linux proposal

 

You’ve won the business! Faster Computing has agreed to the project. As the final stage of pre-implementation, you have been asked to produce a training guide that will demonstrate how to install Linux and provide an overview of several common commands, as follows:

(11.1.3: Install the software.) 

  • Use a hypervisor of your choice to install Linux. Many hypervisors are available, such as Oracle’s VirtualBox, which is a free download. In addition, as part of UMGC’s agreement with VMware, you can download VMware Workstation for free. See below for specific screenshot requirements. You should include at least 3 screenshots (e.g., disk partitioning, timezone selection, creating the default account). Each screenshot should be accompanied by a brief explanation of what you did.
    NOTE: It is not necessary to include screenshots of installing the hypervisor software.

(1.2.3: Explain specialized terms or concepts to facilitate audience comprehension.)

  • Demonstrate command-line operations that will provide the following information:
    • A listing of files in a directory and common file attributes
    • The current directory (hint: also known as the present working directory)
    • Create a file, then copy it to a different directory
    • Create a second file and move it to a different directory
    • Remove the first file, as well as the copy you created
    • The manual page for a given command
    • Create a text file, then use an editor to modify the content. Then display the content of the modified file

(1.4.2: Use vocabulary appropriate for the discipline, genre, and intended audience.)

In the above section (demonstrate CLI operations) show the commands with options/arguments (e.g., ls, cp, mv, rm) in your documentation as well as in your screenshots. 

(11.2.1: Configure technology according to stakeholder specifications and requirements.)

  • Show running processes on the system. Demonstrate how to search for a specific process
  • Forcibly stop a running process

In the above section (demonstrate CLI operations) show the commands with options/arguments (e.g., top, kill, -9, ps) in your documentation as well as in your screenshots. 

(13.1.1: Create documentation appropriate to the stakeholder.)

The deliverable for the final phase of the project is a written paper with screenshots. There is no minimum or maximum page requirement, but all of the requirements must be met.  Use the Training Guide Template to record your work. This section will be graded upon the overall usefulness of the training guide to the organization.

(11.3.1: Add and update systems as required.) 

This portion of the training guide helps determine your submission is unique.

Important Requirement

On the final screenshot, you need to open a command line and type in the following commands (without the quotes):

“date”

“echo CMIT391”

“echo ” (Replace your name here with your name)

The recommended format is to provide screenshots incorporated within the written narrative. The screenshots must all be your own. Screenshots from external sources are not permitted. You must include the specific screenshot listed above or your project will not be accepted.

(1.1.4: Explain the relationship between the ideas presented to enhance clarity and comprehension.)

The training guide must have a cover page, an introduction, summary, and at least 3-5 references.

(1.2.2: Employ a format, style, and tone appropriate to the audience, context, and goal.)

Employ proper spelling and grammar. All Linux commands must be lower case.

(2.2.3: Explain the assumptions underlying viewpoints, solutions, or conclusions.)

In your conclusion of at least a paragraph, summarize why using Linux is beneficial for employees, management, and the organization as a whole.

New Practical Connection Assignment

 Need it to be completed in next 2 hours 

  1. Assignment:
    Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment.
    Note:
    Subject name: Analyzing and visualizing Data
    My Job: Selenium Automation Tester
    No Plagiarism please..

    Requirements:
    Provide a 500 word (or 2 pages double spaced) minimum reflection.
    Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.
    Share a personal connection that identifies specific knowledge and theories from this course.
    Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 
    You should NOT, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace. 

  2. By submitting this paper, you agree: (1) that you are submitting your paper to be used and stored as part of the SafeAssign™ services in accordance with the Blackboard Privacy Policy; (2) that your institution may use your paper in accordance with your institution’s policies; and (3) that your use of SafeAssign will be without recourse against Blackboard Inc. and its affiliates.

Plan of Action and Milestones

 

Your company recently reviewed the results of a penetration test on your network. Several vulnerabilities were identified, and the IT security management team has recommended mitigation. The manager has asked you to construct a plan of action and milestones (POA&M) given that the following vulnerabilities and mitigations were identified:

  • The penetration test showed that not all systems had malware protection software in place. The mitigation was to write a malware defense process to include all employees and retest the system after the process was implemented.
  • The penetration test indicated that the data server that houses employee payroll records had an admin password of “admin.” The mitigation was to perform extensive hardening of the data server.
  • The penetration test also identified many laptop computers that employees brought to work and connected to the internal network,some of which were easily compromised. The mitigation was to write a bring your own device (BYOD) policy for all employees and train the employees how to use their devices at work.

Complete the 1- to 2-page Plan of Action and Milestones Template.       (Must use this template!)

Data discussion

This is a check up week. Please provide a status on what you have learned so far in the first four weeks. Also, list any areas you are struggling with? 

Week#3 Discussion

 

After reading this week’s article, and any other relevant research you locate, please discuss the following in your main post:.

  • Which case study in the paper was most interesting to you and why?
  • Do you think that ERM is necessary in the contemporary organization and why?

