Computer Architecture Feb 6

Assignment Content

  1. We are now in Week 4 so you all should be more familiar with the Architectural components and processes of a computer. To further enhance your knowledge on this topic, you will be answering the questions below.

    Remember to format your work in an APA style (Cover Page is a Must) and provide proper citation and references for the paper. Plagiarism is not allowed and I will give you an automatic zero if I discover that any part of your work was plagiarized either from the internet or another student’s paper.

    For this week’s assignment, Please provide a write-up as an answer to the question below;

    • Compare the computer architecture of modern processors from two different vendors in terms of memory, speed and expansion bus.
    • Explain the concept of virtual memory and its role in memory management and in memory protection.
    • Provide any five differences between logical addressing and physical addressing in operating systems.
    • What are the benefits of using scripts to automate operating systems tasks?
    • You should submit at least TWO FULL PAGES OF CONTENT…meaning sources, title, etc. do NOT count…be sure to include any reference material you used…

Foundations of Emergency Management: Point Paper

 Topic: Threat of a hurricane to the Gulf Coast or East Coast area of the U.S. 

Instructions:   

The content of your paper must be at least 7 pages in length (double-spaced, Times New Roman 12 font), not including cover page, references, appendix, tables, etc. The format of the paper must include: 1) submit in Word document and not PDF; 2) a Cover page, which must include the title of the paper, your name, date of submission, and course name; 3) an Abstract or Introduction, which states the purpose of the paper; 4) Sub-headers for each topic as prescribed by the Guidelines listed below, which also serves as the evidence to be graded; and 5) a Conclusion, which summarizes your research findings, and includes comments of your personal perspective about the topic. The research paper must include a minimum of five (5) references, which must be properly cited using APA (7th edition) guidelines. Never use Wikipedia, which is unacceptable. All papers are filtered by Canvas through Turnitin (https://www.turnitin.com/). Evidence of plagiarism will result in a failing grade. You may also lose 10 points every day the paper is late. Follow the instructions carefully to earn a good grade.

First, conduct thorough research for the ‘Topic’, and be sure to use/cite a minimum of five (5) reference sources > APA 7th edition, citation/bibliography format. (10/10)  

Second, consider the hazard in relation to the setting and the probability of a future occurrence based on history as described in the readings of the textbook (Chapters 1 & 2): sub-header > History of Hazard. (20/20) 

Third, apply the principles of mitigation and planning considerations to the topic as described in the readings of the textbook (Chapter 3): sub-header > Principles of Mitigation. (20/20) 

Fourth, outline a community planning and preparedness program, and include the purpose and need of timely and accurate communication as mentioned in the textbook (Chapters 4 & 5): sub-header > Community Preparedness & Communication. (20/20) 

Fifth, provide an overview of the principles of Response and Recovery, and include significant factors necessary promote and enhance communication, collaboration, and cooperation as mentioned in the textbook (Chapters 6 & 7): sub-header > Principles of Response & Recovery. (20/20)

Lastly, must include the following: Cover page, Abstract, Conclusion, Sub-headers, Bibliography, spelling/grammar/punctuation; references cited; APA 7th edition format. (10/10)

Discussion 1

 

Explain what is meant by the syntax and the semantics of a programming language. Give Java examples to illustrate the difference between a syntax error and a semantics error. Use different examples than those found in the textbook. 

Your Discussion should be at least 250 words in length, but not more than 750 words. Once you’ve completed your initial post, be sure to respond to the posts of at least 3 of your classmates.

Assignments

 

Assignments:1 

Learning About OWASP

Visit the OWASP website. 

Using WORD, write an ORIGINAL brief essay of 300 words or more describing the history and background of OWASP. 

See the Vulnerabilities tab. Choose one of the vulnerabilities on the linked page and describe briefly.

Safe Assign is software that verifies the originality of your work against on-line sources and other students.

Note your Safe Assign score. Continue submitting until your Safe Assign score is less than 25. For your first written assignment, you have unlimited times to retry your assignment.

To improve Safe Assign score, submit references in a separate document or paste in the text section.

Attach your WORD doc and then hit SUBMT.

Assignment:2

Learn About creating good password security.

An IT Security consultant has made three primary recommendations regarding passwords:

1. Prohibit guessable passwords

o such as common names, real words, numbers only

o require special characters and a mix of caps, lower case and numbers in passwords

2. Reauthenticate before changing passwords

· user must enter old pw before creating new one

3. Make authenticators unforgeable 

· do not allow email or user ID as password

Using WORD, write a brief paper of 200-300 words explaining each of these security recommendations.  Do you agree or disagree with these recommendations. Would you change, add or delete any of these?  Add additional criteria as you see necesarry.

