Need helpurgent work C++ computer paper

only experienced programmers to work on it, i need it within 8-10 hours. contact me asap

it is like this from this blog post

In this assignment, you are asked to do a mortgage payment calculation. All information needed for this will be passed to the program on the command line. There will be no user input during the execution of the program. You will need a few pieces of information. The price of the home and the amount of the down payment. You will also need to know the interest rate and the term of the mortgage. To figure your mortgage payment, start by converting your annual interest rate to a monthly interest r

Ethics Project

this is Ethic Project that needs to be done By Today.

I will provide everything you need to understand it, it’s small Project

List the Following Briefly in Six sentences each

  • 9.1 Give examples of applications of IPsec.
  • 9.2 What services are provided by IPsec?
  • 9.3 What parameters identify an SA and what parameters characterize the nature of a particular SA?
  • 9.4 What is the difference between transport mode and tunnel mode?
  • 9.5 What is a replay attack?
  • 9.6 Why does ESP include a padding field?
  • 9.7 What are the basic approaches to bundling SAs?
  • 9.8 What are the roles of the Oakley key determination protocol and ISAKMP in IPsec?

IT345: Impact of IT on Individuals, Organizations, and Society

Week 3 Discus A

Welcome to Week 3

This week we will tackle the tough topics of anonymity, net neutrality, censorship, and controlling speech. All these topics can easily start a debate among the most conservative individuals. It is important to understand these concepts can sometimes counteract the progression of technology in society.

Pick a topic below and post your reply by Wednesday at midnight. Your response should be at least 200 words and appropriately cites your resources.

Respond to two of your classmates by Sunday at midnight. Your responses should be at least 100 words and should be substantive. You should offer additional resources, insight, or other helpful feedback. A simple “I like your post” will result in a 0.

You will not be able to see your classmates’ posts until you make your first post.

Note: plagiarism is not tolerated in this course. Everything must be in your own words with sources! Failure to do so will result in failing grade. 

Executive Program Practical Connection Assignment

 Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course(ENTERPRISE RISK MANAGEMENT) have been applied, or could be applied, in a practical manner to your current work(SOFTWARE DEVELOPER) environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. Requirements:

  • Provide a 500 word (or 2 pages double spaced) minimum reflection.
  • Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.
  • Share a personal connection that identifies specific knowledge and theories from this course.
  • Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 
  • You should NOT, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace. 
  • Any use of outside sources, including your own prior work, will result in a zero on the activity and a report being filed with Academic Affairs regarding plagiarism (even if self-plagiarism).

Assignment 1: Network Infrastructure Design Diagram

Instructions

Background: Kamehameha Institute is an organization that provides educational offerings to non-traditional students via the institute’s website in a three-tier web, application, and database configuration. The State of Hawai’i regulates the educational sector, driving the need to ensure Kamehameha follows the State’s strict security and regulatory requirements. Kamehameha’s leadership is also very concerned with the threat posed by the online theft of their unique intellectual property. Additionally, the number of Hawai’ian entities breached by threat actors is on the rise. Thus, security, privacy, and compliance are all important considerations for the Kamehameha network architecture.

Your boss, the Kamehameha Institute’s Chief Operating Officer (COO) has tasked you to design a network infrastructure for three facilities located in the Hawaiian Islands of Honolulu, Hilo, and Lihue. The COO stipulated that you must provide for strengthened defenses to protect Kamehameha’s cultural heritage. After meeting with the COO, the two of you drafted the following set of requirements for your network design:

  • Each of the facilities has three floors:
    • The first and second floor of each building requires 150 network connections each for machines connected to the management network used by administrators to manage the network devices
    • The third floor of each building requires 75 network connections for the servers
    • All sites require redundant connectivity to the other sites (e.g., Internet redundancy between the sites can be accomplished through a single Internet connection and a point-to-point link between the sites or two Internet connections provided by separate vendors along with point-to-point VPN connections between the sites)
  • Each datacenter is a redundant failover environment to the other datacenters (Hilo, Honolulu, Lihue)
  • A constant connection between the three locations, carrying at least 75 Mbps of data
  • All servers at all locations must have redundancy
  • Protection from intrusions is required and should be documented
  • A plan to verify security and failover measures is required

