Computer Science 302 (Business Communication and Data) Presentation

Instructions

Explain and provide example when it is possible that will cover chapter & subjects: Power Points on this chapter is uploaded below.

– Backbone Network Components

–Switches, Routers, Gateways

– Backbone Network Architectures

– The Best Practice Backbone Design

– Improving Backbone Performance

– Implications for Management 

Present and discuss ONE of VLAN Management Software :

  1. SolarWinds Network Configuration Manager
  2. ManageEngine Network Configuration Manager
  3. WhatsUp Gold
  4. Paessler PRTG Network Monitor

Strategic Plan Components

Directions

List and describe the components of an information technology strategic plan.

Format

Students should use the following format for their written assignments.

  1. Cite your resources in APA Style
  2. Use Times New Roman—12-point font.
  3. Use professional language.
  4. Include a reference page

20210112

  

Data Base Security:

1) Write an essay discussing sqlmap, an automated tool for sql injection and database takeover in 500 words or more. Why do we need an automated tool for sql injection? 

2) Write an essay of at least 500 words discussing discussing IAM in a federated cloud application. 

3) Write an essay of at least five hundred words discussing the use of encryption to protect data at rest, in motion, and in use. 

4) Write an essay of at least 500 words discussing the reasons for the two new auditing roles in Oracle 12c. Why did Oracle consider them necessary? What problems do they solve? How do they benefit companies? 

5) Write an essay of at least 500 words discussing the Safe Harbor provisions under HIPAA.  

6) Write an essay of at least 500 words discussing how database auditing and monitoring fit within a SOX compliance framework. 

7) Write an essay of at least 500 words discussing discussing how a blockchain implementation would improve data security in a military, education, or other context. 

8)   Learning About Cookies as Spyware. Research what kind of information cookies store. You might find the following  websites helpful:

www.allaboutcookies.org/

www.howstuffworks.com/cookie1.htm

Using WORD, write an ORIGINAL brief essay of 300 words or more describing cookies and the way they can invade privacy.

essay

 

Please write a detailed, insightful essay on Computer Crime and Hacking and analyzes one of the more controversial subjects that deal with the rapid pace of change in the technology arenas. 

You could even write your essay as if you were reporting a specific case study from the future in which you were personally involved (following the examples in the ACM Code).  

Please write 1000 words or even more, font size 11 or 12. Write meaningful, insightful words, not just fluff. Include a list of suitable references.  

Tasks

 

There are TWO tasks that you would need to do( they are separate): 

Task 1:

Product Idea and Search Engines/Electronic Marketing. 

After reviewing the assigned reading materials, complete the following activities:

1.  You will develop a product service idea.

      A. Describe the product/service including the benefits of using the product/service

      B. Discuss the potential customers for this product/service

2.  Based on the nature of the product/service, recommend at least 3 possible ways to market the product electronically. Your suggestions must include at least one search engine. Describe your recommendations and discuss the advantages and disadvantages of each.

TASK 2:

Write a reply to the two responses in the attached document ( Response 1 and Response 2) with 150 words for each. 

There should be no plagiarism. Attach a plagiarism report with 0 % similarity index. 

linux

1.  For this discussion topic you need to apply the things that you have read and come up areas of enterprise that docker would be most useful for. 

2. As you have learned from your reading Docker is available for many platforms and in many forms.  Your assignment is to research containerization solutions that are competitors to Docker and compare and contrast them.  You should find at least two competitors and investigate their features compare and contrast them and see where each of them have advantages. 

3. For this discussion topic you need to apply the things that you have learned throughout the course.  Consider all of the virtualization topics that have been covered and discuss how you see the role of virtualization moving forward in the enterprise. 

4. For this assignment you are going to research various orchestration options and evaluate them to see which ones you think would add value to a business.   You should as part of this assignment develop a method to objectively evaluate the platforms and the arrive at a conclusion using your method.  Make sure to justify the components of your decision making process while you explain them.  

5. you are expected to do research and post your findings on the pros and cons of cloud computing 

There are many mobile platform vulnerabilities listed in the readings from this week (slides 8, 9, and 10). Which do you feel is the greatest threat to users? Do you agree that people generally are not aware of the threats to their mobile devices?

Please write 350 words essay on following

 There are many mobile platform vulnerabilities listed in the readings from this week (slides 8, 9, and 10). Which do you feel is the greatest threat to users? Do you agree that people generally are not aware of the threats to their mobile devices? 

P13.7 and P13.8 computer science C++ coding assignment

computer science C++ coding assignment

Please see the attachments for the instruction of this assignment

Additional info:

In the instruction, it says that ” Implement an iterator that produces the moves for the Towers of Hanoi puzzle described in Worked Example 13.2 “, however, worked example 13.2 is the wrong section. It’s supposed to be Worked Example 11.2 so I attached it.