Design and Applications of Solaris Operating System

Prepare a 3 page report and a short powerpoint presentation on the topic mentioned above. More details given below.

Imagine that a company wants to know all the important things about the design/structure/architecture (* important – not just user interface features) and the applications in  solaris operating system, and that company has assigned you the task of writing a report and presenting your findings to the managers and technical staff of that company.  Concentrate on the “big picture” first, that is, the most important things about whatever system(s) or approach you are studying. Don’t let your audience/readers get bogged down  in unimportant details. Only if fine details serve to help to understand the big picture, would you use those fine details as examples to illustrate how the important things work.  

How the topic study will be evaluated:  

The topic study will be evaluated according to:  

(a) The quality, clarity, and completeness of the report and presentation.   

(b) Whether the most interesting and most important facts about the topic were emphasized and clearly presented in the report and presentation.

The format for the references in the topic study, should be similar to the format of the references in the paper i have attached.

plain view doctrine

 

Describe the plain view doctrine, and why  it has such a significant impact on digital forensics? What are three approaches to determining whether the doctrine applies to a specific case.

Use your own words and do not copy  the work of another student.

Attach your WORD document here.

Research Paper – Info Tech Strat Plan

This week’s written activity is a three- part activity. You will respond to three separate prompts but prepare your paper as one research paper. Be sure to include at least one UC library source per prompt, in addition to your textbook (which means you’ll have at least 4 sources cited). 

Start your paper with an introductory paragraph.

Prompt 1 “Data Warehouse Architecture” (2-3 pages): Explain the major components of a data warehouse architecture, including the various forms of data transformations needed to prepare data for a data warehouse. Also, describe in your own words current key trends in data warehousing. 

Prompt 2 “Big Data” (2-3 pages): Describe your understanding of big data and give an example of how you’ve seen big data used either personally or professionally. In your view, what demands is big data placing on organizations and data management technology? 

Prompt 3 “Green Computing” (2-3 pages):  One of our topics in Chapter 13 surrounds IT Green Computing. The need for green computing is becoming more obvious considering the amount of power needed to drive our computers, servers, routers, switches, and data centers. Discuss ways in which organizations can make their data centers “green”. In your discussion, find an example of an organization that has already implemented IT green computing strategies successfully. Discuss that organization and share your link. You can find examples in the UC Library.

Conclude your paper with a detailed conclusion section. 

The paper needs to be approximately 7-10 pages long, including both a title page and a references page (for a total of 9-12 pages). Be sure to use proper APA formatting and citations to avoid plagiarism.

Your paper should meet the following requirements:

• Be approximately seven to ten pages in length, not including the required cover page and reference page.

• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course, the course textbook, and at least three scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find supplemental resources.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Java Project to be applied in Console

  

Description:

The Bank app is a console-based application that simulates banking operations. A customer can apply for an account, view their balance, and make withdrawals and deposits. An employee can approve or deny accounts and view account balances for their customers.

Purpose:

We want to see that you can meet deadlines and that you can code. You are expected to complete the following requirements and give a 5 minute presentation of your project.

Requirements:

● Build the application as a Maven project using Java 8

● All interaction with the user should be done through the console using the Scanner class

● Customers of the bank should be able to register with a username and password, and apply to open an account.

o Customers should be able to apply for joint accounts

● Once the account is open, customers should be able to withdraw, deposit, and transfer funds between accounts

o All basic validation should be done, such as trying to input negative amounts, overdrawing from accounts etc.

