Please be sure to answer the questions fully and in essay/short answer format. There should not be any 1 or 2 word/sentence responses to any of the questions. Use your own words. Copied answers will NOT be accepted.
Please be sure to answer the questions fully and in essay/short answer format. There should not be any 1 or 2 word/sentence responses to any of the questions. Use your own words. Copied answers will NOT be accepted.
Search the web to find a Cloud provider. Now search the companies website to answer as many of the questions you provided below. Atleast 50-100 words
Share the name of the Cloud provider and the answers to the questions with the class.
In this lab you will learn about the environment you will be using to do your lab assignments. The labs will utilize a Lab Notebook which, you will create and is required to be kept up since it will help you in your midterm and final exams.
The first lesson is getting into the ssh environment to access the lab area.
Refer to the attachment lab work 1-1
In this lab you will learn how to navigate in the environment you will use to do your lab assignments. The labs will utilize a Lab Notebook which, you will create and is required to be kept up since it will help you in your midterm and final exams.
The second lesson is navigating the Linux hierarchy.
Refer to the attachment Lab work 2-2
Writing Requirements
Use standard APA writing and the application of the Blooms taxonomy(highest level of analysis) to answer the following questions. 2-4 pages to each questions without the cover page and references.
Approach this from a research perspective, apply what you have learned from this course and add other resources as applicable. Find 5 -7 Scholarly papers to support your response to each question.
2. You have just been named the Project Manager of IT Governance Enterprise Wide Initiative within a company. who do you think should own the Project, the Chief Information Officer (CIO), Chief Security Officer (CISO) or Chief Operating Officer (COO) and why?
Define and relate these different terminologies and Information Governance (IG), Data Governance (DG) and Information Technology Governance (ITG), E-Discovery, Digital Assets; how do you see IT Governance evolving in the next 5 years? What framework will you adopt to in implementing the IT Governance Initiative, and demonstrate its applicability.
In 250-300 words outline your dissertation topic and goals for this semester as they relate to your dissertation course. If you do not have a dissertation topic please revert those you are considering. Also, include ways that you could improve your dissertation, as well as areas you may be struggling with.
Please contact me if you are good in word, powerpoint and excel. These are simple projects that has an instruction file and a pre- made file. All you have to do is follow the steps and edit the pre-made file. I have total 11 projects. I am attaching a sample file.
Written Paper: 1-2 pages
PowerPoint presentation: 8 slides on the same question below
The project will be to analyze a compromised system and provide forensic analysis in the form of a narrative report and example graphical images (Jpeg format) from your analysis.
1) Select some Microsoft Windows operating system disk image that has been compromised. You may search for your own image or use the following known image that can be downloaded from: http://www.forensickb.com/2008/01/forensic-practical.html
2) You may select any Windows Registry forensics analysis tool or the tool discussed in the text, RegRipper. You will need to download and install the tool
3) You may use any resources available to understand and use the tool of your choice. You need to provide an APA formatted reference for any resources (books, white papers, or websites) you use to become familiar with the tool
4) Write a narrative/paper focused on your forensics analysis of the compromised image you used for the project
5) Provide a minimum of two JPEG images that capture reporting or some other evidence of the use of the tool
The Final Paper should be in APA format, although for this assignment, you may single space. Provide a cover page, a one-page Executive Summary of the analysis investigation, similar to what you might do for a real-world investigation. Provide 1 to 2 pages (single-spaced) of subsequent narrative related to your observations and experiences using the tool, including setup. Answer the following questions: Did you find evidence that was expected? What other evidence was observed or what other evidence would have been helpful? Was the evidence sufficient to provide a clear report of what happened? Provide a short conclusion. The references for your paper should be included at the end of the report.
1) Write a function that calculates the volume of a sphere with radius r for only values > 0, return 0 otherwise . V=4/3 π r^3
2) Write a function that finds you weight in stones using the formula. mstone = mkgx2.2/14
3) Write a function that takes some monetary amount from the user in dollars, and then display exact changes for this amount using the minimum number of coins. For example, $0.97 shows 3 quarters, 2 dimes, and 2 pennies.
Output:
change_it(97)
The change for 97 cents is:
3 quarters
2 dimes
2 pennies
Write an function to calculate both Ohm’s Law and Power transferred. The function takes i and r as inputs and prints the results (see output below). Calculate only if both i and r are > 0.
FORMULA
i is current, v is voltage, r is resistance, p is power
p = i * v # power = current * volatage
v = i * r # voltage = current * resistance
def ohms_law(i, r):
'''
i is current
r is resistance
'''
# check if both i and r are greater than 0
# calculate v and p
# PRINT v and p
omhs_law(5, 5)
v = 25 p = 125
omhs_law(-5, -5)
0
Computer Networking and Machine Learning
Discussion Question 1:
As an administrator for your company, you manage a large server that is running Windows Server 2016 and that has about 8 TB of disk space that you can allocate to be used by other servers. Describe how to configure the servers such that the two other servers running Windows Server 2016 can use the disk space just as if the disk space was local?
Discussion Question 2:
You are setting up a class so that you can train several junior administrators on Windows Server 2016 Hyper‐V. You don’t have dedicated Hyper‐V hosts, but you do have plenty of resources on your current Hyper‐V environment. Describe your proposed solution.