WRTG 393 6368 Advanced Technical Writing

 

1. Describe a possible white paper for an external audience.  Keep in mind that, for a white paper to an external audience, you will not be writing to an audience for an organization of which you are a member.  In other words, you would not write a white paper to your boss about the need to correct a problem in your company.  That would be an internal white paper because you are a part of the company.

You would not write a white paper to the board of directors of your son’s soccer league about the need to address a problem in the soccer fields.  That would be an internal white paper because you are a part of the soccer league.

However, you could write a white paper to other companies about a product or service that your company sells or offers.  

Or you could write a white paper to soccer leagues around the country about problems in soccer fields. 

For example, let us consider an example of a person named Susan.  She works for a company that has developed a new method of training IT personnel.  She could write a white paper for companies that have IT departments.  The white paper might compare current methods of training IT personnel to the new method that her company has created.  

This would be an example of an external audience, as Susan is not familiar with the individuals who will read her white paper, does not work for these companies, and is not involved in these companies.

Or we can consider an example of a person named Joseph.  He works for a company that had a bad experience in moving its data to the cloud.  He could write a white paper for companies that are considering moving their data to the cloud.  The white paper would discuss current reasons companies are considering moving to the cloud in light of the pitfalls of moving to the cloud that Joe feels companies should be aware of.

This would be an example of an external audience, as Joseph is not familiar with the individuals who will read his white paper, does not work for the companies that might benefit from it, and is not involved in these companies in any way.

2. Describe what terms you might need to define or what concepts you might need to explain for a white paper of the type you mentioned in task #1 above.  For example, a white paper that gives cautions about moving to the cloud will have to define certain cloud terminology for its audience.  A white paper that describes a new method of training IT personnel will have to define certain terms used in IT now. 

Web Design

 Discuss the importance of mobile applications in web design. Answer with 6 to 7 sentences.

————————————————————————————————————

Discuss the following: Answer with 6 to 7 sentences

  • Explain the importance of resizing images
  • Why is it important to use alt tags for all foreground images

—————————————————————————————————-

 

Please answer all of the following questions. Each answer should be two sentences

  1. What is the difference between a

    and
    ?

  2. When should an

    tag be used?

  3. Explain the steps to place a txt file directly into an HTML file

 Save as Word file called Project-02-Questions-FDL

————————————————————————————————————-

Wk 4 – Apply: Disaster Recovery Plan

Assignment Content

  1. Consider a large health clinic with a dozen doctors and approximately 80 nurses and support staff. The building houses a small computer room with 4 servers to support the clinic’s patient database, email services, file storage and medical applications and all laptops and desktops have a specialized medical client application and are encrypted with licensed full disk encryption software. As an IT consultant supporting this clinic, you need to develop part of a Disaster Recovery plan covering 4 keys areas.

    You need to specifically address how to quickly accomplish the following to enable operations within 24-48 hours:

    • An alternate location to operate from
    • Replacement of damaged/lost servers, workstations and laptops and business applications installed on them.
    • Backup, Security and Restoration of office and patient information
    • Methods of communicating with staff during the disaster
    • Be sure to be proactive in your plan, that is what a plan is for.

Discussion

 

Wk 7 Discussion

Research the variety of enumeration tools available. Select one tool and explain what it does, how it works and what type of information it extracts (example:  Softerra LDAP Browser is the industry-leading software for browsing and analyzing LDAP directories. It provides a wide variety of features for handy viewing of directory contents, getting information about directory infrastructure and objects.)

 

Week 7 Discussion

Describe some ways that an administrator can harden a system on a network.

Post should be between 250-300 words

Prompt Thus far in our class we have read and discussed a wide variety of arguments for specific foreign policies beginning with the early Republic though the start of the Second World War. Doing so has allowed us to see how certain ideas, arguments, and

 

Prompt

Thus far in our class we have read and discussed a wide variety of arguments for specific foreign policies beginning with the early Republic though the start of the Second World War. Doing so has allowed us to see how certain ideas, arguments, and themes have changed in response to new threats and opportunities. Although all of these arguments were made prior to the advent of modern game theory, they all nevertheless employ implicit or explicit strategic logic. Indeed, given our readings in the intellectual development of US foreign policy, it is clear that the earliest statesman of the United States understood the role of strategy and advocated for policies which they believed were in the best interests of America’s strategic place in the world.

In this essay, you are to select 4 selections from previous readings and analyze their strategic logic. You can choose any selections that we have read thus from Ideas and American Foreign Policy. Possible questions to consider include (but are not limited to):

  1. Do the early policy-makers advocate for positions which make strategic sense? Why or why not?
  2. Are there lessons from the early history of American foreign policy which can be applied today?
  3. Why do several others seem to point to the same principle but reach different conclusions? Is it because some misunderstood or were misrepresenting the principle, or because the application of the principle changed according to different fact-patterns in the changing landscape of international politics?
  4. Is America safer with a foreign policy of engagement with the world or with a turning away toward insular concerns?

