ppt

 

Scenario: Your instructor has asked you to present information about  core programming concepts and the idea behind computer algorithms to the  class.

Create a PowerPoint presentation that describes the following core  concepts for computer programming. Provide an example for each concept.  (Hint: You can use examples from your readings/labs.)

  1. Numbers and data representations for computers
  2. Data types
  3. Variables
  4. Decisions/selection
  5. Repetition/iteration
  6. Data structures
  7. An algorithm

 

  • Contain at least seven content slides.
  • Include the transcript of your presentation in the notes section for the given slide.
  • Cite references in APA format within the presentation where applicable. Consult the Writing Center’s APA Style resources as needed. For additional APA citation and formatting help, refer to the Academic Tools area of this course.
  • Include a title slide and a final reference slide.

No plagiarism

Telecomm Network Security Assignment

Would need first part of the assignment now. PFA for requirements.

Topic:

Corporation Techs provides remote and on-site support to small and mid-size businesses. Clients use Corporation Techs’ services to solve problems involving malware removal, to manage data recovery and network issues, and to install hardware and software.Due to recent developments, most technical representatives will begin working from home within the next six months. Because Corporation Techs provides 24/7 support, its systems and communications pathways must be fully operational at all times. In addition, the company has been experiencing unprecedented growth and is preparing to double its client-facing staff.You are a junior network architect who is responsible for helping to plan and design network enhancements to create a more secure internal network, and to ensure secure remote access.

Deliverables

The project is divided into several parts. Details for each deliverable can be found in this document. Refer to the course Syllabus for submission dates.

  • Project Part 1: Network Design
  • Project Part 2: Firewall Selection and Placement
  • Project Part 3: Remote Access and VPNs
  • Project Part 4: Final Network Design Report

Discussion 250 -300 words

Do some Internet research on flow control in data communications networks. Identify common examples of why flow control is needed and how it is used to ensure reliable data transfer between senders and receivers. Provide references. 

CIS222 Unit 1

 

Unit 1 Assignment

Attached Files:

Due: Midnight SundayAs the new Chief Information Security Officer (CISO) for PostCyberSolutions (PCS) LLC you are developing a Security Program Plan for the Executive Board approval.Based on your research for Unit 1:

  • Develop the PCS security program charter for the corporate network and satellite offices.
  • Clearly state the CISOs vision including elements of a strong security program.
  • Include information regarding some of the regulations or laws that influence the direction of your security program.
  • Identify the key roles and responsibilities of the various company stakeholders.

The requirements for your assignment are:

  • 1-2 page APA paper excluding title and reference pages
  • Provide at least two references and in-text citations in APA format
  • College level writing

Refer to the attached document for the grading rubric. 

Two-Factor Authentication

we are going to set up Duo. Duo is a commonly used second-factor authentication mechanism used by many entities, even the university. It allows a user to register their cell phone to their account and either type a rotating six-digit number or push a prompt to their cell phone. Duo also includes a free tier that allows you to create up to 10 users.

1. Create an account using your university email here:

Use your own name for Company. Verify your email by clicking the link, and then choose a password. Next, install the Duo app on your smartphone and scan the QR code to link your administrator account to your smartphone. If you don’t have one, you can set one up with any phone number.

2. Next, we will set up two-factor authentication to log in to our virtual machine. Follow the directions here to get started (you just did Step 1 above):

3. Screenshot your successful login through Duo prompt (after /usr/sbin/login_duo echo ‘YOU ROCK!’), and stop at that point. You can continue following the directions to set up two-factor authentication on the login if you desire, but at this point, we have proof of concept.

For your submission, include:

  • A screenshot of successful Duo login from the command prompt
  • Your thoughts on the benefits of adding a second factor of authentication to the system login. Is the inconvenience worth the security gain?

Parameters

  • The assignment should be double-spaced, 12-point Times New Roman font, with one-inch margins
  • Use APA for citing references and quotations
  • See the assignment rubric below for more details 

Program 3.22 using message passing

  

Program 3.22 using message passing

The Collatz conjecture concerns what happens when we take any positive integer n and apply the following algorithm

The conjecture states that when this algorithm is continually applied all positive integers will eventually reach 1. Write a C program using fork() system call that generates this sequence in the child process. The starting number will be provided from the command line. Because the parent and the child processes have their own copies of the data, it will be necessary for the child to output the sequence in Exercise 3.21. Another approach to designing this program is to create message queues, one for the parent process and one for the child process. The parent can write a message containing the starting number of the sequence to the child’s message queue. After the child process receives the message, the child process will generate the sequence, and send the entire sequence to the parent’s message queue. The parent will receive the sequence from its message queue, then output the sequence to the screen. Before the processes terminate, they will each destroy its own message queue.

One area of concern with cooperating processes involves synchronization issues. In this exercise, the parent and child processes must be coordinated so that the parent does not output the sequence until the child finishes execution. These two processes will be synchronized using synchronous message sending and receiving.

useful example msg-passing-outline

Block Chain – Journal 1

In chapter 1, the author presents several use cases for blockchain technology. Describe the use case that aligns most closely with your current job role, including how blockchain technology would change things that you currently do in your job. If you are not working in a job role that aligns nicely with a use case presented in chapter 1, describe a job role that you would like to hold after finishing your degree program, and how blockchain technology may affect those job functions.  

Information security systems and organizational awareness

Write a 4-5 page paper (deliverable length does not include the title and reference pages)

  • What are key issues with interacting and using a computer for people who are visually impaired?
  • What input and output devices are specifically created to help the visually impaired use a computer?
  • What would be the privacy concerns of visually impaired learners and how is their privacy managed?

Develop a Complete Disaster Recovery Plan to be submitted to the executive board of your company.

Develop a Complete Disaster Recovery Plan to be submitted to the executive board of your company.

 Need a PPT of 10-12 pages and Word Doc.

Word Doc:MS Word (.doc, .docx) and Adobe Acrobat (PDF) formats are acceptable. Please note that this is a formal writing, all references (peer-reviewed) mostly must be cited appropriately within the text and clearly avoid plagiarism. The paper should have a minimum of 10 pages, 1.5 spacing and Times New Roman font. A minimum of 5 peer review references must be provided. Reference style is APA. You can also have some web references alongside the stated requirement. Please see class syllabus for additional details