same place, you can create Ethernet WAN links by using the RJ-45 ports and a UTP cable without the need to purchase an SFP for each router).  6 Marks

c) You have just configured your router and the following are the details: 

Refer to IMG 2

Using the parameters above, match the networking parameters from the left onto the correct values on the right: 4 Marks

Refer to IMG 3

d) Using your understanding of AAA functions, choose the appropriate functions on the left that fall under each heading on the right. 4 Marks

Refer to IMG 4

e) In the following exhibit, what needs to be changed for Computer A to successfully

communicate with Computer B (assume the least amount of effort to fix the problem)?   2 Marks

Refer to IMG 5

f) You are installing IP phones in a new office. The phones and office computers

connect to the same device. To ensure maximum throughout for the phone data sessions,  the company needs to make sure that the phone traffic is on a different network from that  of the office computer data traffic. What is the best network device to which to directly  connect the phones and computers and what technology should be implemented on this  device?  3 Marks

QUESTION TWO [25 MARKS]

a) Explain any five ways that network managers can enhance availability and reliability of their networks. 5 Marks

c) Explain how the following diagrams help in troubleshooting a network. 

(i) Physical Network Diagram 2 Marks

(ii) Logical Network Diagram 2 Marks

d) Study the diagram below very carefully. Using the IP address 192.168.15.0, and by using VLSM, create the subnets and show where they fit on the interfaces. 16 Marks

Refer to IMG 6

Assessment 3 Mitigation Plan for Threat Report (MIS607 Assessment 3)

MIS607 Assessment 3 Mitigation Plan for Threat Report

Course: MIS607

  

Task Summary

For this assessment, you are required to write a 2500 words mitigation plan for threat report based on knowledge you gained about threat types and key factors in Assessment 2. You are required to use the Assessment 2 case as context to write a report to address or alleviate problems faced by the business and to protect the customers. In doing so, you are required to demonstrate your ability to mitigate threat/risks identified in Assessment 2 through the strategy you recommend (STRIDE).

Context

Cybersecurity help organizations to mitigate threats/risks, reduce financial loss and safety violations, decrease unethical behaviour, improve customer satisfaction, and increase efficiency, as well as to maintain these improved results. Threats can be resolved by Risk Acceptance (doing nothing), Risk Transference (pass risk to an externality), Risk Avoidance (removing the feature/component that causes the risk) and Risk Mitigation (decrease the risk). This assessment gives you an opportunity to demonstrate your understanding of cybersecurity and your capability to explain Risk Mitigation strategies for such threats. Mitigations should be chosen according to the appropriate technology and resolution should be decided according to the risk level and cost of mitigation.

Task Instructions

1. Read the Assessment 2 Case Scenario again to understand the concepts discussed in the case.

2. Review your subject notes to establish the relevant area of investigation that applies to the case. Reread any relevant readings that have been recommended in the case area in modules. Plan how you will structure your ideas for the mitigation plan for threat report.

3. The mitigation plan for threat report should address the following:

• Setting priorities for risks/threats

• Analyse the case in terms of identified risk categories and scenarios

• Apply standard mitigations

• Discuss specific resolutions for improvement, and justify their significance

• Provide recommendations for mitigating risk based on an assessment of risk appetite, risk tolerance and current risk levels (Choose techniques to mitigate the threats)

• Make recommendations to the CEO on how to conduct risk management, key issues involving your process improvement model, including a road map, the identification of appropriate technologies for the identified techniques, communicating the strategy, and a suggested timeline.

4. The report should consist of the following structure:

A title page with subject code and n ame, assignment title, student’s n ame, student , and lecturer’s n ame.

The introduction that will also serve as your statement of purpose for the report. This means that you will tell the reader what you are going to cover in mitigation plan report. You will need to inform the reader of:

a) Your area of research and its context (how to mitigate or manage threats)

b) The key concepts you will be addressing

c) What the reader can expect to find in the body of the report

The body of the report will need to respond to the specific requirements of the case study. It is advised that you use the case study to assist you in structuring the report. Set priorities for identified threats from assessment 2, analyse the case in terms of identified risk categories and discuss specific resolutions and recommendations for improvements in the body of the report.

The conclusion (will summarise any findings or recommendations that the report puts forward regarding the concepts covered in the report.

5. Format of the report

The report should use font Arial or Calibri 11 point, be line spaced at 1.5 for ease of reading, and have page n umbers on the bottom of each page. If diagrams or tables are used, due attention should be given to pagination to avoid loss of meaning and continuity by unnecessarily splitting information over two pages. Diagrams must carry the appropriate captioning.

