Describe Design Issues in Distributed Systems 3 pages o fessey
contigency planning
Contingency planning is a risk mitigation process for developing back-up plans in anticipation of events (scenarios) that might disrupt ‘business as usual’. Business continuity planning is an expanded version of contingency planning that typically encompasses a more comprehensive and extended response plan for getting back to ‘business as usual’. In a well-formatted, highly-detailed research paper, address the need to contingency planning, ensuring to address the following items:(1) Benefits of scenario events/planning.
(2) Questions to consider when implementing scenario planning.
(3) The common types of scenario planning.Your paper should meet these requirements:
- Be approximately four to six pages in length, not including the required cover page and reference page.
- Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
- Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
- Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.
Unit 5 DB: Convince us of your conflict
· Jackson, Dick, and Atwood brilliantly incorporate the conflict of Man vs. Society, but which one does it better?
· In one to two paragraphs, argue which of the Unit 5 authors best portrays the conflict of Person vs. Society and HOW (you might like to do some more research on The Handmaid’s Tale to write about Atwood). This is a great practice for your upcoming Position Paper.
· Share a modern-day piece of literature (new story, article, video, movie, novel, etc.) that supports your response and is a direct connection to the story you choose. Be sure to post the link to your modern piece of literature and explain how it connects to your chosen author/story.
· Finish your post by asking a question of your peers that promotes critical thinking on this subject.
Capstone project
After World experienced unprecedent pandemic, everyone needed to adapt to circumstances. For companies the best way to adapt was working remotely. In order to do that they needed to have open channels for communication. Opening channels was easy. The problem was to provide secure channels. As cyber security student my proposal will be focus on protecting the data while opening channels for remote workers.
dq
Many business environments have both visible and invisible physical security controls. You see them at the post office, at the corner store, and in certain areas of your own computing environment. They are so pervasive that some people choose where they live based on their presence, as in gated access communities or secure apartment complexes. Alison is a security analyst for a major technology corporation that specializes in data management. This company includes an in house security staff (guards, administrators, and so on) that is capable of handling physical security breaches. Brad experienced an intrusion—into his personal vehicle in the company parking lot. He asks Alison whether she observed or recorded anyone breaking into and entering his vehicle, but this is a personal item and not a company possession, and she has no control or regulation over damage to employee assets. This is understandably unnerving for Brad, but he understands that she’s protecting the business and not his belongings.
When or where would you think it would be necessary to implement security measures for both?
Exp19_PowerPoint_Ch02_Cap_ScienceClub
Solution File + Step-By-Step Video is Available in the Answer
Exp19_PowerPoint_Ch02_Cap_ScienceClub
Start PowerPoint. Download and open the file named Exp19_PPT_Ch02_Cap_Oceans.pptx. Grader has automatically added your last name to the beginning of the filename.
Replace Student Name on Slide 1 with Carla Chen.
Contrast is one of the main design principles used in a presentation to direct focus and aid in readability. You adjust the formatting of the font used in the presentation so there is better contrast.
Change the title font type to Tw Cen MT (Headings) and ensure the size is 48. Change the font color to Black, Text 1. Change the subtitle font type to Tw Cen MT (Body) and ensure the size is 22. Change the font color to White, Background 1, Darker 50%.
Repetition is another design principle. You change the font on several slides to utilize repetition throughout the presentation.
Click Slide 4 and change the title font color to Black, Text 1. Change the bulleted text font color to Black, Text 1.
Click Slide 5. Change the title font type to Tw Cen MT (Headings) and ensure the size is 32. Change the font color to Black, Text 1.
Click Slide 6 and change the title font color to Black, Text 1. Change the bulleted text font color to Black, Text 1. Do not change the font color of the email address.
The design principle of proximity to visually connect or organize the placement between text and the image on this slide. This will keep create a relationship between the objects on the slide.
Click Slide 2 and create a text box and size it to a height of 0.5” and a width of 4”. Type Whales are amazing creatures Apply Tight Reflection: Touching as a text effect. Drag the text box to the lower-right corner.
This slide is enhanced by using the alignment design principle to add ovals and text to convey the intended message.
Click Slide 3 and use Lock Drawing Mode to add four Oval shapes. Size them to a height of 2” and a width of 3.44” . Arrange them from the lower left corner to the upper right corner of the slide. Change the fill to Blue.
Add a Line Arrow connecting each oval to the next higher oval. Change the weight to 4 1/2 pt.
Type Primary Producer in the lowest oval. Type Primary Consumer in the next oval. Type Secondary Consumer in the third oval. Type Top Predator in the highest oval.
Create a text box and type THE FOOD CHAIN. Change the title font type to Tw Cen MT (Headings) and the size to 32. Drag the text box to the upper-left corner.
Animation is added to the shapes on this slide to control how they appear on the slide and focus how the audience receives the message of the slide.
Click Slide 3. Select the Primary Producer oval and add the Wheel Entrance animation. Next, select the Primary Consumer oval and add the Wheel Entrance animation. Then, select the Secondary Consumer oval and add the Wheel Entrance animation. Finally, select the Top Predator oval and add the Wheel Entrance animation.
