4s week 11 assignment EH

In 300 words,

Web servers are compromised for a number of reasons which may include any of the following: Improper file or directory permissions, installing the server with default settings, unnecessary services enabled, security conflicts, a lack of proper security policies, improper authorization with external systems, default accounts with default or no passwords, unnecessary default, backup, or sample files, misconfigurations, bugs in server software, OS, or web applications, misconfigured SSL certificates and encryption settings, administrative or debugging functions that are enabled or accessible on web servers or the use of self-signed certificates and/or default certificates.

Select one of these compromises and explain how it could be avoided.

Include references.

No copy-paste, use your own words.

Virtual Communication

Respond to both prompts:

In recent days, most communication (business interactions, coursework, spiritual communities. etc.) has become computer-mediated  How has this changed your daily life? How might relationships be affected over time? How might our culture change? Advantages? Disadvantages?

View “5 Tips for Delivering Zoom Presentations Like a Pro” How can you apply these suggestions to your presentations in class and at work?

Lamport clock

Note: This one IP is worth 200 points. Parts 1 and 2 together are worth 100 points. Part 3, which is “summative” is worth 100 points. Part 1: In a two-phase, total-order multicast system, messages are sent in the following sequence from node S to G1 and G2. G1 and G2 are the members of the group. 1. S sends m1 to G1 2. S sends m1 to G2 3. S sends m2 to G2 4. S sends m2 to G1 Use the basic implementation of the Lamport clock. The clock s at each node start at: S: 4, G1: 6, G2: 1 Show the exchange of messages and their acknowledgments in a clock diagram using the basic implementation of Lamport’s clock. In which order and at what times are m1 and m2 delivered? Part 2. Draw a state diagram of Maekawa’s voting algorithm on the slide “Maekawa’s algorithm” in the “Distributed mutual exclusion” slide set. Note that the state diagram is from the point of view of any one of the nodes, called “this” node below. The state diagram cannot show the states of other nodes. i) Start with the basic case where “this” node wants the lock, gets it, and then releases it, and no other node wants the lock at the same time. In this case, “this” node goes through all the states in this order: Released and not voted Wanted and not voted Wanted and voted Held and voted Released and voted (Back to) Released and not voted Events are: acquire for when “this” node wants the lock release for when “this” node gives up the lock. 8/7/20 3:01 PM 15 request_received, reply_received, and release_received when a message from any node arrives at “this” node. The state diagram is similar the one of Ricart and Agrawala’s state machine (in the Distributed Mutual Exclusion PowerPoint deck) but has more states. *** If you do part i) more or less correctly, you will earn most of the points. *** ii) The complete solution includes the situations where “this” node votes on requests from other nodes. The states are the same as above, but there are additional transitions and actions. Use the “Maekawa scenario” slide in the Distributed Mutual Exclusion slide set, or Fig. D-10 in the Study Guide. Warning: There is an incorrect solution for this problem on the Web. It has extra, incorrect states. Part 3 (100 points): Summarize the course in your own words in an essay of 5-6 pages or so. Feel free to reuse any relevant DB posts as well as Unit 3 IP, but please correct any errors found. Edit it all into one paper that reads nicely from top to bottom and is styled according to APA. Include at a minimum: • How threads and safe objects interact. This can be in general or based on Ada or Java. • Entity-life modeling: the idea of finding event-sequence models of the domain and map them onto thread architectures in the software. Deadlock prevention. • The use of logical clocks for communication and/or for distributed mutual exclusion.  

Cloud Computing and Digital Forensics

1.) Use at least three sources. Use the Research Databases available from the Danforth Library not Google. 

Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list. 

Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs. 

Stand alone quotes will not count toward the 3 required quotes. Write in essay format not in bulleted, numbered or other list format. 

2.) Go  to the website: https://epic.org/privacy/litigation/ which focuses on civil rights issues and privacy. Pick a case.

Using WORD, in you OWN WORDS, write an ORIGINAL brief essay of 300 words or more  :

Summarize the case

Give your opinion of the decision.

Describe how the case deals with the material in this chapter

Innovation at International Foods

1. In discussion with Josh, Tonya foreshadows “some serious obstacles to overcome.”

Describe these obstacles in detail.

2. How can Josh win support for his team’s three-point plan to use technology to help

IFG reach its customers?

Java Basics

Have you ever played the game “Mab Libs?” (http://en.wikipedia.org/wiki/Mad_Libs). The general idea was that one player would have a story and ask another player (who doesn’t know the story) for nouns and adjectives, etc. and the end result was that you’d read the pre-written story fitted with their mostly out-of-context words filling in key spots of the story. It usually was pretty funny.
 

