Category Archives: Computer Science

Homework help-Computer Science Project

ORDER NOW your custom paper to have it completed successfully on time.

Email Us:

1) You are required to configure and test a DNS server (Ubuntu Server 16.04.3 LTS). Configure a DNS server with both forward and reverse lookup. You should configure a domain name zone of, and a reverse name mapping zone of Configure A and PTR records for: host1 –, host2 – and host3 – Configure a CNAME of www for host1, and a CNAME of dc1 for host2. Test the operation of your DNS server using an external client running DNS queries. [10 marks]


2) Create a user “assgn2′ and in their home directory create the files with the following permissions [5 marks].

  • A file called “test.txt”, with contents “This is a test file”, with read and write permissions for owner, group and other, but no execute permissions.
  • A file called “script1” that runs a simple script of your choosing, with read and execute permissions for group and other, and full read, write and execute permissions for the owner.
  • A hidden file called “.test_config”, owned by root with contents “Test config file”, that has root read, write and execute permissions only, no other permissions set.
  • A symbolic link with an absolute path to a system log file of your choosing.
  • A directory called “test_dir” with the owner having full permissions to create, rename or delete files in the directory, list files and enter the directory. Group and other having permissions to only list files and enter the directory and access files within it.


Submit a learning diary for this activity in which you should include:

  • Your DNS configuration, including copies of your underlying DNS server configuration files;
  • Screenshots from your client device demonstrating the operation of the DNS server;
  • What you did;
  • Describe the problems you encountered. Were you able to resolve these problems? (Y/N);
  • How much time you spent on each part of the exercise.



This assessment item is design to test your

  • assess your progress towards meeting subject learning outcomes 1, 2 and 3;
  • assist you to develop your learning of the priciples covered in topics 1-6 of the subject;
  • knowledge of the details of network service technologies;
  • ability to apply problem-solving techniques;
  • ability to find credible information sources and apply them;
  • ability to write clearly and concisely; and
  • ability to correctly reference information sources.

Marking criteria


Part 1.


This part is a series of multiple choice questions. Each correct answer will score 1 mark. Marks will not be deducted for incorrect answers.

Most quizzes will involve multiple choice or true/false type questions, although quizzes may include other contents. Marks will be given based on the correctness of the answers. The Test Centre will be marking automatically and you will receive marks according to the following criteria:
HD – At least 85% answers were correct
DI – At least 75% answers were correct
CR – At least 65% answers were correct
PS – At least 50% answers were correct


Part 2.

Question Criteria HD DI CR PS FL
Part 2 Q1. DNS Configuration Ability to learn and use systems administration techniques

Application of technical knowledge


Demonstrated working DNS implementation.

Application of techniques drawn from synthesis of two or more sources, presents a summary of the information and explains the facts in a logical manner with outstanding explanation and presentation.

Demonstrated working DNS implementation.

Application of techniques drawn from synthesis of two or more sources, and draws appropriate

conclusions based on understanding, with all factors identified and described.

Demonstrated working DNS implementation.

Application of techniques drawn from two or more sources, and draws conclusions based on understanding, with major factors identified and described.

Demonstrated working DNS implementation with minor errors or omissions.

Application of techniques  and conclusion drawn from facts, with major factors identified and described.

Major errors or omissions. Limited detail and understanding demonstrated
Part 2 Q2. File and Directory Permissions Ability to learn and use systems administration techniques

Application of technical knowledge


Application of techniques drawn from synthesis of two or more sources. Configuration is accurate and execution is detailed with precise and neatly presented information. Application of techniques drawn from synthesis of two or more sources. Configuration is accurate and execution is detailed. Application of techniques drawn from sources. Configuration is accurate and execution is detailed. Configuration is accurate and execution is detailed with minor errors or omissions. Major errors or omissions. Limited detail and understanding demonstrated
Overall Assignment Referencing Use of citations and quotes


Broad range of references strategically used in support.

Clear acknowledge other people’s ideas.

Always conforms to stipulated style

References strategically used in support.

Clear acknowledge of other people’s ideas.

Mostly conforms to stipulated style

References used in support.

Acknowledge other people’s ideas.

Mostly conforms to stipulated style

Over use of quotations.

Sources not well integrated within answers.

Minor errors in style

Not always proper acknowledge sources

Text or quotations not clearly identified.

Major errors in style.

Inconsistent use of styles





You should submit your assessment as a single word document which should contain all components of your assignment. Use screenshots to compliment your written answers and to provide evidence and detail of the work you have done.

ORDER NOW your custom paper to have it completed successfully on time.

Email Us:



Assignment help:Buy your research paper []

Buy your research paper []

assembler language

Project 1

What is my assignment?


Getting Started (Items you have to review or learn to do for the project)

In order to get started on creating your assembler you must be able to have the program understand basic syntax of a text file containing a program.  In this first part of the program you will deal with the basic functions of string processing and reading files.  The following is a list of items to complete to help you do the project.


1) You will need to be able to read in arguments pass from the command line.

Ex: project1.exe inputfile.txt outputfile1.txt


2) You will need to be able to parse a string.

Ex: You will need to use the strtok() function in the string.h file.


3) You will need to convert all letters to lowercase letters.


4) You will need to compare a string to a list of know words.

(add, load, store, r0, r1, r2)


5) You will need to have a number in text 123 be converted to a number (integer) in the C program.


6) You will also need to be able to read and write files.


Project #1

Your assignment is to make a simple assembler for the DLX processor.  We will simplify the assembler by only using the core instructions, we will not do the floating point instructions.  The registers will be named as r0, r1, r2, … r29, r30, r31.  We will also not allow any advance naming for saving constant or memory locations the assembly source code we write will hard code any constant and memory location to read and write to.  The only advance item we will do is use a label for branching and jumping in code.


Items to turn in: a report that tells how you created your program, source code, test files and a flow chart.



It is common to run an assembler in a two pass structure.  The first pass goes through the source files and finds all the labels and addresses for each instruction.  You can start your program by assuming the first line of code is at memory location 0.  You will make a table of label and address.  On the second pass you will then convert the assembly instruction into machine code and fill in any labels using your table.



What to turn in


The following is what needs to be turned in for project 1:


The report is made up of the following 4 parts:

1) The first part tells me if the project was successful or unsuccessful. If unsuccessful tell me which parts work and which parts do not work.

2) I need a documentation of each function of your code. Give me the name of the function, the inputs/outputs, and a description of what the behavior of the function is.

3) Instead of a flow chart give me a written set of steps that occur in your code design, reference the names of function calls as needed. You will write is as

Step 1 – what is done in step 1

Step 2 – what is done in step 2. If you have decisions write if X occurs go to step Y.

4) Project output. I need you to write a test file that test one instruction of each type (Load, Store, Branch, ALU, ALUi, JR, J). Write out the instructions in the test file and give me a screenshot of the output. Show the output of the encoding done by hand and compare it to the encoding of your program.


Source Code


Test Files (SubI r12,R20,255

start: lw r7,-16(R31)

SLT r3,r1,r9


SGTI r3,r7,-5

stop: sb 16(r11),r9

jalr r4

All of the files should be placed in one zip file. Name the file as I do not want the files sent in an email. Post the file in blackboard under the Project 1 assignment. I will take

Buy your research paper []

off 20 points if I receive an email of your project.