Click After Previous in the Start box for the Top Predator oval. Adjust the Delay to 00.50. Open the Animation Pane. Click each of the three lower ovals and then click After Previous. Close the Animation Pane.
Click Slide 4. Select the bulleted text and apply the Fade Entrance effect. Set the animation to start After Previous with a Duration of 02.00 and a Delay of 01.75. Click the Animation Pane to access the Fade dialog box. Set the After Animation to Green on the Effect tab.
You apply a transition to all the slides in the presentation to create visual interest and re-focus the audience attention as each new slide displays during the presentation.
Click Slide 1 and add the Fade transition. Set it to apply to all. Set the slides to advance automatically after 00:03.00.
Video engages the audience’s emotions and helps to reinforce the message of your presentation. This helps the audience remember the message of the presentation, so you add one on this slide.
Click Slide 5. Insert the video file oceans.mp4. Compress the media. Select and delete any additional text boxes that may display when the video is inserted.
You use the Playback and Format tabs to adjust the video’s properties.
Set the video to start Automatically. Change the Video Options to Hide While Not Playing and to Rewind after Playing.
Apply a Simple Frame, White Subtle Video Style. Format the video into an Oval shape.
Audio is added to emphasize the message of not only this slide but that of the entire presentation.
Click Slide 2. Record yourself saying “Whales are amazing creatures” or insert Whales.m4a. Drag the speaker icon to the lower left of the slide. Set the audio option to start automatically and to hide during the show.
View the presentation. Save and close Exp19_PPT_Ch02_Cap_Oceans_solution.pptx. Exit PowerPoint. Submit the file as directed.
HTML
In this exercise, you are to modify the HTML temlate file according to the file comments and the instructions below.
To complete this exercise, do the following:
- Download the exercise21.html downloadfile and place it in the CS597 Exercises folder.
- Update the meta description attribute value with “CS597 Exercise 2.1”.
- Update the meta keywords attribute value with “Lists”.
- Update the meta author attribute value with your name.
- Update the title tag with Exercise 21 — Lists.
- Edit article one to create an ordered list which describes the steps that occur when you enter a URL into your browser and go to that web site. Be sure to include the translation from URL to IP address in your list.
- Edit article two to create an unordered list which contains names of the HTML tags introduced in chapters 3 and 4.
- Edit article three to create a definition list that has as its terms the following tags: sup, sub, cite, dfn, abbr. For each of the terms, include the definition.
- Edit article four to create a nested list with the structure shown in image . That is, an outer definition list with three terms (all of which are “The three laws of robotics”) with the first definition being an order list of the three laws, the second definition being a definition list of the three laws, and the third definition being an unordered list of the three laws.
- In the
tag, add the id attribute “top”.
- In the
tag for the ordered list section in step 5, add the id attribute “ordered-list”.
- In the
tag for the unordered list section in step 6, add the id attribute “unordered-list”.
- In the
tag for the definition list section in step 7, add the id attribute “definition-list”.
- In the
tag for the nested list in section step 8, add the id attribute “nested-list”.
- Modify the paragraph in article 5 to be an internal link to the “top” id you just created.
- In article 0, add the following links to the list section subheaders:
- make step 5 a link to the “ordered-list” id
- make step 6 a link to the “unorder-list” id
- make step 7 a link to the “definition-list” id
- make step 8 a link to the “nested-list” id
- Make the Go to the top of the page. text a link to the id “top”.
- Make the Go to the page on links a link to the file exercise22.html.
- Save exercise21.html.
- Download the exercise22.html downloadfile and place in the CS597 Exercises folder.
- Update the meta description attribute value with “CS597 Exercise 2.2”.
- Update the meta keywords attribute value with “Links, Absolute, Relative, Internal”.
- Update the meta author attribute value with your name.
- Update the title tag with Exercise 22 — Links.
- Add the id “top” to the
tag.
- Add the id “absolute” to the
tag in article 2.
- Add the id “relative” to the
tag in article 3.
- Add a link to the “absolute” id to the Absolute Links text in article 1.
- Add a link to the “relative” id to the Relative Links text in article 1.
- In article 2, add a link to the Apple home page on the text Apple home page that opens in a new window.
- In article 2, add a link to the Microsoft home page on the text Microsoft home page that opens in the same window.
- In article 2, add a link to the top of the page to the text Go to the top of this page.
- In article 3, add a link to the exercise21.html file onto list item 1.
- In article 3, add a link to the ordered list (use the “ordered-list” id) in the exercise21.html file onto the list item 2.
- In article 3, add a link to the ordered list (use the “unordered-list” id) in the exercise21.html file onto the list item 3.
- In article 3, add a link to the ordered list (use the “definition-list” id) in the exercise21.html file onto the list item 4.
- In article 3, add a link to the ordered list (use the “nested-list” id) in the exercise21.html file onto the list item 5.
- In article 3, add a link to the top of the page on the text Go to the top of this page.