Guidelines

Your paper should follow the standard 5 paragraph essay, with one paragraph for an introduction, one for a conclusion and three well-written paragraphs which defend or otherwise advance your thesis. If necessary, you may include an additional 2 paragraphs for a total of 7 paragraphs. Your paper should therefore be about 1000-1400 words.

Your paper must have a clearly defended thesis. You must also rely only on the texts to justify your position. Outside citations are not permitted: this is not a research paper but a sustained reflection on the course to this point.

You be graded on the quality of your thesis, evidence, logic, formatting, and spelling/grammar.

The best papers will, in addition to a clearly articulated and defended thesis, format their papers in line with the Chicago Manual of Style. Papers should use 1″ margins on all sides, use 12pt Times New Roman Font, and double spaced text. Include a formatted title page. For additional information on these guidelines, see the formatting handout given in class. (If you were not in class, you should consult Kate Turabian, A Manual for Writers, Eighth Edition[Chicago Press].).

assembly language

CSP25 Assignment 05
Question 1 (From Chapter 5)
The RandomRange from the Irvine32 library generates a pseudo random integer between 0 and
N-1. Your task here is to improve this by generating a random  number between M and N-1. Let
the user specify M in EBX and N in EAX.
Here is a sample test of this procedure whose name will be BetterRandomRange in your
program.
MOV EBX,-300   ;M is -300
MOV EAX,100   ;N is 100
Call BetterRandomRange

You should call this BetterRandomRange procedure in a loop to be repeated 20 times and display
the value return 20 times also.

Make sure you have the following at the top of your Assembly code file. Fill it up accordingly
such as the name of the asm file will be Assignment05.asm
; Program Template (Assignment01.asm)
; Program Description:
; Author:
; Creation Date:
; Revisions:  
; Date:Modified :
Also make sure to document your Assembly code.

What to submit?
TWO files.
1. Copy your program and paste it to a text editor such as Notepad and save file as .txt file
then submit this text file.
2. A pdf file that has your code (copied or screenshot) and output of dumping of your
registers.
 

SECURITY POLICY & STANDARTS

Please write a 1-2 page synopsis on the following topic.

Security awareness training is often the first view a typical user has into information security. It’s often required for all new hires. Think of it as the first impression of management’s view of information security. This is management’s opportunity to set the tone. Most individuals want to do a good job, but they need to know what the rules and expected behavior are. That is one of the purposes of a security awareness policy.

Answer the following question(s):

1. What do you think are the two most important practices that should be incorporated into a security awareness policy?

2. Why do you rank them so highly?

The following information

  

1. The following information is listed for the configuration of a router: Internet Port: MAC Address – 00:21:3D:AE:2C:A6 IP Address – 70.115.23.137 DHCP – DHCP Client IP Subnet Mask – 255.255.240.0 Domain Name Server – 209.18.47.61, 209.18.47.62 LAN Port: MAC Address – 00:21:3D:AE:2C:A5 IP Address – 192.168.1.1 DHCP – OFF IP Subnet Mask – 255.255.255.0 

(a) The two MAC addresses are different. What is a MAC address, and why are the two different even though this is a single router? 

(b) The two IP addresses are different. What is an IP address, and why are the two different even though this is a single router? 

(c) Since DHCP is disabled on the router, it is not assigning addresses on the LAN. If setting a static IP address for a device on the LAN, what range of addresses could be utilized? 

2. List at least four services that are part of the internet and differentiate what each facilitates. You should include the World Wide Web as one of your four services.

à i) WWW

ii) DNS

iii) FTP

3. For the network that you have chosen to characterize, list the MAC Address, IP Address, IP Subnet Mask, Gateway Information, and DHCP and DNS Information for each network connection (all NICs in each computer as well as all network device connections). Based on this information, explain the flow of information in and configuration of this network. 

Q) Hash tables (8 points)

This question looks at the behavior of the hash() method in the hash symbol table classes LinearProbingHashST and SeparateChainingHashST. You are given the following list of twelve strings:

  • Erdos
  • eRdos
  • erDos
  • erdOs
  • erdoS
  • erdos
  • Knuth
  • kNuth
  • knUth
  • knuTh
  • knutH
  • knuth

Note carefully which letters are upper case and which are not.

  1. Applying the hash method in either of the classes named above (it’s the same method in both) and which we often discussed in class, write two lists. The first contains each string and its hash value when the table size is 29 and the second contains each string and its hash value when the table size is 30.
  2. Assuming the strings are inserted into a linear probing hash table in the order given, what is the index where each ends up in each table? Again write two lists. The first contains each string and the index where it ends up in the table of length 29. The second contains each string and the index where it ends up in the table of length 30. Please list the strings in increasing order by index, not in alphabetical order by string.

As an example of what the lists should look like, here are the lists for a table of size 31.