Computer Science
[ORDER SOLUTION] Network Plan
You were selected to design a small peer-to-peer network for a new facility which has six computers and a networked printer. Each desk computer must have a wired network connection. The rooms are to have wireless access for mobile devices.
For this assignment, you will utilize Gliffy®, (Links to an external site.) a software application to create a basic network diagram depicting a star topology with a switch as the central communications node. The focus here is on the network communications equipment for this LAN. Include only that equipment and end node devices on the network diagram. There is no need to draw out the layout of the physical space.
In addition to providing a network diagram, you must also provide a short essay that describes the details of the LAN equipment that is being used and the connections. In the essay, be sure to explain why each device is positioned where it is.
Also, briefly state any assumptions you’ve made about the kind of work being done, the demands the personnel in the office will put on the network, how they’ll use it, and how that influenced your design. For example, if the business that uses the LAN is a small video-based news streaming service, they will probably need more performance from both their network and ISP than a small rental property management office might need.
Requirments.
1. Depict a star topology that uses Ethernet.
2.Provide a ‘cloud’ shape or another symbol for the ISP WAN service. Label the symbol as ‘Dial-up,’ ‘Cable,’ or ‘Fiber Optic.’
3.Label all network devices in the LAN (brand and model names are acceptable but not required).
4.Connect to the ISP service using a dial-up modem, cable modem, or, if using fiber optic service, an optical network terminal (ONT). Do not use a combination device such as a modem/router.
5.Connect the LAN router (wireless router) to the ISP WAN service device. The LAN router provides many capabilities to include: DHCP, (Links to an external site.) NAT translation, (Links to an external site.) port forwarding, (Links to an external site.) QoS, (Links to an external site.) and software firewall services. Do not use a router/switch combination device; however, a router with integrated wireless capabilities is acceptable.
6.Use a managed switch as a centrally-located device to provide wired network connectivity for the seven end nodes (six desktop computers and a printer). Connect the switch directly to the main LAN router.
7. Connect the seven end nodes directly to the central switch.
8. Label the specific type of physical media (cables) being used to connect the LAN router to the ISP service device, the central switch to the LAN router, and the seven end nodes to the central switch.
9. Use a screen capture tool such as Snagit (Links to an external site.) or the Microsoft Clipping Tool to copy your diagram and paste the copied image into a Word document with the written essay.
Your application response is a reflective written assignment relating to the module readings, discussion, and other activities presented. All work must be original and not taken from Internet sources.
In a document, compose an essay consisting of three paragraphs (250-300 words) This assignment must be in essay format with an introductory paragraph, body, and conclusion.
[ORDER SOLUTION] Mobile Technology- mHealth
Discussion Board Post
Initial Post:
Browse either Android apps at Google Play or Apple apps at the iTunes App Store. Search under medical apps and attempt to organize them into categories in a table. Are there categories that are missing, e.g. clinical guidelines for patients? Any future predictions about new categories of software? Pick one of your categories and describe the types of Apps in it.
[ORDER SOLUTION] Internet Impact
Discussion Forum 1
Internet Impact
In Discussion Forum 1, post your response to the following discussion questions. Reply to at least two classmates’ responses by the date indicated in the Course Calendar.
How has the Internet impacted your life? List and explain your top 5 preferred or most used sites and explain why you prefer or use these sites. Describe three ways that using the Internet has changed your life. Have these changes been for better or worse?
[ORDER SOLUTION] Critical Play Journal
For this week, I asked you to engage with Gamestar Mechanic, a web-based game platform that teaches students about game mechanics through a quest-based learning approach. Students earn “sprites” as a result of moving through a storyline developed by the creators of Gamestar Mechanic. I also suggested checking out the “TEACHER” section of the site for more information about how educators use this platform to introduce this learning system to their students.