Computer Science and Information Technology_

Computer Science and Information Technology

Buy your research paper []
Document: Assignment 1
Author: Santha Sumanasekara
Save Date: 22/03/2017
Page 1 of 9
School of Science/ Computer Science and IT
ISYS1055/1057 Database Concepts
Assignment 1
Semester 1, 2017
1 Introduction
This is an individual assignment, to be submitted electronically using the Blackboard facility. A
submission link will be enabled on blackboard closer to the submission date. It is due 23:59 Friday
21st April 2017, and contributes 20% towards the aggregate of 100 marks.
The objective of this assignment is to reinforce what you have learned in the lectures and tute/ lab
sessions. Specifically, it covers the basic concepts in the relational database model, using entityrelationship
model for database design, and using SQL for querying a relational database.
1.1 Plagiarism
All code or other material that is not original must be fully credited. That is, any material that is
copied or derived from another source must be clearly identified as such and the original author
must be identified. Sometimes students assist each other with an assignment, but end up working
together too closely, so that the students’ separate solutions have significant parts in common;
unless the solutions were developed independently, they are regarded as plagiarised.
Plagiarism is a very serious offence. Any submissions determined to be a result of plagiarism will
be deemed as an academic misconduct and harsh penalties apply. It is also an offence for
students to allow their work to be plagiarised by another student. You should familiarize yourself
with the university website for Academic Integrity Policy, Procedures and Guidelines.
( All work is to be done individually and plagiarism of any
form will be dealt with according to the RMIT plagiarism policy.
1.2 What to Submit, When, and How
1.2.1 When
This assignment is due at 23:59 on Friday 21st April 2017.
1.2.2 What
You should submit one PDF document with all answers together. You can use Oracle SQL
Developer and LucidChart to work on your assignment. You may use Word or any other word
processor to compile your submission. At the end, convert it into PDF format. Do not submit Word
files. if that option is not available on your system there are free pdf converters online you can
utilise. e.g.
1.2.3 How
You are required to submit your solution electronically using the Blackboard facility. A submission
link will be enabled on blackboard closer to the submission date.
Computer Science and Information Technology
Document: Assignment 1.docx
Author: Santha Sumanasekara
Save Date: 22/03/2017
Page 2 of 9
1.2.4 Penalties for late submissions
Late submissions of assignments will be penalised as follows. For 1 to 5 days late, a penalty of
10% (i.e. 10% out of total marks, not 10% out of your marks) per day. For assignments more than
5 days late, 100% penalty applies. If you submit between 00:00 22nd April and 23:59 22nd April,
your penalty is 10%. If you submit between 00:00 23rd April and 23:59 23rd April, 20% penalty, and
so on.
1.2.5 Special Consideration
If unexpected circumstances affect your ability to complete the assignment you can apply for
special consideration. If you seek a short extension, you can directly contact the lecturer. For
longer extensions, you must follow instructions provided at
1.3 Preparation Tasks
Part A of this assignment, you must be familiar with LucidChart diagramming application. You are
required to complete the Week 4 Tute/ Lab session prior to attempt this assignment. Additional
resources on using LucidChart are available under Databases and Tools section of the course
Blackboard shell.
2 Part A: Entity-Relationship Modelling (50 Marks)
2.1 Designing an Entity-Relationship Model
You have just been employed as a database designer in a well-established software development
firm. Your first job is to design and implement a database system for a small medical centre in one
of the Melbourne suburbs.
The following information have been gathered after analysing the current practices of the medical
• The system records information about the doctors work at the medical centre. Doctors
have unique registration numbers. In addition to the registration number for each
doctor, the system records the name, date of birth, gender, qualifications, and
specialisations. Doctors can have multiple qualifications and multiple specialisations.
• The system keeps a record for each patient. When a new patient comes to the medical
centre, the patient is given a registration form to be filled. The information gathered in
this form will be stored on the system. When these information is entered to the system,
a serial number is assigned to each patient. The registration form captures following
information: name, address, date of birth, gender, telephone numbers (multiple
numbers are allowed), Medicare number (if any), private health cover number (if any),
and private health cover company (if any).
• When a patient attends a consultation with a doctor, following information are recorded:
consultation number, date, time, description, symptoms, and special remarks.
Symptoms is a multi-valued attribute.
• A number of prescriptions can be recommended after each consultation. For each
prescription, following information are recorded: name of the medicine, dosage, number
of repeats, and special instructions. None of these attributes are unique. However, for a
given consultation a medicine is prescribed only once.
• The doctors sometimes make referrals for other procedures, such as X-ray, MRI, and
physiotherapy. The system should be able to record such referrals made at
consultations. For each referral, following information are recorded: name of the
procedure, short description, referred practitioner, and whether this procedure essential
Computer Science and Information Technology
Document: Assignment 1.docx
Author: Santha Sumanasekara
Save Date: 22/03/2017
Page 3 of 9
or optional. Like prescriptions, referral for a given procedure is only made once in a
• The system should be able to keep accounting information. In particular, the system
should be able to store payments made for the consultations. There are three
1. bulk-billing:
Some Medicare1 patients (such as disabled and seniors) are bulk-billed. This means
that the patient is not required to pay anything up-front. The medical centre will bulkbill
the Medicare (the government agency that deals with healthcare services in
Australia) the costs associated with the consultation. For such transactions, the
medical centre will record the payment number, timestamp, amount and the
Medicare reference number
2. full up-front payments (cash or card):
The patients with no Medicare benefits are required to pay full cost of the
consultation up-front. For such payments, the medical centre will record the
payment number, timestamp, the amount paid, and the method of payment.
3. settling part of the invoice using a Medicare benefits and the balance in cash or
Some Medicare patients are required to pay a top-up payment (gap fee). That
means, part of the consultation fee is covered by Medicare benefits and the rest is
paid up-front by the patient. For such transactions, two payment records are created
and stored. (The both are linked to one consultation). First record will be similar to
(1) above. The second is similar to (2) above.
Based on the information you gathered, model the activities in your client’s business and present
your model as an Entity-Relationship diagram. Carefully state any assumptions that you make. In
your ER diagram, you must properly denote all applicable concepts, including weak or strong
entities, keys, composite or multi-valued attributes; relationships and their cardinality and
participation constraints.
If you cannot represent any of these information in the ER model, clearly explain what limitations in
the ER model restrict you from representing your model.
You must use UML notation used in the lectures and tute/ lab sessions. You may use any
diagramming tool to draw your diagram, however, use of LucidChart is highly recommended.
Your diagram must be drawn to a high standard with minimal clutter.
Note that you are not required to map the ER model to relational model.
A special note: This is an open-ended question with many different models can be derived. Your
model is assessed based on how accurately it represents business rules described above.
1 If you are not familiar with how Medicare works,
australian-health-system-how-it-works has a simple explanation.
Computer Science and Information Technology
Document: Assignment 1.docx
Author: Santha Sumanasekara
Save Date: 22/03/2017
Page 4 of 9
2.2 Mapping an ER Model to a Relational Database Schema
Consider the following E-R diagram, which models an online bookstore. Map this E-R diagram into
a relational database schema. Show every step of the mapping. No marks are awarded to the final
schema if you do not show the partially-built schema at the end of each step. Indicate the primary
key (underlined) and foreign key (with an asterisk) in each relation.
Name {PK}
EMail {PK}
Telephone {1..N}
CartID {PK}
Code {PK}
0..N 1..1
0..N StockedAt 0..N
Computer Science and Information Technology
Document: Assignment 1.docx
Author: Santha Sumanasekara
Save Date: 22/03/2017
Page 5 of 9
3 Part B: SQL (30 Marks)
LibraryDB is a database system that keeps track of information concerning the books and their
circulation in an imaginary library.
Disclaimer: The data that populates the database are artificially constructed and by no means
correspond to actual real-world data.
The schema for the LibraryDB database is given below.
The primary keys are underlined. The foreign keys are denoted by asterisks (*).
Description of the schema
• person — keeps track of the people who borrow books from the library. The attributes
contain personal and contact information.
• author — keeps track of personal information about authors.
• publisher — keeps track of the publisher information. To make simple, most of the attributes
have been truncated in the sample database.
• subject — this relation keeps information about the subjects on which the library collection
have books (such as Mathematics, Database, etc)
• book — contains information about the books that are available in the library. Every book
can have one or more physical copies in the collection. Each book can have one or more
authors and it is published by one or more publishers.
• book_copy — keeps track of the physical copies of the books in the library collection.
• borrow — keeps track of the check-ins and check-outs of the books. Every transaction is
done by one person, however may involve with one or more book copies. If there is no
return date, it means the book has been checked out but not returned.
• written_by — associates books with authors. A book may be associated with several
authors and an author may be associated with several books. There is also an attribute
‘role’ that specifies the role of the author for the book (author/ editor/ translator/ etc).
• published_by — associates publishers with books. There is an attribute ‘role’ here too.
• borrow_copy — associates physical copies of books with a transaction. Members are
allowed to borrow several books in a single transaction.
A conceptual data model (shown as an entity-relationship diagram) which represents these data is
given below.
borrow(transactionID, personID*, borrowdate, duedate, returndate)
author(authorID, firstname, middlename, lastname)
book_copy(bookID, bookdescID*)
book(bookdescID, title, subtitle, edition, voltitle, volnumber,
language, place, year, isbn, dewey, subjectID*)
borrow_copy(transactionID*, bookID*)
person(personID, firstname, middlename, lastname, address, city,
postcode, phonenumber, emailaddress, studentno, idcardno)
publisher(publisherID, publisherfullname)
written_by(bookdescID*, authorID*, role)
published_by(bookdescID*, publisherID*, role)
subject(subjectID, subjecttype)
Computer Science and Information Technology
Document: Assignment 1.docx
Author: Santha Sumanasekara
Save Date: 22/03/2017
Page 6 of 9
You can access a sample database instance of this library database system using Oracle SQL
Developer (either on myDesktop or lab machines) or sqlplus on core teaching servers (titan, jupiter
or saturn.) Please follow the instructions provided on the Blackboard to access the sample
Username: rolibrary
Password: library
If you wish to do this part of the assignment from home, you can install SQLite (with SQLite
Studio). The instructions for installing, configuring and using SQLite Studio is provided in the
Databases and Tools section of the Blackboard. Also included is the pre-built Library database in
SQLite format (Library.db) at the same location.
Write SQL queries for the following tasks.
1. Display the titles of all books on the subject “DataBases”. Your result set should be sorted
on the alphabetical order of the titles.
2. Display
a. the number of books on the subject “DataBases”.
b. the number of book copies on the subject “DataBases”.
3. Display the firstname and lastname of the authors who wrote books on the subject
a. Write your query without using NATURAL JOINs.
b. Write your query using NATURAL JOINs.
4. Who translated the book “American Electrician’s Handbook”? Display the firstname,
middlenames, and lastname of the translator.
authorID {PK}
subjectID {PK}
publisherID {PK}
bookdescID {PK}
bookID {PK}
transactionID {PK}
personID {PK}
1..1 0..N
Computer Science and Information Technology
Document: Assignment 1.docx
Author: Santha Sumanasekara
Save Date: 22/03/2017
Page 7 of 9
5. Display the firstname and lastname of the people who returned books late.
6. Display the firstname and lastname of the people who returned books more than 7 days
7. Display the titles of books that haven’t been borrowed.
8. A borrower wants to borrow the book titled “PRINCIPLES AND PRACTICE OF DATABASE
SYSTEMS”, but all of its copies are already borrowed by others. Write two queries to
display other recommended titles using the following methods.
a. Using partial matching of the book title — note that the borrower is interested in a
“DATABASE” book.
b. By searching of other books written by the same author (i.e. the author of
9. Display the list of publishers who have published books on the subject “DataBases”. Your
query should display publisher’s full name, along with “DataBases” book titles they
10. List the full names of publishers who have not published books on “Databases”.
Computer Science and Information Technology
Document: Assignment 1.docx
Author: Santha Sumanasekara
Save Date: 22/03/2017
Page 8 of 9
4 Part C: Relational Database Model (20 Marks)
This question has been adopted from Fundamentals of Database Systems, Elmasri and Navathe.
(Question 5.11).
A relational database schema and an instance of this schema are given below.
Most of the attribute names are self-explanatory. Super_SSN refers to corresponding employee’s
supervisor’s SSN (Social Security Number). This example is based on US system, assume it is
similar to Australian Tax File Number.
Computer Science and Information Technology
Document: Assignment 1.docx
Author: Santha Sumanasekara
Save Date: 22/03/2017
Page 9 of 9
Arrows indicate foreign keys and the corresponding attributes in parent relation. In the case of
Super_SSN, the parent relation is the Employee relation itself (self-referencing).
1. It was found that the data entry operator had incorrectly entered data for John B. Smith and
Ramesh K. Narayan. Their SSN were swapped. The error was discovered, and the data
entry operator was instructed to fix it. (S)he attempted to swap SSN value in each tuple
using the following SQL statement.
But, it was not successful. The DBMS returned an error message and two tuples were not
a) Explain why they didn’t work.
b) Give another way to correct the error.
c) Write down the correct SQL UPDATE statements to carry out your proposed solution.
2. James E. Borg gets a pay rise, which increased his salary by 10%. The data entry operator
has executed the following SQL statement.
Write down all the integrity constraints violated by the above operation. If the operation
does not violate any constraints, indicate as ‘no violations’.
3. Due to a workplace dispute, John B. Smith has been moved to a new supervisor. To effect
this change, the data entry operator has executed the following SQL statement.
Write down all the integrity constraints violated by the above operation. If the operation
does not violate any constraints, indicate as ‘no violations’.
4. A new project has been established, but neither a project number nor a department is
assigned yet. A new record has been entered into the Project relation, as follows.
Write down all the integrity constraints violated by the above operation. If the operation
does not violate any constraints, indicate as ‘no violations’.
UPDATE employee
SET SSN=’666884444’
WHERE SSN = ‘123456789’;
UPDATE employee
SET SSN=’123456789’
WHERE SSN = ‘666884444’;
UPDATE employee
SET salary = salary*110/100
WHERE SSN = ‘888665555;
UPDATE employee
SET super_SSN = ‘666884444’
WHERE SSN = ‘123456789′;
INSERT INTO project (pname, plocation)\

