Python Coding (list and loops)

 

Instructions:

You will complete this assignment in Python 3.x. Make sure you have downloaded the software, and it is installed correctly. You will download it from this site.

You will code the following and submit it in one file. Use the information in the Lessons area for this week to assist you. Save it as a python file (.py), and upload it into the Assignments area.

  • Create a comment block (starts at line 1 in the code) with the following information:

Joshua Kreider

Week 8

26DEC2020

  • Problem 1: Create a list (or tuple only, no dictionary) that contains the months of the year. ( do not hardcode the month number)
  • Problem 2: Create a loop to print the number and the months of the year from the list. 
  •      The output should like this:

Month 1 is January

Month 2 is February

….

….

Month 12 is December

Server virtualization and cloud computing

 For your written assignment this week, complete a case study of the organization you work for (use a hypothetical or “other” organization if more applicable) that will address the following prompts:

 • Describe the organization’s environment, and evaluate its preparedness for virtualization.

• Explain Microsoft (or another product) licensing for virtualized environments.

• Recommend a configuration for shared storage; make sure to discuss the need for high availability and redundancy for virtualization for the organization.

• Explain Windows Azure capabilities for virtual machines and managing a hybrid cloud, including Windows Azure’s Internet as a Service (IaaS) and storage capabilities

Make a recommendation for cloud computer use in the organization, including a justification for your recommendations.

• Be approximately four to six pages in length (1200-1800 words), not including the required cover page and reference page.

2 DISCUSSIONS 1 CASE STUDY 1 WEEKLY SUMMARY

Discussion 5.1

Describe IAD’s set of top strategies to fit these goals of “Confidence in Cyberspace” guide.

Discussion 5.2

Describe PKI, what is it? What components/parts/parties is it constituted of?  

Case Study 5.1

Describe Four Major Concepts of Cryptography. 

Writing Requirements

  • 3–4 pages in length  (excluding cover page, abstract, and reference list)
  • Include at least two peer-reviewed sources that are properly cited
  • APA format, Use the APA template located in the Student Resource Center to complete the assignment.
  • Please use the Case Study Guide as a reference point for writing your case study.

REFRENCES SHOULD NOT BE OLDER THAN 2015

REFRENCES SHOULD NOT BE OLDER THAN 2015

Weekly Summary 5.1

Each week you will write and submit a brief summary of the important concepts learned during the week. The summary will include a summary of the instructor’s weekly lecture including any videos included in the lecture.

Which is Best: Mean or Median?

 

This week you will use the Bureau of Labor Statistics website to search for income data on the occupation you are seeking.  Visit the following website:  https://www.bls.gov/bls/blswage.htm (Links to an external site.) 

The BLS has wage information for hundreds of jobs and data can also be found by state. There is much information here so take some time to browse around. 

Once you arrive at the site, complete the following steps to gather the data you need to answer the discussion questions.

Part 1

  • Search for information on your occupation by clicking on national wage data 800 occupations. This will take you to the Occupational Employment Statistics page.
  • Scroll to the bottom of that page for a table listing the major and sub-job categories. Note in the first column there is an occupation code. For example, accountants and auditors have the code 13-2011 and are listed under banking and financial operations.
  • Click on the job title to find earnings information. There you will find mean wages as well as percentiles and the 5-number summary.
  • Compare the mean and median pays. For example, the mean pay for accountants was $78,800 and the median was $70,500.
  • Record the information on percentiles, the 5-number summary, the mean and the median.

Part 2

  • Above the data on the occupation page, you will find the following links:
    • National estimates for this occupation
    • Industry profile for this occupation
    • Geographic profile for this occupation.
  • Select the geographic profile to view maps of the states.
  • Scroll down to the map that presents mean wages by state using the color code.
  • Compare the ranges of wages of the states based on the ranges presented. 
  • Identify the highest paying and lowest paying states.

 

Step 3

Include the following in your discussion post:

  • Share the information you found in steps 1 and 2.
  • Discuss your interpretation of the statistics you recorded in Part 1.
    • Percentiles
    • Mean
    • Median
  • How different are the salaries shown in the map of states?
    • What is the range for your state?
    • Would you move to another state based on this data?
    • What other statistics would you want to know before making that decision?
  • What effect do the lowest paid and highest paid states have on the calculation of the mean and median for the United States?
  • Suppose you were asked by a potential employer to request a salary. Which is the best measure to use to find “average” earnings for your occupation? Explain your answer.

week 6 individual

  Minimum 600 words

This assignment should be in APA format and have to include at least two references.

Since it is so dangerous, why would designers install software into the kernel at all (or make use of kernel software)? If you were an antivirus designer or maker, what other methods do you utilize to prevent virus? 

cloud_computing_week8

 Discussion Topic: Define the advantages and disadvantages of securing cloud-based solutions. 

Paper:

Write a paper on securing the cloud. The following are the items to discuss in the paper:

  • Define and discuss the data wiping process.
  • Discuss how a cloud-based solution provider may reduce the risk of a DDoS attack.
  • Define and discuss hyperjacking attacks.
  • Define and discuss guest-hopping attacks.

Paper requirements:

  • Minimum 1200 words (excluding title page, table of contents, abstract, and references pages)
  • Minimum of four (4) references
  • Format your paper consistent with APA guidelines
  • When submitting the assignment, please ensure you are submitting as an attached MS Word document.

Research Paper

** RESEARCH PAPER** 

please address the following in a properly formatted research paper:

1. Do you think that ISO 27001 standard would work well in the organization that you currently or previously have worked for? If you are currently using ISO 27001 as an ISMS framework, analyze its effectiveness as you perceive in the organization.

2. Are there other frameworks mentioned has been discussed in the article that might be more effective?

3. Has any other research you uncover suggest there are better frameworks to use for addressing risks?

Your paper should meet the following requirements:

Be approximately five to six pages in length, not including the required cover page and reference page.

Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 

Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

**DISCUSSION POST**

From your research, discuss whether or not your organization has ISO 27001 certification. Outside of overall protection from cyber-attacks, describe, in detail, some other benefits your organization will achieve in obtaining this certification. If your company does not have this certification, how can they go about obtaining it?

Present your discussion post as if you were presenting to senior leaders of your company.