Chapter Note

 Need to write about 350-word summary of EACH CHAPTER, so that it contains:

(part 1) important concepts of the chapter

(part 2) experience/application/opinions of the chapter.  

Total 4 chapters, 350 word for each

Cybersecurity

 

Hypertext Transport Protocol Secure (HTTPS) is becoming increasingly popular as a security protocol for web traffic. Some sites automatically use HTTPS for all transactions (like Google), while others require that users must configure it in their settings. Some argue that HTTPS should be used on all web traffic. What are the advantages of HTTPS? What are its disadvantages? How is it different from HTTP? How must the server be set up for HTTPS transactions? How would it protect you using a public Wi-Fi connection at a local coffee shop? Should all web traffic be required to use HTTPS? Why or why not?

Write at least a one-page paper of your research on HTTPS, 

Outline to do

 

1. Write up the problem-solving outline of what you want to present through video.

The talk needs to be equal to 5-7minutes maximum. 

2. The problem solving can be any of these topics: (CHOOSE 1 ONLY) 

-Train someone how to properly use an iPhone

-Train someone on how to use Apple Magic Mouse

-or you decide which problem-solving to write about but you MUST let me know by tomorrow which topic it is so I can approve it.

PowerPoint_1G_Kilauea

 

 

#PowerPoint_1G_Kilauea

 

#PowerPoint 1G Kilauea

Project Description:

In the following project, you will edit an existing presentation that describes a Kilauea Volcano tour.

#Replace   all occurrences of the text Diamond Head with Kilauea and then change the layout of Slide 1 to Title Slide.

#Apply the Retrospect theme,   using the gray variant–the third variant color in the Variants group.

Change the Slide Size to   Widescreen (16:9).

#Display Slide 3, open the Reuse   Slides pane, and then from your downloaded files browse for and display the   presentation p01G_Volcano.pptx. If   necessary, clear the Keep source formatting check box, and then insert the   last slide.
 

  Note, Mac users, after inserting the slides, delete the redundant Kilauea Volcano Tour slide.

#Display Slide 5. In either the   slide pane or in the slide outline,  increase the list level of the second   bullet point. Click at the end  of the second bullet point, and then add the following   two additional  bullet points at the same list level:
 

Wear   sturdy, covered shoes
 

Expect   uneven terrain

#With Slide 5 still displayed,   select the text in the content  placeholder, and change the line spacing to   2.0. In the Notes pane,  type the following notes: Follow all tour precautions and   guidelines.   (include the period) 

#Display Slide 2. Select the   paragraph of text, and then change the  Font Color to Black, Text 1-in the   second column, first row. Change  the Font Size to 20.

#In the same paragraph, change   the Line Spacing to 1.5, and then center the paragraph and the slide title.

#With Slide 2 still displayed, in   the content placeholder on the right, from your downloaded files, insert the   picture p01G_Lava.jpg. Format the   picture with the Metal Frame picture style and the Marker artistic effect.

#Delete Slide 3, and then move Slide   4 so that it is positioned before Slide 3.
 

Display Slide 4, and then apply   the Soft Edge Rectangle picture style.

#With Slide 4 displayed, insert a   New Slide with the Section Header layout. Type Visit Majestic Kilauea in the title placeholder. Type On Your Next   Trip to the Big Island   in the text placeholder.

#Apply the Uncover transition and   change the Effect Options to From  Top. Change the Timing by increasing the   Duration to 01.25. Apply the  transition effect to all of the slides.

#Insert a Header & Footer on   the Notes and Handouts. Include  the Date and time updated automatically, the   Page number, a Footer  with the text 1G_Kilauea and then apply to all the   slides.

Computer and Number Systems

  

Computer and Number Systems

1. You have been hired to develop a website-based sales system for a large international retail firm. List and describe at least fourfeatures that are specific to the Web design of your system and customer service important to consider if your system is to be successful at attracting and keeping customers living outside of the US. Include not only characteristics of the user interface, but those issues that must be uniquely addressed to successfully service your non-US customers.

The first characteristic concerns the need to understand the critical concept of colors and the potential significance. Red for example in a US environment may signify an error or warning whereas other cultures may use green or black for the same purpose.

Secondly, any symbols or flags should be treated with caution due to certain connotations causing problems in certain cultures – the thumbs up in Iran for example would be highly offensive.

Thirdly payment options should also take into account cultural considerations, with some countries preferring electronic payments while others are using money orders – there should be appropriate payment options for each country that is being served by the website.

It would also be advisable to create different versions of content for each specific culture/region that will be using the site – in this way relevant analogies and formatting of content can be adjusted accordingly.

