java interview question

 

1. Describe the key architecture points in a high capacity enterprise solution processing over 100/000 TPS?

 2. What are the key breakage points in the architecture? How would you improve upon them?

Discussion forum on chapter readings

Required text book:

Gaur, N., Desrosiers, L., Novotny, L., Ramakrishna, V., O’Dowd, A. & Baset, S. (2018). Hands-On Blockchain with Hyperledger: Building decentralized application with Hyperledger Fabric and Composer. Packt Publishing. 

Chapter-12: The Future of Blockchain and the Challenges Ahead

This chapter reading discussed the current state of blockchain technology and suggested what the technology may look like in the near future. The author provided several suggestions that would increase blockchain’s value to the enterprise.

Discussion Topic:

1.choose whether you would consider interoperability or scalability to be more important to blockchain’s future. 

2.Explain your decision and use examples from Chapter 12. 

3.Then think of three questions you’d like to ask other students. The questions should be taken from Chapter 12. You’re not trying to test each other, but you are trying to start a discussion.

Write 2pages document

Cyber security Planning and Management: Assignment 1 & 2

 

Select ONE ARTICLE from the following links and summarize the reading in your own words. Your summary should be 2-3 paragraphs in length and uploaded as a TEXT DOCUMENT. 

http://topics.nytimes.com/top/reference/timestopics/subjects/c/computer_security/index.html

http://www.sans.org/newsletters/

http://news.cnet.com/security/https://www.onlinesecurity.com/news–publications-pagehttp://www.esecurityplanet.com/viewshttp://netsecurity.about.com/

Operational Excellence

APA format with headings

Strictly plagiarism free.

Assignments 1,2,3 each should have 2 references 

total – 5 pages

Assignment 1 (discussion – 1 page)

Discussion: This week we focus on some additional terms for IT users.  This week lets discuss what a community of practice is.   Why are they important and how can they impact the culture within an organization?

Assignment 2 (Exercise – 1 page)

Chapter 13- Exercise 1 (2, 4) (Information Systems for Business and Beyond)

Assignment 3 (Essay – 1 page)

Chapter 11 – Review the employment challenge in the digital era (as well as the entire chapter). Reflect on the various challenges are present in the digital era. Will things get better or more complicated as times goes on? Explain. What are some methods to assimilate new generations into the workforce to think about competitive advantage? (Information Technology and Organizational Learning)

Assignment 4 (Practical assignment – 2 pages)

Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.

NOTE: Do not submit a paper you wrote for another class. This paper must be written specifically for this class.

NOTE: Do not include a job description from your current or previous job. This paper must be written to describe how this course would apply to your job.

Information Governance Research paper 1

Your final project paper is broken down into 3 parts, worth a total of 600 points towards your final grade. This milestone is worth 100 points.

For this piece of that assignment, you will write the introduction to your final portfolio project (2-3 pages), comprehensively describing the industry you are choosing to use in the paper and preliminary challenges with information governance that you have identified. Be sure to utilize 3-5 sources from the UC Library.

Review the instructions in the Portfolio Project document first (attached here). Each milestone is a separate writing assignment, leading up to the final submission in week 7.

Expectations are that it will be a scholarly work, using largely peer-reviewed resources, formatted to APA 7 style. Grammar, spelling, and punctuation are significantly weighted. Any instance of plagiarism will result in a 0 on the activity (first offense) or failing the course (2nd offense).

EH week10 DB

 

Hello,

i need this paper by 10/28 afternoon.

Strictly No plagiarism please use your own words.

Social engineering is the art of manipulating people so they give up confidential information. The types of information these criminals are seeking can vary, but when individuals are targeted the criminals are usually trying to trick you into giving them your passwords or bank information, or access your computer to secretly install malicious software – that will give them access to your passwords and bank information as well as giving them control over your computer.

Explain a scenario where you or someone you know may have unknowingly given too much personal information to a stranger. How could this situation  been avoided? 300-350 words.

Reference Article Link: 

https://www.webroot.com/us/en/resources/tips-articles/what-is-social-engineering

 

Make sure Strictly No plagiarism content should not match and even the reference should not match in plagiarism 

R5

Please go through the attachment for assignment details.

Business contingency and disaster recovery

Create a disaster recovery plan for either the organization they work for or one they wish to work for in the future. The plan will follow the template/example provided. Should request prior authorization of the company to be addressed to ensure that all students are working on unique companies.

**Even though this is a technical document, for academic purposes, all sources should be cited and referenced.

**You may modify some of the sections per the company they have selected but all students will need to complete a DR plan for the Portfolio requirement.