project 2

  Now that you understand and have created a virtual machine,  your Caduceus CTO, Eliza, has asked you to extend that application and  provision infrastructure in the cloud. Specifically, you will provision a  Windows operating system in the cloud. The provisioned infrastructure  could be accessed by any end-user device client. This includes a desktop  running Microsoft Windows, a Mac device running Apple MacOS, iPad,  Android Tablet, and even a Google Chromebook. You will use any of the  aforementioned end-user devices to access the provision infrastructure  once this is set up.

Step 1: Log in to the AWS Dashboard

CMIT 495 requires you to complete hands-on assignments in the Amazon Web Services (AWS) virtual environment.To get started, log in to the AWS free account you created in Week 1.

Step 2: Download the Week 2 Assignment Template

Next, watch the video and download the template from the Cloud Computing Assignment Resources page. You will answer the questions and embed the appropriate screenshots of your cloud infrastructure provision as you work.When providing a detailed overview of the steps required to  install the Windows operating system on the virtual machine, make sure  to include screenshots of each step in the process. Specific details and  instructions are included within the Week 2 Assignment Template.

Step 3: Install and Configure a Microsoft Windows Operating System

  • Provision cloud infrastructure via Amazon and a OS platform (PaaS) by installing and configuring a Microsoft Windows operating system that can be accessed on demand by any end-user device.   
    • Research and use AWS documentation and tutorials for instructions and guidance to complete the assignment.  
    • Consult the AWS Connection Documentation in order to connect to the Microsoft Windows operating system.  
    •     How Will My Work Be Evaluated? The following evaluation criteria aligned to the competencies will be used to grade your assignment:  
    • 1.4.1: Produce grammatically correct material in standard academic English that supports the communication.  
    • 2.2.3: Explain the assumptions underlying viewpoints, solutions, or conclusions.  
    • 2.3.1: State conclusions or solutions clearly and precisely.  
    • 3.1.1: Identify quantitative information that is relevant to a problem or situation.  
    • 3.1.2: Analyze quantitative data using an appropriate method.  
    • 10.1.1: Identify the problem to be solved.  
    • 11.1.3: Install software.  
    • 11.3.1: Add and update systems as required.  
    • 11.2.1: Configure technology according to stakeholder specifications and requirements.  

Step 4: Upload Your Work to the Assignment Folder

  • When complete, export your file as a PDF and upload to the LEO Assignments Folder (e.g., Project 2 – Cloud Computing).  

Step 5: Stop and Terminate Your Amazon Instance

After you complete the Week 2 Assignment, stop and terminate your  Amazon deployment/instances so you do not receive any unexpected charges  on your account. 

Essay that evaluates how to conduct effective research online.

Week 2 Written Assignment

Each assignment will be an essay written in APA format (see below). Each essay should be no less than 1500 words on the topic (s) noted below.

The title page and bibliography do not count towards the word count.

Complete the assignment in a Word document using APA formatting with your last name as part of the file name. Omit the abstract and outline. A Word APA template and APA sample paper are provided for reference

After completing the essay, save and upload the document in the Assignments section of the e-classroom.

Each essay will be checked by Turnitin automatically upon submission.You will have access to the originality reports.

Topic: After conducting independent research using at least three sources not used in the class write an essay that evaluates how to conduct effective research online.

CA

 

There are a variety of ways that a cyber-attack can cause economic damage. In many cases, attackers try to “penetrate” systems in order to steal technology or other sensitive information. When do you think an attack can be classified as cyber terrorism?

  • Ask an interesting, thoughtful question pertaining to the topic
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Make an argument concerning the topic.

cloud computing R2

 

Develop a paper describing how the knowledge, skills, or theories of this course have been applied or could be applied, in a practical manner to your current work environment. If you are not currently working, share how you could leverage the knowledge gained working as an IT consultant working for an organization of your choice.

Requirements:  Provide a 500-word (2 or more pages double spaced not counting the title and reference pages) paper.  The paper should include a title page, body pages, and reference page.  An abstract and introduction is not required for this assignment.  Correct use of APA guidelines for sources and citations is required. If supporting evidence from outside resources is used those must be properly cited.