10p1

4-5 pages and must include minimum 5 scholarly references. The page requirements listed below apply to the project and not the final capstone. It important that students follow the capstone format/subheadings for both proposal and capstone. Questions concerning APA format,

Computer Science 505 assignment 7

Business Case: Red Star National Hospital system has 4 hospitals (H1, H2, H3, and H4). They need your service to establish a new data communication Network.  

The location of  H1: Fairfax, VA  

The location of   H2: Dallas, TX

The location of   H3: Los Angeles, CA

The location of  H4: Columbus, OH

WIDE AREA NETWORK REQUIREMENTS (EXPECTATIONS)

  • Hospitals must be connected to each other based on given extranet data rate requirements
  • The patient files will be located in the main hospital (H1) and shared with all computers within the system using the file transfer applications.
  • Here are the given expected data rates between hospitals

EXTRANET DATA RATE REQUIREMENTS

Requested data speed from H1 to H2

10 Gbps

Requested data speed from H1-H3

8 Gbps

Requested data speed from H1-H4

80 Mbps

Requested data speed from H2-H3

12 Mbps

Requested data speed from H2-H4

2 Mbps

Your team will be developing the WAN network design. Prepare your recommendations by covering the following section.

Question 1 Draw the block diagram and clearly indicate the network topology you would prefer to connect all four Hospital sites. You may use USA Map to draw a network diagram. Download USA Map from the web, place the nodes on the map and then draw the topology.   You must insert the picture of the WAN network diagram into your MS word document 

Question 2 All four sites will have a 90Mbps connection to the internet. In the WAN diagram you developed in question 1, incorporate the connection to the internet and provide the new diagram.  You must insert the second diagram/picture of the Network diagram into your MS word document 

Question 3 What type of WAN service (s) would you recommend leasing for each connection to fulfill the Data Rates expectations? You should prepare a table and write WAN service for each connection among the hospital sites 

Wk 2 – Apply: Case Study: Appliance Warehouse – Use Case Analysis

  

Assignment Content

  1.     Continue your work to support the development and implementation of the new Service Department for Appliance Warehouse.

    For this week’s assignment, be sure to refer to the Appliance Warehouse Resources: Organizational Staffing document and the Organization Chart created in Week 1.

    Directions
    In MindTap, review the Appliance Warehouse Case, and do the following:

    • Read the Before You Begin Message and the Module 4-7 Appliance Warehouse Webmail Client Emails. Read the messages to help determine the tasks you must complete.
    • Review and analyze the weekly Appliance Warehouse case study content and resources.
    • Create a 3- to 4-page document (to submit in Blackboard) that includes the following:
    • Business Case Investigation
    • Identify 4 employees you would interview to support your business analysis. For each employee, state the topic(s) you will use for questioning. The interview topics and responses will be used to influence your future design.
    • A possible use case diagram for making an appointment and verifying parts availability
    • Identify the users of the system and requests into and out of the system.
    • Implementation resources needed for the project
    • Identify people and hardware. Human resources may include internal or external resources.

Netlab 4

 

Complete Netlab 4 and submit your lab summary here.

NETLAB 4. A. Web Pen-Testing. 

  1. Scanning with Nikto. 
  2. Setting up Burp Suite. 
  3. Building a site man with Burp Suite. 
  4. Brute forcing a Web Application. 

NETLAB 4. B. Client Side Exploitations. 

  1. Hooking Web Browsers with BeEF Framework 
  2. Clients Exploitation with BeEF Framework. 

NETLAB 4. C. ARP Spoofing And MiTM Attacks.

  1. ARP Spoofing with ettercap. 
  2. Capturing web usernames and passwords 
  3. Maniputaing HTTP images. 
  4. Manipulating Java scripts. 

Exp19_Access_Ch09_HOEAssessment – Food Inspections 1.0

Exp19_Access_Ch09_HOEAssessment – Food Inspections 1.0

  

Project Description:

Your job at the Chicago Health Inspection Agency has been fun and challenging. You have been making daily updates to the Agency’s database with the help of your boss, Anne Serdifone. The database tables may already be normalized; however, you need to examine the tables to verify this. Based on your understanding of the rules of normalization, you decide to recommend some design changes to the database.

     

Start Access. Open the   downloaded Access file named Exp19_Access_Ch09_HOEAssessment_Food_Inspections.accdb.   Grader has automatically added your last name to the beginning of the   filename.

 

Anne has asked you to review the   table structure to see if any changes should be made. You decide to apply the   rules of normalization to the Inspections table.
 

  Open the Inspections table in   Datasheet view. Look for repeating groups in the Inspections table. The   Violation field has multiple values separated by bars. This qualifies as a   repeating group. This information has been added to a new table and will be   removed from this table. For simplicity’s sake, the information for   inspection violations has been preloaded to a table called Violations, so   removing the Violation field from the Inspections table is required to   conform to 1NF.
 

  Switch to Design view. Click the row selector   for the Violation field and click Delete   on the Home tab in the Records group. Click Yes when asked for confirmation, and switch to Datasheet view.   Click Yes when prompted to save.

 

After you remove the Violation   field, you will examine the Inspections table and convert to second normal   form. Examine the Inspections table and notice there are multiple Inspections   with Dominick Cortez as the Business Owner.
 

  Switch to Design view for the Inspections table. Business Owner is determined   by Business ID and are attributes of the business, not a specific inspection.   Fields will need to be removed to satisfy 2NF. In a real-world scenario, you   would need to create a separate table for this information, but the   Businesses table is provided so you do not have to perform data entry.
 

