CCM-3

   

Research desktop virtualization and summarize at least one  peer-reviewed scholarly article on the topic.  Provide at least two full  paragraphs as a summary.

Additionally, provide at least one more paragraph to contrast and compare Hyper-V and ESXi.

Assignment – Zero plagiarism

I already have the common answers for the assignment.

I need to Zero plagiarism in the assignment 

just I need change in the Question 3 and 4 

method of answer with same answer .. change some words ..  

cc-13 project

Question:   “What is a      hypervisor? Differentiate between type I and type II. What are the      security vulnerabilities of each? 

1. 5 source annotated bibliography

2. slide presentation with 12 or more slides

3. Summary or Abstract containing at least 850 words.

The topic must be appropriate for graduate level. Find a topic that we covered in the course and dig deeper or find something that will help you in your work or in a subject area of interest related to the course topic. Use the Research Databases available from the Danforth Library not Google.

case study

 Prepare a report to address all aspects of the assignment.  This report should be no less than 10 pages of content.  You need to include outside sources and properly cite and reference your sources.  You must have at least 10 references, 5 of which must be scholarly peer-reviewed articles.  In addition to the 10 pages of content, you will want a title page and a reference sheet.  This report needs to be in proper APA format. 

EA DB 5

In 250- 300 words.
Explain in your own words what “FOOTPRINTING” (or digital reconnaissance) is and how you would go about gathering the information you need to determine the location of a recently stolen late model car that was last seen in the parking lot of our college 

How to detect and prevent industrial esponage

Consider this hypothetical situation:

David Doe is a network administrator for the ABC Company. David is passed over for promotion three times. He is quite vocal in his dissatisfaction with this situation. In fact, he begins to express negative opinions about the organization in general. Eventually, David quits and begins his own consulting business. Six months after David’s departure, it is discovered that a good deal of the ABC Company’s research has suddenly been duplicated by a competitor. Executives at ABC suspect that David Doe has done some consulting work for this competitor and may have passed on sensitive data. However, in the interim since David left, his computer has been formatted and reassigned to another person. ABC has no evidence that David Doe did anything wrong.

What steps might have been taken to detect David’s alleged industrial espionage?

What steps might have been taken to prevent his perpetrating such an offense?

Write your answer using a WORD document. Do your own work. Submit here. Note your Safe Assign score. Score must be less than 25 for full credit.

You have three attempts.

discussion

 explain the different security measures that each version of SNMP uses.  What is the different between SNMPv1, v2c and v3? 

SQL challenge

In this assignment, you will design the tables to hold data in the CSVs, import the CSVs into a SQL database, and answer questions about the data. In other words, you will perform:

  1. Data Engineering
  2. Data Analysis

Note: You may hear the term “Data Modeling” in place of “Data Engineering,” but they are the same terms. Data Engineering is the more modern wording instead of Data Modeling.

Data Modeling

Inspect the CSVs and sketch out an ERD of the tables. Feel free to use a tool like http://www.quickdatabasediagrams.com.

Data Engineering

  • Use the information you have to create a table schema for each of the six CSV files. Remember to specify data types, primary keys, foreign keys, and other constraints.
    • For the primary keys check to see if the column is unique, otherwise create a composite key. Which takes to primary keys in order to uniquely identify a row.
    • Be sure to create tables in the correct order to handle foreign keys.
  • Import each CSV file into the corresponding SQL table. Note be sure to import the data in the same order that the tables were created and account for the headers when importing to avoid errors.

Data Analysis

Once you have a complete database, do the following:

  1. List the following details of each employee: employee number, last name, first name, sex, and salary.
  2. List first name, last name, and hire date for employees who were hired in 1986.
  3. List the manager of each department with the following information: department number, department name, the manager’s employee number, last name, first name.
  4. List the department of each employee with the following information: employee number, last name, first name, and department name.
  5. List first name, last name, and sex for employees whose first name is “Hercules” and last names begin with “B.”
  6. List all employees in the Sales department, including their employee number, last name, first name, and department name.
  7. List all employees in the Sales and Development departments, including their employee number, last name, first name, and department name.
  8. In descending order, list the frequency count of employee last names, i.e., how many employees share each last name.

Bonus (Optional)

As you examine the data, you are overcome with a creeping suspicion that the dataset is fake. You surmise that your boss handed you spurious data in order to test the data engineering skills of a new employee. To confirm your hunch, you decide to take the following steps to generate a visualization of the data, with which you will confront your boss:

  1. Import the SQL database into Pandas. (Yes, you could read the CSVs directly in Pandas, but you are, after all, trying to prove your technical mettle.) This step may require some research. Feel free to use the code below to get started. Be sure to make any necessary modifications for your username, password, host, port, and database name:
    from sqlalchemy import create_engine engine = create_engine(‘postgresql://localhost:5432/‘) connection = engine.connect()
  1. Create a histogram to visualize the most common salary ranges for employees.
  2. Create a bar chart of average salary by title.

Epilogue

Evidence in hand, you march into your boss’s office and present the visualization. With a sly grin, your boss thanks you for your work. On your way out of the office, you hear the words, “Search your ID number.” You look down at your badge to see that your employee ID number is 499942.

Submission

  • Create an image file of your ERD.
  • Create a .sql file of your table schemata.
  • Create a .sql file of your queries.
  • (Optional) Create a Jupyter Notebook of the bonus analysis.

cryptography

Select one type of cryptography or encryption and explain it in detail. Include the benefits as well as the limitations of this type of encryption. Your summary should be 2-3 paragraphs(300 words) in length and uploaded as a TEXT DOCUMENT.