- Save the exercise22.html file.
- Bundle exercise21.html and exercise22.html in a Zip file archive called . Do not include a containing folder in the Zip file, the exercise21.html and exercise22.html files must be at the top level of your Zip file. Submit your Zip file
CIS 415 Unit 3 Assignment: Mercy Health System
3 page
please read the case study at the end of Chapter 3, give a brief synopsis of the case, and answer the questions at the end.
See the attached document for complete instructions and the grading rubric
TCP/IP is the protocol used by the Internet. The OSI model is a conceptual model that identifies functions of a communication system. For this assignment, write a paragraph (no less than 200 words) that compares the layers of the TCP/IP against the OSI mo
TCP/IP is the protocol used by the Internet. The OSI model is a conceptual model that identifies functions of a communication system. For this assignment, write a paragraph (no less than 200 words) that compares the layers of the TCP/IP against the OSI model.
Develop and apply an appropriate and useful inheritance hierarchy
Develop and apply an appropriate and useful inheritance hierarchy.
Use multiple cpp and header files effectively to develop modular code. Background Assume that all baseball players, regardless of their position, have these two important statistics: • rbi – runs batted in, a whole number (so you must data type int) • batting average – real number percentage of hits per at-bat (a real number, so you must use data type double) Pitchers are baseball players with an additional statistic, era (earned run average), a real number for earned runs per nine innings pitched (so you must use data type double). Developing the Class Hierarchy A logical class hierarchy for these two types of objects would use a Player class as a parent (base) class for a derived (child) Pitcher class. The Pitcher class would include all the members of the Player class and have an additional (private) era data member, and, of course, appropriate (public) accessor, mutator and constructor methods. This relationship is sometimes called a tree, but is also called a hierarchy, more particularly in this case, a class hierarchy. Note that the arrow points from derived (child) class to parent (base) class, which indicates the search path for executing member methods; if the method is not found in the Pitcher class, the compiler looks back to the parent class, Player, to find it. File Organization (Class Header and Implementation Files, etc.) Each class (in this case Player and Pitcher) will have its own header (.h) and implementation (.cpp) file, and, of course, there needs to be an executable file that actually uses the class (an application .cpp file with a main function). As with the classes previously developed in the course, the application will be a “driver” program that executes each member function at least once with an arbitrary, but specific test case data set. Requirements Use the given Player class as a base class for Pitcher and add to the BaseballPlayerDriver file code to test the class with the data specified below. Player class requirements: 1. Create with separate header (Player.h) and implementation (Player.cpp) files. 2. Two private data members, rbi and battingAverage. 3. A parameterized constructor that receives and sets the initial values for both rbi and battingAverage. 4. Two accessor (get) methods that return the values of the data members: getRbi and getBattingAverage. 5. Two mutator methods: 5.1. setRbi that receives a whole number and writes it to the rbi data member. 5.2. setBattingAverage that receives a real number and writes it to the battingAverage data member. 6. showAll accessor method that displays the values of both data members as shown here for an arbitrary test case for a player who has 10 rbi and batting average 0.1234: rbi = 10 batting average = 123 Note that the battingAverage variable will be a floating point number (double), but it must be rounded and display as a digit integer. Pitcher class requirements: 1. Pitcher class must be derived from Player class. 2. Create with separate header (Pitcher.h) and implementation (Pitcher.cpp) files. 3. One private data member, era. 4. A parameterized constructor that receives and sets the initial values for all three data members, rbi, battingAverage and era. 5. getEra accessor method that returns the value of era. 6. setEra mutator method that receives a real number and writes it to the era data member. 7. showAll function to over-ride the base class’s showAll function and do the following: call the base class’s showAll function to display the inherited data members’ values and, in addition, output the additional value, the pitcher’s era, as shown for an arbitrary test case for a pitcher who has 10 rbi, batting average 0.1234 and era of 3.456: rbi = 10 batting average = 123 era = 3.46 Note that the era variable will be a floating point number (double), but it must be rounded and display to decimal places. BaseballPlayerDriver class requirements: 1. Tell the user you’re creating a Pitcher with 10 rbi, batting average 0.1234 and era 3.456. 2. Use the parameterized constructor to create to instantiate a Pitcher variable, p1 with initial values 10 rbi, batting average 0.1234 and era 3.456. 3. Tell the user you’re using the get methods to display the values of the data members. 4. Use cout and the three get methods to display the values. 5. Tell the user you’re using the showAll method to display the values of the data members. 6. Call the showAll method. 7. Tell the user you’re using setRbi to change it to 9. 8. Use setRbi to change it to 9. 9. Use showAll to display the data values. 10. Tell the user you’re using setBattingAverage to change it to 0.2345. 11. Use setBattingAverage to change it to 0.2345. 12. Use showAll to display the data values. 13. Tell the user you’re using setEra to change it to 5.678. 14. Use setEra to change it to 5.678. 15. Use showAll to display the data values. Additional Requirement: Use the const modifier for member functions that do not write to a data member to guarantee the data members are protected. Report Put all five files