network administration

There are several different firewall architectures available:
Main Border Firewall
Screened Firewall
Internal Firewall
Host Firewall
DMZ Firewall

In this discussion, you are to describe each of these and describe when they could/would be used. Additionally, how can these be layered and used together to provide better security? What could be a disadvantage to using any of these firewalls?

What is output from the following

  

What is output from the following segment of code? (note: this is a code segment, not a complete program.)
 

int x;
 

for (x= 1; x <= 5; x++)
printf (“%i “, x+1)

Using the variable declarations below, what gets output once the printf statement shown below is executed:
int num1 = 2;
int num2 = 3;
printf (“%i”, num1 + num2);

What is output from the following code segment:
int a, b;
for (a = 1; a <= 2; a++)
for (b = 1; b <= 3; b++)
printf(“%i “, a + b);

Write a program that asks the user to enter how many hot dogs they wish to purchase. It will then compute the price of that many hot dogs at $1.50 each, compute the meals tax of 5%, and display the number of hot dogs and the original price, the meals tax amount, and the total amount due on three separate lines with appropriate labels. (No header or comments should be inserted in the code! No trap loops or any loops are needed, it will result in deductions!).

Assume that a, b, c, and d are all variables of type int. Also assume that: a = 2, b = 3, and c = 5. What value is stored in variable d after the following C statement is executed:
d = (a + b) + c * 5;

How many times would the following loop execute?
for (x = 2; x <= 10; x += 2)
printf (“I am in the loop!n”);

In C, for variables of type int we use %i as the format specifier in printf and scanf statements. What do we use as the format specifier for variables of type float, if we want to output the floating point value, showing 3 decimal places?

Assume x is a variable of type int. Which for loop below would output the following: (Choose all that apply.)
10
20
30
40
50

 

b. for (x = 1; x <= 50; x++)
printf (“%in”, x);
 

c. for (x = 1; x <= 5; x++);
printf (“%in”, x);
 

Determining the Square Root of a Number Via Recursion

  

Determining the Square Root of a Number Via Recursion For this programming project you will develop an recursive function to find the square root of a number. The function should the number for which we are determining the square root and any other arguments you deem necessary. The recursion should terminate when the calculated square root produces a squared value within 0.001 of the value we are finding the square root of.
The following is required:
1. The user should be prompted to input a positive number.
2. The program should check to determine whether the user entered a valid number, i.e. -4.0 doesn’t work.
3. The program should call a function called: recursive sqrt(argument, argument, ….) .
4. The recursive square root function should continue to call itself until the value calculated for the square root when squared is within 0.001 of the value for which we are calculating the square root.
5. Your calculated value of the square root should be printed to the screen.

Operational excellence research paper

 You are starting a new company and want to ensure organizational success through operational efficiency and strategic vision.  The plan for this project is to understand where there is a need in the market to create a new product/ service, understand the components that need to be addressed or factored when managing operational efficiencies (to include resource management), and present the work as though asking for approval to proceed with the project. 

 Your task is to determine where there is a gap in the market or area for a niche market can note:

  1. The market, the name of the company, why you feel as though there is a niche or area for you to succeed in the market.
  2. Research other companies in the same market and note why they aren’t providing the services you are offering and contrast them to the goods or services your company is going to offer.

 Discuss the major components required in the operational efficiency plan:

  • Business Plan
    • How will you obtain funds for the project?  (are you asking for funds or obtaining from another source)
    • How many funds are required to start?
    • What is the timeframe to launch?
    • Resource requirements
      • Hardware
      • Software
      • Other support IT to get the systems up and running (networking, database, etc…)
      • People
      • Equipment
      • Office Space
      • Etc…
  • Key concepts to address to ensure the organization is running efficiently
    • Organizational Learning Concepts and Theories
    • Integration of IT Resources
    • Virtual Teams? Local Teams?  Why?
    • Ethical and Legal Implications
    • Cyber Security and Privacy of Information
      • What do you have to account for?  (managing data or credit card information?)
    • Best Practices that you are going to implement in your organization and why
  • Summary and Next Steps

 The above paper must be at least 10 pages in length.  This does not include the APA formatted cover page or the references.  There must be at least 6 APA references to support the findings in the submission. 

Peer response number 2

Please respond to peer based on this post to keep discussion going. 100 words minimum.

To create a new database in Microsoft Access; I would click “Create” and then click on “Table,” followed by typing in the Table Name and click “Create.” Next, I would go to the first blank row in the table and type in the column headers. After that, I would click on each of the columns that I would add to my database and click on “Insert.”

