Project Part 4: Final Network Design Report

 Overall Project Scenario

Corporation Techs provides remote and on-site support to small and mid-size businesses. Clients use Corporation Techs’ services to solve problems involving malware removal, to manage data recovery and network issues, and to install hardware and software.Due to recent developments, most technical representatives will begin working from home within the next six months. Because Corporation Techs provides 24/7 support, its systems and communications pathways must be fully operational at all times. In addition, the company has been experiencing unprecedented growth and is preparing to double its client-facing staff. You are a junior network architect who is responsible for helping to plan and design network enhancements to create a more secure internal network, and to ensure secure remote access.

Deliverables

The project is divided into several parts. Details for each deliverable can be found in this document. Refer to the Course Syllabus for submission dates.

  • Project Part 1: Network Design
  • Project Part 2: Firewall Selection and Placement
  • Project Part 3: Remote Access and VPNs
  • Project Part 4: Final Network Design Report

Project management……8888889999

 Please review the attached RFP for instructions regarding the group project. The REQS document will give you detailed system requirements which you may consider incorporating into your prototype. 

 Lastly, please review the grading rubric to understand how your projects will be graded and what should be included. Submit in the form of a power point.

Problem 5- Legal

Question I – If a business does not agree with the decision of a hearing officer, may that business appeal the decision directly to the judicial court system?  What steps must the business take to get the case within the judicial system?

Question II –Peter Plaintiff’s son is killed while working overseas for a United States corporation that deals in proprietary petroleum extraction and production.  Peter Plaintiff brings a wrongful death lawsuit on behalf of his son’s estate against this corporation and requests a wide scope of business documents related to the corporation and its overseas operations under the Freedom of Information Act (FOIA).  What defenses, if any, does the corporation have against revealing the requested information under the FOIA?

Text

Title: Business 

ISBN: 9780357447642 

Authors: Marianne M. Jennings 

Publication Date: 2021-01-01 

Edition: 12th Edition

Write a program, using functions

  

Write a program, using functions, that calculates the area and perimeter of a rectangle whose dimensions (Length and width) are provided by a user.
 

Before attempting this exercise, be sure you have completed all of chapter 8 and course module readings, participated in the weekly conferences, and thoroughly understand the examples throughout the chapter. There are 3 main components of your submission including the problem analysis, program design and documentation, and sample test data.
 
Part 1: Analysis [6 points]  

Provide your analysis for the following problem statement: You need to write a program that calculates the area and perimeter of a rectangle whose dimensions (Length and width) are provided by a user.
 

Your analysis should be clearly written and demonstrate your thought process and steps used to analyze the problem. Be sure to include what is the required output? What is the necessary input and how you will obtain the required output from the given input? Also, include your variable names and definitions. Be sure to describe any necessary formulas and sample calculations.
 

Part 2: Design [7 points]  

Provide your program design for the problem you analyzed for calculating and displaying the area and perimeter of a rectangle. Always work for modular design where possible. Be sure to use separate functions for calculating the area and perimeter of the rectangle. Other subprograms for Input and Output should be included as needed. Be sure to describe the fundamental tasks (i.e., things your program must do) needed to solve the problem so you can use a modular design. Provide pseudocode of your overall design that includes the Main module and the order of the module calls, and a Hierarchy chart for the program (see figure 3.8 page 148). Finally, display the flow charts (using Raptor, or your favorite graphics editor) for each module. (See figure 5.3 page 225 as an example.)
 

Include header and step comments in your pseudocode, using a similar approach as the example provided in section 2.3 (textbook page 86). See example 2.8 on pages 87-88).
 

Part 3: Test Data [3 points]  

Prepare at least 3 sets of input data (Test data) along with expected output for testing your program. Your test data can be presented in the form of a table as was shown in Assignment 1.

BI – IOT

1. Compare the IoT with the regular Internet.

2. Discuss the potential impact of autonomous vehicles on our lives.

3. Why must a truly smart home have a bot?

4. Why is the IoT considered a disruptive technology?

5. AT&T is active in smart city projects. Investigate their activities (solutions). Write a summary.

Write above five questions in APA format, In-Text citations, 5 Active most recent References, 3+ pages.

Cybersecurity 14

 

Create a one-page document of a personal disaster recovery procedure for your home computer. Be sure to include what needs to be protected and why. Also include information about where your data backups are stored and how they can be retrieved. Does your DRP show that what you are doing to protect your assets is sufficient? Should any changes be made?

Include in your plan, several good online backup services can help make data backup easy for the user. Use a search engine to search for online backup service reviews, and select three different services. Research these services and note their features. Create a table that lists each service and compare their features. Be sure to also include costs. Which would you recommend? Why?

Also consider, although not as full-featured as online backup services, several free synchronization storage tools allow users to back up data by synchronization: when you place a file in a designated folder, it is automatically stored to the remote site. Several of these sites offer free storage from 5 GB to unlimited space. Use a search engine to search for free cloud synch storage, and select three different services. Research these services and note their features. Create a table that lists each product and compare their features. Be sure to include storage space limits. How do they compare to online backup services? Which would you recommend? Why?

Write at least a one-page document of a DRP, include the use of online backup services (paid/free) and the table that list and compare the backup services. 

Modify the Week Two Java application

  

Modify the Week Two Java™ application using Java™ NetBeans™ IDE to meet
* these additional and changed business requirements:
*
* • The company has recently changed its total annual compensation policy
* to improve sales.
* • A salesperson will continue to earn a fixed salary of $50000.
* The current sales target for every salesperson is $500,000
* • The sales incentive will only start when 80% of the sales target is met.
* The current commission is 5% of total sales.
* • If a salesperson exceeds the sales target, the commission will increase
* based on an acceleration factor. The acceleration factor is 7.5%
* • The application should ask the user to enter annual sales, and it should
* display the total annual compensation.
* • The application should also display a table of potential total annual
* compensation that the salesperson could have earned, in $5000 increments
* above the salesperson’s annual sales, until it reaches 50% above the
* salesperson’s annual sales.
*
* Sample Table: Assuming a total annual sales of $100,000, the table would look
* like this:
*
* Total Sales Total Compensation
* 100,000 <>
* 150,000 <>
* 200,000 <>
* 250,000 <>
* 300,000 <>
* 350,000 <>
* 400,000 <>
* 450,000 <>
* 500,000 <>
* ….. …
* 950,000 <>
* 1,000,000 <>
*
* The Java™ application should also meet these technical requirements:
*
* • The application should have at least one class, in addition to the
* application’s controlling class.
* • The source code must demonstrate the use of conditional and looping
* structures.
* • There should be proper documentation in the source code.