Networking
power point presentation Topic related to subject “Decision Mkg/Essent Bus Comm “
question 2.
power point presentation Topic related to subject “Decision Mkg/Essent Bus Comm “
Audit Report Presentation (power point presentation)
what is audit report (audit report means opinion on whether a company’s
financial statements comply with generally accepted accounting principles)
below i have attched , how to make audit report presentation.
please read every step and work on the power point presentation
power point presentation(total 150 points ). Must and should cover below points
Content 40 points
Quality of Content 60 points
Organization 15 points
Written Communication 15 points
Visual Aids 10 points
Presentation Style 10 points
Assignment 1: Network Infrastructure Design Diagram
Background: Kamehameha Institute is an organization that provides educational offerings to non-traditional students. The organization has tailored its unique educational offerings into the groups shown in Table 1 below:
Table 1. Kamehameha Educational Offerings.
GroupOfferingKamehameha BrandedFocused on the general public/provides services directly to its studentsCo-BrandedProvides the same services as Kamehameha Branded but resold by a third party and labeled as “…. Kamehameha Strong”White Label BrandedWhile the service offering is the same, these services are labeled solely with the third parties’ information
The State of Hawai’i regulates the educational sector, driving the need to ensure Kamehameha follows the State’s strict security and regulatory requirements. Kamehameha’s leadership is also very concerned with the threat posed by the online theft of their unique intellectual property. Additionally, the number of Hawai’ian entities breached by threat actors is on the rise. Thus, security, privacy, and compliance are all important considerations for the Kamehameha network architecture.
Your boss, the Kamehameha Institute’s Chief Operating Officer (COO) has tasked you to design a network infrastructure for three facilities located in the Hawaiian Islands of Honolulu, Hilo, and Lihue. The COO stipulated that you must separate the three group offerings in Table 1 and provide for strengthened defenses to protect Kamehameha’s cultural heritage. After meeting with the COO, the two of you drafted the following set of requirements for your network design:
· Each of the facilities has three floors:
· The first and second floor of each building requires 150 network connections each
· The third floor of each building houses a data center and requires 75 network connections
· The Honolulu location requires additional network connections for failover purposes
· The Hilo location will be the primary data center and house redundant database servers
· The Lihue location will serve as a failover data center and house the primary web servers (including the primary application and primary database servers)
· A constant connection between the three locations, carrying at least 75 Mbps of data
· All servers at all locations must have redundancy
· Protection from intrusions is required and should be documented
· A plan to verify security and failover measures is required
· Submission: Using the free tool, daw.io available at https://draw.io (no sign-in or registration required), create a network diagram (drawing) specific to the organization that encompasses the three facilities and also depicts ant necessary interconnections. Figure 1 shows the draw.io ‘new network diagram’ dialog window:
Figure 1. Draw.io New File Dialog Showing the Network Diagramming Templates
Your diagram should include enough detail to show the topology interconnections. The viewer should be able to understand the Kamehameha Institute’s network environment and be able to implement the architecture you develop. Ensure that you properly cite any external sources.
One of the keys to producing a viable network diagram is labeling the objects consistently and descriptively. Think about what you would want to know about a network device if you logged into it with little prior information. Consider location, floor number, or other pertinent information. At a minimum, include the following elements:
· IMPORTANT: Your network diagram must include an identifying label (e.g., callout box) that includes your class and section, assignment title, your name, and the date. Edit the items in italics. Your assignment will not be accepted if this element is missing:
Table 2. Example Network Diagram Callout Box.
CMIT 350 6980 Project #1 Network Diagram Student Name: Name Date: 6/22/2010
· Any necessary hardware
· Site-to-Site (WAN) connections (e.g., leased line connectivity, satellite, etc.)
· Annotate the following values for each of the Sites:
· Network ID
· Useable Range
· Subnet Mask
· CIDR Value
· Broadcast Address
· All devices require hostnames complying with the following naming conventions:
· Routers: Rx; where x is the site number incremented by a value of 1 for each router
· Switches: Sx; where x is the site number incremented by a value of 1 for each switch
· Servers: SRVx where x is the server number incremented by a value of 1 for each server
· For each site router, implement a private ip addressing scheme using a range suitable for corporate infrastructure and include the following:
· management vlan
· production vlan
High availability
When finished, export the diagram as a PDF document (Note: You will need to use this diagram again in Project 3, so ensure you save the xml source file!) and submit it to the Assignment folder. Figure 2 demonstrates how to export your draw.io diagram as a PDF document:
Figure 2. Draw.io ‘Export’ as Function to PDF
How Will My Work Be Evaluated?