Microsoft Access is new to me, but seems interesting since it has many similarities to Excel as far as inputting necessary data. Like Excel, it stores data in tables that look much like worksheets, but Access tables is designed for complex querying relation to data stored in other tables.

D1

Find a peer-reviewed scholarly journal article discussing government planning and/or entrepreneurial innovation. Complete a review of the article by writing a 2-3 page overview of the article. This will be a detailed summary of the journal article, including concepts discussed and findings. Additionally, find one other source (it does not have to be a peer-reviewed journal article) that substantiates the findings in the article you are reviewing.
You should use Google Scholar to find these types of articles.
Once you find the article, you will read it and write a review of it.  This is considered a research article review.
Your paper should meet these requirements: 

6pages APA format 

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

complete the following questions in an MS Word

  

.complete the following questions in an MS Word Document in APA format. Double space your work and place in 12 point font using Times New Roman. You must include both a separate cover and reference page.
 

1. (counts double) The following information is listed for the configuration of a router: Internet Port:
MAC Address – 00:21:3D:AE:2C:A6
IP Address – 70.115.23.137
DHCP – DHCP Client
IP Subnet Mask – 255.255.240.0
Domain Name Server – 209.18.47.61, 209.18.47.62
LAN Port:
MAC Address – 00:21:3D:AE:2C:A5
IP Address – 192.168.1.1
DHCP – OFF
IP Subnet Mask – 255.255.255.0
 

a. The two MAC addresses are different. What is a MAC address, and why are the two different even though this is a single router?
 

b. The two IP addresses are different. What is an IP address, and why are the two different even though this is a single router?
 

c. Since DHCP is disabled on the router, it is not assigning addresses on the LAN. If setting a static IP address for a device on the LAN, what range of addresses could be utilized?
 

d. After choosing an unused address from the range given in d for the IP address for a device on the LAN, what would the IP subnet mask and gateway be set to? Explain why these settings would be used.
 

2. List at least four services that are part of the internet and differentiate what each facilitates. You should include the World Wide Web as one of your four services.
 

3. For the network that you have chosen to characterize, list the MAC Address, IP Address, IP Subnet Mask, Gateway Information, and DHCP and DNS Information for each network connection (all NICs in each computer as well as all network device connections). Based on this information, explain the flow of information in and configuration of this network.

Migration Proposal Presentation

 

Faster Computing has contacted Go2Linux and requested a brief proposal presentation for migrating its systems from Windows to Linux.

The company is specifically interested in seeing the following information:

(10.1.1: Identify the problem to be solved.)

  • Based on your current understanding of Faster Computing’s business, what are some potential benefits of Linux?
  • The company is aware that many different Linux derivatives exist. Be very specific and choose only one version (e.g., Ubuntu, Mint, Zorin, Redhat, CentOS, Kali). Which would Go2Linux recommend, and why? Give specific reasons for your choice (e.g., security features, support, updates, user interface).

(10.1.2: Gather project requirements to meet stakeholder needs.)

  • What steps will be required to migrate the systems from Windows to Linux?
  • Are there graphical interfaces available for the Linux workstations that would provide similar functionality to Windows? Some users are concerned about working with a command-line interface.

(10.1.3: Define the specifications of required technologies.)

  • What tools are available on Linux for the servers to provide file sharing, Linux services, and printing? (e.g., Apache/Nginx, Samba, CUPS, SSH/SCP). Ensure you identify what the functions/services are used for (e.g., Samba is used for file sharing).

(1.1.3: Present ideas in a clear, logical order appropriate to the task.)

The deliverable for this phase of the project is a three- to five-slide PowerPoint narrated presentation.

  • An introductory slide
  • A summary slide
  • Voice narration on every slide

For each slide, you will embed your own audio recording as if you were presenting the content to the Faster Computing team. Faster Computing has not yet committed to the project, so this should be presented as a proposal. The presentation should be visually appealing; the inclusion of at least one image that supports the content and adds value to the proposal is required.

(1.3.3: Integrate appropriate credible sources to illustrate and validate ideas.)

You must cite at least two quality sources.

You used at least 2 references and your references were cited properly following an accepted style. Ask your instructor for clarification.

Use the Migration Proposal Presentation template to get started.

(2.3.1: State conclusions or solutions clearly and precisely.)

You should present your proposal as if you are selling to the company. Revisit all of these important reasons in the summary slide.