  

2. In order to receive credit for these problems, you must show all of the steps you took to arrive at your answers.

(c) Convert the following decimal number to binary:

 

(d) Convert the following binary number to decimal:

 

(c)Convert the following hexadecimal number to decimal:

 

(d) Convert the following binary number to hexadecimal:

 

3. ASCII, Unicode, and EBCDIC are, of course, not the only numeric / character codes. The Sophomites from the planet Collegium use the rather strange code shown in the Figure below. There are only thirteen characters in the Sophomite alphabet, and each character uses a 5-bit code. In addition, there are four numeric digits, since the Sophomites use base 4 for their arithmetic. Given the following Sophomitesequence, what is the corresponding binary message being sent by the Sophomites?

4. Define memory cache write-through and write-back techniques and describe the advantages and disadvantages of each.

Input / Output

5. Answer the follow questions about interrupts.

a. Describe in detail the steps that occur when a system receives an interrupt.

b. Describe how these steps differ in the case when a system receives multiple interrupts

6. Answer the following questions about clusters.

a.Describe how you might use a cluster to provide fault-tolerant computing

b.Describe how you might use a cluster architecture to provide rapid scalability for a Web-based company experiencing rapid growth.

7. Answer the following questions about communication protocols.

a.Using the operations of UDP (User Datagram Protocol) and TCP (Transmission Control Protocol) as a basis, carefully explain the difference between connectionless and connection-oriented communication.

b. If you were ordering a number of items from an online seller, such as amazon.com, which Protocol (TCP or UDP) would you recommend and explain why.

8. In the context of network security, 

a.explain the purpose of non-repudiation. 

b.How does non-repudiation differ from authentication?

c.(4 pt) Create a business scenario that illustrates the importance of each.

9.Circleor highlight the correct answer to the following questions / statements about data communications:

(a)What characteristic of an analog signal is measured in Hertz, or cycles per second?

a. Amplitude c. Phase

b. Frequency d. Skew

(b)What measurement unit describes the speed and capacity of a communication channel?

a. Throughput c. Response Time

b. Access Time d. Data Transfer Rate

(c)____ can be produced by a variety of sources, including electric motors, radio equipment, and nearby power transmission or communication lines.

a. EMI c. Distortion

b. Attenuation d. Signal/noise (S/N) ratio

(d)A(n) ____ can extend the range of an electrical signal by boosting signal power to overcome attenuation.

a. repeater c. amplifier

b. return wire d. signal wire

(e)Which of the following does not allow multiple messages to be carried on a single channel?

a. time division multiplexing c. packet switching

b. frequency division multiplexing d. half-duplex

10. Answer the following questions about user interfaces:

(a) List and explain at least two of the definite advantages to the use of a command line interface (CLI) over other types of interfaces. 

File Management

11. Answer the following:

a.Use the following four processes that have arrived in the ready queue in the sequence shown below and answer the following about process scheduling:

  • Process      1 has a total run time of 25 seconds and a priority of 2, but it will      require 15 seconds of I/O after 10 seconds of execution
  • Process      2 has a total run time of 30 seconds, a priority of 1, but it will require      10 seconds of I/O after 20 seconds of execution
  • Process      3 has a total run time of 15 seconds and a priority of 3
  • Process      4 has a total run time of 20 seconds, a priority of 2, but it will require      15 seconds of I/O after 5 seconds of execution

(ii)If the round robinscheduling algorithm is used, which process will finish first? At what time will it complete?

(i)Both shortest job first and non-preemptive priority queue scheduling algorithms will complete all four 

Homework

 Many believe that complete security is infeasible. Therefore, we are left with incomplete security. Generally, the greater the security, the greater the cost. Discuss how one should weigh the benefits and associated costs of security. (250 words add references)

OSINT

 

Instructions: Identify an organization that you will investigate over the course labs. However, do not choose a government organization, individual, or entity that may be considered a violation of privacy.

Task: Identify 15 factors about the organization that could provide information about the organization, and how you would research these.

Submittal: Submit using the Grid Association Matrix.

 

Using the organization identified from Lab 1, identify what items would you would want to include in your chosen organization’s collection plan. Additionally, you will want to identify what you expect to gain/monitor with the collection plan.

Task: Start to develop a 1300 word document data collection plan. Include any information/content you needed to be included in your collection plan, why you selected this information, and more importantly what you expect to be able to present to leadership through the collection plan.

PreviousNext
 

Intro to Networking: Assignment 3

Must be one full page. At least (2) APA reference. 100% original work. no plagiarism. Attached is the previous assignment instruction leading to this assignment. Also, attached is the answer that will you for this work.

  • You have completed building out the physical aspect of your network in the new ACME, Inc. facility. Now let’s get it up and running.
  • You will need to provide a plan for how to bring the network online.
    • Note: There are 5 departments moving into the facility
      • Accounts Receivables
      • Accounts Payables
      • Human Resources
      • Legal
      • Outside Sales
  • Your plan should include the following, this is not the entire list.
    • Network Switch Configurations
    • IP Addressing table and assignments/Subnetting strategy
    • Routing Tables (3 minimum routes/remember this is a remote office)
    • Remember to justify your choices
  • All of this should be contained in a Word document