cloud computing 4

 

Part 1: Hypervisors

Review case 8-3 and 8-4. Select one of the two cases from chapter 8 and complete the written exercise.

Case 8-3 Hyper-V 

Review case 8-3 and complete the exercise. Provide a minimum of 2 references to support your writing.

 OR

Case 8-4 VmWare 

Review case 8-3 and complete the exercise. Provide a minimum of 2 references to support your writing.

Part 2: Cloud Security

Chapter 9 lists several common security threats to cloud-based environments. Analyze 3 types of cloud security threats and describe methods to mitigate the risks. Compare and contrast the difference between these security threats in a data center/on site versus from the cloud. Provide a minimum of 3 references to support your findings.

Requirements:

Total page count should be a minimum of 3 pages.

Make sure to cite any content provided from your sources.

Minimum number of references for the assignment is 5.

Reflection of Information Governance Course in a practical manner to current work environment(theories and knowledge could be applied to an employment opportunity)

Requirements:

Provide a 500 word (or 2 pages double spaced) minimum reflection.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited. 

Share a personal connection that identifies specific knowledge and theories from the Information Governance course. 

Demonstrate a connection to the current work environment. If not employed, demonstrate a connection to your desired work environment. 

should NOT, provide an overview of the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace. 

Java assignment help

This assignment focuses on conjunctive normal form formulas (cnf-formula) and satisfiability.

In this assignment, you must create a Netbeans Java program that:

• prompts the user for the location of a file to load a cnf-formula (use JFileChooser)

• reads a cnf-formula from the file creating a CnfFormula object (see file-format below),

• prompt the user for a variable assignment (see AssignmentView below),

• verifies and displays whether the user’s assignment satisfies the cnf-formula,

• determines whether the cnf-formula is satisfiable and if so, output the assignment,

• as Java comments give the Big-O analysis of the verify and isSatisfiable methods,

• as a separate file, submit the cnf-formula file you “unit” tested on.

Spr1.4

 Assignment 1

According to Kirk (2016), most of your time will be spent working with your data. The four following group actions were mentioned by Kirk (2016):

· Data acquisition: Gathering the raw material

· Data examination: Identifying physical properties and meaning

· Data transformation: Enhancing your data through modification and consolidation

· Data exploration: Using exploratory analysis and research techniques to learn

Select 1 data action and elaborate on the actions preformed in that action group.

Textbook is attached, “Andy Kirk – Data Visualisation_ A Handbook For Data Driven Design-Sage Publications (2019)”.

Requirement: 

· ****Separate word document for each assignment****

· Minimum 300-350 words. Cover sheet, abstract, graphs, and references does not count.

· Add reference separately for each assignment question.

· Strictly follow APA style. 

· Include at least two citations (APA) from academic resources

· No plagiarized content please! Attach a plagiarized report.

· Check for spelling and grammar mistakes!

· $5 max. Please bid if you agree.

Assignment 2

Assume you are a security professional. You are determining which of the following backup strategies will provide the best protection against data loss, whether from disk failure or natural disaster:

· Daily full server backups with hourly incremental backups

· Redundant array of independent disks (RAID) with periodic full backups

· Replicated databases and folders on high-availability alternate servers

Answer the following question(s):

Which backup strategy would you adopt? Why?

Requirement: 

· ****Separate word document for each assignment****

· Minimum 300-350 words. Cover sheet, abstract, graphs, and references does not count.

· Add reference separately for each assignment question.

· Strictly follow APA style. Length – 2 to 3 paragraphs. 

· Sources: 2 References to Support your answer

· No plagiarized content please! Attach a plagiarized report.

· Check for spelling and grammar mistakes!

· $5 max. Please bid if you agree.

P13.7 and P13.8 computer science C++ coding assignment

computer science C++ coding assignment

Please see the attachments for the instruction of this assignment

Additional info:

In the instruction, it says that ” Implement an iterator that produces the moves for the Towers of Hanoi puzzle described in Worked Example 13.2 “, however, worked example 13.2 is the wrong section. It’s supposed to be Worked Example 11.2 so I attached it.

