IT 348 9

In discussing the IoT state of the Union Topic, Please respond to the following questions?

1) How can you generate value from the data transmitted through the connected devices and how would you manage this data?

2) the Internet of things data is noisy and contains gaps and false readings. Please describe how would you filter process transform and enrich this data and would it be possible to store this data in standard tables with rows and columns? 

3) describe the process for analyzing data generated from the Internet of things connected devices? please name some of the analytic devices out there?

Very Important Instructions:

Not more 350 words. 

CIS 498 Week 8 Assignment – System Implementation

 Week 8 Assignment – System Implementation

Overview

This is the fourth in a series of five sequential assignments (the course project) in which you continue to act as the Chief Technology Officer (CTO) of a hypothetical, e-commerce start-up company of your design.

You have been working on delivering an information technology project plan in anticipation of the company relocating to a new facility.

  • In the first course project deliverable, you created a project plan inception document and supporting Gantt chart.
  • In the second course project deliverable, you developed the business requirements to be incorporated into the information systems design you are creating. You also updated your original supporting Gantt chart based on major and minor tasks identified in the business requirements document.
  • In the third course project deliverable, you created an infrastructure design that considered the key elements of software, hardware, security, and business process flow for your e-commerce startup company. Once again, you updated your supporting Gantt chart to reflect the major and minor tasks uncovered while developing the infrastructure design.

This fourth course project deliverable focuses on the project’s construction phase. In this assignment, you will develop the system implementation plan document. This document will include the engineering, furnishing, and installation (EFI) technical aspects of your e-commerce company’s information systems infrastructure. This assignment consists of two parts:

Part 1: System Implementation Document

You will create an 8–10-page system implementation document that details the engineering, furnishing, and installation (EFI) technical aspects of your e-commerce company’s information systems infrastructure.

Part 2: Updated Gantt Chart

You will use Microsoft Project to once again update the supporting project Gantt chart begun in your first course project deliverable.

  • You are not creating a new Gantt chart, only updating the one you created in the previous assignment with the major and minor tasks uncovered while creating the system implementation document.

Note:

  • You are to create or assume all necessary assumptions to successfully complete this assignment.
  • You must submit both parts as separate files to the assignment area. Label each file name according to the appropriate part.

Instructions

Part 1: System Implementation Document

You are to write an 8–10-page system implementation document in which you:

  1. Use graphical tools to design the logical and physical layout of the planned e-commerce company’s information systems.
  2. Use graphical tools to illustrate the possible placement of key infrastructure elements with external connectivity (Internet) and internal connectivity (firewalls, LAN).
  3. Develop the bill of materials and tabulate it in a spreadsheet to include item, description, model number, and approximate cost.
  4. Document the methodology and process to include the engineering, furnishing, and installation of the identified inventory.
  5. Use three sources to support your writing.
    • Choose sources that are credible, relevant, and appropriate.
    • Cite each source listed on your source page at least one time within your assignment.
    • Access the library or review library guides for help with research, writing, and citation.
Part 2: Updated Gantt Chart

Use Microsoft Project to update the previously created Gantt chart with the major and minor tasks identified in the system implementation document.

Formatting

This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions. Note the following:

  • The preferred method is for the narrative portion of your assignment to be typed, double-spaced, using Times New Roman font (size 12), with one-inch margins on all sides.
  • Include a cover page containing the assignment title, your name, your professor’s name, the course title, and the date. The cover page is not included in the required page length.
  • Include a source list page. Citations and references must follow SWS format. The source list page is not included in the required page length.

Computer Science

Please provide a brief introduction, field of study, plans for using the doctoral degree and favorite vacation activity. Do you have any fears or excited about starting the dissertation?

Your initial posting is to be a detailed, well-organized response to the posed question. In addition to your initial posting, respond to one other classmate’s thread.

Final Com-Sci

1. Explain the advantages and disadvantages of Fiber Optic vs wire

2. Explain the maximum data rate (speed) and the physical differences in the following cables:
a. CAT5

b. CAT5e

c. CAT6

d. CAT6a

e. CAT7

f. Fiber Optic

g. What is the physical difference between CAT5 and CAT6 cables?

3. Explain in detail how router and switches work 

4. The 802.11 is the IEEE standard used for Wireless Networking.  Explain in detail the IEEE 802.11a, b, g, n, and AC type wireless standards.  Are these standards compatible with each other?

5. Explain in detail how wireless networking works.

6. Explain in detail the Network Interface Card (NIC) and the MAC address.

7. Explain in detail the Optical and RF line of sights.

8. Explain antennas for the wireless networking including the types of antennas used, theirpurposes, and differences.

9. Many wireless routers have more than one antenna.  Explain in details the purpose of using more than one antenna in wireless routers.

10. Explain a couple methods of extending the range of wireless routers.

200 word post

 

Activity 10.2: Analyze a Phishing Email*

You probably already have great source material for this lab exercise: simply open your email spam folder and find a likely phishing attack email.

Part 1: Manually analyze an email header

Once you have identified a suspected phishing email, you will need to open the headers for the email. If you’re not familiar with the process, most email providers have help available on how to access the headers. It can help to print the headers out for analysis or to import them into your favorite text editor to allow for markup as you track what you have found.

Review the headers and identify what clues you can find. 

  Report on;

a) where it was sent from
b) who sent it, and
c) what path it traveled before you received it.
c) What red flags stand out,

d) What would you do to identify future phishing emails based on the header information?

Part 2: Analyze the email content

Now that you have reviewed the header, you can move on to the body of the email. In this phase, review the content of the message, paying particular attention to common artifacts found in phishing emails. You should look for embedded links and record any deceptive links or embeds. You can also identify typos, poor grammar, and other typical elements of a phishing email.

   Report on;

  1. Once you have identified these components, check the links against a tool like those found at zeltser.com/lookup-malicious-websites/.
  2. Is the link or domain a known-bad link?

Part 3: Use an automated tool

      Use one or more automated email header analyzers to review the header from part 1.

   Report on 

      if you identify additional useful data and what that data is.

      (Many sites are available; you can start with www.whatismyip.com/email-header-analyzer/ or mxtoolbox.com/EmailHeaders.aspx.)

Conclusion

Write a one paragraph conclusion on what you learned.