Microsoft Word Project

work.

Now, let’s take a look at the areas that need to be revised in this project:

✜For this project, we are four Word documents: Healthy Home Care Letter, Healthy Home Care Fact Sheet, Healthy Home Care Flier, and Healthy Home Care Registration Form. Unfortunately, you did not submitthefourrequiredfilesforgrading. Pleasereviewtheprojectbooklettomakesurethatyouare submitting the correct files for grading. If you are unsure of which files to submit, please contact us and we will help you to choose the correct file

  • attachment

    Computer_Applications_Challenge_Assessment.pdf

Test Case-Software Engineering

Develop equivalence partitions and test cases for the following items specified in the project description:

screen name

password

Show the partitions and the test cases that are selected from each partition, along with the expected response (valid/invalid) of the system (e.g., 123?8 as a test case for password would be invalid – includes a non-digit)

 

Go– a human vs human/ human vs computer application

The objective of this project is to produce a system for managing Go games. Players can be either humans or computers. Participants must be registered in order to play. To register, one enters a screen name of five letters and digits; and a password of five digits. To play a game, participants must first log in and make a request to play. The game will start when two players have signed up to play.

The System Administrator must log in as administrator. (S)he will have the ability to set certain parameters.

The system will keep records of wins and losses of players. Guests can view records of wins/losses of individual games or players.

Additional requirements will be developed during the semester.

The project will be done in teams. Each team will develop a hard copy folder for its project. At each phase, the team will add to its folder the original documents submitted for that phase, the grade sheet, the original red-marked graded documents, and revised documents with changes if applicable. As the semester progresses, documents will be added at each phase until the final folder contains documents for all phases.

Cyber Security And Network Security (3 Questions)

**** Need it by 11/19/2019 5 PM EST****

APA Format NEEDED

In-text Citations

NO PLAGIARISM

SUBJECT: Cyber Security Planning

QUESTION1: (3 paragraphs with 2 JOURNAL ARTICLE REFERENCES)

According to recent surveys, China, India, and the Philippines are the three most popular countries for IT outsourcing.  Write a short paper (2-4 paragraphs) explaining what the appeal would be for US companies to outsource IT functions to these countries.

You may discuss cost, labor pool, language, or possibly government support as your reasons.

QUESTION2: (400 words with 2 JOURNAL ARTICLE REFERENCES)

Many believe that cloud computing can reduce the total cost of computing and enhance “green computing” (environmentally friendly).

Why do you believe this to be correct? If you disagree, please explain why?

SUBJECT: NETWORK SECURITY

(Answer below each question with 3 to 4 lines)

* Provide a brief definition of network access control?

* What is an EAP?

* List and briefly define four EAP authentication methods?

* What is EAPOL?

* What is the function of IEEE 802.1X?

* Define cloud computing?

* List and briefly define three cloud service models?

* What is the cloud computing reference architecture?

* Describe some of the main cloud-specific security threats?

Cs340

Operating Systems – Week 6 Assignment

I/O Performance Analysis

Part 1

Start your Linux Partition from a fresh boot and open the Terminal. Do not open any other applications at this time.

NOTE: You may need to install the “sysstat” and “iotop” package for this exercise:

Type command:

apt-get install sysstat

apt-get install iotop

run the following command to create a 50MB test file

dd if=/dev/zero of=test.file bs=1024 count=50000

Now run this command to repeatedly create another file from the first file. This is creating I/O load on the system.

while true; do dd if=/test.file of=test2.file bs=1024;rm test2.file; done

Using iostat watch the I/O for your devices and all of its partitions over 30 second intervals. List the command used and record your findings. Do not display CPU statistics.

Using iotop, report which three processes are the most I/O intensive.

Part 2

Add 3 new 50 MB Fixed Size Virtual Disks to your linux Partition. This is done using the Virtual Box interface while your Linux Virtual Machine is shut down.

