Title is Virtual Machine

 

 Your PowerPoint should contain 10-15 slides. You can use Microsoft Teams to record the audio narration of your PowerPoint presentation (preferred). Please cover the following topics in this presentation:

  • The CTF category
  • Problem solved
  • Steps used to solve
  • The solution
  • Strategies, pitfalls, lessons learned
  • Workplace relevance

Final project proposal

 Propose and defend a topic for your final project it should be related to Cloud computing

 Write  500 words or more explaining why this topic is important for your peers to understand. Be focused and specific. Look into the general topic provided in the list in this folder to find something new and interesting to write about. You should do a deep dive into a topic. Do not do a survey. Use the Research Databases available from the Danforth Library not Google. 

You MUST make a statement saying exactly what your topic is. 

Use at least five sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Write in essay format not in bulleted, numbered or other list format. 

Do not use attachments as a submission. 

Discussion

1. What is “Partition” and it function? What is required before OS can be installed?  

2.What is “File System” and what does it do for computer?

3.Describe the 7 file attributes in computer file System and what are the 6 Operations performed on Directory? 

4. Review scholarly articles and reputable resources and discuss what are the latest technology/software for intrusion detection and prevention techniques.

Please  list  your references/resources.

IT Disaster

 Go online and search for information about companies that have been harmed or bankrupted by a disaster. Choose one such company and create a brief case study about it. Successful narratives will focus on the manner in which the organization was impacted, including financial losses, losses of sales, or the need for layoffs. Your assignment should be 3-4 paragraphs in length. 

Microsoft Access

 different discounts 8 not 6. 

 

First Query per Instructions

  1. Invoice History 

Part 2

Once completed add the following queries to your database.

Create a query for each of the following that shows

  1. How many invoices were paid on time
  2. Which doctor has the most invoices 
  3. Which doctor has the least invoices
  4. How many invoices due after June 30- 2014
  5. How many different doctors offered a discount.
  6. How many discounts were offered altogether. 

Total of 7 Queries for this assignment .

Computer Security

Please read below and respond with 150 words or more on how to keep your computer safe.

 Malware typically infects a machine by tricking users into clicking  and/or installing a program that they shouldn’t from the Internet. The  purpose of malware is to interfere with a machine for a variety of  reasons. From the theft of financial details to sensitive corporate or  personal information, malware is best avoided, for even if it has no  malicious purpose at present, it could well have so at some point in the  future. Spyware is any software that installs itself on your computer  and starts covertly monitoring your online behavior without your  knowledge or permission. Spyware uses your internet connection to relay  personal information such as your name, address, browsing habits,  preferences, interests, or downloads.
A trojan horse is a kind of  software that is used for malicious purposes. A trojan horse is a  special type of malware that pretends to do a certain thing, but in  reality, it does something else, such as allow a stranger to read and  change the computer’s information. To protect against trojan horse  virus, You must secure your computer with anti-virus software or  anti-spyware software, Use a firewall. Firewalls block unwanted  connections, which can help prevent Trojan horse viruses. also, Update  your security patches for your operating system. 

In pseudocode, declare a 2-dimensional array

  

In pseudocode, declare a 2-dimensional array of integers that would store the multiplication table of up to 10×10. (100 elements total need to be stored) Use a nested repetition loop of your choice to store each of the values. Be sure to walk through your code and make sure it is properly calculating each of the elements.