need case study help minimum 300 words

Read the case study “Teloxy Engineering (A)” on page 948 attached and answer the corresponding questions on the same page.

Questions

1. Using the expected value, is it economically better to make or buy the component?

2. Strategically thinking, why might management opt for other than the most economical choice?

Week 7

 

Create a PowerPoint that contains a FLOWCHART and a PSEUDOCODE for each problem (You may use a different application if PowerPoint is not available).

Use the information below to create a pseudocode (which can be a text-based description for solving the problems) and a flowchart (using flowchart symbols to illustrate how you would program) to solve each problem. Use Microsoft PowerPoint® for Pseudocode and the flowchart (You may use a different application if PowerPoint is not available)..

  • Problem 1: Create a list that contains the months of the year.
  • Problem 2: Create a loop to print the month number and name (do not hard code the month number)

Data Mining

Write one page on how data mining helps to gain competitive advantage for businesses. Include at least 2 references and in-text citation.

DSBDA W 2 A

 This week’s reading centered around how Big Data analytics can be used with Smart Cities. This is exciting and can provide many benefits to individuals as well as organizations. For this week’s research assignment, you are to search the Internet for other uses of Big Data in RADICAL platforms. Please pick an organization or two and discuss the usage of big data in RADICAL platforms including how big data analytics is used in those situations as well as with Smart Cities. Be sure to use the UC Library for scholarly research. Google Scholar is the 2nd best option to use for research.Your paper should meet these requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Algorithm

 

Design and write an algorithm to find all the common elements in two sorted lists of numbers. For example, for the lists 2, 5, 5, 5 and 2, 2, 3, 5, 5, 7, the output should be 2, 5, 5. What is the maximum number of comparisons your algorithm makes if the lengths of the two given lists are m and n, respectively?

Ethical Obligations in Information Security Proposal

Students will develop privacy policy and protocols for a highly regulated organization in the United States that will have a mix of remote, work from home, and multiple business offices. The privacy policy will need to address all work locations in support of the privacy of confidential information. Consider elements such as shared workspaces in the home and workplace, printing, telephone conversations, use or personal devices (computers and phones), access to the internet, etc.

C++ coding lab task

Write a Program to calculate:
1) Kinetic Energy
2) Potential Energy
3) Total Energy
Requirement for this assignment includes the use of at least 3 Programmer Defined Functions, with at least one of the functions using PASS BY REFERENCE Parameters. 
Please DO NOT  use global variables unless specified.
But can use global constant to store “acceleration due to gravity”.
 
Formula & Explanation for these three are as follows:
Screen Shot 2020-03-25 at 11.01.03 PM.png
Screen Shot 2020-03-25 at 11.02.51 PM.png
For Kinetic Energy:
Mass is in “kg”
Velocity is in “m/s”
 
For Potential Energy:
Mass is in “kg”
Height is in “m”
Gravitational Acceleration is going to be considered as constant for the purpose of the program ie 9.81
 
Sample Output:
1)
Please enter mass in kg, for calculation of Kinetic Energy :2                                                                          
Please enter velocity in m/s, for calculation of Kinetic Energy :5                                                                     
Kinetic Energy in Joule is: 25                                                                                                         
                                                                                                                                       
Please enter mass in kg, for calculation of Potential Energy :5                                                                        
Please enter height in meters, for calculation of Potential Energy :2                                                                   
Potential Energy in Joule is: 98.1      
                                                                                                       
Total Energy is :123.1     
2)
Please enter mass in kg, for calculation of Kinetic Energy :2                                                                          
Please enter velocity in m/s, for calculation of Kinetic Energy :2                                                                     
Kinetic Energy in Joule is: 4                                                                                                          
                                                                                                                                       
Please enter mass in kg, for calculation of Potential Energy :2                                                                        
Please enter height in meters, for calculation of Potential Energy :2                                                                   
Potential Energy is: 39.24         
                                                                                                    
Total Energy in Joule is :43.24 
3)
Please enter mass in kg, for calculation of Kinetic Energy :10                                                                         
Please enter velocity in m/s, for calculation of Kinetic Energy :10                                                                    
Kinetic Energy in Joule is: 500                                                                                                        
                                                                                                                                       
Please enter mass in kg, for calculation of Potential Energy :10                                                                       
Please enter height in meters, for calculation of Potential Energy :10                                                                  
Potential Energy is: 981                    
                                                                                           
Total Energy in Joule is :1481
 
Note: Here is a link to understanding the concept of Kinetic Energy & Potential Energy, in case some one wants/needs to look at it.
https://www.mathsisfun.com/physics/energy-potential-kinetic.html
 
Point Distribution:
-50 Does not compile
-5 Warnings
-5 No description multiple line comments (name, date, etc)
-5 No single line comments (logic, input, output, etc)
-10 Kinetic Energy
-10 Potential Energy
-10 Total Energy
-10 Does not use at least 3 programmer defined functions
-10 Does not use at least 1 reference parameter

Need Response to below discussion

Please read the below discussion posts and provide two responses in 50 to 75 words

Post#1

 

