server networking

  

# 1

A minimum of 200 words is required, and they must be your own words.  Including figures and quotes is value-added, but they will not count against your 200 word requirement.

Discussion Question 1:

Describe each of the DNS zone types that are available in Windows Server 2016. Explain why you would use each type of zone. For example, when would you use a Standard Zone versus an Active Directory Integrated Zone? Make sure you include Stub Zones in your answer. Also, include in your answer methods for securing and protecting DNS servers  and clients.

# 2

A minimum of 200 words is required, and they must be your own words.  Including figures and quotes is value-added, but they will not count against your 200 word requirement.

Discussion Question 1:

Compare and Contrast IPv4 and IPv6. Find examples of companies who are currently using IPv6. What are some of the benefits of using IPv6 over IPv4 and vise versa.

#3

A minimum of 200 words is required, and they must be your own words.  Including figures and quotes is value-added, but they will not count against your 200 word requirement.

Discussion Question 1:

One of the most important concepts is all of networking is NAT. What is NAT? How does it affect web log files? What are some ways that you can view your public IP Address? Discuss the IP Addresses that are not routable. Describe the LAN and WAN addresses on your system, using tools like ipconfig and www.ipchicken.com.

#4

A minimum of 200 words is required, and they must be your own words.  Including figures and quotes is value-added, but they will not count against your 200 word requirement.

Discussion Question 1:

What types of things would you suggest to a manager be included in a Network Access Policy? Should users be allowed to bring their own equipment? Can users connect to the company’s network? Can users do personal work on company issued equipment? Find an example policy that a company has and indicate whether you agree with the policy.

# 5

A minimum of 200 words is required, and they must be your own words.  Including figures and quotes is value-added, but they will not count against your 200 word requirement.

Discussion Question 1:

This week we discussed Fault Tolerance. The Distributed File System is only one example of Fault Tolerance. Find some other technologies from Microsoft or other vendors that help protect data. End your discussion with justifying to your manager why the company can benefit from such a (likely expensive) purchase. What is the cost and can you justify it?

#6

A minimum of 200 words is required, and they must be your own words.  Including figures and quotes is value-added, but they will not count against your 200 word requirement.

Discussion Question 1:

You will have a fairly large project on SOFTWARE-DEFINED NETWORKING in your 495 capstone. Here is a chance to get some background and understanding of the topic. Your manager has asked you, one of her most technical employees, to make a presentation to your co-workers on SOFTWARE-DEFINED NETWORKING. Explain what it is, what the advantages are, and how it can benefit your company.

