discussion api

 Name the three essential elements of a basic structured cabling network? How are they installed and what are the components that are involved with them? 

cloud computing

Compare and contrast physical, dedicated virtual, and shared virtual servers. Search the web for companies that provide each. What cost should a customer expect to pay for each?

Be sure to provide a minimal 2 pages, 3 scholarly resources and write using APA format. No plagiarism.

Room reservation site

Hello, this needs to be a very basic webpage. This is project for a school assignment and doesn’t need to be flashy or extra. Think the simpler the better. As long as it works and hits all the points listed below ill be fine. Requirements:

  • Allow users to login to the site
  • Create a database to hold login info for website, reservation info, & conference room info
  • Allow users to register to the site
  • Users should be able to reserve rooms for a specified date and time range
  • Validate user input
  • Display error messages when appropriate.
  • List conference room reservations sorted in date and start time order
  • Allow two display options: 
    • All-display all conference room reservation schedules; past and future
    • Future-display conference room reservations that are scheduled in the future only

This site is to be hand coded ONLY do not use and site builders, any plugins/widgets, I only need it to be very basic. This is not a professional site it is a school project. I have provided a link of what is considered too far and not what im asking for. 

http://mdimond.info/2550/conference/login.php

* Do not allow reservations outside of business hours or during the weekends

PT

Penetration testing is a simulated cyberattack against a computer or network that checks for exploitable vulnerabilities. Pen tests can involve attempting to breach application systems, APIs, servers, inputs, and code injection attacks to reveal vulnerabilities. In a well-written, highly-detailed research paper, discuss the following:

  • What is penetration testing
  • Testing Stages
  • Testing Methods
  • Testing, web applications and firewalls

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. 

Security Admin security Plan

1) Describe how security administration works to plan, design, implement and monitor an organization’s security plan. Submit by Friday of Week 4 11:59 PM EST in order to receive timely input.

2) Describe five effective change management processes organizations can execute as well as the advantages and disadvantages of change management when it comes to the IT department.

lighting

  

The Building is 1400 feet by 1200 feet. Explain your lighting strategy. There will be 20 or so 5-10 trees surrounding the building

COmp

 A researcher wanted to know if there was a significant difference in cyber security breaches between cities on two different continents.  What test should he conduct to determine if there is a significant difference in cyber security breaches between the continents?  Write up the results and determine what do the results mean? 

Here is the data set:

Asia

Europe

40

25

52

35

63

20

70

18

25

19

19

14

 

11

 

9

: In Excel write data analysis

Results are to be written in excel

Artifical Intelliegence

 How does artificial intelligence impact games intelligent. Provide a game algorithm. At least it should have 650words Provide examples and present your written findings. 

You must include 3 scholarly reviewed references that are DIRECTLY related to the subject. 

Computer Crime

 

Search the Internet for articles on computer crime prosecution. Write a one page paper summarizing the article and identify key features of the decision you find in your search.

Assignments are due by 11:55 p.m. Eastern Time on Sunday of Week 1.

Plagiarism – who are you cheating? Discussion board

There are research services available online that can be used by students preparing term papers.

Is the use of these services ethical?

Is the use of programs to detect plagiarism by instructors ethical?

How can the problem of plagiarism and other forms of cheating at schools today be resolved?

Whose responsibility is it to ensure students do not cheat themselves out of a proper education?