Application Security to Software development

 

  1. How does Application Security relate to software development?
    1. Define application and software development
    2. Briefly describe the role of application security in software development
  2. Discuss two software development approaches
    1. For each briefly discuss the high-level principles/approach
    2. Discuss how Application Security should be included in each phase/step of the approaches
    3. Discuss what elements of the application should be addressed and how.  Examples: data at rest, data in motion, identity management, etc.
  3. Discuss the potential downfalls that can occur if Application Security is not integrated with application development

For all writing assignments ensure that you do the following:

  • Write 1000 to 1500 words in APA format.
  • Utilize at least five scholarly references. 
  • Note that scholarly references do not include Wikipedia, .COM websites, blogs, or other non-peer reviewed sources. 
  • Utilize Google Scholar and/or the university library. 
  • Do not copy and paste bulleted lists.  Instead, read the material and in your words, describe the recommendation citing the source. 
  • Review the rubric to see how you will be graded.
  • Plagiarism will result in a zero for the assignment. 
  • The second instance of plagiarism will result in your failure of this class.
  • If you use a source, cite it.  If you do not, it is plagiarism.

Computer programing

 Assignment 2 tests your knowledge of Selection (Chapter 4) and Repetition (Chapter 5). Write a program YourName-Assignment2 (replace YourName with your actual name, no spaces) that reads/inputs from a file1 students’ records (one student per line) with the following format: LastName Tests Grade Assignments Grade and computes and outputs (to the console) the STUDENT STATISTICS in a table format one line per student: Student Name Total Points2 Numeric Grade3 Letter Grade4 The table should have the exact table header5 . The program should also compute and output (to the console) in the 2 rows 2 columns table format, the CLASS STATISTICS for the entire class: the number of students6 (row Number) and the average numeric grade7 (row Average) among all students. All text/character columns should have the same width, be aligned to the left and all floating-point values align to the right and formatted with 2 decimals. You can test your program on the attached Grades.txt (do not edit the file) and you can check your output by comparing it to the sample output shown here, but your program should work on any other files that have the correct format, thus, do not hardcode the output or the number of students. The program needs to use loops/repetition statements to read the data from the files and selection statements (Chapter 4) to compute the letter grades. You should write the program in Visual Studio 2019 using only concepts learned in classso far (Chapters 1 to 5, so, without arrays, functions, pointers, references, and any other concepts not studied in class so far). Create a Microsoft Word document called YourName-Assignment2-Screenshots.docx (replace YourName with your name, no spaces) that contains screenshots of your entire C++ code in editor (take multiple screenshots if the code is larger than one screen and is not readable in one screenshot), and the entire program console output in the Console Output Window for the attached Grades.txt (take multiple screenshots if the output is larger than one window). SUBMIT your YourName-Assignment2.cpp Visual Studio 2019 C++ source code and YourName-Assignment2- Screeshots.docx screenshots document files under Assignment2 on eCampus. Do not archive the files (no ZIP, RAR or other archived files) or submit other file formats. 

1 The program should work on any file with that format with different numbers of line. Do not hardcode the number of lines, compute it instead when you read from the file.

 2 You compute the Total Points as the sum between Tests and Assignments.

 3 You compute the Numeric Grade as the total points (from all the evaluations) divided by 2. The value will be between 0 and 100 

4 The Letter Grade is: A if the numeric grade is between 89.5 and 100, B if the numeric grade is between 79.5 and 89.49, C if the numeric grade is between 69.5 and 79.49, D if the numeric grade is between 59.5 and 69.49, and F if the numeric grade is between 0 and 59.49.

 5 The table header should have the exact text, but it does not have to be on 2 separate lines/rows, you can put them on one row (.e.g. “Total Points” on one row)

 6 The number of lines from the file

 7 The sum of all the numeric grades divided by the number of students