dicussion-9

 

The shared security responsibility model that a dba must be aware of  when moving to the cloud.

Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes.

Automation Testing Script using Celenium Java

Please request the candidate to have below 2 sets of exercises (Java8 and above) completed by tomorrow and share the GitHub link

 1. Selenium WebDriver – Page Object Model:

1. Visit amazon.com Page

2. Search for Book ‘qa testing for beginners’

3. Click on 1st item in the listed results.

 

4. Before Click on add to cart Add to Cart asset price from Step3. 

5. Click on Add to Cart.

6. Before Click on Proceed to Checkout asset price from Step3.

7. Click on proceed to checkout

5. On the checkout page assert price from Step3.

 2. API automation using Rest-assured or Karate API Test

 1. Use any 2 methods(Get, and Delete) from end-points listed in

http://dummy.restapiexample.com/

2. Perform assertions for 

   – Get & Delete – Status code to be Successful.

   – Get – Return specific Employee details(Any).

   – Delete – “message”: “successfully! deleted Records”.

bharg discussion

 In discussion 5, we looked at networks in general; however, in this discussion we’re looking at wireless networks, mostly focusing on mobile networks.  Mobile networks in a global economy can be a challenge for multiple reasons.  First, governments in other countries control the mobile networks.  Second is the technology.  Mobile networks in other countries might not be as good as the mobile networks within the US.  As a global company, how can we deal with this?  With a big push for 5G, which has speeds well over 2Gbps, how does that change the way you do business?  What are some things you need to think about when it comes to doing business globally, using a wireless mobile network? 

200-250 words

 

Kirk (2016) tells us that all requirements and restrictions of a project must be identified.  Select 1 key factor below and discuss why Kirk (2016) states it will impact your critical thinking and shape your ambitions:

People: stakeholders, audience.

Constraints: pressures, rules.

Consumption: frequency, setting.

Deliverables: quantity, format.

Resources: skills, technology

Textbook:http://dl.booktolearn.com/ebooks2/computer/graphics/9781526468925_Data_Visualisation_050a.pdf

Cloud computing_31_1

 Write a 2-3 page paper where you compare and contrast the differences between IDaaS, IaaS and IAM. The submission needs to include a minimal of 3 scholarly resources in APA format.

Please include the reference and citation. Need by 11/01 11:00 am.

Computer crime affects

 

Overview:

In Chapter 2 we talked about how computer crime affects forensics and you learned about the following categories:

  1. Identify theft
  2. Hacking systems for data
  3. Cyberstalking / harassment
  4. Internet fraud
  5. Non-access computer crimes
  6. Cyberterrorism

Instructions

For this week’s assignment, please do some external research and identify at least three actual events for each category. Detail what happened and be sure to cite your sources. The intent here is to help you understand how the world is truly internetworked and why digital forensics is an important role in our environment.

security architecture 10.1

 Since it is so dangerous, why would designers install software into the kernel at all (or make use of kernel software)? If you were an antivirus designer or maker, what other methods do you utilize to prevent virus? 

 Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references.  Minimum of 400 words 

week-7-BT

From our weekly chapter reading, digital preservation can be defined as the long-term, error-free storage of digital information, with means for retrieval and interpretation, for the entire time span the information is required to be retained.  Though this assessment holds true to the authors, business organizations continue to face significant challenges in meeting their LTDP needs, especially those organizations whose primary mission is to preserve and provide access to permanent records.

Looking at your identified industry for your paper, what considerations would have to be made in developing a long-term archival plan for a company within that industry?

CLoud_computing_week_9

 Discussion Topic: Define and describe Service-Oriented Architecture (SOA). Compare and contrast a web page and a web service. 

Paper Topic: 

Write a paper on disaster recovery and business continuity. The following are the items to discuss in the paper:

  • Define and describe business continuity.
  • Define and describe disaster recovery.
  • Discuss pros and cons of cloud-based backup operations.
  • Discuss threats to an IT data center infrastructure and provide cloud-based solutions to mitigate the risks.

Paper requirements:

  • Minimum 1200 words (excluding title page, table of contents, abstract, and references pages)
  • Minimum of four (4) references
  • Format your paper consistent with APA guidelines
  • When submitting the assignment, please ensure you are submitting as an attached MS Word document.