Buy your research paper []

VALUES (‘Agent X’, ‘Washington’);

Need Help-CYS 404 Information System Audit Project Description

Need Help-CYS 404 Information System Audit Project Description

Report Submission Deadline: 18th December 2016

Write a comprehensive report about ISSAI 100

Topic description:

ISSAI 100 – Fundamental Principles of Public-Sector Auditing (Basic Principles)


Guidelines for Report:

  1. report should contain at least 5000 words.
  2. report must have these sections:
  • abstract
  • table of contents
  • list of figures
  • introduction
  • (research material)
  • conclusion
  • bibliography
  1. report must follow IEEE template for computer society journals available at
  2. report must follow principles of scientific repot writing e.g. paraphrasing, in text citation, references etc.
  3. The structure, formatting, mechanics, documentation and references, reliable data from credible sources, technical content and theoretical explanation will be considered while evaluating the report.
  4. All the submissions will be checked at Turnitin plagiarism software and a maximum of 20% similarity is allowed.
  5. Add related figures and at least one table. write about them within the research to make it easy to read the research for “visual readers”.
  6. Font size = 12, font style = Times New Roman.
  7. Line spacing 1.5
  8. Please use the article attached and this website is helpful too:
  9. Please use only references that could be found online and try ro use new/up-to-date references.
  10. Feel free to use any number of resouces!

Need Help-CYS 404 Information System Audit Project Description

Need help-Assignment

Need help-Assignment

Assignment Instructions

Assignment 1 Requirements


For this and other assignments you will be working on the analysis and design specifications and models of a continuous case study. For this assignment, you will focus on the requirements for the Community Patient Portal System (CPPS) case study.  In a Word document complete Questions 1, 2, 3, 4 for Community Patient Portal System (CPPS) Part requirements.  Read the Community Patient Portal System (CPPS) Part 1 case study.

  1. List and define the stakeholders for CPPS? How involved should CPO’s patients in the system definition?  As the business grows, who else might be potential stakeholders and interested in system functions?  When you define something, use the phrase “A(n) itemtobedefined” is a …”  and then complete the sentence.
  2. List and describe the specificanalysis techniques would you use to determine the requirements if you were hired to design and implement this system?  What questions would you need answered?  Make a list.
  3. What technology and communication requirements would be necessary?  What kind of computer equipment/hardware would be necessary?  What are your recommendations?
  4.  Number, list, and describe the primary functional requirements for the system?  Number, list, and describe the primary nonfunctional requirements?


Submission Instructions

  1. Submit your Word file and name it like LastNameFirstNameAssignment1.
  2. Make certain that you include the above numbered questions with the answers in your document.
  3. Include your name and assignment number at the top of your Word document.
  4. Insert any graphics into your Word document.  Do not submit any graphics separately.


Your assignment will be graded with the following rubric:


Rubric for Assignments Points
Content & Development 50% 50/50
Organization 20% 20/20
Format 10% 10/10
Grammar, Punctuation, & Spelling 15% 15/15
Readability & Style 5% 5/5
Timeliness (late deduction 10 points) Optional
Total 100/100



Need Help-Computer Homework 7

Need Help-Computer Homework 7

Carefully read the instructions for Computer Homework 7and act accordingly. Carefully read the Late Assignment Submission Policy in the Syllabus. General Instructions: (a) Complete Computer Homework 7 based on Dataset For Computer Homework_Midterm Exam_Final Exam.xlsx in the Computer Homework Module under the Modules tab on CANVAS and based on the class discussions, lecture notes, and the assigned chapters for class 10. You are strongly advised to carefully read chapter 16 in Salkind, Neil J. Statistics for People Who (Think They) Hate Statistics (5th ed.). (Thousand Oaks, CA: Sage, 2014); and chapters 14 and 15 in Berman, Evan M. and XiaoHu Wang. Essential Statistics for Public Managers and Policy Analysts (3rd ed.). (Los Angeles, CA: Sage/CQ Press, 2012. You are strongly advised to watch the YouTube video “SPSS Aids on Regression with Dummy Variables” under the Announcements tab on CANVAS (b) You must use SPSS to complete Computer Homework 7, and must submit (1) all the generated SPSS outputs in one single PDF document and (2) all the properly numbered written interpretations/responses in one single Word document in the Computer Homework 7 folder under the Assignments tab on CANVAS by 12pm on October 25. (c) Use the question numbers to organize your responses in the required word document, without including the question words in your responses. (d) You should let your interpretations and explanations reflect what all the continuous variables in the Regression stand for, as defined in the excel sheet Variable Meaning in the Dataset. An explanation example that reflects what Air quality stands for in the Variable Meaning sheet of the Dataset: Given that the standard deviation is 15 and the mean is 100, it is possible to calculate the range of Air Quality scores within ±2 standard deviations as 100 –(2)(15) to 100 + (2)(15) = 100- 30 to 100+30 = 70 to 130. Since Air quality in the Variable Meaning of the Dataset is used to mean % SO2 emission concentration per year, the range of Air Quality scores within ±2 standard deviations is 70% to 130% SO2 emission concentration per year. (e) You will be deducted five points for each part of each question you did not answer. (f) You will be deducted two points for each wrong calculation and answer. (g) You will be deducted two points for each wrong interpretation. (h) You will score zero points for Computer Homework 7 if you fail to submit the specified PDF document and the specified Word document. Page 2 of 3 Computer Homework 7 i. Use your lecture notes and the assigned readings for class 10 to guide your interpretations. ii. Watch the CANVAS YouTube on “Regression with Dummy Variables” to recode Region in column A of the Dataset into four different dummy variables: Eastern Europe and Central Asia, Latin America and Caribbean, Middle East and North Africa, and Europe). If you are coding Region into Europe, Europe must be “1” and every other region must be “0”. Repeat the same process for every other specified region in (ii) above. iii. Use the most common region in column A in the Dataset as the reference dummy variable. A reference dummy variable must be omitted from the regression computation in SPSS. iv. In one single Regression Analysis at the risk level of 0.05, use SPSS to predict Education from the following independent variables: a. The three relevant dummy variables based on the information in (ii) and (iii) above. b. Sufficient Water c. Safe Sanitation d. GDP. e. Unemployment. Notes: Make sure you check standardized coefficients, if unchecked in SPSS. v. Use SPSS to calculate collinearity diagnostics for all the continuous independent variables. vi. In 100-300 total words, a. identify all the continuous variables from (iv) above b. explain why they are continuous variables. c. identify and explain the continuous variables that are independent variable(s) from (iv) above. d. identify and explain the continuous variables that are dependent variable(s) from (iv) above. vii. In 20-25 total words, use the information in (v) above to explain which of the continuous variables should be dropped from the Regression SPSS output for (iv) above and why. Note: In your explanation, use the real names of the continuous variables. Page 3 of 3 viii. In 20-25 total words, interpret the Adjusted R-square in the SPSS outputs for the Regression in (iv) above . ix. In 100-120 total words, interpret (a) the standardized Coefficient (Beta), (b) the Sig. value, and (c) the 95% Confidence Interval for B [in the Regression SPSS outputs in (iv) above] for each of the three relevant dummy variables in the Regression in relation to the reference dummy variable omitted from the Regression in the Regression SPSS outputs. Note: In your interpretation, use the real names of the dummy variables. x. In 100-120 total words, interpret (a) the Standardized Coefficient (Beta) and (b) the Sig. value [in the Regression SPSS outputs for (iv) above] for each of the continuous independent variables. Note: In your interpretation, use the real names of the continuous variables.