1.1.3: Present ideas in a clear, logical order appropriate to the task.
2.2.2: Evaluate sources of information on a topic for relevance and credibility.
10.1.1: Identify the problem to be solved.
10.1.2: Gather project requirements to meet stakeholder needs.
10.1.3: Define the specifications of the required technologies.
13.1.1: Create documentation appropriate to the stakeholder.
13.2.1: Evaluate vendor recommendations in the context of organization requirements.
Question
Discussion Question #1: How do you describe the importance of data in analytics? Can we think about analytics without data? Explain.
Discussion Question #2: Considering the new and broad definition of business analytics, what are the main inputs and outputs to analytics continuum?
Discussion Question #3: Where do the data for business analytics come from? What are the sources and nature of those incoming data?
Discussion Question #4: What are the most common metrics that make for analytics-ready data?
Exercise #12:
Go to data.gov – a US government-sponsored data portal that has a very large number of data sets on a wide variety of topics ranging from healthcare to education, climate to public safety. Pick a topic that you are most passionate about. Go through the topic-specific information and explanation provided on the site. Explore the possibilities of downloading the data and use your favorite data visualization tool to create your own meaningful information and visualization. Show your visualization on your assignment submission
Wk 1 – Apply: Positive Rights Table
Table to use is attached.
Complete a 1- to 2-page table using the Positive Rights Table Template provided comparing your opinion of the rights listed below to a corresponding ethical theory:
- The right to a higher education
- The right to private phone conversations
- The right to health care
- The right of a presidential or government candidate to receive time on television
List 1 ethical challenge that could impact a U.S. company that wants to acquire a non-U.S.-based company.
Cloud Computing and Digital Forensics
1.)
In 500 words or more, compare DNS failover and cloud failover.
Use at least three sources. Use the Research Databases available from the Danforth Library as your first choice. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list. Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs. Stand alone quotes will not count toward the 3 required quotes.
Write in essay format not in bulleted, numbered or other list format.
2.) Using Chapter 10 as a reference (refer to uploaded file), Explain the concept of information stores. Why is an understanding of how different clients store messaging information critical to the success of an email search?
Write your answer using a WORD document.
Differences & Similarities Between Windows, Linux and Mac (infographic, table, or chart listing)
Create an infographic, table, or chart listing the similarities and differences between Windows, Linux, and the MAC OS X. Include the following areas: Functionality, Graphical User Interface, Security, User Access, Encryption, etc. Include an introductory paragraph describing your graphic, table, or chart.
Feel free to be creative in how you develop this assignment. You can complete this using any application you have available, such as Word, PowerPoint, Visio, etc. Your submission should have proper attention to formatting, spelling, grammar, and punctuation. It should be in a format easily viewed on a standard Windows PC.
Discussion forum on chapter readings
Required Textbook: Tapscott, D., &Tapscott, A. (2016). Blockchain revolution: how the technology behind bitcoin is changing money, business, and the world. Penguin.
Chapter-10: Overcoming Showstoppers: Ten Implementation Challenges
Chapter 10 introduced ten blockchain implementation obstacles.
Discussion:
1.choose two obstacles from those discussed in chapter 10, then describe them and how they could disrupt blockchain acceptance.
2.Also, describe how you would overcome each of these obstacles.
3.Then think of three questions you’d like to ask other students. The questions should be taken from material you read in Chapter 10 . You’re not trying to test each other, but you are trying to start a discussion.
Write 500 words paper
200-250 words discussion
As you all read, according to Kirk (2016), most of your time will be spent working with your data. The four following group actions were mentioned by Kirk (2016):
- Data acquisition: Gathering the raw material
- Data examination: Identifying physical properties and meaning
- Data transformation: Enhancing your data through modification and consolidation
- Data exploration: Using exploratory analysis and research techniques to learn
Select 1 data action and elaborate on the actions preformed in that action group.
Please make sure you have an initial post (about 200 words) and a comment/post to one of your friends’ posts.
Intel Monopoly
After reading the section titled “Dominant Microprocessor Company Intel Adapts to Next Trend” and the article titled “2018-2019 Intel Corporate Responsibility Report: Creating Value through Transparency,” complete a list of reasons how a single firm like Intel comes to dominate some markets. Although this assignment allows you to create a list, you must follow the APA style of writing and include research to support your list and place this information in your reference section.
Why do you think Intel is a Monopoly ?