text me to send you the file
Wk 2 – Apply: Configuring and Deploying a Private Cloud with System Center 2012
he director of IT has indicated that the Board of Directors is compiling a corporate portfolio on ethics and has asked all departments to contribute information on how a code of ethics impacts daily decisions. The director of IT has asked for you to help by providing an example.
Using the links provided, research at least 2 of the following codes of ethics:
- (ISC)2 Code of Ethics
- The International Council of Electronic Commerce Consultant (EC-Council)
- System Administration, Networking, and Security Institute (SANS)
- Global Information Assurance Certification (GIAC)
- SANS IT
- Institute of Electrical and Electronics Engineers (IEEE)
Write a 1- to 2-page ethical choice example using Microsoft® Word. Complete the following in your document:
- Reflect on ethical considerations for each type of data involved (e.g., Active Directory user information, reporting information,logs). Explain how to apply your knowledge of ethical theories to decisions you would make as a security administrator for System Center 2012.
- Select 2 of the codes of ethics you researched and quote the items you would use in your corporate code of ethics. Explain how they would help you implement ethical choices when working as an administrator of System Center 2012 Active Directory user information, reporting information, and logs.
Cite any references to support your assignment.
Format your assignment according to APA guidelines.
Submit your assignment.
Access control discussion 10
What are authentication factors and what are the risks associated with them?
It must be at least 450 words and have references.
No plagiarism and no grammar mistakes and need APA format.
properly cite the references.
BS W7
In 250 words
Use the Web to search for methods to prevent XSS attacks.
Write a brief description of more than one method
ERD Diagram, Project, Using MySQL
Build out the ERD diagrams for the entire solution based on the following questions (you must have at least 3 tables for full credit, there is no limit based on your simplification of the data. The simplification of the data should follow the in-class examples of data, with no duplication in tables)
Provide
I. The MYSQL code (within the word document) to build the database and tables
II. The MYSQL code (within the word document) to answer each of the following questions
III. Provide screen shots answering each question along with any supporting text
The answers must be done in SQL, not table presentation and manual interpretation of the data
Questions :
1. What is the total revenue for the year?
2. What is the gross profit for the year? (based only on what is in the tables)
3. How much revenue did each wine provide for the year?
4. What is the Average revenue per month per location for the year?
5. What is the final inventory of the Premium Red wine?
6. If the retail price of the wine increases by 10%, what is the gross profit margin ?
7. How many bottles of the different wines were ordered in July?
8. What is the revenue per year per restaurant?
security architecture and design 7
What is the difference between VA(Vulnerability Assessment) and PT(Penetration Testing)? Per enterprise security assessments?
wk3_dis 632
- Provide the title of your term paper (note: you may change the wording in the official title in the final version however, you cannot change the topic once you select one)
- Include an introduction on the topic
- A minimum of 3-5 references in proper APA format
Research Paper 12
We have viewed how Blockchain has made a significant impact on businesses and industries. Select one industry and highlight the advancements Blockchain has had on that single industry.
Your paper should meet the following requirements:
- Be approximately four to six pages in length, not including the required cover page and reference page.
- Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
- Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
- Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.
Presentation Computer Science
Summarize the following subjects of Chapter 3
- Different types of network circuits and media
- Digital transmission of digital data
- Analog transmission of digital data
- Digital transmission of analog data
- Analog and digital modems
- Multiplexing
Discuss & Present TWO of the following subjects:
5- space-based global Internet service
https://www.youtube.com/watch?v=hXa3bTcIGPU
https://www.blueorigin.com/news/blue-origin-to-launch-telesats-advanced-global-leo-satellite-constellation
https://www.starlink.com/
https://www.oneweb.world/
6- Select and present a Network topic from IEEE Spectrum
https://spectrum.ieee.org/computing/networks
Introduction to Data Communication and Networking
Discuss the ethical of using network tools such as privacy. Provide examples from your outside research to support your comments. Use at least two outside sources other than your textbook.
Below are two articles to help with developing a coherent discussion:
- http://www.windowsecurity.com/articles-tutorials/misc_network_security/Ethical-Issues-IT-Security-Professionals.html
- https://tools.ietf.org/html/rfc1087
Writing Requirements
- APA format, 2-3 pages in length (excluding cover page, abstract, and reference list)
- Minimum of 2-3 peer reviewed resources
- APA format, Use the APA template located in the Student Resource Center to complete the assignment.