Linked Inventory Management

 CS 2336 PROJECT 3 – Linked Inventory Management Project Due: 11/04 by 11:59 PM KEY ITEMS: Key items are marked in red. Failure to include or complete key items will incur additional deductions as noted beside the item. Submission: • The file containing main must be named Main.java. (-5 points) • The project files must be in packages that start with LinkedInventoryManagement.* (-5 points) • All project deliverables are to be submitted in eLearning until further notice o Zip the contents of the src directory into a single zipped file o Make sure the zipped file has a .zip extension (not .tar, .rar, .7z, etc.) (-5 points) o Add your project’s presentation link in the comments section in eLearning • Programs must compile and run with Java SE 13. • Each student is responsible for developing unit test cases to ensure their program works as expected. • Type your name and netID in the comments at the top of all files submitted. (-5 points) Objectives: • Create a modular code solution with multi-packages • Use the Singleton pattern to create and manage the Scanner object • Create and manipulate a multi-directional LinkedList in Java • Use Java Generics to create generic classes and methods • Implement and use the Comparable interface Problem: A small electronics company has hired you to write an application to manage their inventory. The company requested a role-based access control (RBAC) to increase the security around using the new application. The company also requested that the application menu must be flexible enough to allow adding new menu items to the menu with minimal changes. This includes re-ordering the menu items and making changes to the description of a menu item without having to change the code. Security: The company has suggested to start the application by asking the user for a username and password to ensure that the user is authorized to access the application. There are two types of users at this company, managers and employees. If managers log on to the application, they will see all options on the menu list. If employees log on to the application, they will see a limited set of options on the menu list. User information is stored in Users.dat file, which may or may not exist at the start of the program. A super user “admin” with password “admin” has already been hardcoded in the program to allow for the initial setup and the creation of other users. The Users.dat file contains the FirstName, LastName, Username (case insensitive), HashedPassword and a flag to indicate whether a user is a manager or not. The file is comma separated and it is formatted as follows: Joe, Last, jlast, 58c536ed8facc2c2a293a18a48e3e120, true Sam,, sone, 2c2a293a18a48e3e12058c536ed8facc, false Jane, Best, jbest, 293a18a48e3e12052058c536ed8facc2c, false Application Menu: The menu of the application is dynamically loaded and displayed to the user only after the user successfully logs on. The menu items will be loaded from file “MenuList.dat”, which may or may not exist at the start of the application. If the file doesn’t exist, the application should show at least an Exit menu item as default. The file will contain all menu items details, including the name of the command that will be executed when the menu item is selected. The file may contain duplicate menu items. Your program should detect this by checking the command name as a key to compare menu items and prevent showing duplicates in the menu. If a menu item is marked as restricted (Boolean flag), only managers can see that item. The file contains the following comma separated fields, Description, a Boolean flag to indicate if the option is restricted to managers only, and the name of the menu command that will be executed when the option is chosen. The order and option number of a menu item may change depending on how they are listed in the file. The Exit option will always be listed last and it will not be in the file. Below is a sample of how the MenuList.dat file looks like: Add User, true, AddUserCommand Delete User, true, DeleteUserCommand Change Password, false, ChangePasswordCommand Add New Product, true, AddProductCommand *Note: The command name of each menu item must match the name of the class that you will create in the code (See AddProductCommand class in the code for example). Inventory: The inventory consists of multiple products of type Product stored in class ProductCatalog. The ProductCatalog is responsible of all inventory operations that add, remove, find and update a product. When printing a product information, the product retail price should be calculated and displayed as well. Retail price = (cost + (margin * cost/100)). A list of functions has been added to this class in the provided code template. You must implement all listed functions. The inventory products will be saved in file Inventory.dat, which may or may not exist when the program first starts. The file will contain the product unique id (int), product name (string), cost (double), quantity (int) and margin (int, integer that represents margin percentage). Your program must prevent the user from inserting duplicate products by checking existing products using the product name (ignore case) as a comparison key. The Inventory.dat file is comma separated and formatted as follows: 3424, Smart Watch, 20.45, 23, 80 65454, Flat Screen TV, 465.98, 15, 35 435, Computer Monitor, 123.54, 84, 43 Data Structure: The MenuList and ProductCatalog classes must use a custom LinkedList that you will create instead of using an ArrayList. The nodes in this list must be multi-directional to facilitate moving from current node to next node and from current node to previous node if needed. This custom linked list must be named InventoryLinkedList, must be generic, and must contain at least the following methods: – public InventoryLinkedList(E[] elements) //Constructor – public E GetFirst() //Get the first element in the list – public E GetLast() //Get the last element in the list – public void Insert(int index, E element) //Inserts element e at the specified index – public E Remove(int index) //Remove the element at the specified index – public String toString() //Return formatted elements information – public boolean Contains(E element) //Check if list contains the element – public E SetElement(int index, E element) //Set the element at the specified index – public E GetElement(int index) //Get the element at the specified index – public Integer GetLength() //Returns the number of elements in the list Output Format: Enter username: some username Enter password: some password //Repeat prompts until user is authenticated OR show error and option to exit. Invalid username or password! Press enter to continue or “Exit” to exit: Enter username: some username Enter password: some password Welcome Firstname LastName! Inventory Management System Menu //This is the header of the MenuList // The order and option number of a menu item may change depending on how they are listed in the MenuList.dat file. The Exit option will always be listed last and it will not be in the MenuList.dat file. 1- Add user 2- Remove user 3- Change password 4- Add new product 5- Update product information 6- Delete product 7- Display product information 8- Display inventory 9- Exit Enter your selection: 7 Enter product name: sMaRt wAtCh Id Name Cost Quantity Retail ———————————————————— 3424 Smart Watch $20.45 23 $36.81 Type “Next” or “Previous” to display next/previous product, press enter to return: next Id Name Cost Quantity Retail ———————————————————— 65454 Flat Screen TV $465.98 15 $629.07 Type “Next” or “Previous” to display next/previous product, press enter to return: next End of products list… //Displayed if no more products in the list Type “Next” or “Previous” to display next/previous product, press enter to return: //Enter //Repeat the menu after each command is executed.