6. Referencing

There are requirements for referencing this report using APA referencing style for citing and referencing research. It is expected that you used 10 external references in the relevant subject area based on readings and further research. 

7. You are strongly advised to read the rubric, which is an evaluation guide with criteria for grading the assignment—this will give you a clear picture of what a successful report looks like.

Submission Instructions

Submit Assessment 3 via the Assessment l ink in the main navigation menu in MIS607 Cybersecurity. The Learning Facilitator will provide feedback via the Grade Centre in the LMS portal. Feedback can be viewed in My Grades.

THE TOPIC IS Open Shortest Path First ( OSPF )

 

Paper Description

Paper Grading and Elements in the Body of the Paper

Description: This assignment requires that the student write a 2200 word paper describing of this TCP/IP routing protocols called     OSPF . The paper will include the following:
The paper must have a Title Page, distinct and well written Introduction, Supporting Body and Conclusion. In the body you MUST include the following (These are considered the Elements of your subject and appear in the Body of your work. Modern Day Usage being the exception it should appear in the conclusion.)
In the Body of your Paper

  • The history of the protocol chosen
  • Site at least two each advantages and site at least two each disadvantages, of your chosen routing protocol subject
  • Site at least two of the most common programmable parameters of the protocol, and how they affect traffic flow
  • Discuss the major differences between the routing protocol chosen and all others that were not chosen

In the Conclusion of your Paper

  • Discuss how your chosen protocol can be used in a modern day routed network environment. (seen in Conclusion)

Research Paper

What are baseline security requirements that should be applied to the design and implementation of applications, databases, systems, network infrastructure, and information processing when considering cloud computing within an enterprise risk management framework?Your paper should meet the following requirements:

  • Be approximately five to six pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Write a program not in Database Languages, e.g. SQL but in a high-level language, e.g. C++, Java, or Python, etc. to implement a File System for the tables

 

Write a program not in Database Languages, e.g. SQL but in a high-level language, e.g. C++, Java, or Python, etc.
to implement a File  System for the tables demonstrated (one file for one table) in Sept. 2 class: Fig. 1.2 (a) and (b) and the resulting table by join/merging of the two tables as in Fig. 1.4.

Functionalities of the File System includes, e.g.:
1) Creating the tables.
Insertion of the records, and add operations of the tables,
such as sorting by one attribute, retrieval of information, the connection of tables including natural join operations, to generate another table, input/output the whole or partial (like view in the database) records of the tables etc.

2) Access to the data in tables to 
e.g.  • Retrieval of information stored in the tables

• Insertion of new information into the tables

• Deletion of information from the tables

• Modification of information stored in the tables

3) Operations between tables
The operations (functions, features, etc.) of the file system shall be implemented like what DDL, DML in SQL can do. (Selection ◦ Projection, grouping, aggregation, etc. within a table,  set operations, i.e. operations among tables: such as◦◦ Set operations: Union/Interception ∪ ◦  difference − ◦ Selection, Projection, Cartesian product × and Join/Merge two or more tables, etc.)

Due to the time limit, try the simple functions first and get more and more later. No need to get it all complete when this work is done individually until later (after this assignment) we might go for teamwork for covering more functions.

Deliverables:

Again, for any program in high level language or SQL

  • Attach the necessary documentation (can be embedded in comments of the program) to cover a software process SDLC briefly e.g. Requirement, Analysis, Design, Implementation code, Testing, and Deployment/Maintenance which instructs users how to run your program and specify what you have done in the program and what you did not finish, etc,
  • The program shall offer clear UI user interface so users know how to run your program.
  • At the end of program, attach various TESTING CASES within the comments to show how capable and how many cases your program can handle.

Notes:

Drawbacks of using file systems to store data

o   Data redundancy and inconsistency

§  Multiple file formats, duplication of information in different files

o   Difficulty in accessing data

§  Need to write a new program to carry out each new task

o   Data isolation — multiple files and formats

o   Integrity problems

§  Integrity constraints  (e.g., account balance > 0) become “buried” in program code rather than being stated explicitly

§  Hard to add new constraints or change existing ones

o   Atomicity of updates

§  Failures may leave database in an inconsistent state with partial updates carried out

§  Example: Transfer of funds from one account to another should either complete or not happen at all

o   Concurrent access by multiple users

§  Concurrent access needed for performance

§  Uncontrolled concurrent accesses can lead to inconsistencies

§  Example: Two people reading a balance (say 100) and updating it by withdrawing money (say 50 each) at the same time

o   Security problems

§  Hard to provide user access to some, but not all, data

Research in computer

 What are some of the challenges when completing research in computer and information sciences? Why are they challenges and how can they be overcome?