● Employees of the bank should be able to view all of their customers information. This includes:

o Account information

o Account balances

o Personal information

● Employees should be able to approve/deny open applications for accounts

● Bank admins should be able to view and edit all accounts. This includes:

o Approving/denying accounts

o withdrawing, depositing, transferring from all accounts

o canceling accounts

● All information should be persisted using text files and serialization via Object Input/Output Stream

● 100% test coverage is expected using J-Unit

o You should be using TDD

● Logging should be accomplished using Log4J

o All transactions should be logged

Qu

1. 250 words:   Meals on Wheels Organization

write a one-page paper discussing the challenges the organization (Meals on Wheels) had that limited their profitability and/or competitiveness and how they planned to leverage Cloud Computing to overcome their challenges. This paper should be written in third-person. The third-person point of view belongs to the person (or people) being talked about. The third-person pronouns include he, him, his, himself, she, her, hers, herself, it, its, itself, they, them, their, theirs, and themselves (Not I, we, us, our).

The paper must adhere to APA guidelines including Title and Reference pages.  The Title and Reference pages do not count towards the page count requirement. There should be at least one scholarly source listed on the reference page.  Each reference cited in the text must appear in the reference list, and each entry in the reference list must be cited in text. APA requirements for this class include:

  • A title page
  • 12-point Time New Roman font
  • Your paper should be typed and double-spaced with 1″ margins on all sides
  • The first sentence of each paragraph should be indented one tab space
  • All papers should contain the page number, flush right, in the header of every page. Use the automatic page-numbering function of your word-processing program to insert page numbers in the top right corner; do not type page numbers manually.
  • APA 7th edition in-text citations
  • Reference page

2: 250 words:

What are FOUR (4) differences between descriptive and Predictive categories of Data Mining.  Provide your response in no less than 250 words. Each difference discussed must be clearly stated before describing them in the proceeding paragraph.

Requirement

Your response must be written in no less than 250 word, using  properly formatted APA in-text citation and scholarly reference support all your assumptions and or quotations

3. 250 words:

 Using different scholarly or peer-review articles involving data mining, describe THREE (3) note worthy application or usage of “data mining” in the real world. Support each usage with examples for each use. All response must be in your own words and citation provided to support your response. Use proper grammar and in-text citation. 

Practical Connection Assignment

 Required Textbook: Tapscott, D., &Tapscott, A. (2016). Blockchain revolution: how the technology behind bitcoin is changing money, business, and the world. Penguin.  

 

Course name: Introduction Blockchain and Cryptocurrency

Assignment:

Provide a reflection of how the knowledge, skills, or theories of this course have been applied or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Requirements:

Provide a 750 words minimum reflection APA format document.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

Share a personal connection that identifies specific knowledge and theories from this course.

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 

cyber security

 1.”Lake Point Consulting Services (LPCS) provides security consulting and assurance services to over 500 clients across a wide range of enterprises in more than 20 states. A new initiative at LPCS is for each of its seven regional offices to provide internships to students who are in their final year of the security degree program at the local college.

Predish Real Estate and Auction (PREA) buys and sells high-end residential and commercial real estate across a multistate region. One of the tools that PREA offers is a sophisticated online website that allows potential buyers to take virtual tours of properties. However, PREA’s site was recently compromised by attackers who defaced the site with malicious messages, causing several customers to threaten to withdraw their listings. PREA’s senior management has demanded a top-to-bottom review of their security by an independent third party. LPCS has been hired to perform the review, and they have contracted with you to work on this project.

The first task is to perform a vulnerability assessment of PREA. Create a PowerPoint presentation for the president and his staff about the steps in a vulnerability assessment. List in detail the actions under each step and what PREA should expect in the assessment. Your presentation should contain at least 10 slides” (Ciampa, 605).

2. Create a one-page document of a personal disaster recovery procedure for your home computer. Be sure to include what needs to be protected and why. Also include information about where your data backups are stored and how they can be retrieved. Does your DRP show that what you are doing to protect your assets is sufficient? Should any changes be made?” (Ciampa 649). 

Assignment

 

1) Compare and contrast physical, dedicated virtual, and shared virtual servers. Search the web for companies that provide each. What cost should a customer expect to pay for each?

Be sure to provide a minimal 2 pages, 3 scholarly resources and write using APA format.

Note: APA is must. 2 pages excluding reference page and title page.