Writing Assignment 2

  

Discuss the difference between VBA and VB.Net. What are the differences and use scenarios for each?

· Prepare a quality, substantive journal post that addresses the objectives of the 

assignment and the expectations set forth in the grading rubric. 

· 300 words minimum is required. 

Use APA format  

algoritham and maths

   

Fall 2020 CIS 606 Midterm

You have to TYPE your answers and use a tool to draw figures. Save them in a file called mid.pdf. The cover page should contain your picture, name and your grail’s login id. Use the following command on grail to submit it BEFORE noon on Oct 20 (EST):

turnin -c cis606s -p mid mid.pdf

WARNING: Finding the solutions from Internet or discussing with any other person will be considered as CHEATING.

1. Write True or False at the beginning of your answer and give an explanation for each of the following statements.

(a) ( 9 points) (True or False)

5n+5 = O(5n)

(b) ( 9 points) (True or False)

In the algorithm SELECT which uses the median of medians, the input elements are divided into groups of 5. The algorithm can still work in linear time if they are divided into groups of 9.

(c) ( 9 points) (True or False)

Finding a closest pair of points in 2 dimensions would be harder (in terms of time complexity) if the distance between 2 points (x1, y1) and (x2, y2) were defined as

|x1 − x2| + |y1 − y2|.

   

Solve the following recurrence by making a change of variables.

T (n) = 8T (√n) + 1

3. ( 15 points)

Using Figure 6.3 as a model, illustrate the operation of BUILD-MAX-HEAP on the array A = h3, 2, 15, 9, 70, 18, 5, 33, 8i.

4. ( 10 points)

Trace in detail how the OS Select(T.root, 18) operates on the following RB tree T .

Given two arrays A[1..n] and B[1..n], the elements in the array A are sorted in de- scending order and the elements in the array B are sorted in ascending order. Consider the problem of finding the median of all 2n elements in A and B.

(a) Design an algorithm with merging. What is the running time of your algorithm?

(b) Design an efficient recursive algorithm based on the prune-and-search approach.

You may use a figure to illustrate your algorithm. Give the recurrence relation for the time complexity of your algorithm. Solve your recurrence using the master theorem.

  

Input: array P [1..n] and array Q[1..n], where n is power of 2.

Output: array R[1..(2n − 1)]

Two binary operators   and ⊕ will be used for calculations. Both are associative. The operation   is distributive over ⊕ and has higher precedence than ⊕.

The operator   will be used to calculate each pair of operands P [i], 1 ≤ i ≤ n, and Q[j], 1 ≤ j ≤ n (i.e. one operand in P and the other in Q). The result of P [i]   Q[j] will be accumulated into R[i + j − 1] by using the ⊕ operation.

The following is a loop-based algorithm:

for i = 1 to n

for j = 1 to n

R[i + j − 1] = R[i + j − 1] ⊕ P [i]   Q[j]

endfor endfor

For example, given P [1..4] and Q[1..4], the output result R[1..7] will be:

R[1] = P [1]   Q[1]

R[2] = P [1]   Q[2] ⊕ P [2]   Q[1]

R[3] = P [1]   Q[3] ⊕ P [2]   Q[2] ⊕ P [3]   Q[1]

R[4] = P [1]   Q[4] ⊕ P [2]   Q[3] ⊕ P [3]   Q[2] ⊕ P [4]   Q[1] R[5] = P [2]   Q[4] ⊕ P [3]   Q[3] ⊕ P [4]   Q[2] R[6] = P [3]   Q[4] ⊕ P [4]   Q[3] R[7] = ⊕ P [4]   Q[4]

Use the Divide and Conquer approach to develop an efficient algorithm which uses fewer   operations. You may draw a figure to illustrate your idea. Give the recurrence relation for the time complexity of your algorithm. Solve your recurrence using the master theorem.

Hint: Split the array P [1..n] into two subarrays A[1..n ] and B[1..n ]. Also split the

2 2

array Q[1..n] into two subarrays C[1..n ] and D[1..n ].

2 2

monitoring

Answer each these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.

1. Should society help workers dislocated when technology, like the Internet, elimlnates their jobs in a process called ‘Creative Destruction‘?

2. are we working more and earning less?

3. Would you want a telecommuting job? Why or why not? 

4. Does the gig economy appeal to you? Why or why not?

5. How is an employee differentiated from a contracter under US law? 

6. Why have some municipalities put restrictions on innovations in the sharing economy and in on-demand services?

7. What has been the effect on the US economy of outsourcing (or offshoring) technical and professional jobs? 

8. How much monitoring of employee activities at work is appropriate? 

9. Should an employer be able to discipline or terminate an employee for on-line behavior in his/her own time? 

10. What is the relationship betwee BYOD (bring your own device) and shadow IT

11. What is cyberloafing?

IA week10 DB

 

Hello,

i need this paper by 10/28 afternoon.

Strictly No plagiarism please use your own words.

Describe three network security risks and how an administrator may be able to defend against them.

An initial post must be 300 words.

Make sure Strictly No plagiarism content should not match and even the reference should not match in plagiarism