Need Help-Computer Homework 7




Assignment 1: Harness New Technology Google ATAP has been developing new technologies that allow us to interact with computational media in ways beyond the traditional interaction paradigms and closer to natural human movements and behaviours. Project Soli is one such endeavour. At the heart of this project is the development of a new interaction sensor that relies on radar technology to accurately and efficiently capture tiny and discrete hand motions. In essence, this sensor transforms the human hand into a control mechanism. The goal of this assignment is to imagine and propose a new application for this technology. This assignment is individual; pairs and teams are not allowed. Instructions: 1) Watch the videos below to learn more about Project Soli and the applications recently pursued by HCI people around the world: a. b. 2) Can you think of a creative, complex problem where this new interaction sensor may be a solution? Come up with a new application (not from either of the videos above!) that meets the following criteria for use of this sensor: a. Embedded in or involving an everyday object, such as a table, pencil, etc. b. Using tiny movements of the hand, including fingers, the wrist, etc. c. Transforming the hand into a control mechanism. 3) Outline the main task and 3-6 steps/interactions involved in completing the task. Be sure to describe the input and output at each step/for each interaction. You may use one of the following methods: a. Text description, that may be supplemented with visuals. b. Illustrations, with appropriate text descriptions. c. Animation and/or video (< 5 mins), demonstrating the task and steps. 4) Explain how your idea harnesses Project Soli’s new interaction sensor technology by referencing the criteria above. CSC318 ASSIGNMENT 1 2 Rubric: Criteria Weight Description of your idea (new application of the technology); ~½ page. 10% Description/illustration/demo of main task and steps/interactions; ~½ page. 50% Explanation of how criteria was met; ~½ page. 30% Proper formatting, conciseness, spelling, and grammar. 10% Deliverable: A single PDF file named A1-LASTNAME.pdf. 1” margins, Arial font, 12 pt, 1.5 line height. Structure as follows: § Title page with your name, UTORid, and preferred contact email. § Idea: o Description of your idea, § Main Task: o Description/illustration/demo of main task and steps/interactions, § Explanation: o Explanation of how criteria was met. If you created an animation or video, include the URL to the video (e.g., YouTube) where you would normally place a text description of the main task and steps/interactions. Due through MarkUs on: Monday Section: The Wednesday of Week 6 (Oct 19) at 11:59pm. Thursday Section: The Thursday of Week 6 (Oct 20) at 11:59pm.


Need Help-Hierarchical Network Design Assignment

Need Help-Hierarchical Network Design Assignment

Hierarchical Network Design Assignment

General Requirements

The college district is in the process of implementing an enterprise-wide network which will include Local Area Networks (LANs) at each site and a Wide Area Network (WAN) to provide data connectivity between all college sites.

Access to the Internet from any site in the college district is also an integral part of this implementation. Once the network is in place, the college district will implement a series of servers to facilitate online automation of all of the district’s administrative and many of the curricular functions.

Since this network implementation will have to continue to be functional for a minimum of 10 years, all design considerations should include a minimum of 20x (times) growth in the LAN throughput, 2x (times) growth in the WAN core throughput, and 5x (times) growth in the District Internet Connection throughput. The minimum requirement for initial implementation design will be Fast Ethernet to any host computer in the network and Gigabit Ethernet to any server host in the network.



The WAN will be based on a hierarchical model. Three (3) regional Hubs will be established at the Galway IT, Sligo IT and Letterkenny IT for the purpose of forming a fast WAN core network. College locations will be connected with
high-end, powerful routers. Access to the Internet or any other outside network connections will be provided through SligoIT with appropriate WAN links. For security purposes, no other connections will be permitted.




The LAN will include both wired and wireless connectivity.

Each Local Area Network (LAN) segment will use the appropriate Horizontal and Vertical Cabling which complies with TIA/EIA-568-A and TIA/EIA-569 standards.

Each College consists of 2000 student, 300 lecturers, 40 admin staff and 30 Network Technicians.  The LAN infrastructure will be based on Ethernet LAN switching. This will allow for a migration to faster speeds (more bandwidth) to the individual computers and between MDFs and IDFs without revamping the physical wiring scheme to accommodate future applications.

In each location a Main Distribution Facility (MDF) room will be established as the central point to which all LAN cabling will be terminated and will also be the point of presence (POP) for the Wide Area Network connection. All major electronic components for the network, such as the routers and LAN switches, will be housed in this location. In some cases an Intermediate Distribution Facility (IDF) room will be established, where horizontal cabling lengths exceed TIA/EIA-568-A recommended distances or where site conditions dictate. In such cases, the IDF will service its geographical area and the IDF will be connected directly to the MDF in a STAR or EXTENDED STAR topology.

Each room requiring connection to network will be able to support 24 workstations and be supplied with four (4) CAT 5 UTP runs for data, with one run terminated at the teacher’s workstation. These cable runs will be terminated in the closest MDF or IDF. All CAT 5 UTP cable run will be tested end-to-end for 100 Mbps bandwidth capacity. It will consist of a lockable cabinet containing all cable terminations and electronic components; i.e. data hubs and switches. From this location data services will be distribute within the room via decorative wire molding.

Wireless access should be secure allowing appropriate personnel to obtain connectivity with internet access.



All file servers will be categorized as Enterprise or Workgroup type services, and then placed on the network topology according to function and anticipated traffic patterns of users.  You should select the appropriate files servers for the organisation along with the reasons for your selection.



A complete TCP/IP addressing and naming convention scheme for all hosts, servers, and network interconnection devices will be developed and administered by the District Office. The implementation of unauthorized addresses will be prohibited. The District Addressing Scheme can be implemented in a number of ways. Ideas you should consider are Class A, B, and C Addresses with appropriate subnetting, Network Address Translation (NAT), and Private Network Numbers.

All computers located on the administrative networks will have static addresses, curriculum computers will obtain addresses by utilizing an appropriate server. Each site should use only addresses consistent with the overall District Addressing Scheme. A master network management host will be established at the Sligo IT college and will have total management rights over all devices in the network. This host will also serve as the router configuration host and maintain the current configurations of all routers in the network. Each region location will house a regional network management host to support its area. The management scheme for the data portion of the network will be based on the Simple Network Management Protocol (SNMP) standards. All routers will be pointed to the master Network Management host for the purpose of downloading new or existing configurations. The Sligo IT college will maintain the super user passwords for all network devices and configuration changes on these devices will be authorized from the District Office: i.e., Routers and LAN Switches.




External Threats – Internet Connectivity shall utilize a double firewall implementation with all Internet-exposed applications residing on a public backbone network. In this implementation all connections initiated from the Internet into the schools private network will be refused. Appropriate internal security should also be empolyed.


College Floor Plans


Each college floor plan is identical.   Make up your own plan based on the following.  Each college has 2 buildings 400 meters apart.

Building 1

2 floors

150 meters long

Each floor has 30 lecture theatres

POP is on floor 1

Building 2

1 floor

50 meters long

20 lecture theatres

Your task Plans

Your team of 4 students have been employed by the College district to design a network that suits their needs.  Internal employees will implement the design, there fore it must be documented efficiently.  Here are some examples (not all) of what is required.