Note your Safe Assign score. Continue submitting until your Safe Assign score is less than 25. You have three attempts to complete your assignment.

To improve Safe Assign score, submit references in a separate document or paste in the text section.

Attach your WORD doc and then hit SUBMT.

Assigment:3

Do a bit of research on JSON and AJAX.

How do they relate to the the Same-Origin policy?

Using WORD, write several short paragraphs on each. A  total of 200-300 words. 

Use your own words and do not copy  the work of another student.

Attach your WORD document here.

Assignment:4

You are the web master of a college website. You share a server with other school departments such as accounting and HR.

Based on this chapter, create at least five security-related rules for staff members who are adding web pages being added to your site. Include a justification and explanation for each rule. Rules should relate to college, staff and student, and system information security.

Write your answer using a WORD document. Do your own work and use your own words. Submit here. Note your Safe Assign score. Score must be less than 25 for full credit.

You have three attempts.

To improve Safe Assign score, submit references in a separate document or paste in the text section.

Attach your WORD doc and then hit SUBMT.

Assignment:5

Do a bit  if research into File Inclusion Vulnerability.

  • What is it?
  • Why is is dangerous?
  • What is the difference      of low and remote inclusion?
  • What methods can me      employed to prevent a security breach?
  • What programming      languages are vulnerable to this type of attack.

Post between 100-300. Use your own words. Do not copy the work of another students.

Assignment:6

You are the web master for the Republican Party National Committee. Prepare a risk assessment analysis for your website. Some questions to consider:

· Who is likely to attack your site?

· When are attacks likely to occur?

· What sort of attacks might take place?

· How can you best minimize attacks and protect the integrity of your site?

Write between 200-300 words.

Research Paper: Hick’s Law Vs. Fitt's Law

Explain the difference between Hick’s Law and Fitt’s Law.  When is it best to use one law over the other, and why are they important in designing?  Support your research with scholarly references.

Research Paper Requirements

  • Use Microsoft Word to submit this paper
  • PDF is not acceptable
  •  New Times Roman 12 pts
  •  APA format is required. Use the template provided on the Library Homepage.  
  •  You are required to use between 3-4 scholarly peer-reviewed articles source.
  • The assignment must be between 3 -4  pages in length and does not include the cover and reference page.  The Abstract is optional. 
  •   You may also use diagrams/charts/codes to convey your thoughts    
  • Use proper heading for each section—see Perdue OWL formatting.

See below the required components of the paper:

Introduction  

This section you will introduce the subject and what you are writing about ( you may include the prompt from the assignment)

Body of the Paper

  • Discussion of the two laws to include the history
    • Hick’s Law
    • Fitt’s Law             
  • Compare and Contrast – address the prompt, ways they are similar, and how they are different. When is it best to use one law over the other, and why are they important in designing?  

Conclusion.

NOTE: ALSO INCLUDE A POWERPOINT RESUME OF THE PAPER

wk-research assignment

 After responding to the weekly discussion topic on FOOTPRINTING, you now have an idea as to how to conduct a digital investigative project. For this assignment, you are asked to develop your own crime scenario. Explain the incident that occurred, and then list the steps you would follow to solve this case (examples might include: a lost child, an unauthorized charge on your credit card, an unidentified charge made with your EZ PASS, etc.). 

3 Separate Individuals Problems

Save in Word Document

Watch the 2 YOUTUBE videos and answer the questions below:

SEE LINK: https://youtu.be/mLGt_GPyPFU

SEE LINK: https://youtu.be/WxQXvmnfCaw

Answer the following questions:

1-What is Walmart’s e-commerce strategy?

2-Why did Walmart acquire Jet.com?

3-How does Walmart’s fulfllment operation difer from Amazon’s?

4-What are the three key assets that Walmart can leverage (build on) to compete with
Amazon and other online retailers?

————————————————————————–

Save in Word Document

Customer Service Chapter 7

1. Define the term ROI.

2. What is business and IT alignment?

3. What is a cost-benefit analysis?

4. Describe two ways that customer data is used.

5. Describe two ways that incident data is used.

6. Describe two ways that status data is used.

7. What is scope creep?

8. Define the term trend analysis.

9. What is a budget?

10. Define the term cost per contact.

———————————————————————–

Save in Word Document

Customer Service Chapter 8

1. What is a team?

2. What are the reasons technical support lends itself to a team setting?

3. What are the five characteristics of a successful team?

4. List the three components of a service desk mission.

5. List and describe three ways the service desk supports the goals of DevOps.

6. List the four stages of development reflected in the Tuckman Teamwork Model.

7. List three characteristics of emotional intelligence.

8. Why is communication important in a team setting?

9. What is feedback?

10. How must feedback be delivered to be effective?