Discussion-II

 

Name the three essential elements of a basic structured cabling network? How are they installed and what are the components that are involved with them? 

Search the peer-reviewed literature to identify its potential impact on networking and what measures can be put in place to minimize the effect. 

Research Paper: Server Virtualization

 

complete a case study of the organization you work for (use a hypothetical or “other” organization if more applicable) that will address the following prompts:

  • Describe the organization’s environment, and evaluate its preparedness for virtualization.
  • Explain Microsoft (or another product) licensing for virtualized environments.
  • Recommend a configuration for shared storage; make sure to discuss the need for high availability and redundancy for virtualization for the organization.
  • Explain Windows Azure capabilities for virtual machines and managing a hybrid cloud, including Windows Azure’s Internet as a Service (IaaS) and storage capabilities
  • Make a recommendation for cloud computer use in the organization, including a justification for your recommendations.

Submit your research paper as a single document. Your paper should meet the following requirements:

  • Be approximately 2-4 pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Security Architecture & design discussion

Length: Minimum of 400 words

Due date: Sunday, November 22, 2020 by 4:00PM EST

Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references.

Question:
Why do good requirements go bad?  What can be done to prevent things from going bad?

Ethical Paper

 Submit in a word document, template attached. Be careful, make sure to avoid plagiarism and to use quotation marks and proper citation as required. Length should be one page. Use APA format for citations and the required References page. Remember that the significant portion of your analysis should be in your own words. Attached is the assignment, template, and prior paper to use as a guide. 

Class diagram and sequence diagram

As the head of information systems for a college you are tasked with developing a new student 
registration system. The college would like a new client-server system to replace its much older system 
developed around mainframe technology. The new system will allow students to register for courses 
and view report cards from personal computers attached to the campus LAN. Professors will be able to 
access the system to sign up to teach courses as well as record grades.
Due to a decrease in federal funding, the college cannot afford to replace the entire system at once. The 
college will keep the existing course catalog database where all course information is maintained. This 
database is an Ingres relational database running on a DEC VAX. Fortunately the college has invested in 
an open SQL interface that allows access to this database from college’s Unix servers. The legacy system 
performance is rather poor, so the new system must ensure that access to the data on the legacy system 
occurs in a timely manner. The new system will access course information from the legacy database but 
will not update it. The registrar’s office will continue to maintain course information through another 
system.
At the beginning of each semester, students may request a course catalogue containing a list of course 
offerings for the semester. Information about each course, such as professor, department, and 
prerequisites, will be included to help students make informed decisions.
The new system will allow students to select four course offerings for the coming semester. In addition, 
each student will indicate two alternative choices in case the student cannot be assigned to a primary 
selection. Course offerings will have a maximum of ten students and a minimum of three students. A 
course offering with fewer than three students will be canceled. For each semester, there is a period of 
time that students can change their schedule. Students must be able to access the system during this 
time to add or drop courses. Once the registration process is completed for a student, the registration 
system sends information to the billing system so the student can be billed for the semester. If a course 
fills up during the actual registration process, the student must be notified of the change before 
submitting the schedule for processing.
At the end of the semester, the student will be able to access the system to view an electronic report 
card. Since student grades are sensitive information, the system must employ extra security measures to 
prevent unauthorized access.
Professors must be able to access the on-line system to indicate which courses they will be teaching. 
They will also need to see which students signed up for their course offerings. In addition, the professors 
will be able to record the grades for the students in each class.
Give below are the UML Use Case Diagram and Use Case Specifications (Descriptions). Your task is to 
draw the Sequence and Class Diagram(s).

internet security

You are a security specialist and have been asked to provide a     presentation  to the CSU Medical Center. Your audience consists of medical     receptionists,  doctors, and finance personnel. Summarize the concepts of the    threat triad and  C-I-A triad on how patient information is handled by the     different jobs within  the medical facility. Hint: Does the receptionist need     billing information, or  the finance department need patient prognosis, or do     doctors need patient  addresses? Explain who needs what information and how     C-I-A helps protect that  information.  

