System Design

 scenario:  firms hire Spider to do an overall analysis of their network needs included the detailed cost benefit summary.  Recently a client complained that the new system was too slow and lacked sufficient capacity. Top management realized the company simply outgrew the network much earlier than anticipated.  How would you respond as the CTO. 

you are assuming the role of the chief technology officer (CTO) of Spider IT Services and writing a response memorandum (memo) to the CEO of the company referenced as the client in the case. 

 

For the purpose of your response, assume that your company, Spider IT Services, installed a traditional ring network over 10 years ago at this client site. You have learned that this client is a durable medical supply company now complaining about network performance. They have an internal network at their home office that supports 30 end users and 20 devices and are interested in expanding to include a wireless network for approximately 100 additional end users such as guests and sales persons coming in-and-out of their home office.

In your memo,

  • Explain the concept of network topography and how it relates to end user performance in terminology appropriate for a senior executive.
  • Describe the limitations of the ring network that was put in place by Spider IT Services over 10 years ago for this client.
  • Propose a star network design including its components and functionality.
  • Contrast the anticipated benefits of the star network and the ring network topography.
  • Verify the clients request for working with Spider IT Services to install a wireless network expansion.
  • Describe the IT standard that you recommend in designing the wireless network expansion.

The Network Design Case Study Memorandum

  • Must be one to two double-spaced pages in length.

PowerPoint_3G_Remodels

 

PowerPoint_3G_Remodels

#PowerPoint3GRemodels

Project Description:

In the following project, you will format a presentation that describes backyard remodels.

Open   the file named Student_PowerPoint_3G_Remodels.pptx. downloaded with this project.

Change the Colors for the   presentation to Paper.

On Slide 1, format the   background with the Stationery texture, and then change the Transparency to   30%.

Select Slides 2 through 4, and   then apply a Solid fill to the background of the selected slides-in the fifth   column, the third color.

On Slide 2, hide the background   graphics.

On Slide 2, insert a Table with   2 columns and 4 rows. Apply table style Medium Style 3-Accent 1, and then   type the information below in the inserted table.
 

  Row 1, Col 1: Improvement Type; Col 2: Components
  Row 2, Col 1: Outdoor Kitchen; Col2: Barbecue, sink, bar, covered patio
  Row 3, Col 1: Swimming Pool; Col 2: Jacuzzi, pool, waterfall
  Row 4, Col 1: Fire Pit; Col 2: Fire pit, seating area, gas lines

Change the Font Size of all of   the table text to 28. Resize the table height to 5.8″, and then   distribute the table rows. Align   the table text so that it is centered horizontally and vertically within the   cells.

In the table, change the Font   Size of the first row of text to 32. Apply a Round style Cell Bevel to the   first row. Note, depending on your version of PowerPoint, this may be called   Circle.

On Slide 3, animate the picture   using the Wipe entrance animation starting After Previous. Change the   Duration to 01.00. Apply the Split entrance animation to the bulleted list   placeholder, and then change the Effect Options to Vertical Out.

On Slide 4, insert a Clustered   Column chart. In the worksheet, beginning in cell B1, type the following   data.
 

  In row 1, beginning in cell B1: Owner Installed, Contractor, Owner as Contractor
  In row 2, beginning in cell A2: Patio, 8000, 12000, 9500
  In row 3, beginning in cell A3: Bar, 3500, 5200, 4600
  In row 4, beginning in cell A4: Infrastructure, 5000, 9750, 8100
  In row 5, beginning in cell A5: Appliances, 3000, 4200, 3850

Apply Chart Style 8 to the   chart, and then remove the Chart Title element. Apply the Wipe entrance   animation to the chart and change the Effect Options to By Series.

On Slide 5, format the   background using solid fill color Dark Green, Background 2 and hide the   background graphics. (depending upon your version of Office, the color may be   named Dark Green, Text 2). From your downloaded project files, insert the   video p03G_Video1.mp4.

Change the Video Height to 5 and use the Align Center and   Align Middle options to position the video. Apply the Simple Frame, Black   video style.

On the Playback tab, change the   Video Options to Start the video Automatically. Trim the video so that the   End Time is 00:07 and then compress the media to Low Quality. (Mac users, the   Compress Media feature is not available on a Mac).

On Slide 6, hide the background   graphics, and then format the slide background by inserting a picture from   your downloaded grader files-p03G_Backyard.jpg.   Set the Transparency to 0%

Insert a Header & Footer on   the Notes and Handouts. Include the Date and time updated automatically, the   Page number, and a Footer with the text 3G_Remodels
  Display the document properties. As the Tags, type backyard   remodels 

Look

2hrs to complete

Overview

Based on Chapter 7 in Kremling and Sharp Parker (2018), this assignment is designed to examine the prevention approaches for cyberterrorism and other forms of cybercrime.

“What is the role of violence in cyberterrorism? Within the academic definitions of terrorism, over 80% of definitions indicate violence as a necessary element. However, how does violence, and subsequently fear of harm/violence, translate in cyberspace? Furthermore, how would the presence of violence affect the prosecution of cyberterrorists?

Jackman has elaborated on the issues surrounding the conceptualization of violence. She asserts that there are four main issues that have affected society’s perception of violence. The first is the idea of physical violence. Often, acts of violence that result in “psychological, material, and social injuries” are ignored. Second, the conceptualization of violence is usually limited to “physical behavior and threats of physical behavior.” The third issue is the idea of failure to resist by the victim, and the last is the concentration on interpersonal violence, or the concentration on acts which have “individually identifiable agents and victims and immediate and certain outcomes.” In the virtual realm, these four points come under scrutiny when examining the conceptualization of violence as it applies to cyberterrorism.