  Examine the Inspections table. Click the row   selector for the Business Owner field and click Delete in the Records group of the Home tab, clicking Yes in response to the warning.
  You deleted this field because it is not functionally dependent on the entire   primary key. Save the Inspections table. Switch to Datasheet view.

 

The final step to improve the   Agency’s Inspections table is to convert to third normal form: The value of a   non-key field cannot be functionally dependent on the value of another   non-key field.
 

  Look for any non-key field values in the Inspections table that are   functionally dependent on another non-key field value. Facility Type ID   (non-key) is functionally dependent on Business ID (non-key). If you know the   Business ID, you can determine the Facility Type ID, which will help you   determine the Facility Type. A table named Facility Types already exists.
 

  Switch to Design view in the Inspections table. Delete the Facility Type ID field, clicking Yes in response to all warnings you   receive. You delete the Facility Type ID field because it is functionally   dependent on the Business ID field and therefore is not allowed in the   Inspections table. Normally, this would then require you to set up a new   table, but as you already have a Facility Types table, you can simply delete   the Facility Type ID field. Note that this may not always be the case.
 

  Switch to Datasheet view, saving the table. The table now meets 3NF criteria.   Close the Inspections table.

 

You will now create   relationships for the tables in the database. Due to the changes you made to   the design, you will add relationships to ensure the database functions   correctly.
 

  Click the Database Tools tab and   click Relationships in the   Relationships group to show the Relationships window. Click Show Table. Click each table and click Add. Once you have added all five tables, click Close to close the Show Table dialog   box.

 

Drag the Inspection Type ID field from the Inspection Types table to the   Inspection Type ID field in the Inspections table. The Inspection Types and   Inspections tables are related by the common Inspection Type ID field. Select   the Enforce Referential Integrity   and Cascade Update Related Fields   options. Click Create to create   this relationship.

 

Repeat the steps to connect the   Businesses and Inspections tables via the Business ID field.

 

Repeat the steps to connect the   Businesses and Facility Types tables via the Facility Type ID field.
 

  You may also notice the Inspections and Violations tables are not yet linked.   You are leaving these tables unlinked intentionally as you want to discuss   the contents with your supervisor.
 

  Save the relationships and close the Relationships window.

 

Select the Inspections table, and create a basic report using the Report   tool. Save the report as Inspections Report. Close the report.

 

Select the Violations table and create a report using the Report tool. Save   the report as Violations Report. Close the report.

 

Click the Create tab and click Navigation   in the Forms group. Select the Horizontal   Tabs option. A new Horizontal Tabs navigation form displays. Drag the Inspections Report from the   Navigation Pane to [Add New].

 

 

Add Business Report, Facility   Types Report, Inspections Types   Report, and Violations Report,   in that order to the navigation form.

 

Switch to Form View and click each tab to test the form. Save the   navigation form with the default name and close the form.

 

To simplify the look and   functionality of the database, you will hide the Navigation Pane and set the   Navigation Form to open automatically when the database is opened.
 

  Click the File tab, click Options, and in the Access Options   dialog box, click Current Database.   Scroll to the Navigation section of the dialog box and deselect Display Navigation Pane. The   Navigation Pane will now be hidden from view.
 

  In the Navigation Options, click the arrow next to Display Form: and select the newly created Navigation Form. Click OK   to close the dialog box. Click OK.
 

  The Navigation Form will now display upon opening the database. Save and   close the database. Re-open the database to test the changes. The Navigation   Form should display upon opening the database and the Navigation Pane should   not be visible.

 

Save the database. Close the   database, and then exit Access. Submit the database as directed.

The only LCD mount you will ever need

  

LCDs are extremely common in the market now. One can find them easily in normal households as well. 

There are many sizes available for them in the market. From small to large, each room can be equipped with the correct size. 

The Computer Supply Store is one of the places where one can find. One can choose whichever one suits them the best. 

The most famous one in the market is the 3-axis point option. It provides balanced support to the accessory. 

It is a type of detachable mount that can be adjusted according to the on-spot changes. 

The highly sold option has the dimensions of 6” X 6” X 6” and has a mere weight of 1.95 lbs. 

Do not worry about it being ruined or going bad. The warranty period will save you from any extra charges on the initial period. 

The look is also quite classic and chic. With a black powder-coated finish, it is worth checking out. 

To know more about the right tools for the office, one should give a look at this >> adjustable Computer Desk

Develop an ADT specification for

 1. Develop an ADT specification for a priority queue. A priority queue is like a FIFO queue except that items are ordered by some priority setting instead of time. In fact, you may think of a FIFO queue as a priority queue in which the time stamp is used to define priority.
 

2. Write an algorithm to reverse a singly linked list, so that the last element become the first and so on. Do NOT use Deletion – rearrange the pointers.
 

3. What is the average number of nodes accessed in search for a particular element in an unordered list? In an ordered list? In an unordered array? In an ordered array? Note that a list could be implemented as a linked structure or with an array.
 

4. Write a routine to interchange the mth and nth elements of a singly-linked list. You must rearrange the pointers, not simply swap the contents.
 

5. Given the following interface for a list, comment on it from the perspective of an ADT.
 

public interface ArrayList {
public ArrayList(void) { List = 0 }; //constructor – initializes list to be empty
public Insert(itemtype item, int index); //verifies index & inserts itemat position index in list
public int Search (itemtype item); //searches list & returns position of item. Returns -1 if not found
public int CountItem ( itemtype Item);
private boolean VerifyIndex (int index); //validates that index is position within list