While engaging with Gamestar Mechanic, I asked you to take notes on the experience, following the guidelines addressed in this article:
Using the linked guide above (specifically – the bullet points within the article articulating the various elements pertinent to evaluating a game in a critical way), please write up a critical game review on Gamestar Mechanic. Be sure to address what a serious game is, what 21st century skills the game/platform embodies, in addition to referencing the readings/video for this week relative to your gameplay experience.
[ORDER SOLUTION] Cyber-Security Leadership
This activity will address module outcomes 1, 2, 3, 4, and 5. Upon completion of this activity, you will be able to:
Identify an organizations cybersecurity stakeholders, their responsibilities, and sources of authority. (CO1)
Contrast various management styles and their applicability to various cyber roles. (CO1)
Describe relevant strategic and tactical goals within the cybersecurity context. (CO2)
Determine organizational communications models in use by organizations for cybersecuritycritical and non-criticalevent management. (CO1, CO2)
Synthesize how a CISO would lead and communicate to pursue organizational goals. (CO1, CO2)
review the scenario presented:
Imagine this is your first day as Senior Chief Information Security Officer (CISO) of Company A. The Chief Financial Officer (CFO) calls you wondering what should have been done differently during a recent incident involving your predecessor. The following incidents recently occurred and were closed out without any alert to senior staff or the CFO.
The Chief Financial Officers admin reported that their laptops were performing erratically and many popup screens kept appearing while browsing the Internet. Upon inspection, it was found that the laptops were infected with malware and computer viruses. As the users were the CFOs direct subordinates, the service desk decided to respond quickly. However, the service desk did not report the incident up the chain. As soon as the malware was removed, the service desk closed the ticket.
Based on your understanding of the prior scenario involving the CFO’s admin, identify at least one risk if the process or procedures are not changed.
Your paper should include the following information:
Executive summary describing Incident
Analysis Section describing the risk or risks identified.
Categorize the risk or risks if not changed (high, medium or low) and the potential impact (what is the worst that could happen).
Describe the mitigation or process and procedure that should be changed.
Categorize any remaining risk.
[ORDER SOLUTION] IRBNet Assignment
Submit a summary (one page or less) within IRBNet describing the project goals. The abstract must:
1) describe the reasons for conducting the proposed project,
2) provide a brief description of the project including objectives, and
3) describe the proposed activities for the project.
Proposal Preparation:
Clear description of the problem to be studied.
Level of review requested (QI, Exempt, Expedited, Full Board)
Projected project timeline (Note: Proposals are approved for one year, so give yourself adequate anticipated time to complete the project).
Succinct background and rationale addressing the problem and the need to conduct the project including references.
Statement of the purpose of the project.
Detailed project methodology: This is often a problem area in student submissions. Be sure to identify your specific design (e.g. quasi-experimental, cohort model) and describe your intervention in detail (step-by-step). If, for example, conducting an educational intervention be sure to include a detailed content outline and any handouts as a supplementary submission file.
Identify your target population for the project. Be sure to include who is eligible to participate (inclusion criteria) and who is not eligible (exclusion criteria). Describe how subjects will be recruited, what the subject burden of participation will be and include any recruitment flyers or announcements that will be used.
Include any and all instruments, surveys, or forms that subjects will be asked to complete. If the instruments are in the public domain and free to use and/or modify, provide documentation of this. If approval to use or modify is required from the author, you must obtain this in writing and include the approval. Finally, if instruments are published, include any validity and reliability information available on the instrument(s).
Describe the risks and benefits of the study. All research has some risk, though it may be minimal. For very benign projects, subject burden and possible mild psychological distress from completing instruments should be noted. If it is possible that more serious distress can occur, you must describe in detail how this will be handled (e.g. debriefing, counseling) and by whom.
Confidentiality must be clearly addressed in the application: Where will subject data be stored? Who will have access to the data? Typically, data should be securely stored for 3 years. If de-identification of subjects is needed, this should be described in detail. De-identification rosters must also be securely stored but must be kept separate from the data.