Let’s build a Mad Labs game with Javascript … you’ll create a script that contains a list of variables. You can either use an array or individual variables. You should use variables that are integers and text. You’ll then create your story by concatenating the variables into the story. 
 

For example, to create the story you could take a paragraph like this:
 

It is a period of civil war. Rebel spaceships, striking from a hidden base, have won their first victory against the evil Galactic Empire.

You would sub in variables for certain words: 
 

It is a period of . Rebel , striking from a , have won their victory against the evil .

Steps:

1. Come up with three to four sentence paragraph, decide which words you will replace with variables and make a list of corresponding parts of speech. You should ask specifically for “a noun”, “an adjective”, “a number”, corresponding to how many elements you need.

2. In the forum denoted as “Lesson 2 – Mad Libs”, post your list of word needs for a classmate to reply to, which you can plug in for the variables.

rp

This week, you have read about entrepreneurship in a global economy. For your written assignment this week, complete a case study of the organization you work for (use a hypothetical or “other” organization if more applicable) that will address the following prompts:

  • Describe the organization’s environment, and evaluate its preparedness to go global, if not already, and it’s strategy for staying global if it is.
  • Research other company’s strategy for going global and explain if this will or will not work for your company. 
  • Make a recommendation for a global strategy in the organization, including a justification for your recommendations.

Submit your midterm research paper as a single document. Your paper should meet the following requirements:

  • Be approximately five pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

BUS5WB – Data Warehousing and Big Data Assignment 02: OLAP, Cubes, and Insights

The second assignment focuses on the agility of data warehouse developments, redesigning an existing dimensional model, and the use SSDT tools and techniques to generate business insights. Your ability to correctly apply these tools to a business use case will be assessed.

Task 1: Agile data warehouse development approach

Conduct a critical evaluation of the dimensional models that you designed in assignment 01 to formulate an agile development approach for the corresponding data warehouses. The lecture on data warehouse lifecycle provides a basis for this formulation but you are required to reference external reading on agile and cloud data warehouse solutions (preferably Azure) to determine the critical components that will address the business needs with agile delivery.

The following business case applies to Tasks 2 and 3: 

The CIO of Valeur, a large national supermarket/retail store chain has recently introduced a loyalty card program and keen to gain a more comprehensive understanding of the organisation’s customer base through traditional transactional data as well as the newer and effective demographic analysis techniques. The customer relationship management (CRM) team working under her supervision have already put together a summarised data warehouse containing some transaction data and customer demographics. Although the data is accurate and complete, the CIO believes the structure is not. She feels there’s more information that can be captured by the warehouse. She has two main business problems in mind. Firstly, improving the current dimensional model/ warehouse to capture all relevant information that applies to customers, such as demographics. Secondly, using current data in the warehouse to better understand the customer base by identifying customer behaviours and thereby potential sales and marketing opportunities.

Task 2: Dimensional model redesign

Study the given dimensional model to determine what is lacking in response to the business need. Identify potential improvements to the dimensional model. This can be in the form of new attributes, new dimensions, new measures or the use of dimension design techniques. Present your recommendations with supporting evidence and the new dimensional model.

Task 3: Demonstration of Analysis Tools

The data warehouse (ValeurDW) is accessible from the WB server.

Use the knowledge and experience gained from tutorials 7-10, to demonstrate each of the seven analysis

technique/tool – 1) SSAS, 2) Cube Features, 3) SSRS, 4) MDX, 5) SSDT Data mining, 6) Excel Power Pivot, and 7) PowerBI, by conducting a comprehensive analysis of customer behaviours and thereby potential sales and marketing opportunities.

It is anticipated that you will demonstrate your proficiency with advanced analysis approaches rather than simple and straightforward querying. Each demonstration should lead towards an insight/recommendation of business value. A minimum of seven demonstrations is expected, preferably in increasing complexity and increasing decision value.

bash scripting, knowledge on linux

 

Hi, do you have skills about bash scripting, knowledge on linux?

It is not an assignment it’s an exam preparation, I want an expert answer about it

because I have the actual exam on Wednesday. Let me know if you really have skills with coding because I’m struggling in this class and I need help for live exam on Wednesday because it is open book exam but timed 90 minutes. If you do live session let me know I really can compensate you big if you can do that. I’ll give you $10 for this preparation exam.