Discussion Board – Unit 3

 

For this Discussion Board, please complete the following:

Many people take for granted the unique identification of devices on a network. Each device must contain one or more Internet Protocol (IP) address. 

 

  • What is the difference between IPv4 and IPv6? In your opinion, why was there a need for IPv6?
  • What problems might occur with IPv6, and what do you think are the solutions?

Technical Spec Comparison

 Overview: In this assignment, you will identify and list the technical specifications of a hardware device and differentiate among alternative replacements.

 Instructions: 

• Select one hardware component (CPU, RAM, motherboard, HD, video card, camera, sound, or monitor) that you want to improve in your current computer system.

 • List your current component’s specifications and shop for two new components that are potential replacements. 

• Compare the three items (your old part, and the two possible replacements) by listing their specifications side by side and comparing the cost of the new items.

 • Which replacement is the best choice for your system? Explain your reasoning. Requirements:

 • Submit a Word document in APA format.

 • Three pages in length, excluding the Title and Reference pages. 

• At least two resources. Be sure to read the criteria below by which your work will be evaluated before you write and again after you write. 

access control and authentication

 

Create a short paper on comparing the following access control models: Mandatory Access Control (MAC), Discretionary Access Control (DAC), or Role or Rule Based Access Control (RBAC). 

The requirements for your paper are:

  • Explain the differences between the three models.
  • Describe the impact of each model on an organization including how technical controls or Access Control Lists (ACLs) will prohibit or restrict access to users within the organization.
  • APA formatted including title page, reference page, and in-text citations.
  • Length of 2-3 pages, excuding the title and reference pages.
  • Minimum of 2 scholarly resources.

Assignment

Read chapter 13 of your textbook (lecture slides under week 5), and review online library and reputable articles/journals/online resources and write 1 page paper and discuss:

How do you design a secure network. Discuss latest technologies to keep your network secure.

Please list your reference/sources

Exp19_Excel_Ch04_CapAssessment_Rockville_Auto_Sales

 

Exp19_Excel_Ch04_CapAssessment_Rockville_Auto_Sales

 

Project Description:

You work for Rockville Auto Sales and have been asked to aid in the development of a spreadsheet to manage sales and inventory information. You will start the task with a prior worksheet that contains vehicle information and sales data for 2018. You need to convert the data to a table. You will manage the large worksheet, prepare the worksheet for printing, sort and filter the table, include calculations, and then format the table.

This program has six required

  

1) This program has six required outputs and involves
searching and sorting an array of integers.

Write a Java application that initializes an array with the
following numbers, in this order:

23, 17, 5, 90, 12, 44, 38, 84, 77, 3, 66, 55, 1, 19, 37, 88,
8, 97, 25, 50, 75, 61, and 49

Then display the unsorted values. This is required output #1
of 6 for this program.

Using a sequential search of the unsorted array, determine
and report the 1-relative (i.e. 1, 2, 3, 4, etc.) positions of the following
numbers in the array (or -1 if not found), and the number of searches required
to locate the numbers: 25, 30, 50, 75, and 92. This is required output #2 of 6.

Then display the total number of searches for all five
numbers. This is required output #3 of 6.

Sort the numbers using any algorithm of your choice and then
display the sorted array. This is required output #4 of 6.

Using a binary search of the sorted array, determine and
report the 1-relative positions of the following numbers in the array (or -1 if
not found), and the number of searches required to locate the numbers: 25, 30,
50, 75, and 92. This is required output #5 of 6.

Finally, display the total number of searches for all five
numbers. This is required output #6 of 6. (There are six required sets of output as numbered in the above paragraphs.)

Try to create an object-oriented solution for your solution
vs. a procedural one. For example, you might have a class that stores an array
passed by a driver class, with methods for sorting the array, searching the
array via a sequential search, searching the array via a binary search, and
output the current contents of the array. The driver class could not only pass
in the initial array values but call various methods to perform the searches,
sorting, and array contents display. You may use any output type class you want
(e.g. Scanner, JOptionPanel)

 

2) You may use any Java Integrated Development Environment
(IDE) you choose to develop your source code, compile and link your code, and
execute your program (jGRASP is recommended). Or you may use the Windows
Command Prompt.

 

You are to submit the following deliverables in a single
Microsoft Word file in this order, and clearly labeled.

 

a) A screen snapshot of your Java source code (all file(s)
shown separately) displayed in the IDE or Windows editor showing a successful
compilation if possible (only the beginning of the source file(s) are
necessary).

 

b) A listing of your entire source code file(s).

 

c) A screen snapshot of all of your program’s outputs for
the specified values in Step #1. For this program there are 6 (six) total sets
of item(s) to be output. Failure to show any of them will result in lost points.
In order not to confuse the grading process, and possible lose points, do not
include any other outputs besides these six items.

 

4) You will be evaluated on (in order of importance):

 

a) Following directions and inclusion and packaging of all
deliverables in Step #2.

 

b) Correct execution of your program (this includes proper
compilation). This also includes getting the correct answers!

 

c) Proper commenting of your Java code and indentation (as
specified in the text).

 

d) Neatness in packaging of your deliverables (to include
putting the items in Step #2 in the correct order).

customer support and helpdesk software

  compose a research paper with the content body between 900 & 1400 words evaluating the main ideas of the readings. The paper should be correctly cited using APA style citation form. There should be a title page and works cited page (not included in the word count). There should be at least 3 outside sources for your critique. Document your research using the other sources and explain how the white papers might be correct, incorrect, lacking or showing forsight, practical or impractical, etc.  

Internet Protocol and Subnetting

You have learned a great deal about the Internet Protocol (IP). IP is a set of rules for how data is sent across networks and arrive at the intended destination. An IP address is a numeric identifier assigned to each device on an IP network. Unfortunately, the internet has finally run out of IPv4 addresses. The good news is that everyone knew this would eventually occur and there is a solution: IPv6.

For this discussion, compare the characteristics of IPv4 and IPv6. Discuss any benefits one provides over the other.

Both IPv4 and IPv6 have the option to subnet. Some of the reasons to subnet a network is to improve network performance and speed, reduce network congestion, control network growth, and ease administration.

Next, select a Class A, B, and C IP (v4) address for input into the subnet calculator.

Class A: 1.0.0.1 – 126.255.255.254
Class B: 128.1.0.1 – 191.255.255.254
Class C: 192.0.1.1 – 223.255.254.254
Take a screenshot and post each of your results to include in your post.

If you want to increase the number of subnets, you simply change the Maximum Subnets field input to your desired number. When you increase this number, what happens to the Host per Subnet field and why?