Your completed PowerPoint presentation should be 8 to 10 slides in length.

Research Paper

 

This week’s reading centered around Bitcoin Economics.  For this week’s research paper, search the Internet and explain why some organizations are accepting and other organizations are rejecting the use of Bitcoins as a standard form of currency.  Your paper needs to identify two major companies that have adopted Bitcoin technology as well as one that has refused accepting Bitcoin as a form of currency. Be sure to discuss each organization, how they adopted (or why they won’t adopt) Bitcoin, and what recommendations you have for them to continue to support Bitcoin (or why they should support Bitcoin).

Your paper should meet these requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Reflection Papers:

  

Reflection Papers: The reflection papers assignments help students to review the change management concepts and lessons learned during module. 

Week Six Reflection Paper:  Identifying the attributes of what makes a meaningful vision statement is an important skill for the change manager.  This assignment gives students practice in critically assessing vision statements to finding the Vision “Wow” Factor.

1. Find the vision statements of  Three (3) different companies that you are interested in. You can get these either from annual reports or from online searches. If you prefer, take the vision statements outlined in Vision Statements from Fortune 100 Companies (p.178).

2.  Choose two different frameworks from Table 6.3 (p. 177).

3.  Assess the vision statements in relation to the two frameworks.

4.  What are your conclusions about each of the visions? Do they have the “wow” factor? Why?

Use the questions above as a guideline to support your viewpoint.

Değerlendirme Listesi

Reflection Paper Rubric

   

Reflection Paper    Rubric

 

Kriter

Oranlar

Puan

 

Bu kriter bir öğrenme çıktısı   ile ilişkilendirilmişCritical Insight

Student explores   issues/problems from critical standpoint using class resources (lessons,   text, slides, discussions).

   

25,0 puan

Full Marks

0,0 puan

No Marks

25,0 puan

 

Bu kriter bir öğrenme çıktısı   ile ilişkilendirilmişKnowledge of Subject Matter

Student demonstrates strong   understanding of subject matter

   

25,0 puan

Full Marks

0,0 puan

No Marks

25,0 puan

 

Bu kriter bir öğrenme çıktısı   ile ilişkilendirilmişPast Experience

Student provides insight to   inform on issues/problems based on past experiences, hindsight, and   lessons-learned; use of examples and/or stories to enhance understanding of   topic

   

25,0 puan

Full Marks

0,0 puan

No Marks

25,0 puan

 

Bu kriter bir öğrenme çıktısı   ile ilişkilendirilmişGrammar and APA

Student employs formal   writing skills and strong grammar skills (punctuation, vocabulary,   organization, transition of thought) as well as use of proper APA guidelines   for both bibliography/references and Intext Citations

   

25,0 puan

Full Marks

0,0 puan

No Marks

25,0 puan

 

Toplam   Puan: 100,0 puan

WS&F

For the final project, you will be conducting a forensics investigation using one of the following items:

  1. A smartphone
  2. A network (ideally, a wireless network)

 You will review various forensics tools used with your selected system. Select a tool and use that tool to gather forensics data for analysis. You are simulating the process of gathering this data, so you do not need to investigate a compromised device or system. The project deliverables are as follows:

 Week 7 – Prepare an investigative report of the forensics data capture conducted using the tool selected for this purpose. The paper should provide the following information: 

  • Executive Summary of your investigation, including a description of the device or systems and the tool used for the forensics analysis
  • Step-by-step description you used to gather data for analysis
  • Report on the information that was obtainable from the device
  • Graphics evidence that you conducted the forensics data gathering and analysis

 The paper should be in a form that would be used for reporting to a court or a law enforcement agency. Be sure to provide graphics evidence of your forensics investigation effort (Screenshots, reports, etc.). References should be in APA format.