Switch to the root user

sudo su –

Using fdisk create 3 new “linux raid auto” partitions. One for each new drive added. Use the full space available on each disk.

i.e. /dev/sdb1 /dev/sdc1 /dev/sdd1

install “mdadm” package

apt-get install mdadm

*If asked for a “mail server” choose “No Configuration”

**This can take a few minutes to install.

Create a striped array (RAID 0) using all three disks.

Create Filesystem on New Raid 0 Array

Mount your new striped filesystem

What is the size of the filesystem? Why?

Repeat Part 1 of this assignment but this time make sure you are using your new striped filesystem. To do that just change to that directory

cd /stripefs

Summarize your findings about your new RAID 0 filesystem and iostat output.

Did you achieve desired results? If not, why not and what would need to be changed in a real world production server to achieve desired results?

Submission Requirements

You will submit a Word or Libre Writer Document which contains results from the above analysis and responses. I do not have access to your system so you need to be sure to provide screenshots for anything I cannot possibly know.

I don’t need screenshots for every piece of output you analyze during this assignment. Just give screenshots which show snapshot information to support your overall findings.

Please insert your screenshots into your word document with supporting documentation which meets all requirements. You will be penalized for any results which are not backed by proof.

Disclaimer

A large portion of this class is exploring and researching solutions on your own! You will continue to operate as a systems administrator / analyst and thus you will be expected to figure out what you need to know on your own.

You will not find exact solutions in your book which give you what you need to know to complete this assignment or future assignments. What you will find in your book is an in depth analysis of how an operating system manages devices at a low level. This is imperative in understanding what the resulting data values mean from your assignment.

Homeworkhelp 13

.

Discuss in 500 words or more the best practices for incident response in the cloud.

Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list. Cite your sources. Do not copy. Write in essay format not in bulleted, numbered or other list format.

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your post. Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. Please do not use attachments unless requested.

2.

Review the material on routers.

Since information extracted from router or switch interfaces to not provide specific evidence of a particular crime in most cases, what use is the information collected from these devices.? Write and post your answer.

Post 300 words.

Attached PPT for reference

3.

Project Abstract on Email Forensics

Abstract should be in the format in the below mentioned link

Writing an Abstract for Your Research Paper

  • attachment

    Chapter12.pptx

Information Security Governance

iscuss Information Security Governance.  Discuss ISG.  Discuss how ISG moves information security beyond technical decisions and makes security a strategic decision.  How and why does ISG move information security from the technical arena to the business arena.  Discuss why this is necessary.

Answer the question with a short paragraph, between 150 and 250 words.  Brevity is a virtue.  That is why you are limited to 250 words.  If you can’t present your hypothesis in 250 words or less then it is too complicated.   Remember that when you state a fact if you don’t provide a reference, it is not a fact but rather an opinion.

You can type your response in Word and use the word count button to see how many words you have typed.  Do not include the references in your word count.  No headings or title page, etc.

W5 Net Ques

Do the following in 2-3 lines

  • 5.1 Provide a brief definition of network access control.
  • 5.2 What is an EAP?
  • 5.3 List and briefly define four EAP authentication methods.
  • 5.4 What is EAPOL?
  • 5.5 What is the function of IEEE 802.1X?
  • 5.6 Define cloud computing.
  • 5.7 List and briefly define three cloud service models.
  • 5.8 What is the cloud computing reference architecture?
  • 5.9 Describe some of the main cloud-specific security threats.

2S Week 5 Assignment CP profile

In 350 Words.

According to recent surveys, China, India, and the Philippines are the three most popular countries for IT outsourcing. Write a short paper (2-4 paragraphs) explaining what the appeal would be for US companies to outsource IT functions to these countries. You may discuss cost, labor pool, language, or possibly government support as your reasons. There are many other reasons you may choose to highlight in your paper. Be sure to use your own words.

Also provide References.

Please do not copy paste, write in your own words. Plagiarism results in course termination.

Required Material:

https://www.cio.com/article/3099091/cloud-computing/cloud-services-now-account-for-a-third-of-it-outsourcing-market.html

https://youtu.be/aqhjNJkvC9w