Use appropriate hierarchical design including LAN design, WAN design, cut sheets, MDF and IDF layouts, Server and workstation details, User policies, Data recovery methods, Addressing, VLANs, Servers, Maps, Redundancy, Backup procedures, Security procedures, routing protocols, Internet connectivity, wireless etc…

Marks              15% of Continuous Assessment

Due                 Friday 14th of October

Warning           10% deduction per day late



LAN Design Steps Study Guide


First step in LAN design is to establish and document the goals of the design


Requirements of network design:

  1. Functionality – provide user-to-user and user-to-application connectivity with speed and reliability
  2. scalability – ability for network to grow without major changes to overall design
  3. adaptability – design can adapt and implement new technologies as they become available
  4. manageability – easy network monitoring and management to ensure on-going stability


Critical components of LAN design:

  1. function and placement of servers – should use 100 Mbps or more
    1. servers provide file-sharing, printing, communication, and application services
    2. servers run specialized operating systems (netware, windows NT, UNIX, LINUX)
    3. categorized into 2 classes
  1. enterprise servers – supports all the users on network by offering services (e-mail, DNS); should be placed in MDF
  2. workgroup servers – supports specific set of users, offering services such as word processing and file sharing; should be placed in IDF
  1. select correct devices to decrease collisions
    1. media contention – excessive collisions caused by too many devices
  2. segmentation – splitting a single collision domain into two or more collision domains
    1. use bridges or switches creates more bandwidth availability
    2. bridges and switches forward broadcasts not collisions
    3. bridges and switches broadcast = FF-FF-FF-FF-FF
  3. bandwidth vs broadcast domains
    1. bandwidth domain is everything associated with one port on a bridge or switch also known as a collision domain
    2. all workstations compete for the same LAN bandwidth resource


1st step in designing a network is to:

  • gather data about the organizational structure
    • history
    • current status
    • projected growth
    • operating policies and management procedures
    • office systems and procedures
    • viewpoints of employees
  • analyze requirements
    • availability – measures the usefulness of the network
      • throughput
      • response time
      • access to resources
    • determine network traffic load
    • cost


2nd step in designing a network is to develop LAN topology (star/extended star)

  1. Layer 1 – physical cabling
    1. Type of cable (cat 5 for horizontal runs, fiber for backbone and risers)
    2. Distance limitations
  1. 100 meters for cat 5
    1. 3 meters – computer to telecommunication outlet/wall plate
    2. 90 meters – wall to horizontal cross connect (patch panel)
    3. 6 meters – HCC to switch
  2. 2000 meters for fiber
    1. make a logical topology diagram
  1. location of MDF and IDF
  2. type and quantity of cabling
  • detail documentation of all cable runs
  1. Layer 2 – devices to use to provide flow control, error detection, error correction, and reduce congestion
    1. Bridges
    2. Switches
  1. Can microsegment
  2. Eliminates collisions
  • Reduces size of collision domains
  1. Can allocate bandwidth on a per-port basis
    1. Asymmetric switching – allows more bandwidth to vertical babbling, uplinks, and servers.  Provides switched connections between ports of unlike bandwidth
  1. Layer 3 – use routers which:
    1. Allows communication between segments based on layer 3 addressing
    2. Allows connectivity to WANS
    3. Stops broadcasts from reaching other LAN segments
    4. Provides scalability
    5. Adds structure to layer 3 addresses
    6. Filters data-link broadcasts and multicasts


3rd step in designing a network is to create logical and physical network maps – document, by site and network within the site, the IP addressing scheme






Components of network documentation – least performed task in a network

  1. Cut sheet diagrams
    1. Diagrams that indicate the path of the physical wiring layout
    2. Type of cable
    3. Length of each cable
    4. Type of termination for each cable
    5. Physical location of each wall plate or patch panel
    6. A labeling scheme for easy identification of each wire
  2. MDF & IDF layouts – contains a physical and logical layout
    1. Rack mounts
    2. Auxiliary equipment
    3. Servers
    4. Patch panels
  3. server and workstation configuration details – fill out about each host attached to the network
    1. make and model of computer
    2. serial number
    3. floppy drives
    4. hard drives
    5. DVD/CD-Rom drives
    6. Sound and network cards
    7. Amount of RAM
    8. Physical location, user, and network ID
    9. Purchase date and warranty information
  4. software listings – of standard and special software
    1. operating system software
    2. application software
  5. maintenance records – all repairs to all equipment included in the network
  6. security measures
    1. soft security – user rights, password definition, firewall support
    2. physical security – how MDF and IDF’s are locked, who has access, how hosts are protected
  7. user policies – how users can interact with the network and consequences


Security policies

  • minimum password length
  • maximum password age
  • unique passwords
  • times of logon
  • don’t use family or pet names for passwords
  • screensaver password protected


Data recovery methods – protecting data from loss

  • Tape backup – duplicating all stored data to magnetic tape.  Works with a flag or switch. Uses an archive bit which only backs up what has been changes
    • pros – low cost
    • cons – stores data sequentially; drains system resources (bandwidth, processor power)
  • Fault tolerant disk configurations
  • Use of uninterrupted power supplies (UPS)


5 types of backup operations:

  1. full backup – all files on the disk are stored on tape and the archive bit for all files is set to off
  2. incremental backup – backup all files that have been created or modified since full backup; only work in conjunction with a full backup
  3. differential backup – backup all files like incremental backup but the difference is that even though the file is saved to tape, the archive bit is not reset, so each time differential backup is done, all files modified or created since the last full backup will be stored again
  4. copy backup – backup user selected files to tape; does not reset archive bit to off
  5. daily backup – backup only the files that are modified on the day of the backup; doesn’t reset archive bit to off


Fault tolerant storage devices – a redundant set of devices categorized by RAID (Redundant Array of Inexpensive Disks) levels 0 – 5


RAID types:

  1. RAID 0 – stripes data across multiple disks, no parity, no redundancy.  Used for speed
  2. RAID 1 – disk mirroring writes data to two identical partitions on separate hard disks thus creating an automatic backup.  Provides full redundancy but requires twice as much storage space
  3. RAID 2 – writes data across multiple hard disks, with error checking.  No longer used
  4. RAID 3 – stripes data one byte at a time and has a dedicated parity drive.  Very expensive
  5. RAID 4 – stripes data one sector at a time and has dedicated parity drive. Expensive and slow
  6. RAID 5 – stripes data and parity across multiple disks (at least 3).  A separate parity disk is not required abut full data redundancy is achieved.  On NT system, the boot and system partitions cannot be located on a RAID 5 disk array.  Very fast; need at least 5 disks for full redundancy


The three RAID levels that are supported by most operating systems are RAID 0, RAID 1, and RAID 5


Volume – a physical unit of storage


Environmental factors that can affect a network:

  1. Static
    1. caused by lack of humidity
    2. make sure all equipment is off
    3. make sure you ground yourself before starting to install equipment
  2. Dust and dirt
  3. Heat
  4. Power conditioning – preventing electrical irregularities
    1. Isolating transformer – controls voltage spikes and high frequency noise
    2. Regulators – maintains a constant output voltage.  Handles brownouts and surges
    3. Line conditioner – a regulator with an isolating transformer built in
    4. Uninterruptible power supply – battery charger that charges a batter, that in turn powers the computer
  5. EMI and RFI
    1. EMI includes power supplies and monitors, florescent lights, large electric motors, electrical wiring
    2. RFI (Radio Frequency Interface) picked up by other equipment or improper shielded cables
  6. Software Viruses
    1. Worm – propagates itself across computers, usually by creating copies of itself in each computer’s memory
    2. Virus – “infects” computer files (usually exe files) by inserting in those files copies of itself
    3. Trojan Horse – disguised as a game, a utility, or an application


Network performance – a measure of a networks quickness and reliability

  • Measured by a baseline – performance level established after the network has been installed and configured properly. Use a fluke LAN meter for a baseline
  • Baselines should be periodically updated


Two types of networks

  1. Peer-to-peer (workgroup network) – designed for small numbers of workstations (<10)
    1. Advantages
  1. Cheaper to create and operate
  2. Users control own resources
  • Doesn’t require a dedicated server
  1. No additional software required
    1. Disadvantages
  1. No central point of management
  2. If user changes password, all passwords on shared resources must be changed individually
  • If a shared computer is turned off, those resources aren’t available
  1. No room for growth
    1. Examples
  1. Windows for workgroups
  2. Windows 95
  • Windows 98
  1. LANtastic
  1. Client-Server – network operating systems
    1. Advantages
  1. Provide centralized point of user, security, and resource management
  2. Provide access to resources with one ID and password
    1. Disadvantages
  1. Single point of failure
  2. Requires specially trained personnel to maintain
  • Takes special network software and hardware


Client-Server operating systems:

  • UNIX
    • Kernel based
    • Uses NFS
  • Novell Netware (versions 3.12, 4.11, 5.0)
  • Windows NT


Main function of network operating system is to control the network by establishing:

  • Network user
  • Rights
  • Login accounts
  • Passwords
  • Groups
  • System profiles and policies


Troubleshooting a network

  1. identify network/user problem
  2. gather data about problem
  3. analyze data to come up with a possible solution
  4. implement solution
  5. if problem isn’t solved, undo change and modify data
  6. go to step 3

Need Help-Hierarchical Network Design Assignment


Homework Help-ITM 1270-Mashaw

ORDER NOW your custom paper to have it completed successfully on time.

Email Us:

Homework Help-ITM  1270-Mashaw

ITM  1270-Mashaw              Take Home 2, 10 points (no Cooperation)          Name:

The material for this TH is coming from Ch 1, 2 of the Computers;  Ch 3 of the Simplified, and Chapters 3, 4, 5 of the Office. [The criteria for grading this homework is 1) Completeness, 1) Professionally prepared work, 3) Diligent and enthuse work, and 4) The accuracy in your answer. Make sure to indent each answer to identify it.]

