Network security

1.What do you think is the best combination of the types of authentication? Is that type of authentication appropriate for all types of access.

2. Some have made the argument that using WEP presents more security issues than if all traffic were in the clear. What do you think?

3. Which is your “favorite” attack? Why? Which is the most dangerous? Which do you think is the hardest to protect against?

4. Have you ever used e-mail or instant messenger to share information that was sensitive in nature? Have you ever gotten spam? Have you ever responded to spam? Have you tried to remove your name from the list? Did it work? Do you have any idea how your e-mail address wound up on the spam list in the first place?

Wk 1 – West Consulting Customer Design Summary

 You work as a network consultant for West Consulting, a graphic design and printing company. West Consulting is growing in customer and sales volume and, therefore, is expanding its local campus in Des Moines IA, and adding a test location in Australia.

You are tasked with designing a network to support their growth and expansion plan and drafting a proposal. You will work on this project over the next five weeks. The first task is to confirm your understanding of the project and outline your high-level plan to approach the design.

Refer to the West Consulting Network Design Summary document, which lists the network requirements and configuration details.

 

Create a Customer Design Summary that includes the following: 

  • Project Summary
  • A description of the organization, the business environment, and the project purpose
  • Design Requirements
  • Desired functional network requirements, any technical constraints, and network performance or design goals
  • Existing High-Level Network Infrastructure Survey
  • Include both a logical topology diagram (layer 3) and a physical network diagram of current infrastructure and routing.
  • Implementation Plan
  • Description of a high-level network upgrade plan based on Cisco’s network design lifecycle principles and an explanation of how your plan addresses West Consulting’s goals and strategies

Diagram your current network survey in Microsoft® Visio®.

Document the remainder of your Customer Design Summary as a 2- to 3-page Microsoft® Word document

Note: You will complete assignments related to this project throughout this course. The assignments build on one another. Therefore, it is recommended that you select the delivery method of a Microsoft® PowerPoint® presentation or a Microsoft® Word document to use throughout these assignments. Also, you will use this completed assignment as you work on next week’s assignment.

Submit your assignment a DOC/DOCX word document and a separate diagram in VSD/VSDX format.  Microsoft Visio file. 

HR Management & Blockchain

 What are the stages of blockchain maturity and explain which stages have the most potential for human resource management application.

Reference

1. Anelis, J. & da Silva, E. R. (2019). Blockchain adoption: A value driver perspective. Business Horizons, 62, 307-314.

310- Arrays

 

Write a Java program that inserts 25 random integers ranging from 0  to 100 into an ArrayList in ascending order. The program should then  output the numbers and display the sum and average of the numbers.

After you are done, submit the source code and screenshot.

IT348

 

DISCUSSION 400 wordfs APA fortmat citation and header and page number

Bringing IoT Into Your Organization—Change Management

IoT has emerged as both an agent of dramatic change and the result of global forces that drive change. 

TripleX Inc. has posted its request for proposals to implement Internet of Things solutions to their organization. Your company Solutions Inc. has won the bid, and now you are in charge of executing this contract. Explain your approach to implementing this contract and where do you start. Feel free to use real-life examples scenarios or use cases in supporting your responses.

Data Structures

 Please answer the following with a minimum of at least 200 words. Be sure to site your references as well.

Discuss the characteristics of ArrayList, LinkedList, and Vector, and  when to use them. You are strongly encouraged to use code to elaborate  on your answer. 

dis

 When thinking about data visualization, it is important to understand regular expressions in data analytics.  Therefore, note the importance of data visualizations and choose two types of expressions (* – wildcards for example) and discuss the difference between the two types of expressions. 

MIs433- Module 4: Queries & SQL

In this assignment, you are given a complete database file (located in the assignment following this page) which sets the stage for the following list of queries. After you create and test your query, then save it under the name given as a part of the instructions for each query. Note that the file referenced below is located in the assignment submission folder that immediately follows this page.

  1. Download the Module4.accdb database. (Located in the assignment submission folder located after this page.)
  2. Get to know the tables.
  3. Review the Relationship across all the tables. This will help you when you work on a multi-table query.
  4. Create a query to list all the data from the Customers table ordered in the ascending order of the State field. Save the query as Q1
  5. Create a query to list the Company name, address and balance of the customers who have a balance over $0. Save it as Q2.
  6. Create a query to list the names of the customers who purchase a GMC Pickup (ID 59) or Ford Convertible (ID 15). This is a multi-table type of query. Save it as Q3.
  7. Create a parameter query of your choice. Use any table and criteria you choose. Save it as Q4.
  8. Create a multi-table query of your choice using an ‘AND’ operator. Save it as Q5.

Checkpoints1) Include name

  

Checkpoints1) Include name, e-mail, and lab# as comment and print same to output2) Minimum of three (3) comments in each function (Purpose: Pre: Post:)3) use a globally defined constant for the rate of profit4) Input may not be case sensitive. That is, if user enters ‘r’ change it to ‘R’ immediately. To do this use if() and assign uppercase value or you may use toupper() function (see 10.2 on page 545 of text). Only an error message should be output and nothing more if data is erroneous. Use exit() function as explained in 6.15 (p. 360).5) A function must be used to calculate the number of books to be ordered. Round to the nearest whole number. Hint: static_cast (x + .5)6) A function must be used to calculate the profit given the number of books and unit price.
7) One function must be used for all the output8) Output must be formatted using dollar sign and 2 decimal place as shown on page 1.TEST DATA
(###) ###-####34.98,35,R,O
(###) ###-####34.98,34,R,O
(###) ###-####5.95,40,S,O
(###) ###-#### 65.99, 35, N, Y