Intro to Networking: Assignment 2

Must be one full page. At least (2) APA reference. 100% original work. no plagiarism. Attached is the assignment instructions for better viewing.

  • Congratulations, you have been chosen to build out a network for a new facility for your company, ACME, Inc.
  • Office Schematic, (ATTACHED) each office is approximately a 10’x10′ space with 10′ ceilings. Building is roughly 125’x150′.
  • Each office should contain two network ports minimum, one for Voice and one for Data. Room B will serve as your network closet.
  • You will need to provide the following items in your submission:
    • Estimated Purchases list (some examples below)
      • Switches
      • Cable
      • Port plates
      • Punch Boards
      • UPS and Power
      • Etc.
    • A timeline of installation (*estimated)
    • Chosen Typology (*estimated)
    • Basic Network configuration (*estimated)
    • Remember to justify your choices
    • Your proposal should answer the questions above. If you have experience in networking, there are additional things you would “want”, but hold on those till later assignments, as the assignments build upon one another. *NOTE* This means you may reuse information from this assignment in future assignments as well, and I am granting you a waiver of not citing yourself in those assignments.
  • Assignment must be in a Word document. The numbers are going to be rough estimates, that is understood. Pricing for purchases and labor can be based off of pricing from online resources.
  • Required Format
  • A timeline of installation (*estimated) ANSWER
  • Chosen Typology (*estimated) ANSWER
  • Basic Network configuration (*estimated) ANSWER
  • Remember to justify your choices

(internet cyberspace) OSI Characteristics Paper

Write a 2- to 3-page paper.

Identify the 7 layers of the OSI model.

Describe 2 to 3 characteristics, protocols, or functions of each layer (i.e. what happens in each layer or what it does) in 1 to 2 paragraphs each.

Cite at least 2 sources, such as video, library articles, or websites other than your textbook in your assignment.

Format your references according to APA guidelines.

Week 3 Assignment

Question:

 Select a major organization that was located with a major natural disaster area, such as the Hurricane Katrina disaster area. Research their experiences and prepare a report detailing the unexpected challenges the organization encountered in returning their operations to normal. Give suggestions on what might be added to the organization’s contingency plan to mitigate those unexpected challenges.

  • Be approximately four pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook.
  •  The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

NO PLAGIARISM*****

Signature Assignment: Cost Model

https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=&cad=rja&uact=8&ved=2ahUKEwjIkpK09PPxAhUFbs0KHQfFAWUQFjACegQICBAD&url=https%3A%2F%2Fwww.homeworkmarket.com%2Fquestions%2Fwk-3-apply-signature-assignment-cost-model-due-day-7-wk-3-apply-signature-assignment-cost-model&usg=AOvVaw0nnZ_kC68w1zPer-gVuTK3

Discussion

 Re-introduce yourself to the class. Tell us something about yourself. Describe your technical skills and background.. 

Why do you think that a study of Digital Forensics is important?

Cisco Passwords

  

Part 1: Type 5 Cisco Password Hashes

To keep your routers, firewalls, and switches secure, they need good passwords. Type 5 Cisco password hashes employ a technique called salting. Discuss password hashes and salting and discuss password cracking tools or websites that can be used to crack Cisco password hashes. Some of the most popular Linux tools are John the Ripper and Hashcat, which are both already included with the Kali Linux distribution. The Windows tool Cain can also crack Cisco passwords. Use the as is choice and the default wordlist that comes with Cain on the password hashes below. You may elect to crack some of them and explain how you did it for part of this discussion:

$1$mERr$TMFGl3gjZgTURz2zWGujv1

$1$mERr$j2lBkUQmIwqeeIUhzEMH/1

$1$mERr$UeZ8mb786UhNnpZquiKwc0

Part 2: Type 7 Cisco Password Hashes

The Cisco type 7 password is not much better than putting the password in clear text, which is the default if you do not type the command service password-encryption. Discuss password hashes and discuss password cracking tools or websites that can be used to crack Cisco type 7 password hashes. Here is a list of some Cisco password hashes. You may elect to crack some of them and explain how you did it for part of this discussion.

11280B061F1B583342

532E26010C082B070B6F02

46152908515041

09611E590A565451

023057495B085E226D6E

062B3D0D1C4A0E4A44

Write an expression

 1. Write an expression that returns a random value between 1 and 100. The values 1 and 100 must be included in the values that can be returned.

2. Write a Java statement to display the string “The value is 100” to a user in a plain dialog box.

 

3. What is the command you would use to compile the file Addition.java?

 

4. What is the command you would use to execute the Addition class?

5. What does a Java class contain that identifies it as a Java application?

 

6. Write a Java statement that declares a constant called MAX which has a value of 1000.

 

7. How do C++ chars differ from Java chars?

 

8. Given a double variable called dval, write a single Java statement to prompt the user to enter the price of an item using JOptionPanes, convert the result and store it into dval.

 

9. Write one Java statement to display the string “The average is xxx” to the console, where the xxx displays the value from the double variable sum divided by 3. Make sure the value is displayed with 3 digits following the decimal point.

 

10. Write a Java method which takes an integer array parameter and fills the array with random numbers between 1 and 1000, including 1 and 1000. Use a traditional for loop to process the array.

11. Explain the difference between an object reference in Java and an object. Use an example to illustrate your answer.

 

12. Explain how objects are created in Java and how the memory used by objects is recovered. Compare this to object creation and destruction in C++.

13. Explain how primitive values like doubles are passed between functions in Java. How are string objects passed between functions in Java? 

14. How are static methods different from non-static methods? How do you invoke a static method? Give an example of a static method.

15. What is the Java source filename extension? What is the Java bytecode filename extension?

 

16. Write one Java statement that creates an array of 100 doubles.

 

17. Write one Java statement that creates an array of integers containing the multiples of 10 between 10 and 100, including 10 and 100.

 

18. Write one Java statement that would take an array A and copy its contents into array B. Assume that A and B already exist and that B is at least as large as A and that they are both of the same data type.

 

19. Write a Java method which takes an integer array parameter and locates the minimum value in the array and outputs that value using System.out.printf. Use an enhanced for loop to process the array. You only need one loop to do this!

 

20. Write one Java statement to create a string containing “The average is xxx” where the xxx contains the formatted value from the double variable sum divided by 3. Make sure the formatted string contains only 2 digits following the decimal point. Store the formatted string into a String variable called str.

Big Data Final Year Projects

 Takeoff projects help students complete their academic projects. Register at takeoff projects today to find and learn about different interesting big data projects and grab the best jobs. Get started right now.