Assignment

The paper is an old but important publication in the history of operating systems. The paper is A. Bensoussan and R. Daley, “The Multics Virtual Memory: Concepts and Design”, Proceedings of the Symposium on Operating Systems Principles, 1969.” As usual, I would like a summary, followed by a separate section containing your reaction. As I continue to read your submissions, in many cases the summaries are better than the reaction sections, in the sense that they were given more attention, or they are so commingled that I can’t tell the summary and reaction apart. Please physically separate the two sections (using ‘Summary’ and ‘Reaction’ headings would be a good way to do that) and give some serious, critical thought to what you have read.

Project 1: Vulnerability and Threat Assessment Step 3: Develop a Comprehensive Work Breakdown Structure (WBS)

Within the previous step, the SoW report conveyed a brief overview of the organization’s critical aspects and a list of the organization’s security needs. Now, you are ready to develop a comprehensive work breakdown structure (WBS).

This breakdown provides more detail, so you will need to devise examples of procedures you might recommend to your organization. Some examples include a penetration test, baseline analysis, or system logging. Note the tools and techniques to use in conducting a vulnerability assessment to be used later in the project.

Using a spreadsheet, create the comprehensive work breakdown structure, including key elements that must be tested and analyzed. Organize the spreadsheet using the elements identified in the SoW from the previous steps and the following:

  • internal threats: personnel, policies, procedures
  • external threats: systems, connectivity, databases
  • existing security measures: software, hardware, telecommunications, cloud resources
  • compliance requirements: legal aspects (federal, state, and local), contractual demands up and down the supply chain

Note the security threats and vulnerabilities. This plan will serve as the second section of the final vulnerability assessment report.

Write an outline of the pdf file attached.

 Re-create an outline of the article provided for this week’s assignment.  What guideline/outline would the authors of this article have created before they started to write the article.  Your outline of this article would include the various sections of the paper such as an abstract, keywords, introduction etc. as well as subheadings and any figures/tables which were included.  Very briefly summarize what information is in each section/subheading in no more than 2 sentences. 

 You will have  to include references in your paper as well as ‘in-text’ citations in APA format like the references and in-text citations in the article you are to read.  You will be also writing a literature review covering some topic in computer science. 

it473 week7

 

Mixing two or three of the three primary colors of light with varying degrees of intensity can produce a wide range of other colors. Discuss (research) the difference between mixing light and mixing paint/pigments. 

 Mixing two or three of the three primary colors of light with varying degrees of intensity can produce a wide range of other colors. List fifteen different combinations of the primary light colors.  

Your assignment must be not less than three hundred (300) words.

Write a program that uses pandas to

  

Questions on python3 pandas
Write a program that uses pandas to plot a regression line, that is, the line with the best fit through a collection of points. First, ask the user to specify the data points by clicking on them in a graphics window. To find the end of input, place a small rectangle labeled “Draw” in the lower left corner of the window; the program will stop gathering points when the user clicks inside the rectangle.
Draw all points on the graphics window.
Collect the points in a dictionary; convert the dictionary to a DataFrame, and use pandas to perform computation without using loops.
use pandas “sum” function; do not use pandas function for average.
If the user enters no point or one point, program prints a message “You need at least two points for a regression line” and terminates.

Discussion9_2

200 words+

Discuss why should the database and web server be installed on separate machines apart from the rest of the network?

                                                Please list your reference/s

Practical Connection Assignment

 

Assignment:
Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Requirements:

Provide a 500 word (or 2 pages double spaced) minimum reflection.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

Share a personal connection that identifies specific knowledge and theories from this course.

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 

You should not, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.

Be sure to not self-plagiarize as this assignment is similar in multiple courses.

InfoTech Import in Strat Plan 10

Develop a computer/Internet security Policy :

You have been hired as the CSO (Chief Security Officer) for an organization. Your job is to develop a very brief computer and internet security policy for the organization that covers the following areas:

  • Computer and email acceptable use policy
  • Internet acceptable use policy

NOTE: You are writing policies that might actually be used in an organization.
Make sure you are sufficiently specific in addressing each area. There are plenty of security policy and guideline templates available online for you to use as a reference or for guidance. Your plan should reflect the business model and corporate culture of a specific organization that you select. 
Include at least 3 scholarly references in addition to the course textbook.  The UC Library is a good place to find these references. At least two of the references cited need to be peer-reviewed scholarly journal articles from the library.Your paper should meet the following requirements:

  • Be approximately 2-4 pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least three scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.`