In most cases of traditional cybercrime, investigations are conducted by banks or antifraud departments, not by traditional law enforcement. However, if an act results in violence, which may be the case in events of cyberterrorism, law enforcement may have to respond to the report.” (Kremling & Parker, 2018, p. 133)

Action Items

  1. Browse Chapter 7 in Kremling & Parker (2018).
  2. Write a 500-to-1000-word paper that addresses the following questions:
  3. The data preservation stage of the collection/acquisition phase of the digital forensic process involves careful planning on the part of the examiner. Identify and discuss five ways in which the digital evidence can be tainted during the data preservation process. Think of the above case as you respond to this, sharing examples of how the evidence can be tainted.
  4. A fellow classmate is confused about the following terms: slack space, clusters, and sectors. The book provided the analogy of a two-car garage to assist readers with these different terms. Create a different analogy to explain these different terms to your classmate.





PSD2

 concepts of Physical Security as they relate to Access Control and Lighting  

Actors and Use Cases

Discuss one advantage and one limitation of actors and use cases. Provide an example of each. Definitions are posted in the attached file.

capstone project

     Final Paper Layout: Chapter 1-5

•Format: Times New Roman, 12 font. Layout Margins is 1X1 (top, left, bottom, right).

•Double spacing between lines.

•Title page

•Committee chair signature page

•Abstract (briefly describe your research area, main findings, and conclusions in a paragraph or two).

•Dedication

•Acknowledgments

•Table of contents

•List of Figures

•List of Tables

MGT311 week 8

Week 8: Discussion

Answer questions 1-4 of chapter 13, page 428 case 13.1.

1.  What additional information should Anna attempt to obtain regarding the absenteeism problem?

2.  Advise Anna on the steps she should take to control absenteeism. Include in your answer the types of standards and strategies she should use.

___________________________________________________________________________________________________________

You are required to make at least two comments on the responses posted by your classmates with a minimum of 50 words. Make sure you design your response with your own words. Your responses to your classmates must be of substance; not just “I agree” or “Good Post.” The purpose of the responses is to convert the discussion forum into a quality academic environment through which you improve your knowledge and understanding. Read and review all assigned course materials and chapters before you start working on your assignments.

Exercise : Write a program in C

  

Exercise : Write a program in C or C++ or Java to display the following information.
1. Time information.
In this section you will print out how long the system has been up and how busy it has been. Once you have some baseline numbers printed, you will run a short program that places a load on the system. You will then take a second set of numbers and calculate the load that your program placed on the system.
a. Duration of uptime # get these information from /proc/uptime
b. Duration of idletime
Calculating load average.
Write a function that does some work (to put some load on the system) and make a note of the uptime and idletime before and after the call of the function. The following can be used as sample code for the work function. This program simple runs a math calculation a large number of times, just trying to keep the CPU busy. You can include it as a function in your overall program. Note that because you are using a math function (pow) you will need to explicitly include the math library when you compile your program, i.e., “gcc –o test test.c –lm”. (the –lm option for program compiling in C or C++.)
void work()
{
double y;
double x = 3.0;
double e = 2.0;
int i,j;
for (i = 0; i < 5; i++)
{
for (j = 0; j < 400000; j++)
{
y = pow(x, e);
}
printf(“Loop %d of work cyclen”, i );
// pause for one second between loops so that the work cycle takes a little time.
sleep (1); // in C or C++ you will need to include the unistd.h library for this function
}
}
 

The skeleton of the program
(1) read file “/proc/uptime” to obtain beginTotaltime and beginIdletime
(2) call work( ) to put some work into the system
(7) read file “/proc/uptime” to obtain endTotaltime and endIdletime
(8) Calculate the percentage of the time that CPU was busy during this program:
programTotalTime = endTotalTime – beginTotalTime;
programIdleTime = endIdleTime – beginIdleTime;
programWorkTime = programTotalTime – programIdleTime;
percentage = (programWorkTime / programTotalTime)* 100;
 

Items to turn in to Week 7 dropbox:
1. Source code with filename (linuxtime.c or linuxtime.cpp or linuxtime.java)
2. Sample output from your program
NOTE: (IMPORTANT !!!)
1. All the source file should be with enough documentation either embedded in the code or in a separate file. Insufficient documentation leads to minus points.
2. Be sure to write your name, date, assignment name and a brief description of the project on the top of the file in comments.(All of this counts towards the documentation)
3. Use the same file name as mentioned above (linuxtime.c or linuxtime.cpp or linuxtime.java) and submit it to Week 7 dropbox.
Percentage Distribution
Total : 100%
• Execution of the program with required output : 70%
• Enough Documentation : 20%
• Submitting the sample output : 5%
• Using the same file name as mentioned above : 5%

 Save it as uptime.c
Compilation, as stated before: gcc -lm -o uptime uptime.c
Running: ./uptime
 

Here are my results:
Loop 0 of work cycle
Loop 1 of work cycle
Loop 2 of work cycle
Loop 3 of work cycle
Loop 4 of work cycle
Total time: 8.78 seconds
CPU idle time : 5.09 seconds
CPU busy time : 3.69 seconds
CPU % of time busy/total : 42%