Emerging technologies

 

Zipcar offers a sophisticated form of car sharing (www.zipcar.com). The firm opened for business in Boston in late 2000. Describe the strategy of Zipcar using the six questions of Figure 4.2. Is the Zipcar strategy sustainable, and will it lead to profitability?

Your response should be at least 300 words, single-spaced, not including references. Use APA formatting for in-text citations and references. Submission does NOT need a title page or a table of contents.

A Mobile Network

 Assignment RequirementsYou are a digital forensics intern at Azorian Computer Forensics, a privately owned forensics investigations and data recovery firm in the Denver, Colorado area. The company’s lab manager wants to include some information on mobile networks in the company policy and procedures manual.The manager is specifically interested in a diagram that shows major components in a mobile network and arrows that show the flow of signals. This needs to be a simple diagram that’s easy to understand at a glance.For this assignment:

  1. Use the Internet to research how a mobile network is set up.
  2. Create a simple diagram using PowerPoint or the drawing program of your choice that includes:
    • A mobile device
    • Mobile switching center (MSC)
    • Base station system (BSS) with at least two base station controllers (BSCs) and base transceiver stations (BTSs)
    • Home location register (HLR)
    • Visitor location register (VLR)
    • Public Switching Telephone Network (PSTN)
    • Arrows that represent the flow of signals starting from the mobile device to the PSTN

Required Resources

  • Course textbook
  • Internet access

Format:Microsoft PowerPoint or the drawing program of your choice; file saved as a PDFLength:1-2 pages
Self-Assessment Checklist

  • I researched mobile network configurations.
  • I understood the process adequately and reflected my knowledge in a diagram or flow chart.
  • I followed the submission guidelines.

For this verse, you need to write a program that asks

For this verse, you need to write a program that asks the user to input the inventory id number (integer) and the price (float) for 5 inventory items. Once the 5 inventory items are input from the user, output the results to the screen. Please ensure you use meaningful names for your variables. If your variables are not named meaningfully, points will be deducted. You should have 10 total variables defined. 5 integers for the inventory item ids and 5 floats for the inventory item prices. 

network security layers

LAN Version Subnetting

Large organizations often consist of multiple departments that require logical networks to be created across the physical network. Two main ways to create logical networks are virtual LANs (VLANs) and subnetting.

Answer the following question(s):

In what situation would you create logical networks with VLANs rather than subnetting? Why?

Semester Project Company

 

This assignment continues your work towards your Semester Project. Now that you have seen what the Internet offers in the way of templates for security policies, you will need to provide a basic background for the organization and its network that you want to model your Security Policy for. This is typically step one for any professional developing such a document, but since this would most likely be the first time you’ve ever done this and there’s no existing organization to analyze, you need to start somewhere. So for this assignment, do the following:

– The general description of your organization (think about organizations other than IT organizations; i.e. non-profits in your geographic area, healthcare businesses, retail businesses, manufacturing businesses, etc.) You will be writing a security policy for this business. Picking a non-profit might be a nice idea. It gets you involved in your community.

P.s: a U.S. company is recommended for this assignment