Security Architecture & design

Length:  Minimum of 600 words

Simply, no plagiarism

Vestige, Inc. is an online software company that specializes in selling ad spaces in their parent company’s magazine.  Vestige manages an online database that allows their customers to upload and pay for their business ads for magazine placement.  Because Vestige’s database needs to connect to the parent company’s database, the parent company has requested that the Vestige system be assessed and verified as secure.

Your company has designated you to be the lead architect for this project because it’s a small company and perfect for the first time.  Since you have spent the past 7 weeks in training to be a System Architect, perform your assessment:

residency paper

  

Prepare an 8 page APA style paper using the resources you have read in this course and at least 3 additional peer reviewed resources. Follow the writing requirements for this course. Include an introduction and conclusion in the paper. Remember to use APA formatted headings for each section of the paper and provided in text citations of the sources you use. This paper should address the following questions:

(1) Does Blockchain technology have the potential to cause the paradigm shift in business practices that many experts are predicting? Explain why or why not.  Support your answer with research.

(2) Is there evidence to suggest that Blockchain technology will change the way HR is practiced? If there is, discuss that evidence. If there is not, what issues exist that impede its adoption?

(3) Which functions of human resource management could be most impacted by Blockchain technology? How might the HR functions change? Support your answer with research.

Course writing requirements:

· References MUST be cited within your paper in APA format. Your reference page and in-text citations must match 100%. Papers without in-text citations will earn failing grades.

· Always include a cover page and reference page with ALL submissions (even initial discussion posts)

· Provide the EXACT web link on the reference page citations for all online sources – do not provide just the home page, but the EXACT LINK – I check all sources

· No abbreviations, no contractions – write formally

· Write in the third person formal voice (no first or second person pronouns)

· Write MORE than the minimum requirement of the word count assigned

· As always, the word count is ONLY for the BODY of the paper – the cover page, reference page, and / or Appendix (if included) do not count towards the word count for the paper

· Indent the first line of each new paragraph five spaces

· Refer to the example APA paper in the getting started folder under the content tab if you need an example. Also, a Power Point is provided under the information tab that addresses APA format.

· Use double-spacing / zero point line spacing, a running header, page numbers, and left justify the margins.

portfolio project (information governance)

  

Scenario:

You have recently been hired as a Chief Information Governance Officer (CIGO) at a large company (You may choose your industry). This is a newly created position and department within the organization that was founded on the need to coordinate all areas of the business and to provide governance of the information. You will need to hire for all positions within your new department.

The company has been in business for more than 50 years and in this time has collected vast amounts of data. Much of this data has been stored in hard copy format in filing cabinets at an offsite location but in recent times, collected business data is in electronic format stored in file shares. Customer data is being stored in a relational database, but the lack of administration has caused data integrity issues such as duplication. There are currently no policies in place to address the handling of data, business or customer. The company also desires to leverage the marketing power of social media, but has no knowledge of the types of policies or legal issues they would need to consider. You will also need to propose relevant metrics that should be collected to ensure that the information governance program is effective.