Part I  Discuss, explain
  1. Discuss briefly, explain (Prefer your own words, use your own understanding. This is also a test to see how effectively you can use your word processor.)
  2. Search and read about events in computer evolution; summarize at least 5 important events (according to your opinion.)
The Year The event Explanation of the event Why it was important


  1. How does a computer do the processing (process data/information)?







  1. What are the differences between a USB, and a Serial Port








  1. Per instructions in the Lab, insert a table with 4 columns to compare computers performances. In the first column, write the performance criteria, in the second column write the information about your computer (the processor’s Architect/model, Speed, RAM size, hard disk capacity, …), and in the third and fourth column write information for two computers that you find for purchase.











Part II  Hands on   (print enough documents to show your work)

A.  The Computer:  Do the following exercises.  Make a note of how you can do it, or how you did it.
  1. What is the file extension for Word 2003 document? What is the file type for following extensions, what is the default program? (hint: check in :  control Panel -> default program)
txt Rtf mpeg
doc Tiff avi
docx bmp Mp4
pdf jpeg Mp3


  1. What kind of Hardware does your computer have? List a few. (Hint: Control Panel ->System->Device Mgr)






  1. Use Notepad, type a line, count the number of characters typed, save (with the extension of txt), and close.

What name did you use?                           What extension?          How many characters did you type?


Check its property, write the amount of storage used:



  1. Use the snipping tool, cut a piece of picture, and paste it here. Change some of its properties.



  1. MS Word,
  2. Create a new Document, include some text (1 page is good enough), and do/practice the following. Show how you do each. Print your  practice work to support your efforts. (Practice doing the following, and explain the menus, and submenus that you are using, use notations.  Print a sample of your work)
  3. Change/add the font Color of a sentence



  1. Insert a family picture,



  1. Change the property of the picture to be “tight” (to float the picture) and the line color to be red, with a width of 6 points,



  1. Format the picture: change brightness, contrast, style, crop it, recolor it, Rotate & Flip, etc.



  1. Insert a smartArt Obj.



  1. Change the margins of only one paragraph (hint: indent a paragraph, note the hanging indent marker, Left and Right indent marker)



  1. Insert a formula such as β → £ . ã



  1. Insert a picture on page 2, set its Orientation to Landscape.



  1. Insert a Happy face (from shapes), change line color to be red, with a width of 6 points



  1. Insert a picture and format; change brightness, contrast, and style; crop it to a smaller size


  1. a. Insert a header to this document, your name should appear on the right
  2. Insert a footer to this document, the footer should show “Take Home # ” , and then the page #



  1. Type a slang, an expression on a line, copy and paste it at least 10  times; change the font and font size (both) for each line. At the end of each line identify the font and size. For example:

Learn by Exploring;   this is Bdoni  MT  , 14 pts


Learn by Exploring;   this is Arial rounded Black, 16 pts




Part III Applications, challenging task, write a book
  1. Prepare a flyer for selling something(or for a garage sale)
  2. Set the margin to .75″ all around
  3. Set the orientation to landscape
  4. put an “art” boarder around the page


Your flyer should be designed attractively; include a text box, clip arts, and shapes.   Make sure to set the property of an object so that you can move it around.


2.  Write your first book to teach MS word, call it something like:  “Manual of Instructions for MS Word”


Write a short “Manual of Instruction” for your friend so that he/she can learn whatever you have learned about MS-Word.   You may call it “A Quick Guide of How to Use Word” (you can change the title if you want.)  You need to be creative. In this instructional manual that you are writing, give instructions and examples of how to use MS-Word to a friend-student who needs to take a test for this purpose. You may say something like:  In order to do that, do: 1.  do . .. ,  2 do … etc.


You should use the majority of skills that you have learned so far, like save/save as,  copy/paste,  doing bullets and numbering, inserting a date, a symbol, a picture  in a document, etc. (This would be a good summary for yourself. )

It is a good idea to use the snipping tool, cut and paste a piece of the menus of the Word, and refer to it.

Your Manual should be professionally prepared (at least 5 pages),  with

  1. Cover page,
  2. Table of content,
  3. The content which should have Major headings, and sub headings, etc.

Homework Help-ITM  1270-Mashaw

ORDER NOW your custom paper to have it completed successfully on time.

Email Us:

Get Help on your Assignment

Get Help on your Assignment

Buy your research paper Online []

Question 1 (1 point)

Which two of the following are among the major 5 actors of the NIST Cloud Computing Reference Architecture?

Question 1 options:

Cloud Auditor
Cloud Broker
Cloud Database

Question 2 (1 point)

What is the block (word) size used by SHA-512 algorithm?

Question 2 options:


Question 3 (1 point)

Which of the following can be utilized as traceroute tool?

Question 3 options:

TTL (Time to Live)
Path Analyzer Pro

Question 4 (1 point)

What is a network of many hacked smartphones called?

Question 4 options:


Which version of the Linux kernal does Android rely upon?

Question 5 options:


Question 6 (1 point)

The Autorun feature of Removable Disks and CD Drives can be a threat to network Security.

What is the best course of action to remove Autorun for Removable Disks and CD Drives in


Question 6 options:

Tape the USB ports
Provide Users without Administrative Rights
Use Group Policy
Remove the CD-ROM Drive from the System

Question 7 (1 point)

According to the text, the three different types of Virtualization include:

Question 7 options:

SAN Virtualization
Network Virtualization
Storage Virtualization
Server Virtualization

Question 8 (1 point)

Among all smartphones, which is most likely to be hacked? (choose all that apply)

Question 8 options:

Windows Phone

Question 9 (1 point)

Some of the Infrastructure as a service vendors include: (choose all that apply)

Question 9 options:

Windows SkyDrive
Amazon EC2
Go Grid

Question 10 (1 point)

The psexec utility can be utilized to perform which of the following actions?

Question 10 options:

Get System Information
List Processes
Launch an Interactive Command Session
Show open files

Question 11 (1 point)

Which of the following are Mobile Network Based Attacks? (choose all that apply)

Question 11 options:

Man-in-the-Middle Attacks
Rogue Access Points
Packet Sniffing
SSL Strip

Question 12 (1 point)

The Management Information Base (MIB) includes which of the following?

(choose all that apply)

Question 12 options:

Scalar and Tabular Objects
File and Folder Permissions
OID Numbers
User Accounts

Question 13 (1 point)

Which of the following applies to an SSID? (choose all that apply)

Question 13 options:

Will be encrypted in WEP or WPA/WPA2 is utilized
Is part of the frame header
Is Case Sensitive
Can be up to 32 characters

Question 14 (1 point)

Which of the following are app stores? (choose all that apply)

Question 14 options:

ITunes Store
Google Play
BlackBerry App World

Question 15 (1 point)

Which Cloud Deployment model is a multi-tenant infrastructure shared among

organizations with common characteristics?

Question 15 options:

Private Cloud
Hybrid Cloud
Public Cloud
Community Cloud

Question 16 (1 point)

Question 16 options:

Disable File and Print Sharing
Block ICMP so the host cannot be detected
Use TCP Wrappers
Turn on the Windows Firewal

Question 17 (1 point)

A lack of vetting of apps can lead to which two of the following results?

Question 17 options:

Malicious apps
fake apps

According to your text, which of the following are ways to detect an Intrusion with

an (IDS)? (choose all that apply)

Choose all that apply

Question 18 options:

Anti-Virus Alerts
Anomaly Detection
Protocol Anomaly Detection
Signature Detection

Which of the following firewall architectures is designed to host servers that


public services?

Question 19 options:

Screened host
Bastion Host
Screened subnet

Question 20 (1 point)

Black hat hackers are:

Question 20 options:

Individuals who work both offensively and defensively at various times
Individuals who aim to bring down critical infrastructure for a cause

and are not worried about jail

Individuals professing hacker skills and using them for defensive

purposees, or security analysts

Individuals with extraordinary computing skills, resorting to malicious

or destructive activities

Question 21 (1 point)

Identify the Nmap Scan method that is often referred to as half open scan:

Question 21 options:

SYN Stealth
Half open
Windows Scan
ACK Scan

Question 22 (1 point)

According to the text, a major Denial of Service Attack caused major

problems for ___.

Question 22 options:

DALnet IRC Network
The Department of Defense
780th Military Intelligence Brigade

Question 23 (1 point)

Which of the following Management Information Base (MIB) files contains

information about server services?

Question 23 options:


Question 24 (1 point)

According to the text, which of the following is a form of MITM Attack?

Question 24 options:

Packet Sniffing
Checksum Evasion
API Hooking
SSL Strip

Question 25 (1 point)

Of the following options, which are virtualization vendors? (

choose all that apply)

Question 25 options:

VMware vSphere
VMware vCloud Suite
Virtual Box

Question 26 (1 point)

Which password cracking technique will the attacker use if she gets

some information about the password to crack?

Question 26 options:

Denial of Service Attack
Distributed Network Attack (DNA)
Rule-based Attack
Syllable Attack

Question 27 (1 point)

Which of the following are signs of file system intrusion?

