cloud computing

Compare and contrast physical, dedicated virtual, and shared virtual servers. Search the web for companies that provide each. What cost should a customer expect to pay for each?

Be sure to provide a minimal 2 pages, 3 scholarly resources and write using APA format. No plagiarism.

Room reservation site

Hello, this needs to be a very basic webpage. This is project for a school assignment and doesn’t need to be flashy or extra. Think the simpler the better. As long as it works and hits all the points listed below ill be fine. Requirements:

  • Allow users to login to the site
  • Create a database to hold login info for website, reservation info, & conference room info
  • Allow users to register to the site
  • Users should be able to reserve rooms for a specified date and time range
  • Validate user input
  • Display error messages when appropriate.
  • List conference room reservations sorted in date and start time order
  • Allow two display options: 
    • All-display all conference room reservation schedules; past and future
    • Future-display conference room reservations that are scheduled in the future only

This site is to be hand coded ONLY do not use and site builders, any plugins/widgets, I only need it to be very basic. This is not a professional site it is a school project. I have provided a link of what is considered too far and not what im asking for. 

http://mdimond.info/2550/conference/login.php

* Do not allow reservations outside of business hours or during the weekends

PT

Penetration testing is a simulated cyberattack against a computer or network that checks for exploitable vulnerabilities. Pen tests can involve attempting to breach application systems, APIs, servers, inputs, and code injection attacks to reveal vulnerabilities. In a well-written, highly-detailed research paper, discuss the following:

  • What is penetration testing
  • Testing Stages
  • Testing Methods
  • Testing, web applications and firewalls

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. 

Security Admin security Plan

1) Describe how security administration works to plan, design, implement and monitor an organization’s security plan. Submit by Friday of Week 4 11:59 PM EST in order to receive timely input.

2) Describe five effective change management processes organizations can execute as well as the advantages and disadvantages of change management when it comes to the IT department.

COmp

 A researcher wanted to know if there was a significant difference in cyber security breaches between cities on two different continents.  What test should he conduct to determine if there is a significant difference in cyber security breaches between the continents?  Write up the results and determine what do the results mean? 

Here is the data set:

Asia

Europe

40

25

52

35

63

20

70

18

25

19

19

14

 

11

 

9

: In Excel write data analysis

Results are to be written in excel

Computer Crime

 

Search the Internet for articles on computer crime prosecution. Write a one page paper summarizing the article and identify key features of the decision you find in your search.

Assignments are due by 11:55 p.m. Eastern Time on Sunday of Week 1.