Cloud SLA

 

Discuss in 500 words or more the top 5 details that should be included in your cloud SLA.

Use at least three sources. Use the Research Databases available from the Danforth Library not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes.

Write in essay format not in bulleted, numbered or other list format. 

Do not use attachments as a submission. 

Physical Security

 

Topic: Perform a Vulnerability Assessment of your place of employment or living area. If you use your work area make sure you inform the Security Manager to get permission as to what you are doing. If you live in a gated community inform the security guard of your activities.

Instructions: Please download the Assignment 1 Vulnerability Assessment template (MS Word), which is already in APA 7 format, using size 12 Times New Roman font, 1-inch margins, TOC, Headings and Reference page. If you insert images or tables in your report make sure you label them appropriately according to APA.

For this assignment: The 4 Heading-1s are required. Each Heading-1 must have at least 3 Heading-2s. Each Heading must have at least 2 properly formatted paragraphs with 3 properly formatted sentences each. Once completed name your file: YourName_Assignment_1_Vulnerability_Assessment.docx and submit to the appropriate assignment folder. 

Discussion 4 CISS 301

Class Discussion Topics
  1. Discuss the pros and cons of the various process management algorithms presented in this chapter. Given a choice, which algorithm would you prefer to implement and why?
  2. Discuss the different criteria for designing a process scheduling policy. Do you think that it is possible to optimize the design of a process scheduling policy to suit any system? If so, how? If not, why? Provide some examples to support your ideas.
Additional Resources
  1. History of operating systems:  http://www.osdata.com/kind/history.htm
  2. Dual-Core vs. Quad-Core CPUs: http://www.pcmag.com/article2/0,2817,2406293,00.asp
  3. Intel® Core™2 Quad Processors: http://ark.intel.com/products/29765/Intel-Core2-Quad-Processor-Q6600-8M-Cache-2_40-GHz-1066-MHz-FSB
  4. Multi-core Enterprise Technology at Dell®: http://www1.euro.dell.com/content/topics/topic.aspx/emea/topics/products/pedge/en/multi_core?c=uk&cs=ukbsdt1&l=en&s=bsd

1 page in APA 6th Format on BlockChain

1 page in APA 6th Format on BlockChain on the below points.

1. In chapter 2, the author describes Hyperledger Fabric and its components. Create a new thread, choose one of the Hyperledger design principles described in chapter 2, and explain why your chosen design principle is important to a successful enterprise blockchain implementation. I’m interested to read what YOU learned from this week’s reading. Do NOT submit a research paper. Tell me what you think.

2. Then think of three questions you’d like to ask other students and add these to the end of your thread. 

computer science

 network analysis/tech using the NS3 network simulator and , report-1000 words and , 10 ppt slides w/o notes 

Organ leader and decision making

Datatronics Case Study

Read the Customer Service at Datatronics Case Study on pages 246-250 in the textbook. Answer the Discussion Questions at the end of the Case Study. Your responses must be complete, detailed and in APA format. See the sample assignment for expected format and length.

Create a presentation

 

File submission: Lab – Create a presentation 

 
Objective of the activity  Through this activity the student will develop a presentation with the following characteristics:  Use different “layouts” (additional to Title Slide “and Title and Content” Apply a “Theme” Include images and integrate audio or video Apply transition movements to slides and animation movements in text and images .

 
Instructions  The purpose of this activity is for the student to develop a presentation using MS Power Point. 

 
What are we going to do?  The goal is to creatively construct a presentation that carries the message in an attractive way.  Visit the Ciudad Seva page of the writer Luis López Nieves. In the poems section, available at https://ciudadseva.com/biblioteca/indice-alfabetico-poemas/ (Links to an external site.), Select the poem of your preference. 

 

How are we going to do the activity?

Read the instructions and the evaluation criteria.

Access the application to create presentations.
Create templates with the text given for each one. Remember the 10/20/30 and 1/7/7 rules.
Apply "background" to the entire presentation.
Add graphics (images and / or photos).
Apply transition movements in the "slides" and animation movement in text and graphics.
Once the presentation is developed, save the final document on your computer with the title of the selected poem. The name of the document must include your name, for example: To my daughter - Maria Olivero.

Check that your presentation meets the evaluation criteria stated in the rubric.

Before doing the exercise, access the resources, including the tutorials. This activity is graded only once.

 
Deliverable  Submit your presentation through this virtual space within the stipulated date. The activity is individual. The work must be delivered on time, without spelling or grammatical errors. The works will be submitted to the tool to detect similarity of contents (now Urkund). 

 
Basic review resource  Microsoft. (2019). Tips for creating and presenting an effective presentation. Retrieved from https://support.office.com/es-es/article/sugencias-para-crear-y-realizar-una-presentaci%C3%B3n-eficaz-f43156b0-20d2-4c51-8345-0c337cefb88b 

RSA Applications

 

You have taken courses in the key encryption created by Rivest,  Shamir, and Adelman (RSA) and have identified that many of the  associated applications that they offer could benefit the corporation in  cryptography.  You have been asked to present your recommendation for  an RSA application to the Board of Directors to consider purchasing at  least two of their associated applications, and you know that you must  present a strong case for such a purchase. 

  • Research the RSA associated applications and identify the associated benefits and costs. 
  • Your multimedia presentation must be a minimum of 10 slides with a minimum of four supporting APA references.  
  • Include charts and graphs if they support your recommendation