project 2

  Now that you understand and have created a virtual machine,  your Caduceus CTO, Eliza, has asked you to extend that application and  provision infrastructure in the cloud. Specifically, you will provision a  Windows operating system in the cloud. The provisioned infrastructure  could be accessed by any end-user device client. This includes a desktop  running Microsoft Windows, a Mac device running Apple MacOS, iPad,  Android Tablet, and even a Google Chromebook. You will use any of the  aforementioned end-user devices to access the provision infrastructure  once this is set up.

Step 1: Log in to the AWS Dashboard

CMIT 495 requires you to complete hands-on assignments in the Amazon Web Services (AWS) virtual environment.To get started, log in to the AWS free account you created in Week 1.

Step 2: Download the Week 2 Assignment Template

Next, watch the video and download the template from the Cloud Computing Assignment Resources page. You will answer the questions and embed the appropriate screenshots of your cloud infrastructure provision as you work.When providing a detailed overview of the steps required to  install the Windows operating system on the virtual machine, make sure  to include screenshots of each step in the process. Specific details and  instructions are included within the Week 2 Assignment Template.

Step 3: Install and Configure a Microsoft Windows Operating System

  • Provision cloud infrastructure via Amazon and a OS platform (PaaS) by installing and configuring a Microsoft Windows operating system that can be accessed on demand by any end-user device.   
    • Research and use AWS documentation and tutorials for instructions and guidance to complete the assignment.  
    • Consult the AWS Connection Documentation in order to connect to the Microsoft Windows operating system.  
    •     How Will My Work Be Evaluated? The following evaluation criteria aligned to the competencies will be used to grade your assignment:  
    • 1.4.1: Produce grammatically correct material in standard academic English that supports the communication.  
    • 2.2.3: Explain the assumptions underlying viewpoints, solutions, or conclusions.  
    • 2.3.1: State conclusions or solutions clearly and precisely.  
    • 3.1.1: Identify quantitative information that is relevant to a problem or situation.  
    • 3.1.2: Analyze quantitative data using an appropriate method.  
    • 10.1.1: Identify the problem to be solved.  
    • 11.1.3: Install software.  
    • 11.3.1: Add and update systems as required.  
    • 11.2.1: Configure technology according to stakeholder specifications and requirements.  

Step 4: Upload Your Work to the Assignment Folder

  • When complete, export your file as a PDF and upload to the LEO Assignments Folder (e.g., Project 2 – Cloud Computing).  

Step 5: Stop and Terminate Your Amazon Instance

After you complete the Week 2 Assignment, stop and terminate your  Amazon deployment/instances so you do not receive any unexpected charges  on your account. 

Essay that evaluates how to conduct effective research online.

Week 2 Written Assignment

Each assignment will be an essay written in APA format (see below). Each essay should be no less than 1500 words on the topic (s) noted below.

The title page and bibliography do not count towards the word count.

Complete the assignment in a Word document using APA formatting with your last name as part of the file name. Omit the abstract and outline. A Word APA template and APA sample paper are provided for reference

After completing the essay, save and upload the document in the Assignments section of the e-classroom.

Each essay will be checked by Turnitin automatically upon submission.You will have access to the originality reports.

Topic: After conducting independent research using at least three sources not used in the class write an essay that evaluates how to conduct effective research online.

CA

 

There are a variety of ways that a cyber-attack can cause economic damage. In many cases, attackers try to “penetrate” systems in order to steal technology or other sensitive information. When do you think an attack can be classified as cyber terrorism?

  • Ask an interesting, thoughtful question pertaining to the topic
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Make an argument concerning the topic.

cloud computing R2

 

Develop a paper describing how the knowledge, skills, or theories of this course have been applied or could be applied, in a practical manner to your current work environment. If you are not currently working, share how you could leverage the knowledge gained working as an IT consultant working for an organization of your choice.

Requirements:  Provide a 500-word (2 or more pages double spaced not counting the title and reference pages) paper.  The paper should include a title page, body pages, and reference page.  An abstract and introduction is not required for this assignment.  Correct use of APA guidelines for sources and citations is required. If supporting evidence from outside resources is used those must be properly cited.

Discussion

  After reading chapter 13,  analyze the advantages and disadvantages of digital signatures. You are also required to post a response to a minimum of two other students in the class by the end of the week.  You must use at least one scholarly resource.  Every discussion posting must be properly APA formatted. 

ADT

Set up your project with the given starting code. The files should compile and run, but either no tests will be run, or tests will run but be failing. 2. For this project, start by uncommenting the first TEST_CASE in the assg10-tests.cpp file. These are the unit tests to test the functionality of your PriorityQueue enqueue() function, the class and overridden member function you are to implement. 3. Add the PriorityQueue class to the Queue.hpp header file. The class should inherit from LQueue and override the enqueue() method as described in more detail below. 4. Add a stub for your enqueue() member function to the assg07-stackfun.cpp implementation file. You could start by doing nothing, or by copying the code of the enqueue() function from the LQueue class. 5. Your code should compile and run now. Make sure after adding the class and your stub method your code compiles and runs. However, your unit tests will be failing initially. 6. Incrementally implement the functionality of your enqueue() member function. You should try to add no more than 2 or 3 lines of code, and then make sure your program still compiles and runs. Start by adding code to get the first failing test to pass. Then once that test passes, move on to the next failing tests until you have all tests passing. If you write something that causes a previously passing test to fail, you should stop and figure out why, and either fix it so that the original test still passes, or remove what you did and try a new approach. 7. Once you have the enqueue() member function implemented and all unit tests passing, you should then move on to the other functions in the order suggested. Some functions use previous ones in this assignment, so do them in the order given for you in the tasks below.

Python Functions

1) Write a function that calculates the volume of a sphere with radius r for only values > 0, return 0 otherwise . V=4/3  π r^3

2)  Write a function that finds you weight in stones using the formula.  mstone = mkgx2.2/14

3) Write a function that takes some monetary amount from the user in dollars, and then display exact changes for this amount using the minimum number of coins. For example, $0.97 shows 3 quarters, 2 dimes, and 2 pennies. 

 

Output: 
change_it(97)

The change for 97 cents is:
3 quarters
2 dimes
2 pennies

 Write an function to calculate both Ohm’s Law and Power transferred. The function takes i and r as inputs and prints the results (see output below). Calculate only if both i and r are > 0. 

 

FORMULA
 i is current, v is voltage, r is resistance, p is power
 p = i * v   # power = current * volatage
 v = i * r   # voltage = current * resistance
def ohms_law(i, r): 
   '''
     i is current
     r is resistance
   '''
   # check if both i and r are greater than 0
   # calculate v and p
   # PRINT v and p
omhs_law(5, 5)
v = 25 p = 125

omhs_law(-5, -5)
0

FAVORITE SCRIPTING LANGUAGE

Comment your favorite scripting language (VBScript, Node.Js, Python or SQL script). What do you think is most useful for administration and security? How can you use it? Minimum 150 words. APA format. 1 reference. No plagiarism. 100% original work. NEED THE WORK ASAP!!