The CEO and Board of Directors have tasked you to develop a proposal (paper) that will give them the knowledge needed to make informed decisions on an enterprise-wide Information Governance program, addressing (at a minimum) all of these issues, for the company. 

Requirements:

The paper should include at a minimum of the following sections:

a. Title page

b. Executive Summary (Abstract)

c. Body

i. Introduction (including industry discussion – 1-2 pages)

ii. Annotated Bibliography (2-3 pages)

iii. Literature review (2-3 pages)

iv. Program and technology recommendations, including:

1. Metrics

2. Data that matters to the executives in that industry, the roles for those executives, and some methods for getting this data into their hands.

3. Regulatory, security, and privacy compliance expectations for your company

4. Email and social media strategy

5. Cloud Computing strategy

d. Conclusion

e. References

2. You must include at least two figures or tables. These must be of your own creation. Do not copy from other sources.

3. Must cite at least 10 references and 5 must be from peer reviewed scholarly journals (accessible from the UC Library).

This paper should be in proper APA format and avoid plagiarism when paraphrasing content. It should be a minimum of 8 pages in length (double-spaced), excluding the title page and references.

Milestones:

· Week 3 – Introduction Section – A 1-2 page paper describing the industry chosen and potential resources to be used. 25 pts.

· Week 6 – Develop a full annotated bibliography (2-3 pages).  25 pts.

· Week 12 – Develop the literature review (2-3 pages). 25 pts.

· Week 15 – Completed final research paper (all milestones combined together and include the last sections as discussed in the list above). 50 pts.

The Internet & Databases

 

Answer the following question:

How do you believe smart technologies and the Internet will continue to play an integral role in the use of databases as we collect more contextual, personalized data from all around us?

Instructions

  • This is a required assignment, worth 15 points. The assignment  must be submitted by the due date. Late assignment are not allowed. 
  • You are required to submit a minimum of two postings. Points will be deducted for not fulfilling this minimum requirement.
  • Apply and use the basic citation styles of APA is required. Points are deducted per the rubric for this behavior.
  • Do not claim credit for the words, ideas, and concepts of  others. Use in-text citation and list the reference of your supporting  source following APA’s style and formatting. Points are deducted per the  rubric for this behavior.
  • Do not copy and paste information or concepts from the Internet  and claim that is your work. It will be considered Plagiarism and you  will receive zero for your work. A second offense results in a zero for  the course. A third is termination from the university.

Develop a Computer/Internet Security Policy

Research Paper: Develop a Computer/Internet Security Policy

You have been hired as the CSO (Chief Security Officer) for an organization. Your job is to develop a computer and internet security policy for the organization that covers the following areas:

  • Computer and email acceptable use policy
  • Internet acceptable use policy
  • Password protection policy

Make sure you are sufficiently specific in addressing each area. There are plenty of security policy and guideline templates available online for you to use as a reference or for guidance. Your plan should reflect the business model and corporate culture of a specific organization that you select. 

 Include at least 3 scholarly references in addition to the course textbook.  The UC Library is a good place to find these references. At least two of the references cited need to be peer-reviewed scholarly journal articles from the library.

Your paper should meet the following requirements:

• Be approximately four to six pages in length, not including the required cover page and reference page.

• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course and at least three scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Assignment:
Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Requirements:

  • Provide a 500 word (or 2 pages double spaced) minimum reflection.
  • Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.
  • Share a personal connection that identifies specific knowledge and theories from this course.
  • Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 

You should not provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace. 

Any use of outside sources, including your own prior work, will result in a zero on the activity and a report being filed with Academic Affairs regarding plagiarism (even if self-plagiarism). 

Disuccsion

 describe an instance of plagiarism or other use of another’s intellectual property with which you are familiar. Please give one argument condemning this conduct and one argument defending it.

ApA format 250words