refer to the attached documents
project php
refer to the attached document
GO16_PP_CH02_GRADER_2G_HW – Orientation 1.4
GO16_PP_CH02_GRADER_2G_HW – Orientation 1.4
Project Description:
In the following project, you will format a presentation that is shown to Sensation Park Entertainment Group employees on their first day of a three-day orientation.
Security
- What advantages and disadvantages should be discussed before an organization commits to implement Hadoop?
- How can a database be enhanced to make it user-friendly to managers as well as programmers?
- What are some of the current trends in telecommunications and networks?
- Why would you choose a mesh topology over other types of network topologies?
2)
- What functionalities or services make an e-commerce Web site effective?
- What enhancements might encourage more people to embrace e-commerce and/or m-commerce?
In pseudocode
In pseudocode, declare a 2-dimensional array of integers that would store the multiplication table of up to 10×10. (100 elements total need to be stored) Use a nested repetition loop of your choice to store each of the values. Be sure to walk through your code and make sure it is properly calculating each of the elements.
Module 4 Lab – Using Social Engineering Technology for Criminal Hacking
ubmit a word document containing an analysis and a summary of the completed lab (part A). The word document should contain the following elements:
- Summary of the lab
- Analysis of the activities performed in the lab and their importance to the course topics
- How the lab relates to the course and current module topics
- Related concepts from the module readings and lectures
- At least one external reference
- 1-3 pages in length
- Proper APA formatting and citations
- Minimum of 1-3 references are required
Discussion
How is Cloud Computing different from a simple Client-Server architecture? How is Virtualization different from Cloud Computing? Which is the best to use and why?
Research a Recent Data Breach Involving Databases
Discussion: Research a Recent Data Breach Involving Databases
Instructions:
In this module, we discussed how important security is when it comes to databases. As an effective database professional, you’ll need to ensure the systems and solutions you design and use are properly secured from accidental or intentional misuse. Many databases contain sensitive information, such as PII (Personally Identifiable Information, like your birth date), PHI (Personal Health Information, such as your medical history or current prescriptions), and PCI (Payment Card Information, such as your bank or credit card details). Then there are the thousands upon thousands of other data points captured about you and the world (physical and virtual) around you. All of this information is under attack – by malicious hackers seeking to profit, competitors looking for the “Next Big Thing”, or just bored kids who have nothing better to do.
In your duties, you’ll be managing and acting as a “Data Custodian.” By understanding how impactful a database breach can be, use the internet to research data breaches from the past 5 years. Focus on breaches where
- Data was stored in a database, S3 bucket, or other online repository,
- Data was the primary focus of the attack
- Where that attack caused serious business or financial harm
In general, your post should include: key characteristics or facts about the attack, type of data impacted, business or financial impact. Include any lessons learned or relevant personal experiences.
The post should be roughly 3-4 paragraphs and be roughly 300-400 words long.
You MUST cite resources in APA format.
UMUC has recently
Network Design Paper
UMUC has recently acquired a building in Frederick, Maryland. This new building will house some administrative offices, lecture rooms, library, and computer labs.
Building dimensions:
Length: 240 Feet
Width: 95 Feet
Height: 30 Feet
The 40-year-old two-story building has the following existing layout:
There will be six computer labs that will be used for instruction. Each of these labs will have 21 computers (20 student computers and 1 instructor computer). Each of these labs will also have a server in the closet located inside the lab.
In addition to the six computer labs, there will also be a Student Computer Lab that will provide computer access to students to do their homework. There will be 30 computers in this lab and a server in the closet.
The library will also have some computers to allow students access to the library resources. There will be 10 computers for student’s use in the library, and 5 computers for Library staff.
There are five lecture classrooms in the building. Each of this room will have a computer for instructor’s use.
Finally, there are various offices in the building. Each of these offices will have one computer for the staff use, with the exception of the Admission office that will have 5 computers for staff use.
Equipment Inventory
Workstation
Placement Number of
Workstations Users Total WS
6 Instructional
Computer labs 21 WS Student and
Instructor 132 WS
(based on 20 WS for students and 1 WS for instructor on each lab)
Student Computer Lab 30 WS Student 30 WS
5 various offices 5 WS Staff 5 WS
Admission office 5 WS Staff 5 WS
Library 10 WS Student 10 WS
Library 5 WS Staff 5 WS
Server Staff To be determined by students
Network Connecting
Devices IT Staff To be determined by students
Printers To be determined by student
Two server rooms have been allocated, one on the first floor and one on the second floor.
Your task is to design the network for this new building with the following criteria:
• Student-accessed computers should be on separate network from the staff-accessed computers. There should be at least 3 separate networks: Administrative, Instructional, and Public. All staff-accessed computers will be on the Administrative network. The computers in the instructional computer labs that will be used for classes should be on the Instructional network. The wifi and the computers in the student lobby should be in the Public network.
• The whole building will share one Internet access connection (T-1 link from Verizon). This connection will come into the Server Room on the first floor. The Public IP address for the router here is 191.1.15.1
• Security is very important for UMUC as we have to protect students and employees data as well as any intellectual property that UMUC has on the servers and computers.
• The network has been assigned the 10.15.0.0 network address for all computers and devices.
• The network should use physical cable (not wireless), but do provide wireless access in the Student Lobby area.
Submission should include (in no more than three pages, excluding diagrams and references):
Network Addressing:
1. Define the subnet (based on: rooms, floor, department, or other criteria).
2. For each subnet, explain which devices/groups/users/rooms will be on this subnet, define the network address, subnet mask, and available IP addresses to be used by computers or devices.
Physical Network Design:
1. Define the topology that will be used.
2. Select the appropriate network media to use.
3. Select the appropriate network connecting devices to use.
4. Physical layout of the computers on the floor plan.
5. List of additional servers or network devices needed to implement the network.
6. Justifications for your network design (number 1 – 5 above)
You will be evaluated on your ability to
o Implement appropriate IP addressing scheme
o select and justify appropriate cable media that includes the length of each cable segment and number of nodes on each segment
o select and justify appropriate topology such as star, bus, or ring for your network
o select and justify of your selected network equipments
o select and justify appropriate network services to meet network requirements
o select and justify security implementation for the network
o use proper grammar, formatting, network terminology, and reference citations
Feel free to use any drawings or attachments, and assume any number of computers or users (not when provided here). You will be graded on the basis of right media, topology and knowledge of network concepts.
331f3
Check attachment