Submission: Using a network diagramming tool such as Microsoft Visio, or free tools such as LibreOffice Draw or Draw.io available at https://draw.io (no sign-in or registration required), create a network diagram (drawing) specific to the organization that encompasses the three facilities and also depicts any necessary interconnections. Figure 1 shows the draw.io ‘new network diagram’ dialog window:Figure 1. Draw.io New File Dialog Showing the Network Diagramming Templates

Your diagram should include enough detail to show the topology interconnections. The viewer should be able to understand the Kamehameha Institute’s network environment and be able to implement the architecture you develop. Ensure that you properly cite any external sources.

One of the keys to producing a viable network diagram is labeling the objects consistently and descriptively. Think about what you would want to know about a network device if you logged into it with little prior information. Consider location, floor number, or other pertinent information. At a minimum, include the following elements:

  • IMPORTANT: Your network diagram must include an identifying label (e.g., callout box) that includes your class and section, assignment title, your name, and the date. Edit the items in italics. Your assignment will not be accepted if this element is missing:

Example Network Diagram Callout Box.

CMIT 350 6980
Project #1 Network Diagram
Student Name: Name
Date: 6/22/2010

  • Any necessary hardware
  • Site-to-Site (WAN) connections (e.g., leased line connectivity, satellite, etc.)
  • Annotate the following values for each of the Sites:
    • Network ID
    • Useable Range
    • Subnet Mask
    • CIDR Value
    • Broadcast Address
  • All devices require hostnames complying with the following naming conventions:
    • Routing Devices: Rx; where x is the site number incremented by a value of 1 for each routing device
    • Switching Devices: Sx; where x is the site number incremented by a value of 1 for each switching device
    • Servers: SRVx where x is the server number incremented by a value of 1 for each server
  • For each site routing device, implement a private ip addressing scheme using a range suitable for corporate infrastructure and include the following:
    • management vlan
    • production vlan
  • High availability

When finished, export the diagram as a PDF document (Note: You will need to use this diagram again in Project 3, so ensure you save the xml source file!) and submit it to the Assignment folder. Figure 2 demonstrates how to export your draw.io diagram as a PDF document:

SA&D – 9

 

Week 9 Assignment:

  • Discuss the deployment and implementation phase of a system.
  • Discuss the importance of retirement or end of life of a system. What happens to the physical components of a system?

Submit a one to two-page paper in APA format. Include a cover page, abstract statement, in-text citations and references.

cloud based anti virus

 

Need a  Cloud-based Antivirus which would satisfy the specs mentioned below

1. Must have a local agent/software on the local computer that monitors a directory for new files.

2. Whenever a new file is added to this directory, the local agent must check the file to find if it is in the blacklist or whitelist.

3. If it is in neither, then the local agent must upload it to the cloud.

4. On the cloud side, there must be the following components: multiple virtual machines each with a separate anti virus engine installed, and a central monitor virtual machine that accepts file uploads (or monitors file uploads to S3), and then uses cloud services such as AWS Lambda to provide the file to the virtual machines with anti virus engines. The engines scan the file and sends report back to the monitor which combines the reports and sends the report back to the local engine, telling it if it is a virus/not a virus. Also, the blacklist or whitelist must be updated

SE494 week 1 Di

Discussion 1

Comment on the topic below.

Mobile Devices and Apps for Health Care Professionals: Uses and Benefits
Give some reasoning behind your views. What would be the impact of this approach to the Health care facilities like Hospitals and general public.

Source https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4029126/

Complete an analysis of the graphics, and write a formal report outlining the findings of the analysis.

Mobile devices are being used more daily to include smartphones and tablet computers that have both cellular and Wi-Fi (Wireless Fidelity) connectivity. The wealth of information stored on these devices leads the investigator to look at them for clues or leads that would aid in the investigation.

An investigator has found some graphics involved in a case. There is a strong suspicion that the picture location can help put the subject at different locations in question.

The investigator needs to know as much about the graphics as can be discovered about what equipment was used, locations where they were taken, and dates and times of them. Using the files found in the attached file, complete an analysis of the graphics, and write a formal report outlining the findings of the analysis.