linux proposal

 

You’ve won the business! Faster Computing has agreed to the project. As the final stage of pre-implementation, you have been asked to produce a training guide that will demonstrate how to install Linux and provide an overview of several common commands, as follows:

(11.1.3: Install the software.) 

  • Use a hypervisor of your choice to install Linux. Many hypervisors are available, such as Oracle’s VirtualBox, which is a free download. In addition, as part of UMGC’s agreement with VMware, you can download VMware Workstation for free. See below for specific screenshot requirements. You should include at least 3 screenshots (e.g., disk partitioning, timezone selection, creating the default account). Each screenshot should be accompanied by a brief explanation of what you did.
    NOTE: It is not necessary to include screenshots of installing the hypervisor software.

(1.2.3: Explain specialized terms or concepts to facilitate audience comprehension.)

  • Demonstrate command-line operations that will provide the following information:
    • A listing of files in a directory and common file attributes
    • The current directory (hint: also known as the present working directory)
    • Create a file, then copy it to a different directory
    • Create a second file and move it to a different directory
    • Remove the first file, as well as the copy you created
    • The manual page for a given command
    • Create a text file, then use an editor to modify the content. Then display the content of the modified file

(1.4.2: Use vocabulary appropriate for the discipline, genre, and intended audience.)

In the above section (demonstrate CLI operations) show the commands with options/arguments (e.g., ls, cp, mv, rm) in your documentation as well as in your screenshots. 

(11.2.1: Configure technology according to stakeholder specifications and requirements.)

  • Show running processes on the system. Demonstrate how to search for a specific process
  • Forcibly stop a running process

In the above section (demonstrate CLI operations) show the commands with options/arguments (e.g., top, kill, -9, ps) in your documentation as well as in your screenshots. 

(13.1.1: Create documentation appropriate to the stakeholder.)

The deliverable for the final phase of the project is a written paper with screenshots. There is no minimum or maximum page requirement, but all of the requirements must be met.  Use the Training Guide Template to record your work. This section will be graded upon the overall usefulness of the training guide to the organization.

(11.3.1: Add and update systems as required.) 

This portion of the training guide helps determine your submission is unique.

Important Requirement

On the final screenshot, you need to open a command line and type in the following commands (without the quotes):

“date”

“echo CMIT391”

“echo ” (Replace your name here with your name)

The recommended format is to provide screenshots incorporated within the written narrative. The screenshots must all be your own. Screenshots from external sources are not permitted. You must include the specific screenshot listed above or your project will not be accepted.

(1.1.4: Explain the relationship between the ideas presented to enhance clarity and comprehension.)

The training guide must have a cover page, an introduction, summary, and at least 3-5 references.

(1.2.2: Employ a format, style, and tone appropriate to the audience, context, and goal.)

Employ proper spelling and grammar. All Linux commands must be lower case.

(2.2.3: Explain the assumptions underlying viewpoints, solutions, or conclusions.)

In your conclusion of at least a paragraph, summarize why using Linux is beneficial for employees, management, and the organization as a whole.

Methodology used on topic

  Try to find a quantitative, a qualitative and a  mixed-method dissertation that may be closely related to   Cloud migration and data security as key indicator in e-commerce and business success topic. Describe the method used, the sample, the population chosen, was there a survey involved, or a set of questions asked as in a qualitative study. Finally, can you identify the problem the dissertation tried to examine.  

Vulnerability Assessment

 

Topic: Perform a Vulnerability Assessment of your place of employment or living area. If you use your work area make sure you inform the Security Manager to get permission as to what you are doing. If you live in a gated community inform the security guard of your activities.

Instructions: Please download the Assignment 1 Vulnerability Assessment template (MS Word), which is already in APA 7 format, using size 12 Times New Roman font, 1-inch margins, TOC, Headings and Reference page. If you insert images or tables in your report make sure you label them appropriately according to APA. (click here for link).

For this assignment: The 4 Heading-1s are required. Each Heading-1 must have at least 3 Heading-2s. Each Heading must have at least 2 properly formatted paragraphs with 3 properly formatted sentences each. Once completed name your file: YourName_Assignment_1_Vulnerability_Assessment.docx and submit to the appropriate assignment folder.

Assignment 1 Vulnerability Assessment Template.docx

Also review the additional files attached for detailed information on Vulnerability Assessments.

File based database implementation in java

 

Objective

You are to implement a simple database using a sorted file of fixed length records. The data that you are to use for testing is in file: Parks.csv Windows compatible (cr lf). This data contains the visitation records for the US National Parks from 1904 to 2016.. The goal of this assignment is to understand and practice using file management techniques to implement a database system. Your file-based database needs to handle overflow by writing records to an overflow file that contains unsorted records.

First, create a file of fixed length records from the data provided interleaved with blank records. Your file should create space for insertions by writing one blank record between each real record. Meta-information should be stored in a non-fixed length way in a separate configuration file, e.g., “Parks.config”. The config file must also store useful data like the names of the fields (for display), the number of records, and anything else you would want to add.

So, the initial file will have 764 records, half of which are blank. When a record is inserted, the file is searched (using binary search) to find the correct location. If there is a blank record where the new record needs to go, then the blank record is simply overwritten. However, if there is no empty record available in the correct location, the original file should be re-written with new blanks inserted, including after the new record. For example, if we do 3 inserts into blank records, we would now have 385 real records in our file of 764 total records. If the next insert fails, we would create a new file with 770 total records in it (the 385 real records, each with one blank record after it).

You must not read the whole data file into memory at a time

Program Description

Create a program which offers the user the following menu of operations:

1) Create new database
2) Open database
3) Close database
4) Display record
5) Update record
6) Create report
7) Add record
8) Delete record
9) Quit

Forensics

1.Go online and research some tools that would be valuable in collecting both live memory images and images of various forms of media. Put together a shopping list for your manager that includes tools needed to be purchased. Include a price if applicable. (300 words) 

Chapter 7 ppt 

2. Use the web or other resources to research at least two criminal or civil cases in which recovered files played a significant role in how the case was resolved. (300 words)

Chapter 8 ppt

IT Project Management 2 page paper

Find any example of a real project with a real project manager. Feel free to use projects in the media (such as the Olympics, television shows, or movies). Write a paper describing the project in terms of its scope, time, and cost goals. Also describe other impacts on a project, such as quality resources and risks. Discuss what went right and wrong on the project and the role of the project manager and sponsor. Also describe whether the project was a success and why. Include at least one reference and cite it on the last page. 

APA style, 2 pages, Cover Page, Microsoft Word format.