Discussion forum

Required Text: Stair, R. M., & Reynolds, G. W. (2018). Principles of information systems. Boston, MA: Cengage Learning. 

Discussion:

Do you foresee that the traditional computer will be replaced by mobile and smart technologies as a primary device form factor in the near future? If one looks at the world of education for example, the use of Google Chromebooks and Apple iPads are now running the majority of school infrastructures. Mobile apps replace traditional software. Can the same hold true for corporate enterprises today?

Other references:

Bergin, T. J. (2000). 50 years of Army Computing from ENIAC to MSRC (No. ARL-SR-93). ARMY RESEARCH LAB ABERDEEN PROVING GROUND MD.

https://youtu.be/awLnur5Yt9o

Write two pages APA format document

html2 css

 

Using your personal page that created on Assignment#1,  add the following:

  • Add two separate HTML pages that contain:One Page includes details about your Contact Information (home vs work) and best way to contact
    Second Page includes your favorite Links with a brief information about each link 
  • Using  headings , paragraphs, lists and images in your pages.
  • Using ONE External CSS file to format your pages
  • Your Style file should include at least TEN different rules  that applied on your HTML files.

Make sure that all your site has a valid HTML code.

Ddos attack map

 

Go to the Digital Attack Map gallery: http://www.digitalattackmap.com/gallery/ 

  • Browse the gallery of unusual activities maps and consider the events that correlate with them.
  • Which current/future events do you consider to be more vulnerable to cyber attacks?
  • Support your answer with similar events or activities that you have heard about previously.

Leverage on research/importance on IaaS

 

Infrastructure as a Service (IaaS) – Its is On Demand process, which access to virtualized It Infrastructure through internet.

How this Service helps in computing, networking, storage which helps Cloud providers maintain and monitor the physical infrastructure to deliver IaaS. 

Main criteria for my research about Hoe this service helps current backbone clouds like AWS, that leverage it’s Enterprise in more focus on development and management and also how it is differentiated with PaaS

Detailed analysis and research needed to write in APA format with 4 pages with needed diagrams and references

Cryptography Discussion

Write 600 words that respond to the following questions:  

  • Explain with example the practical cryptanalytic attacks on 3DES.
  • Is it possible to convert a block cipher into a stream cipher using cipher feedback, output feedback and counter modes? If yes, how. If not, why not?

  • Be in APA format including your references.
  • Be 600 words long (not including title and references).
  • Do not re-state the questions.
  • Include two sources (i.e. two references).
  • Do not use Wikipedia as a reference.
  • Respond to at least two of your fellow classmates.

Streaming Analysis : Podcast

efore we start to work on video content, we’re going to look at, and create audio content. Your first analysis will be to listen to a popular podcast and write up an analysis that answers the following 5 questions:

  1. What’s the audience and how does the caster appeal to/create for that audience? 
  2. From listening to one or two episodes of the podcast, what are the tropes and trends you notice? In other words, how is this podcast structured? 
  3. Think about the production value and the use of sound. What does the podcast do to be not just listenable but entertaining?
  4. How does the podcast use time? This relates in ways to 2 and 3 above, but it’s important to think about any places where the cast either drags or moves too quickly (and, relatedly, how the hosts/creators fix that so that it doesn’t continue)
  5. Every podcast with an audience is doing something special. So what is the podcast you’re analyzing doing that makes it unique, elite, popular or otherwise engaging? What’s the secret to success? 

Each criterion will be worth 2 points of your final total for the assignment.

You can select any podcast that you like as long as it conforms to the following two criteria:

  • It has to have at least 100 reviews on Apple Podcasts or Stitcher
  • Episodes have to be at least 30 minutes long

2 full pages long 

Public Key Infrastructure

Answer the question, posting your initial response, minimum 250 Words. APA format and references. 100% original work, no plagiarism.

Which one of the following statements is most correct about data encryption as a method of protecting data?

It should sometimes be used for password files

It is usually easily administered

It makes few demands on system resources

It requires careful key Management

Discussion question, 350 words and 2 references.

A.     Consider the different teams presented in your reading assignment. How do the teams manage their team boundaries? What are the trade-offs between internal cohesion and external ties within each type of team? Support your discussion with at least two (2) external sources.

B.     Consider the list of common roles for team members which of these roles do you think you play in your own team or group? Why?

computer science

Below is the list of items to include in Phase 3 of your project:

  • Provide information included in Phases 1 and 2 that reflect any revisions I may have noted. 
  • Include memory requirements. Be sure to recommend system memory (RAM), hard disk storage, and core processor for optimum performance.
  • Select the right server for the organization.  Make a recommendation on the type of server you have selected to host the operating system.
  • Include a cost schedule for all of the hardware and software items selected for the project. 
  • Include justification about why the above selections will be the best choices for your selected organization.