Discussion Process Summary(One Page)
As you complete your IRB submissions, tell us about the process. Is it more difficult than you expected? What went more smoothly than you expected? What will you do in the planning stages of future projects to move through the IRB process more effectively?
[ORDER SOLUTION] Describe Technology and its Impact on Business Decisions
Learning objective: Describe technology and its impact on business decisions.
Prompt:
Describe the four components of an information system. Why is it important to consider each of them when designing and installing an information system?
Instructions:
In a formal 400-500 word essay
Your essay should include an introductory paragraph and a conclusion.
Follow APA format for structure. An APA template is attached here. Support your essay with 2 to 3 credible references beyond the course materials. Please note Wikipedia, Investopedia and similar websites are not credible academic references
[ORDER SOLUTION] Cyber Crime Fundamentals
Complete Part A or Part B (1000 words)
Part A
Search the internet for the series of ISO standards relating to digital forensics and list each of the standards you think applies
Search the internet for the current UK Forensic Science Regulators Codes of Practice and Conduct (Forensic Science Regulator, 2011). Read Section 21 and say why a digital forensic scientist might have difficulty complying with this item
Using the evidences shown in the figure below write a short report discussing how you going to complete your investigation using the three digital forensic process. Include suitable screenshots. Your report should include at least 3 of the evidences from the figure below.
Collecting
Analysing
Presenting
Include suitable screenshots and references in the report. Please annotate the screenshots
Produce conclusion and reflection of the tasks completed above.
You tasks would be assessed for similarity index (maximum 30%), spelling and grammar, structure and consistent format (font size and type).
Part B
Physical Security
You are the Security Manager for a medium-sized bank. You have been asked to design a security solution to keep intruders out of the bank after hours. The three areas of the bank you need to secure are the parking lot, the building perimeter, and the vault. List what technologies you would use in each of these areas
Social Engineering
You work for the Contoso Corporation. Your manager wants you to put together a training class about end-user security. To begin, use the Internet to research three cases or instances in which individuals used social engineering to break into a system, and list how they attempted to get access.
Biometrics
You are the IT administrator for the Contoso Corporation. Your CIO wants you to investigate the possible use of biometrics for security purposes. The CIO understands what biometrics is and how this technology can be used, but he does not understand the potential disadvantages of using biometrics. What should you tell him?
Changing Passwords
Imagine that you work for the Contoso Corporation. Your CIO tells you that he just got a message on his computer saying that he has to change his password. He wants to know why he must not only use such a relatively long password, but also why he must change that password on a regular basis. What should you tell him?
Firewall
You work for the ABC Corporation. You need to tell a user how to open the Windows Firewall console on a computer running Windows 7 and create a Windows Firewall inbound rule that allows Internet Explorer to communicate over ports 80 and 443. What steps must this user follow?
a) Include suitable screenshots and references in the report. Please annotate the screenshots
b) Produce conclusion and reflection of the tasks completed above.
c) You tasks would be assessed for similarity index (maximum 30%), spelling and grammar, structure and consistent format (font size and type).
[ORDER SOLUTION] Computer History
You are responsible for completing and turning in a research paper on a computer concepts topic that you select and your instructor approves. The paper will include a Title Page, Body, and a Reference Page. The paper will be written in Microsoft Word, double-spaced, using 12-point Arial Font. The paper will have a minimum of 5 complete pages in the body and 3 references. All Research Papers are to follow the APA writing style. Be sure to carefully edit your research paper before submitting. Incorrect spelling, incorrect grammar usage, failure to follow APA format, and general sloppiness will count against your grade (see research paper rubric)
[ORDER SOLUTION] Digitalisation and Technization Influence
I need a paper that explains how digitalization and technization have affected the world we live in today. I don’t need them focussing on organizations and businesses because this is not a business paper. It is a sociology paper and it needs to focus on the human being and the environment around him.
Use Promo Code: FIRST15