(choose all that apply)

Question 27 options:

Connection Requests
Double Extensions
Rogue SUID Entries
Reduced Bandwidth


Question 28 (1 point)

According to OWASP, strong encryption channels, such as which of the following should be used? (choose all that apply)

Question 28 options:


Buy your research paper Online []

Question 29 (1 point)

Which of the following are risks of rooting? (choose all that apply)

Question 29 options:

voiding the warranty
poor performance

Question 30 (1 point)

Buffer overflow attacks allow an attacker to modify the ___________ in order to control the process execution, .

Question 30 options:

Target process’s address space
Target remote access
Target rainbow table
Target SAM file

Question 31 (1 point)

According to the text, by 2018, what percentage of enterprises will specify Wi-Fi as the default connection?

Question 31 options:


Question 32 (1 point)

Identify the attack which forces an unsuspecting user’s browser to send malicious requests they did not intend.

Question 32 options:

SQL injection attack
LDAP Injection attack
Cross-Site Request Forgery (CSRF)
Cross-Site Scripting (XSS)

Question 33 (1 point)

Which of the following is an antenna based on the principal of a satellite dish and can pick up Wi-Fi signals from 10 miles away?

Question 33 options:

Omni Directional

Question 34 (1 point)

You should place your Intrusion Detection System (IDS) in this location on the network (choose all that apply):

Question 34 options:

Outside the Firewall
At the ISP Location
Inside the Firewall

Question 35 (1 point)

Permutation Scanning involves which of the following?

Question 35 options:

Using a psudorandom function
Looking for new vulnerable machines on the local subnet
Collecting a list of possibly vulnerable machines
Using information from infected machines

Buy your research paper Online []

Question 36 (1 point)

What are some of the limitations of Cloud Computing services? (choose all that apply)

Question 36 options:

Storage Limits
Control Limits

Question 37 (1 point)

Which wireless standard has bandwidth up to 54 Mbps and signals in a regulated frequency spectrum around 5 GHz?

Question 37 options:


Question 38 (1 point)

It was well publicized that BlackShades Net was used as an attack tool against:

Question 38 options:

Syrain Political Activists
Sony Pictures

Question 39 (1 point)

Which Cloud Consumer model includes storage, service management, and content delivery?

Question 39 options:


Question 40 (1 point)

What were the two dominant attack strategies identified in Symantec’s Threat Report?

Question 40 options:

Advanced Persistent Threats
Broader Strokes
Focused Attack
Distributed Denial of Service

Question 41 (1 point)

SYN flooding takes advantage of which of the following? (choose all that apply)

Question 41 options:

A flaw in how the three-way handshake can be implemented
A flaw in some firewalls which do not restrict ICMP traffic by default
Not replying to SYN/ACKs
Holding the incomplete connection for a period up to one second

Question 42 (1 point)

Which of the following is a tool that can be used to check for modified or trojanzied files?

Question 42 options:


Question 43 (1 point)

The advantages of a using a Community Cloud Deployment include which of the following? (choose all that apply)

Question 43 options:

High Security
Clear Legal Entity
Compliance to Regulations
Shared Resources

Question 44 (1 point)

Which of the following sentences is true about a proxy?

Question 44 options:

Cannot be used to filter out unwanted content
Allows attacker to view the desktop of users system
Protects the local network from outside access
Does not allow the connection of a number of computers to the Internet when having

only one IP


Question 45 (1 point)

Which of the following Windows Utilities can be utilized to enumerate hosts?

Question 45 options:

net stop
net view
net Use
net start

Question 46 (1 point)

Which of the following is the 3D Graphics Library of Android?

Question 46 options:

Media Framework

Question 47 (1 point)

Which of the following applies to an Intrusion Detection System (IDS)? (choose all that apply)

Question 47 options:

Monitors outbound traffic
Monitors inbound traffic
Will perform actions to stop the attacker in their tracks
Signals an alarm

Question 48 (1 point)

What is the size of WEP initialization vector (IV)?

Question 48 options:


Question 49 (1 point)

low? (choose all that apply)

Question 49 options:

removing bloatware
Low level access to hardware
deleting system files

Question 50 (1 point)

If you want to mask (or spoof) your IP Address, what type of scan should you use?

Question 50 options:

ACK Flag Probe Scan
Stealth Scan
UDP Scan

Question 51 (1 point)

An organization can implement this Cloud Deployment model within the corporate firewall.

Question 51 options:

Public Cloud
Hybrid Cloud
Community Cloud
Private Cloud

Question 52 (1 point)

Which of the following is true about the 802.11i standard?

Question 52 options:

It operates at both 2.4 GHZ and 5 GHZ
It defines WPA-2 Enterprise and Personal
It operates at 5 GHZ only
It operates at 2.4 GHZ only

Question 53 (1 point)

Which two of the following are included in Android Runtime?

Question 53 options:

core libraries
Dalvik Virtual Machine
Flash memory driver
Bind IPC driver

Question 54 (1 point)

Which modes on Bluetooth devices at greater risk? (choose all that apply)

Question 54 options:


Question 55 (1 point)

Which of the following is an example of a Trojan that can be utilized for Website Defacement?

Question 55 options:


Question 56 (1 point)

Which rootkit modifies the boot sequence to load themselves instead of the original virtual machine monitor?

Question 56 options:

Library level rootkits
Hypervisor level rootkit
Boot loader level rootkit
Kernel level rootkit

Question 57 (1 point)

Central Source propagation commonly utilized what two protocols?

Question 57 options:


Question 58 (1 point)

What happens when the CAM table is full?

Question 58 options:

It does not affect the switch functioning
Additional ARP request traffic will not be forwarded to any port on the switch
Additional ARP request traffic will flood every port on the switch
The switch will stop functioning and get disconnected from network

Question 59 (1 point)

Which of the following companies offer Cloud Computing services? (choose all that apply)

Question 59 options:


Question 60 (1 point)

Which of the following evasion techniques rely on Time-to-Live (TTL) fields of a TCP/IP packet?

Question 60 options:

Denial-of-Service Attack
Insertion Attack
Unicode Evasion

Question 61 (1 point)

Which of the following conditions shows the presence of a honeypot?

Question 61 options:

Ports show a particular service running and allow a three-way handshake connection
Ports show a particular service running but deny a three-way handshake connection
Scan shows that no scanned port is live on the network
Ports do not show any particular service running

Question 62 (1 point)

What virus modifies the directory table entries so they point to the virus code instead of the actual program?

Question 62 options:

Boot Sector Viruses
Macro Viruses
Cluster Viruses
Encryption Viruses

Question 63 (1 point)

Identify the statement which is true for RC6 algorithm:

Question 63 options:

Is a 64 bit block cipher that uses a key length that can vary between 32 and 448 bits
Is a parameterized algorithm with a variable block size, key size, and a variable number

of rounds

Includes integer multiplication and the use of four 4-bit working registers
Is a variable key-size stream cipher with byte-oriented operations and is based on random


Question 64 (1 point)

ARP Spoofing involves constructing a large number of forged ARP request and reply packets to overload:

Question 64 options:


Question 65 (1 point)

Packet filtering firewall works at which of these layers of the OSI model?

Question 65 options:

Physical layer
Application layer
Session layer
Network layer

Question 66 (1 point)

All of the following are true about an SSID except which of the following?

Question 66 options:

Is Case Sensitive
Can be up to 32 characters
Is part of the frame header
Will be encrypted in WEP or WPA/WPA2 is utilized

Question 67 (1 point)

According to your text, which of the following are Cloud Deployment Models? (choose all that apply)

Question 67 options:

Community Cloud
Public Cloud
Hybrid Cloud
Private Cloud

Question 68 (1 point)

Which of the following is true about active stack fingerprinting?

Question 68 options:

Uses sniffing techniques instead of the scanning techniques
Uses password crackers to escalate system privileges
TCP connect scan
Is based on the differential implantation of the stack and the various ways an OS responds

to it

Is based on the fact that various vendors of OS implement the TCP stack differently

Question 69 (1 point)

Which of the following are characteristics of Cloud Computing services? (choose all that apply)

Question 69 options:

Distributed Storage
Virtualization Technology
Measured Services
Resource Pooling

Question 70 (1 point)

According to OWASP, the top ten mobile risks include which two of the following?

Question 70 options:

Insecure Data Storage
Client Side Injection
WEP and WPA1

Question 71 (1 point)

According to your text, examples of malware include which of the following? (choose all that apply)

Question 71 options:


Question 72 (1 point)

BlackShades Net can best be described as a:

Question 72 options:

DDoS Tool

Question 73 (1 point)

With Cross Site Scripting, attackers can inject malicious ____. (choose all that apply)

Question 73 options:


Question 74 (1 point)

With this Cloud Deployment model, the provider makes services such as applications, servers, and data storage available.

Question 74 options:

Hybrid Cloud
Community Cloud
Public Cloud
Private Cloud

Question 75 (1 point)

When an attacker is performing a denial of service and a SYN attack is initiated which of the following occurs? (choose all that apply)

Question 75 options:

Sends a large number of ACK packets to the target
Uses a fake source address
Sends a large number SYN requests to the target
Uses the actual source address

Buy your research paper Online []

Question 76 (1 point)

Which scanning technique will bypass firewall rules, logging mechanism, and hide themselves?