DNS Failover is designed to operate at the DNS level. That is, the level before a client connects to any of your servers. DNS essentially converts your domain name (e.g.www.example.com) into the IP address of your server. By monitoring applications and altering DNS dynamically so clients are pointed to different IP addresses, you can control traffic fairly easily and expensively. However, DNS failover does have two notable limitations: a) DNS Failover does not fix an outage when a client is already connected to an application. This is because their browser may not query DNS again for quite some time. b) DNS Failover has a TTL cache issue that could take anywhere from 1 to 30 minutes or more for the IP address change to be visible around the world. This is since many ISP’s recursive DNS servers cache longer than required to reduce traffic. “Time is an important component of the Domain Name System (DNS) and the DNS Security Extensions (DNSSEC). DNS caches rely on an absolute notion of time (e.g., “August 8, 2018 at 11:59pm”) to determine how long DNS records can be cached (i.e., their Time To Live (TTL)) and to determine the validity interval of DNSSEC signatures. This is especially interesting for two reasons” (Malhotra, 2019).

DNS Failover has been around for quite some time and is reliable. As a result, the sequential mode is the most popular for e-commerce applications or where back-end databases exist and some type of synchronization step is required before falling back to the primary. The cloud network monitors all of the available servers based on the monitoring criteria you specify via the management GUI and when it detects the primary down, it automatically fails over to the secondary IP (or if the secondary is down, fails over to the tertiary, etc.). In a typical static content scenario, when the primary comes back, it updates DNS again to send traffic to the primary. However, in an application where back-end databases must be synchronized, you can easily disable auto-failback to prevent the primary server from receiving traffic again. “A passive redundancy approach with diversification has been applied to intrusion-tolerant systems (ITSs) that aim to tolerate cyberattacks on a server” (Okamoto, 2017).

The monitoring system will still alert you that it is back online, but you have to manually force it to start receiving traffic again. This allows you to perform whatever tasks are required to ensure that the primary has the latest copy of the database or whatever is required. One critical drawback to using DNS failover in a situation where back-end synchronization is critical is when the primary is only down for a very short period. The short period would be sufficient to trigger a failover, but insufficient so that existing client connections (or new connections where the TTL cache has not expired) permit some clients to still hit the primary site. In this case, both the primary and secondary sites could receive traffic and create completely different databases that are very difficult to synchronize. “A DNS Load Balancer Daemon (LBD) has been developed at CERN as a cost-effective way to balance applications accepting DNS timing dynamics and not requiring persistence” (Reguero Naredo, 2017).

Post#2

 

            Cloud computing efficiency and security depends on several security concerns related to networks and connectivity. Protecting information system in cloud environment, from threats can be done largely by maintaining secure data traffic. The concepts of Domain Name System failover and Cloud failover come in this context of data traffic security. These two are most popular approaches in cloud security and share some similarities and dissimilarities between each other.

Comparison

            Functionality of DNS and cloud failover depends on the authentication of IP addresses largely. Both the preventive measures in cloud service security find out necessary action to recover from failures such as downtime recovery. Both the solutions need open access to public cloud in order to become active. The monitoring mechanism used in both the systems are almost equal and works in the same way for identification of servers and detection of faults (Naredo & Pardavila, 2017). DNS and Cloud failover are equally capable of delivering fast recovery as soon as within 60 seconds and can change functions automatically based on the requirement scenario.

The differences in cloud and DNS failover starts with the process through which these functions run. DNS finds easiest solution in re-routing of traffic in cases where a particular server fails, and it makes the traffic run through other active servers. A system embedded in the process helps in detecting the active server through a technique known as ‘round-robin’ method. A fault in DNS failover is that it contains the cached data which keeps revolving till one user’s Time to Live (TTL) in the server. “A DNS Load Balancer Daemon (LBD) has been developed at CERN as a cost-effective way to balance applications accepting DNS timing dynamics and not requiring persistence” (Naredo & Pardavila, 2017).

Cloud failover is popular for its accuracy and precision of carrying out the task necessary for sustained uptime. It does not send cached data back frequently. Sessions cared by cloud have better utilization capacities as it allows remote deployment unlike DNS failover where critical applications of a server are interrupted. To sustain through the TTLs, cloud failover uses session-wise load-balancing that proves to be more efficient than round-robin of DNS. Further, DNS failover fails to offer the flexibility due to the pre-determined conditioning that makes it a rigit system. Cloud, however, includes the DNS often for offering optimized result via a permanent proxy IP address. “DNS, being open-source, is less secure and it has no uncommon method for deciding if data has been intercepted while transmission or information of a domain name originates from an approved domain owner or not” (Ansari et. Al., 2020).

Conclusion

As a result of limitations, cloud failover service is costlier than DNS. There are steady improvements identifiable in DNS in global network. Some of the services are also allowing cache-free recovery of server. In spite of the advancements, it is yet to compete equally with cloud failover. On the other hand, cloud has its challenges too. “In spite of Cloud Computing services seem to be very attractive as an alternative to traditional on-premise data centers, there is still some concern about the providers availability” (Goncalves  & Fagotto, 2018).