Question 76 options:

TCP connect scanning technique
Xmas scanning technique
Stealth scanning technique
Maintaining Access
FIN scanning technique

Question 77 (1 point)

Which of the following characteristics applies to the Simple Service Discovery Protocol (SSDP)? (choose all that apply)

Question 77 options:

Can be vulnerable to denial of service
Not work behind a firewall
Controls Communication for the Universal Plug and Play Service
Uses multicast addresses

Question 78 (1 point)

Of the following, which two are purposes of malware?

Question 78 options:

Making a Computer Useless
Obtaining Passwords
Remove the Default LAN Route
Disable Networking Functions

Question 79 (1 point)

Which of the following techniques is used to simulate an attack from someone who is unfamiliar with the system?

Question 79 options:

White box pen testing
Grey box pen testing
Maintaining Access
Announced pen testing
Black box pen testing

Question 80 (1 point)

Which version of Wired Equivalent Privacy (WEP) uses a 104-bit key size?

Question 80 options:

152 bit WEP
64 bit WEP
128 bit WEP
256 bit WEP

Question 81 (1 point)

Which of the following are Mobile Physical Based Attacks? (choose all that apply)

Question 81 options:

Carrier Loaded Software
No passcode

Question 82 (1 point)

Which of the following uses direct client to client (DCC)?

Question 82 options:

Internet Relay Chat
Internet Browser
File Sharing with Mapped Drives
Email Clients such as Outlook Express

Question 83 (1 point)

Which device in a wireless local area network determines the next network to which a packet should be forwarded?

Question 83 options:

Wireless modem
Mobile station
Wireless router

Question 84 (1 point)

Mobile Devices are replacing which of the following devices? (choose all that apply)

Question 84 options:


Question 85 (1 point)

Which of the following are some of the main functions of an Intrusion Detection System (IDS)? (choose all that apply)

Question 85 options:

Performs packet sniffing
Blocks rule-based traffic
Performs packet analysis
Gathers and analyses information from a network

Buy your research paper Online []

Question 86 (1 point)

Which of the following scans only works if the operating systems TCP/IP implementation is based on RFC 793?

Question 86 options:

Maintaining Access
IDLE scan
TCP connect scan
NULL scan
FTP bounce scan

Question 87 (1 point)

Which of the following is one of the most reliable forms of TCP scanning?

Question 87 options:

Half-open Scan
Connect Scan
Inverse TCP Flag Scan

Question 88 (1 point)

Fake Defender deleted apk files from which two of the following locations?

Question 88 options:


Question 89 (1 point)

Which of the following 802.11 standards uses Orthogonal Frequency Division Multiplexing? (choose all that apply)

Question 89 options:


Question 90 (1 point)

Passive sniffing refers to:

Question 90 options:

Sniffing through a hub
Sniffing through a switch
Sniffing through a bridge
Sniffing through a router

Question 91 (1 point)

Which of the following are methods to connect smartphones to a network? (choose all that apply)

Question 91 options:

Wired Connection

Question 92 (1 point)

Which of the following are disadvantages of signature detection? (choose all that apply)

Question 92 options:

False Alerts
Signature Detection
False Positives
Administrative Alerts

Buy your research paper Online []

Question 93 (1 point)

Which of the following protocols are susceptible to sniffing?

Question 93 options:


Question 94 (1 point)

Which of the following are SPAM? (choose all that apply)

Question 94 options:


Question 95 (1 point)

Which of the following factors contribute to a successful session hijacking attack?

Question 95 options:

Definite session expiration time
No clear text transmission
Weak session ID generation algorithm
Account lockout for invalid session IDs

Question 96 (1 point)

Which of the following ports does NTP use as its primary means of communication?

Question 96 options:

UDP port 161
UDP port 113
UDP port 320
UDP port 123

Question 97 (1 point)

Which of the following viruses evades the anti-virus software by intercepting its requests to the operating system?

Question 97 options:

Cluster virus
System or boot sector virus
Macro virus
Stealth/Tunneling virus

Question 98 (1 point)

Which of the following Wi-Fi chalking methods refers to drawing symbols in public places to advertise open Wi-Fi?

Question 98 options:


Question 99 (1 point)

According to your text, what are the 3 types of cloud services?

Question 99 options:

Platform as a Service
Infrastructure as a Service
Virtualization as a Service
Software as a Service

Question 100 (1 point)

Which of the following is transmission method of digital data that uses a pseudo random noise spreading code?

Question 100 options:


Question 101 (1 point)

Which of the following steganography techniques embeds a secret message in the frequency domain of a signal?

Question 101 options:

Transform domain techniques
Cover generation techniques
Domain distortion techniques
Spread spectrum techniques

Question 102 (1 point)

Which of the following commands can be used in a UNIX environment to enumerate the shared directories?

Question 102 options:


Question 103 (1 point)

Which of the following are Network Time Protocol (NTP) enumeration commands? (choose all that apply)

Question 103 options:

Net time

Question 104 (1 point)

The SMTP Protocol provides 3 built in commands, including which of the following?

Question 104 options:


Question 105 (1 point)

Temporal keys are changed for every ___________.

Question 105 options:

1,000 packets
5,000 packets
10,000 packets
15,000 packets

Question 106 (1 point)

The MAC Address of an access point is referred to as the ___.

Question 106 options:


Question 107 (1 point)

According to your text, components of a Cloud Broker include which of the following? (choose all that apply)

Question 107 options:

Service Arbitration
Service Negotiation
Service Intermediation
Service Aggregation

Question 108 (1 point)

Which of the following is a symptom of a DoS attack?

Question 108 options:

Decrease in the amount of spam emails received
Automatic increase in network performance
Automatic increase in network bandwidth
Unavailability of a particular website

Buy your research paper Online []

Question 109 (1 point)

Which of the following are LDAP enumeration tools? (choose all that apply)

Question 109 options:

Active Directory Explorer

Question 110 (1 point)

Identify the correct statement for a software firewall.

Question 110 options:

Software firewall is placed between the router and the networking components of the

operating system

Software firewall is placed between the desktop and the software components of the

operating system

Software firewall is placed between the normal application and the networking component

s of the operating system

Software firewall is placed between the anti-virus application and the IDS components of

the operating system

Buy your research paper Online []

Question 111 (1 point)

Which of the following is an antenna used in wireless base stations and provides a 360 degree horizontal radiation pattern?

Question 111 options:

Omnidirectional antenna
Parabolic grid antenna
Yagi antenna
Dipole antenna

Question 112 (1 point)

Signs of Intrusions include which of the following? (choose all that apply)

Question 112 options:

Strange Processes
Slow Performance
System Crashes
Missing Logs

Question 113 (1 point)

According to the text, which of the following will protect by limiting the ability to access resources?

Question 113 options:

Jail Breaking
Android Rooting
app sandboxing
Jail break detection

Buy your research paper Online []

Question 114 (1 point)

Sophos mobile security features include (choose all that apply)

Question 114 options:

Spam Protection
Loss and Theft Protection
antivirus anti-malware
Privacy Protection and security

Question 115 (1 point)

According to OWASP, which of the following should be applied to transport channels? (choose all that apply)

Question 115 options:

WPA2 with AES

Question 116 (1 point)

According to the text, characteristics of Virtualization in cloud computing technology include which of the following? (choose all that apply)

Question 116 options:

Wireless Capable

Question 117 (1 point)

What does SSL Strip do? (choose all that apply)

Question 117 options:

Remove HTTPS
Force HTTP
Exploit the Server
Exploit the Client Connection

Buy your research paper Online []

Question 118 (1 point)

Which two of the following are signs of network intrusion? (choose all that apply)

Question 118 options:

Sudden Influx of Data
File Size Modifications
Repeated Service Probes
Missing Files

Question 119 (1 point)

Which of the following below accurately describes Transmission Control Protocol? (choose all that apply)

Question 119 options:

Can terminate a connection
Provides acknowledgment
Supports Retransmission of lost Data
Connection-less oriented protocol

Question 120 (1 point)

Footprining tools will help gather the following information about a target. (choose all that apply)

Question 120 options:

IP Addresses
Host Names
Process Lists
DNS Records

Buy your research paper Online []

Question 121 (1 point)

Which of the following are types of database attacks? (choose all that apply)

Question 121 options:

HOS Command Execution
Privilege Escalation
Data Dumping
SQL Injection

Buy your research paper Online []

Question 122 (1 point)

Which of the following techniques practiced by an attacker exploits human behavior to make attacks?

Question 122 options:

Denial of Service
SQL injection
Social Engineering
Buffer overflow

Question 123 (1 point)

Identify the denial-of-service attack that is carried out using a method known as “bricking a system.”

Question 123 options:

Bandwidth Attacks
Application Level Flood Attacks
ICMP Flood Attack

Question 124 (1 point)

Which of the following enumeration techniques does an attacker use to obtain list of computers that belongs to a domain?

Question 124 options:

Netbios enumeration
SNMP enumeration
SMTP enumeration
NTP enumeration

Buy your research paper Online []

Question 125 (1 point)

Which is the best location to place keyloggers?

Question 125 options:

UPS and keyboard
Monitor and keyboard software
Keyboard hardware and the operating system
Operating system and UPS
%d bloggers like this: