Tag Archives: Computer Science

Homework help-Computer Science Project


ORDER NOW your custom paper to have it completed successfully on time.

Email Us: support@customwritings-us.com

1) You are required to configure and test a DNS server (Ubuntu Server 16.04.3 LTS). Configure a DNS server with both forward and reverse lookup. You should configure a domain name zone of itc333.edu, and a reverse name mapping zone of 192.168.15.0/24. Configure A and PTR records for: host1 – 192.168.15.10, host2 – 192.168.15.11 and host3 – 192.168.15.12. Configure a CNAME of www for host1, and a CNAME of dc1 for host2. Test the operation of your DNS server using an external client running DNS queries. [10 marks]

 

2) Create a user “assgn2′ and in their home directory create the files with the following permissions [5 marks].

  • A file called “test.txt”, with contents “This is a test file”, with read and write permissions for owner, group and other, but no execute permissions.
  • A file called “script1” that runs a simple script of your choosing, with read and execute permissions for group and other, and full read, write and execute permissions for the owner.
  • A hidden file called “.test_config”, owned by root with contents “Test config file”, that has root read, write and execute permissions only, no other permissions set.
  • A symbolic link with an absolute path to a system log file of your choosing.
  • A directory called “test_dir” with the owner having full permissions to create, rename or delete files in the directory, list files and enter the directory. Group and other having permissions to only list files and enter the directory and access files within it.

 

Submit a learning diary for this activity in which you should include:

  • Your DNS configuration, including copies of your underlying DNS server configuration files;
  • Screenshots from your client device demonstrating the operation of the DNS server;
  • What you did;
  • Describe the problems you encountered. Were you able to resolve these problems? (Y/N);
  • How much time you spent on each part of the exercise.

 

Rationale

This assessment item is design to test your

  • assess your progress towards meeting subject learning outcomes 1, 2 and 3;
  • assist you to develop your learning of the priciples covered in topics 1-6 of the subject;
  • knowledge of the details of network service technologies;
  • ability to apply problem-solving techniques;
  • ability to find credible information sources and apply them;
  • ability to write clearly and concisely; and
  • ability to correctly reference information sources.

Marking criteria

 

Part 1.

 

This part is a series of multiple choice questions. Each correct answer will score 1 mark. Marks will not be deducted for incorrect answers.

Most quizzes will involve multiple choice or true/false type questions, although quizzes may include other contents. Marks will be given based on the correctness of the answers. The Test Centre will be marking automatically and you will receive marks according to the following criteria:
HD – At least 85% answers were correct
DI – At least 75% answers were correct
CR – At least 65% answers were correct
PS – At least 50% answers were correct

 

Part 2.

Question Criteria HD DI CR PS FL
Part 2 Q1. DNS Configuration Ability to learn and use systems administration techniques

Application of technical knowledge

Referencing

Demonstrated working DNS implementation.

Application of techniques drawn from synthesis of two or more sources, presents a summary of the information and explains the facts in a logical manner with outstanding explanation and presentation.

Demonstrated working DNS implementation.

Application of techniques drawn from synthesis of two or more sources, and draws appropriate

conclusions based on understanding, with all factors identified and described.

Demonstrated working DNS implementation.

Application of techniques drawn from two or more sources, and draws conclusions based on understanding, with major factors identified and described.

Demonstrated working DNS implementation with minor errors or omissions.

Application of techniques  and conclusion drawn from facts, with major factors identified and described.

Major errors or omissions. Limited detail and understanding demonstrated
Part 2 Q2. File and Directory Permissions Ability to learn and use systems administration techniques

Application of technical knowledge

Referencing

Application of techniques drawn from synthesis of two or more sources. Configuration is accurate and execution is detailed with precise and neatly presented information. Application of techniques drawn from synthesis of two or more sources. Configuration is accurate and execution is detailed. Application of techniques drawn from sources. Configuration is accurate and execution is detailed. Configuration is accurate and execution is detailed with minor errors or omissions. Major errors or omissions. Limited detail and understanding demonstrated
Overall Assignment Referencing Use of citations and quotes

References

Broad range of references strategically used in support.

Clear acknowledge other people’s ideas.

Always conforms to stipulated style

References strategically used in support.

Clear acknowledge of other people’s ideas.

Mostly conforms to stipulated style

References used in support.

Acknowledge other people’s ideas.

Mostly conforms to stipulated style

Over use of quotations.

Sources not well integrated within answers.

Minor errors in style

Not always proper acknowledge sources

Text or quotations not clearly identified.

Major errors in style.

Inconsistent use of styles

 

 

 

Presentation

You should submit your assessment as a single word document which should contain all components of your assignment. Use screenshots to compliment your written answers and to provide evidence and detail of the work you have done.

ORDER NOW your custom paper to have it completed successfully on time.

Email Us: support@customwritings-us.com

 

Need Help-CYS 404 Information System Audit Project Description


Need Help-CYS 404 Information System Audit Project Description

Report Submission Deadline: 18th December 2016

Write a comprehensive report about ISSAI 100

Topic description:

ISSAI 100 – Fundamental Principles of Public-Sector Auditing (Basic Principles)

 

Guidelines for Report:

  1. report should contain at least 5000 words.
  2. report must have these sections:
  • abstract
  • table of contents
  • list of figures
  • introduction
  • (research material)
  • conclusion
  • bibliography
  1. report must follow IEEE template for computer society journals available at https://www.ieee.org/publications_standards/publications/authors/author_templates.html
  2. report must follow principles of scientific repot writing e.g. paraphrasing, in text citation, references etc.
  3. The structure, formatting, mechanics, documentation and references, reliable data from credible sources, technical content and theoretical explanation will be considered while evaluating the report.
  4. All the submissions will be checked at Turnitin plagiarism software and a maximum of 20% similarity is allowed.
  5. Add related figures and at least one table. write about them within the research to make it easy to read the research for “visual readers”.
  6. Font size = 12, font style = Times New Roman.
  7. Line spacing 1.5
  8. Please use the article attached and this website is helpful too: issai.org
  9. Please use only references that could be found online and try ro use new/up-to-date references.
  10. Feel free to use any number of resouces!

Need Help-CYS 404 Information System Audit Project Description

Need Help-CSC318 ASSIGNMENT


Need Help-CSC318 ASSIGNMENT

CSC318 ASSIGNMENT 1 1 COMPUTER SCIENCE AT THE UNIVERSITY OF TORONTO CSC318H1F THE DESIGN OF INTERACTIVE COMPUTATIONAL MEDIA

Assignment 1: Harness New Technology Google ATAP has been developing new technologies that allow us to interact with computational media in ways beyond the traditional interaction paradigms and closer to natural human movements and behaviours. Project Soli is one such endeavour. At the heart of this project is the development of a new interaction sensor that relies on radar technology to accurately and efficiently capture tiny and discrete hand motions. In essence, this sensor transforms the human hand into a control mechanism. The goal of this assignment is to imagine and propose a new application for this technology. This assignment is individual; pairs and teams are not allowed. Instructions: 1) Watch the videos below to learn more about Project Soli and the applications recently pursued by HCI people around the world: a. https://www.youtube.com/watch?v=0QNiZfSsPc0 b. https://www.youtube.com/watch?v=H41A_IWZwZI 2) Can you think of a creative, complex problem where this new interaction sensor may be a solution? Come up with a new application (not from either of the videos above!) that meets the following criteria for use of this sensor: a. Embedded in or involving an everyday object, such as a table, pencil, etc. b. Using tiny movements of the hand, including fingers, the wrist, etc. c. Transforming the hand into a control mechanism. 3) Outline the main task and 3-6 steps/interactions involved in completing the task. Be sure to describe the input and output at each step/for each interaction. You may use one of the following methods: a. Text description, that may be supplemented with visuals. b. Illustrations, with appropriate text descriptions. c. Animation and/or video (< 5 mins), demonstrating the task and steps. 4) Explain how your idea harnesses Project Soli’s new interaction sensor technology by referencing the criteria above. CSC318 ASSIGNMENT 1 2 Rubric: Criteria Weight Description of your idea (new application of the technology); ~½ page. 10% Description/illustration/demo of main task and steps/interactions; ~½ page. 50% Explanation of how criteria was met; ~½ page. 30% Proper formatting, conciseness, spelling, and grammar. 10% Deliverable: A single PDF file named A1-LASTNAME.pdf. 1” margins, Arial font, 12 pt, 1.5 line height. Structure as follows: § Title page with your name, UTORid, and preferred contact email. § Idea: o Description of your idea, § Main Task: o Description/illustration/demo of main task and steps/interactions, § Explanation: o Explanation of how criteria was met. If you created an animation or video, include the URL to the video (e.g., YouTube) where you would normally place a text description of the main task and steps/interactions. Due through MarkUs on: Monday Section: The Wednesday of Week 6 (Oct 19) at 11:59pm. Thursday Section: The Thursday of Week 6 (Oct 20) at 11:59pm.

Need Help-CSC318 ASSIGNMENT

Need Help-Hierarchical Network Design Assignment


Need Help-Hierarchical Network Design Assignment

Hierarchical Network Design Assignment

General Requirements

The college district is in the process of implementing an enterprise-wide network which will include Local Area Networks (LANs) at each site and a Wide Area Network (WAN) to provide data connectivity between all college sites.

Access to the Internet from any site in the college district is also an integral part of this implementation. Once the network is in place, the college district will implement a series of servers to facilitate online automation of all of the district’s administrative and many of the curricular functions.

Since this network implementation will have to continue to be functional for a minimum of 10 years, all design considerations should include a minimum of 20x (times) growth in the LAN throughput, 2x (times) growth in the WAN core throughput, and 5x (times) growth in the District Internet Connection throughput. The minimum requirement for initial implementation design will be Fast Ethernet to any host computer in the network and Gigabit Ethernet to any server host in the network.

 

 SECTION 1 – WIDE AREA NETWORK

The WAN will be based on a hierarchical model. Three (3) regional Hubs will be established at the Galway IT, Sligo IT and Letterkenny IT for the purpose of forming a fast WAN core network. College locations will be connected with
high-end, powerful routers. Access to the Internet or any other outside network connections will be provided through SligoIT with appropriate WAN links. For security purposes, no other connections will be permitted.

 

SECTION 2 – LOCAL AREA NETWORK & WIRING SCHEME

 

The LAN will include both wired and wireless connectivity.

Each Local Area Network (LAN) segment will use the appropriate Horizontal and Vertical Cabling which complies with TIA/EIA-568-A and TIA/EIA-569 standards.

Each College consists of 2000 student, 300 lecturers, 40 admin staff and 30 Network Technicians.  The LAN infrastructure will be based on Ethernet LAN switching. This will allow for a migration to faster speeds (more bandwidth) to the individual computers and between MDFs and IDFs without revamping the physical wiring scheme to accommodate future applications.

In each location a Main Distribution Facility (MDF) room will be established as the central point to which all LAN cabling will be terminated and will also be the point of presence (POP) for the Wide Area Network connection. All major electronic components for the network, such as the routers and LAN switches, will be housed in this location. In some cases an Intermediate Distribution Facility (IDF) room will be established, where horizontal cabling lengths exceed TIA/EIA-568-A recommended distances or where site conditions dictate. In such cases, the IDF will service its geographical area and the IDF will be connected directly to the MDF in a STAR or EXTENDED STAR topology.

Each room requiring connection to network will be able to support 24 workstations and be supplied with four (4) CAT 5 UTP runs for data, with one run terminated at the teacher’s workstation. These cable runs will be terminated in the closest MDF or IDF. All CAT 5 UTP cable run will be tested end-to-end for 100 Mbps bandwidth capacity. It will consist of a lockable cabinet containing all cable terminations and electronic components; i.e. data hubs and switches. From this location data services will be distribute within the room via decorative wire molding.

Wireless access should be secure allowing appropriate personnel to obtain connectivity with internet access.

SECTION 3 – DISTRICT SUPPLIED SERVERS AND FUNCTIONS

 

All file servers will be categorized as Enterprise or Workgroup type services, and then placed on the network topology according to function and anticipated traffic patterns of users.  You should select the appropriate files servers for the organisation along with the reasons for your selection.

SECTION 4 – ADDRESSING AND NETWORK MANAGEMENT

 

A complete TCP/IP addressing and naming convention scheme for all hosts, servers, and network interconnection devices will be developed and administered by the District Office. The implementation of unauthorized addresses will be prohibited. The District Addressing Scheme can be implemented in a number of ways. Ideas you should consider are Class A, B, and C Addresses with appropriate subnetting, Network Address Translation (NAT), and Private Network Numbers.

All computers located on the administrative networks will have static addresses, curriculum computers will obtain addresses by utilizing an appropriate server. Each site should use only addresses consistent with the overall District Addressing Scheme. A master network management host will be established at the Sligo IT college and will have total management rights over all devices in the network. This host will also serve as the router configuration host and maintain the current configurations of all routers in the network. Each region location will house a regional network management host to support its area. The management scheme for the data portion of the network will be based on the Simple Network Management Protocol (SNMP) standards. All routers will be pointed to the master Network Management host for the purpose of downloading new or existing configurations. The Sligo IT college will maintain the super user passwords for all network devices and configuration changes on these devices will be authorized from the District Office: i.e., Routers and LAN Switches.

 

 

SECTION 5 – SECURITY

External Threats – Internet Connectivity shall utilize a double firewall implementation with all Internet-exposed applications residing on a public backbone network. In this implementation all connections initiated from the Internet into the schools private network will be refused. Appropriate internal security should also be empolyed.

 

College Floor Plans

 

Each college floor plan is identical.   Make up your own plan based on the following.  Each college has 2 buildings 400 meters apart.

Building 1

2 floors

150 meters long

Each floor has 30 lecture theatres

POP is on floor 1

Building 2

1 floor

50 meters long

20 lecture theatres

Your task Plans

Your team of 4 students have been employed by the College district to design a network that suits their needs.  Internal employees will implement the design, there fore it must be documented efficiently.  Here are some examples (not all) of what is required.

Use appropriate hierarchical design including LAN design, WAN design, cut sheets, MDF and IDF layouts, Server and workstation details, User policies, Data recovery methods, Addressing, VLANs, Servers, Maps, Redundancy, Backup procedures, Security procedures, routing protocols, Internet connectivity, wireless etc…

Marks              15% of Continuous Assessment

Due                 Friday 14th of October

Warning           10% deduction per day late

 

 

LAN Design Steps Study Guide

 

First step in LAN design is to establish and document the goals of the design

 

Requirements of network design:

  1. Functionality – provide user-to-user and user-to-application connectivity with speed and reliability
  2. scalability – ability for network to grow without major changes to overall design
  3. adaptability – design can adapt and implement new technologies as they become available
  4. manageability – easy network monitoring and management to ensure on-going stability

 

Critical components of LAN design:

  1. function and placement of servers – should use 100 Mbps or more
    1. servers provide file-sharing, printing, communication, and application services
    2. servers run specialized operating systems (netware, windows NT, UNIX, LINUX)
    3. categorized into 2 classes
  1. enterprise servers – supports all the users on network by offering services (e-mail, DNS); should be placed in MDF
  2. workgroup servers – supports specific set of users, offering services such as word processing and file sharing; should be placed in IDF
  1. select correct devices to decrease collisions
    1. media contention – excessive collisions caused by too many devices
  2. segmentation – splitting a single collision domain into two or more collision domains
    1. use bridges or switches creates more bandwidth availability
    2. bridges and switches forward broadcasts not collisions
    3. bridges and switches broadcast = FF-FF-FF-FF-FF
  3. bandwidth vs broadcast domains
    1. bandwidth domain is everything associated with one port on a bridge or switch also known as a collision domain
    2. all workstations compete for the same LAN bandwidth resource

 

1st step in designing a network is to:

  • gather data about the organizational structure
    • history
    • current status
    • projected growth
    • operating policies and management procedures
    • office systems and procedures
    • viewpoints of employees
  • analyze requirements
    • availability – measures the usefulness of the network
      • throughput
      • response time
      • access to resources
    • determine network traffic load
    • cost

 

2nd step in designing a network is to develop LAN topology (star/extended star)

  1. Layer 1 – physical cabling
    1. Type of cable (cat 5 for horizontal runs, fiber for backbone and risers)
    2. Distance limitations
  1. 100 meters for cat 5
    1. 3 meters – computer to telecommunication outlet/wall plate
    2. 90 meters – wall to horizontal cross connect (patch panel)
    3. 6 meters – HCC to switch
  2. 2000 meters for fiber
    1. make a logical topology diagram
  1. location of MDF and IDF
  2. type and quantity of cabling
  • detail documentation of all cable runs
  1. Layer 2 – devices to use to provide flow control, error detection, error correction, and reduce congestion
    1. Bridges
    2. Switches
  1. Can microsegment
  2. Eliminates collisions
  • Reduces size of collision domains
  1. Can allocate bandwidth on a per-port basis
    1. Asymmetric switching – allows more bandwidth to vertical babbling, uplinks, and servers.  Provides switched connections between ports of unlike bandwidth
  1. Layer 3 – use routers which:
    1. Allows communication between segments based on layer 3 addressing
    2. Allows connectivity to WANS
    3. Stops broadcasts from reaching other LAN segments
    4. Provides scalability
    5. Adds structure to layer 3 addresses
    6. Filters data-link broadcasts and multicasts

 

3rd step in designing a network is to create logical and physical network maps – document, by site and network within the site, the IP addressing scheme

 

 

 

 

 

Components of network documentation – least performed task in a network

  1. Cut sheet diagrams
    1. Diagrams that indicate the path of the physical wiring layout
    2. Type of cable
    3. Length of each cable
    4. Type of termination for each cable
    5. Physical location of each wall plate or patch panel
    6. A labeling scheme for easy identification of each wire
  2. MDF & IDF layouts – contains a physical and logical layout
    1. Rack mounts
    2. Auxiliary equipment
    3. Servers
    4. Patch panels
  3. server and workstation configuration details – fill out about each host attached to the network
    1. make and model of computer
    2. serial number
    3. floppy drives
    4. hard drives
    5. DVD/CD-Rom drives
    6. Sound and network cards
    7. Amount of RAM
    8. Physical location, user, and network ID
    9. Purchase date and warranty information
  4. software listings – of standard and special software
    1. operating system software
    2. application software
  5. maintenance records – all repairs to all equipment included in the network
  6. security measures
    1. soft security – user rights, password definition, firewall support
    2. physical security – how MDF and IDF’s are locked, who has access, how hosts are protected
  7. user policies – how users can interact with the network and consequences

 

Security policies

  • minimum password length
  • maximum password age
  • unique passwords
  • times of logon
  • don’t use family or pet names for passwords
  • screensaver password protected

 

Data recovery methods – protecting data from loss

  • Tape backup – duplicating all stored data to magnetic tape.  Works with a flag or switch. Uses an archive bit which only backs up what has been changes
    • pros – low cost
    • cons – stores data sequentially; drains system resources (bandwidth, processor power)
  • Fault tolerant disk configurations
  • Use of uninterrupted power supplies (UPS)

 

5 types of backup operations:

  1. full backup – all files on the disk are stored on tape and the archive bit for all files is set to off
  2. incremental backup – backup all files that have been created or modified since full backup; only work in conjunction with a full backup
  3. differential backup – backup all files like incremental backup but the difference is that even though the file is saved to tape, the archive bit is not reset, so each time differential backup is done, all files modified or created since the last full backup will be stored again
  4. copy backup – backup user selected files to tape; does not reset archive bit to off
  5. daily backup – backup only the files that are modified on the day of the backup; doesn’t reset archive bit to off

 

Fault tolerant storage devices – a redundant set of devices categorized by RAID (Redundant Array of Inexpensive Disks) levels 0 – 5

 

RAID types:

  1. RAID 0 – stripes data across multiple disks, no parity, no redundancy.  Used for speed
  2. RAID 1 – disk mirroring writes data to two identical partitions on separate hard disks thus creating an automatic backup.  Provides full redundancy but requires twice as much storage space
  3. RAID 2 – writes data across multiple hard disks, with error checking.  No longer used
  4. RAID 3 – stripes data one byte at a time and has a dedicated parity drive.  Very expensive
  5. RAID 4 – stripes data one sector at a time and has dedicated parity drive. Expensive and slow
  6. RAID 5 – stripes data and parity across multiple disks (at least 3).  A separate parity disk is not required abut full data redundancy is achieved.  On NT system, the boot and system partitions cannot be located on a RAID 5 disk array.  Very fast; need at least 5 disks for full redundancy

 

The three RAID levels that are supported by most operating systems are RAID 0, RAID 1, and RAID 5

 

Volume – a physical unit of storage

 

Environmental factors that can affect a network:

  1. Static
    1. caused by lack of humidity
    2. make sure all equipment is off
    3. make sure you ground yourself before starting to install equipment
  2. Dust and dirt
  3. Heat
  4. Power conditioning – preventing electrical irregularities
    1. Isolating transformer – controls voltage spikes and high frequency noise
    2. Regulators – maintains a constant output voltage.  Handles brownouts and surges
    3. Line conditioner – a regulator with an isolating transformer built in
    4. Uninterruptible power supply – battery charger that charges a batter, that in turn powers the computer
  5. EMI and RFI
    1. EMI includes power supplies and monitors, florescent lights, large electric motors, electrical wiring
    2. RFI (Radio Frequency Interface) picked up by other equipment or improper shielded cables
  6. Software Viruses
    1. Worm – propagates itself across computers, usually by creating copies of itself in each computer’s memory
    2. Virus – “infects” computer files (usually exe files) by inserting in those files copies of itself
    3. Trojan Horse – disguised as a game, a utility, or an application

 

Network performance – a measure of a networks quickness and reliability

  • Measured by a baseline – performance level established after the network has been installed and configured properly. Use a fluke LAN meter for a baseline
  • Baselines should be periodically updated

 

Two types of networks

  1. Peer-to-peer (workgroup network) – designed for small numbers of workstations (<10)
    1. Advantages
  1. Cheaper to create and operate
  2. Users control own resources
  • Doesn’t require a dedicated server
  1. No additional software required
    1. Disadvantages
  1. No central point of management
  2. If user changes password, all passwords on shared resources must be changed individually
  • If a shared computer is turned off, those resources aren’t available
  1. No room for growth
    1. Examples
  1. Windows for workgroups
  2. Windows 95
  • Windows 98
  1. LANtastic
  1. Client-Server – network operating systems
    1. Advantages
  1. Provide centralized point of user, security, and resource management
  2. Provide access to resources with one ID and password
    1. Disadvantages
  1. Single point of failure
  2. Requires specially trained personnel to maintain
  • Takes special network software and hardware

 

Client-Server operating systems:

  • UNIX
    • Kernel based
    • Uses NFS
  • Novell Netware (versions 3.12, 4.11, 5.0)
  • Windows NT

 

Main function of network operating system is to control the network by establishing:

  • Network user
  • Rights
  • Login accounts
  • Passwords
  • Groups
  • System profiles and policies

 

Troubleshooting a network

  1. identify network/user problem
  2. gather data about problem
  3. analyze data to come up with a possible solution
  4. implement solution
  5. if problem isn’t solved, undo change and modify data
  6. go to step 3

Need Help-Hierarchical Network Design Assignment

 

Homework Help-ITM 1270-Mashaw


ORDER NOW your custom paper to have it completed successfully on time.

Email Us: support@customwritings-us.com

Homework Help-ITM  1270-Mashaw

ITM  1270-Mashaw              Take Home 2, 10 points (no Cooperation)          Name:

The material for this TH is coming from Ch 1, 2 of the Computers;  Ch 3 of the Simplified, and Chapters 3, 4, 5 of the Office. [The criteria for grading this homework is 1) Completeness, 1) Professionally prepared work, 3) Diligent and enthuse work, and 4) The accuracy in your answer. Make sure to indent each answer to identify it.]

Part I  Discuss, explain
  1. Discuss briefly, explain (Prefer your own words, use your own understanding. This is also a test to see how effectively you can use your word processor.)
  2. Search and read about events in computer evolution; summarize at least 5 important events (according to your opinion.)
The Year The event Explanation of the event Why it was important

 

  1. How does a computer do the processing (process data/information)?

1)

 

2)

 

3)

 

  1. What are the differences between a USB, and a Serial Port

 

1)

 

2)

 

3)

 

  1. Per instructions in the Lab, insert a table with 4 columns to compare computers performances. In the first column, write the performance criteria, in the second column write the information about your computer (the processor’s Architect/model, Speed, RAM size, hard disk capacity, …), and in the third and fourth column write information for two computers that you find for purchase.

 

 

 

 

 

 

 

 

 

 

Part II  Hands on   (print enough documents to show your work)

A.  The Computer:  Do the following exercises.  Make a note of how you can do it, or how you did it.
  1. What is the file extension for Word 2003 document? What is the file type for following extensions, what is the default program? (hint: check in :  control Panel -> default program)
txt Rtf mpeg
doc Tiff avi
docx bmp Mp4
pdf jpeg Mp3

 

  1. What kind of Hardware does your computer have? List a few. (Hint: Control Panel ->System->Device Mgr)

 

 

 

 

 

  1. Use Notepad, type a line, count the number of characters typed, save (with the extension of txt), and close.

What name did you use?                           What extension?          How many characters did you type?

 

Check its property, write the amount of storage used:

 

 

  1. Use the snipping tool, cut a piece of picture, and paste it here. Change some of its properties.

 

 

  1. MS Word,
  2. Create a new Document, include some text (1 page is good enough), and do/practice the following. Show how you do each. Print your  practice work to support your efforts. (Practice doing the following, and explain the menus, and submenus that you are using, use notations.  Print a sample of your work)
  3. Change/add the font Color of a sentence

 

 

  1. Insert a family picture,

 

 

  1. Change the property of the picture to be “tight” (to float the picture) and the line color to be red, with a width of 6 points,

 

 

  1. Format the picture: change brightness, contrast, style, crop it, recolor it, Rotate & Flip, etc.

 

 

  1. Insert a smartArt Obj.

 

 

  1. Change the margins of only one paragraph (hint: indent a paragraph, note the hanging indent marker, Left and Right indent marker)

 

 

  1. Insert a formula such as β → £ . ã

 

 

  1. Insert a picture on page 2, set its Orientation to Landscape.

 

 

  1. Insert a Happy face (from shapes), change line color to be red, with a width of 6 points

 

 

  1. Insert a picture and format; change brightness, contrast, and style; crop it to a smaller size

 

  1. a. Insert a header to this document, your name should appear on the right
  2. Insert a footer to this document, the footer should show “Take Home # ” , and then the page #

 

 

  1. Type a slang, an expression on a line, copy and paste it at least 10  times; change the font and font size (both) for each line. At the end of each line identify the font and size. For example:

Learn by Exploring;   this is Bdoni  MT  , 14 pts

 

Learn by Exploring;   this is Arial rounded Black, 16 pts

 

 

 

Part III Applications, challenging task, write a book
  1. Prepare a flyer for selling something(or for a garage sale)
  2. Set the margin to .75″ all around
  3. Set the orientation to landscape
  4. put an “art” boarder around the page

 

Your flyer should be designed attractively; include a text box, clip arts, and shapes.   Make sure to set the property of an object so that you can move it around.

 

2.  Write your first book to teach MS word, call it something like:  “Manual of Instructions for MS Word”

 

Write a short “Manual of Instruction” for your friend so that he/she can learn whatever you have learned about MS-Word.   You may call it “A Quick Guide of How to Use Word” (you can change the title if you want.)  You need to be creative. In this instructional manual that you are writing, give instructions and examples of how to use MS-Word to a friend-student who needs to take a test for this purpose. You may say something like:  In order to do that, do: 1.  do . .. ,  2 do … etc.

 

You should use the majority of skills that you have learned so far, like save/save as,  copy/paste,  doing bullets and numbering, inserting a date, a symbol, a picture  in a document, etc. (This would be a good summary for yourself. )

It is a good idea to use the snipping tool, cut and paste a piece of the menus of the Word, and refer to it.

Your Manual should be professionally prepared (at least 5 pages),  with

  1. Cover page,
  2. Table of content,
  3. The content which should have Major headings, and sub headings, etc.

Homework Help-ITM  1270-Mashaw

ORDER NOW your custom paper to have it completed successfully on time.

Email Us: support@customwritings-us.com

SEC 4320 – Unit 4 Assessment


Buy Research paper about this assignment here (Email us: writersestate@gmail.com)

SEC 4320 – Unit 4 Assessment

Question 1

What will you review within the System/Applications Domain as part of your security assessment?

(Your response should be at least 200 words in length. You are required to use at least your textbook as source material for your response. All sources used, including the textbook, must be referenced; paraphrased and quoted material must have accompanying citations.)

 

 

 

Input Answer for question 1 here

 

 

 

Question 2

What will you review and assess in the User Domain as part of this security assessment?

 (Your response should be at least 200 words in length. You are required to use at least your textbook as source material for your response. All sources used, including the textbook, must be referenced; paraphrased and quoted material must have accompanying citations.)

 

Input Answer for question 2 here

 

Please follow the instructions that I provided on the attached documents to complete the order and avoid any revisions     (See attachment for more information)

 

  • No textbook used for this course. Various articles, Power points, and documents will be used instead
  • Answer questions in the same order as the outline provided on the attachment. Treat them as mini essays. If there are 4 questions I need 4 separate answers.
  • Unless otherwise indicated, there is a 200 word minimum response required per question. (The other document will have actual word requirement per question)
  • All sources used, must be referenced; paraphrased and quoted material must have accompanying citations.
  • NOT REQUIRED: title page, margins, header, double spacing, and hanging indentation, introduction and conclusion

 

Buy Research paper about this assignment here (Email us: writersestate@gmail.com)

Project Plan Inception


Project Plan Inception
Due Week 2

This assignment consists of two (2) sections: a project introduction and a project plan. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for. Additionally, you may create and / or assume all necessary assumptions needed for the completion of this assignment.

You are a newly appointed Chief Information Officer (CIO) of a $25 million dollar data collection and analysis company that has been operating less than two (2) years. It is expected to grow by 60% over the next eighteen (18) months. Your company currently collects data using Web analytics and combines it with operational systems data. Web analytics is an increasingly important part of most business marketing plans. Your company is looking for ways to leverage the collected data but wants to ensure that the information technology infrastructure will support the expected growth that the company is anticipating. The Chief Executive Officer (CEO) has given you sixty (60) days to deliver a comprehensive information systems project plan to address the organizational growth that the company is experiencing. The company will be expanding from one (1) floor to three (3) floors within six (6) months. Since this is a relatively new company, there is currently limited technology infrastructure to support the business. All information technology (hardware and software) must be redesigned to meet organizational needs. The solution should be implemented in either a hosted solution, on-site solution, or a hybrid model. The CEO is expecting you to integrate different technologies from different partners and incorporate industry best practices and cost-effective solutions in connection with the development of technological systems. In addition, the CEO is extremely interested in cloud computing technologies and Software-as-a-Service (SaaS) but is leery of security issues that may be associated. However, he is sure that you will implement proper security protocols. The company currently consists of twenty (20) employees of which four (4), including yourself, are dedicated to the IT organization.

Section 1: Project Introduction
Write a four to six 3 page project introduction that documents the current state of the organization, expands upon the information given above, and includes the following:
Background information of the company.
Details regarding the type of business that the company is engaged in.
A description of current outsourcing and offshoring activities.
Identification of current skilled information systems personnel in position and responsibilities.
The specific types of data that the company collects.
A description of the information systems that the company currently has to support the business. The description at a minimum should include the following:
Operational Systems and Databases
Analytics and Interfaces
Infrastructure and Security
The use of at least two (2) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
Section 2: Project Plan

Use Microsoft Project to:
Create a project plan (summary and detailed) using Microsoft Office Project. The project plan should:
Record all tasks, subtasks, resources, and time related to the project.
Outline the planning, analysis, design, and implementation phases.
Develop in accordance with the systems development life cycle (SDLC).

Custom Essay writers


ABOUT US

Where are we Based?

We are an academic assistance agency based in the US and open to the Global market.

How long have we been in the Market?

Our agency is a high quality writing service provider, whose establishment dates back to 2012. Our team is committed to providing all-time customized papers with exceptional authenticity to our customers from across the USA, Canada, Australia, UK and all other parts of the World.

  • USA
  • UK
  • AUSTRALIA
  • CANADA
  • OTHERS

 Our Support Team

Our teams who work in the Support department are highly-trained to answer to inquiries professionally and in a friendly way. The team is available 24/7.

Quote for Order

Simply fill your order details at Order Now  and notify us through our email writersestate@gmail.com. Make Payment through either Paypal or Skrill /Moneybookers (writersestate@gmail.com). Within the first 15 minutes, you will receive a notification through email, confirming we received the order and the payment. The most suitable writer who has done your discipline will be assigned to complete the order. We offer premium services to all our clients upon request.

As well you can make free inquiries on ‘How much to pay for your Order’ through our email; writersestate@gmail.com.  Our Support will guide you accordingly.

WHY CHOOSE US?

Best Quality

  • Highly trained content writers and editors
  • Highest Quality control
  • 6 Six years writing experience

Convenience

  • Consistent communication
  • Customer Support is 24/7
  • Simple process of placing your Order

Affordable Services

  • Prices start at $8 per page
  • Average prices
  • Discount plan for Returning Customers

Zero Plagiarism

Our services are exceptional, free of plagiarism.

Our Values

Confidentiality

We guarantee all our clients confidential deals. We do not share your details either by disclosing private details to any institution, person or reusing any custom essay papers in the online platforms.

Authenticity

Order for ready custom sample papers, research papers, essays, term papers, dissertations, theses, Research projects book/movie reviews, reports, speeches, technical papers and other assignments.

Our Services

Essay draft: We create sample paper useful as reference.

Editing: Polishing a written paper through necessary amendments.

Research: We assist our customers to find reliable sources to your subject.

Formatting: We format your paper using citation styles such as APA, MLA, Harvard, Chicago and/orTurabian.

Articles: We write articles of different subjects.

Blogs: Appealing blogs and social media pages are necessary for your online sites. We write such blogs.

Web Content: We create website content of any audience.

Email Campaigns: We offer assistance in email marketing campaigns.

Landing Pages: Our writers are able to write texts for the landing pages; able to attract visitors.

Creation of Newsletters and News: We create newsletters to our clients depending on requirements provided.

Press Releases: We also write enticing news articles, corporate brochures and Presentations.

Proofreading and Editing: We offer proofreading and editing services on Books and ebooks of all genres, Academic papers (Research papers and Dissertations) at cheaper prices.

 

 

Professional Skills for Information Systems


Assignment 3: Professional Skills for Information Systems
Case Study Report

ORDER NOW your custom paper to h ve it completed successfully on time.

Check Our Guarantees here

Applicable course objective:

  • apply ethical research and inquiry skills and demonstrate an understanding of the social impact of information technology and the need for security, privacy and ethical implications in information systems usage;
  • demonstrate problem-solving skills by identifying and resolving issues relating to information systems and their components, and proficiently utilise different types of information systems software (especially gaining proficiency in utilising databases, spreadsheets, and presentation applications).
  • apply academic and professional literacy skills and demonstrate an understanding of the importance of and differences between information and computer literacy; the basic types of software including system software (operating systems and utilities) and applications software (proprietary, off-the-shelf software applications and cloud computing); the basic hardware components of a computer system, including system unit, storage, input and output devices and the way that they interact to form a single computing system; understanding computer-based telecommunications and networking concepts; the basic concepts surrounding databases, database management systems and understanding the need for information management; the concepts surrounding the Internet, e-commerce/e-business and supply chain activities, and business intelligence, knowledge management and other business information system tools (TPSs, ERPs, MISs, DSSs etc) widely used in organisations today; and the processes involved in information system project management;
  • apply written communication skills by understanding basic information, communication and technology (ICT) terminology for effective communication and applying it within a business environment.

Referencing Requirements

References are required and the Harvard AGPS standard of referencing must be used. This standard is detailed on USQ Library Site <http://www.usq.edu.au/library/referencing>.

Plagiarism, collusion and cheating will be severely penalised. Refer to the USQ Policy Library for more details:

Ensure that your reports are fully referenced, including any reference to the text book. Your report should include in-text references and a List of References.

Do not repeat verbatim large slabs of information from other sources such as the text – you must put the ideas/information in your own words.

You must use at least ten (10) academically sound sources other than the textbook in completing this report.

 

Preamble

Dr Dorothy “Dodo” Little was extremely impressed with our computing firm’s – Kinkajou Technologies – development of the All Creatures Great and Small’s Database Management System (DBMS) utilising Microsoft Access 2007/2010/2013 (Assignment 1) and Decision Support System (DSS) utilising Microsoft Excel 2007/2010/2013 (Assignment 2).

Dr Dorothy “Dodo” Little realises that the business has a lot to learn and that the business will need to invest considerable money to bring the business into the modern online business world, from their current single computer mail order set-up. Dr Dorothy “Dodo” Little has contracted our firm to advise the business on how they can grow their mail order business into a cutting-edge online presence. The business has asked us to develop a report to provide them with information about the following topics that they see as key to their business’ growth:

  1. How can the business move from mail order to being an online presence?

(Use Baltzan et al Chapters 2 & 3 – A Brave New Connected World / E-Business & Mobile Business to assist you in answering this topic)

  1. What type of hardware and software, including networking infrastructure, should the business acquire to expand their capabilities to meet their new e-business initiative?

(Use Baltzan Chapter 5 – Technical Fundamentals to assist you in answering this topic)

  1. What would be the benefits to the business of using business intelligence?

(Use Baltzan et al Chapter 8 Section 2 – Business Intelligence)

  1. What would be the benefits to the business of implementing a collaboration system?

(Use Baltzan et al Chapter 10 Section 2 –Enterprise Information Systems: Collaboration Systems to assist you in answering this topic)

  1. What issues should the business be aware of when embarking on a social media presence?

(Use Baltzan et al Chapter 11 Section 2 – Social Media to assist you in answering this topic)

All phases in this project must be developed with professionalism and user-friendliness in mind.

karledwards.com/poster-gallery/, Karl Edwards Studios.

Mrs Hyacinth Macaw, your manager, has set up the following tasks for you to complete this project:

Refer to the marking criteria for details of mark allocations.

Task 1: Journal (maximum 500 words)                                                 10%

Prepare a journal that records your activities and progress related to completing this assignment. In date order, clearly list the following:

  • Date of research activity/discussion
  • Full description of research activity / discussion (at least 25 words)
  • Web sites visited to collect information; other references accessed (using Harvard AGPS Referencing style – submitted separate to the List of References in Task 2).
  • Time duration of the activity

If you are working in a team, clearly state the activities of each team member.

ORDER NOW your custom paper to have it completed successfully on time.

Check Our Guarantees here

Submit this journal as an appendix to Task 2. Any references to web pages and online documents, such as white papers, should be listed at the end of the journal.

Task 2: Case study ( 4,500 -5500 words)                                             90%

Report Structure and Presentation                                                                                5%

Your report should include a professional title page, computer generated Table of Contents (including List of Tables and List of Figures) and Appendices.

Note: Make sure to state the names of all students involved in the report on the title page.

Report Letter of Transmittal, Executive Summary and Introduction                          5%

Your report should include a letter of transmittal, executive summary, and introduction to the report.

Report Section 1 – E-Business and Mobile Business (1000-1500)                               10%

How can the business move from mail order to being an online presence?

  1. What are the benefits and challenges that the business should be aware of before becoming an e-business?
  2. What are the characteristics of Web / Business 2.0? How should the business address these characteristics when setting themselves up as an e-business?
  3. Which type(s) of e-business model(s) should the business be considering implementing? Why?
  4. What type of e-commerce tools should the business consider utilising to connect and communicate with their customers? Why?
  5. What tools should the business use to measure their e-business success?
  6. Should the business also consider implementing m-business? What are the benefits and challenges Dr Dorothy “Dodo” Little will need to be aware of?

(Use Baltzan et al Chapters 7 & 3 – A Brave New Connected World / E-Business & Mobile Business to assist you in answering this topic)(( refer sample))

Report Section 2 – Hardware, Software and Networking Infrastructure (1000-1500) 10%

What type of hardware and software, including networking infrastructure, should the business acquire to expand their capabilities to meet their new e-business initiative?

  1. Develop a computer hardware proposal (including printer(s)) to allow the business to provide up to twenty (20) staff with computer access, including current Australian prices for the equipment[1]. Justify why this hardware is necessary for the business.
  2. Develop a computer software proposal, including both system and application software, to support the proposed computer hardware proposal, including Australian prices for the software[2]. Justify why this software is necessary for the business.
  3. Develop a networking and communications proposal, including a suggested network architecture, topology and communication medium to support the proposed computer hardware and software proposal[3]. Justify why this networking infrastructure has been chosen for the business.
  4. Include a diagram of the proposed hardware and network infrastructure to help Dr Dorothy “Dodo” Little visualise what you are recommending.

(Use Baltzan Chapter 7 – Technical Fundamentals to assist you in answering this topic)(( refer sample)) APPENDIX A

Report Section 3 – Business Intelligence (800-1500)                                                   10%

What would be the benefits to the business of using business intelligence?

  1. How could the business use business intelligence? Outline for Dr Dorothy “Dodo” Little how business intelligence can assist the business decision making.
  2. How could the business use data mining to gain competitive advantage? What type of data mining would best suit the current businesses analysis needs? Why?
  3. What type of business intelligence tools would best suit the businesses current needs? Why?

 (Use Baltzan et al Chapter 6 – Business Intelligence)

Report Section 4 – Collaboration Systems (800-1500)                                               10%

What would be the benefits to the business of implementing a collaboration system?

  1. How could the business benefit from using a collaboration system with its external partners? Outline how the business could implement such a collaborative system from both the structured and unstructured collaboration categories.
  2. How could the business benefit from using a knowledge management system? What are the types of explicit knowledge assets that could be easily managed with such a system? Why?
  3. How could the business benefit from the use of a content management system? What type of content management system would be of most value to the business? Why?

(Use Baltzan et al Chapter 10 Section 2 –Enterprise Information Systems: Collaboration Systems to assist you in answering this topic)

ORDER NOW your custom paper to have it completed successfully on time.

Check Our Guarantees here

 

Report Section 5 – Social Media(800-1500)                                                                10%

What issues should the business be aware of when embarking on a social media presence?

  1. Outline to Dr Dorothy “Dodo” Little why the business should also be considering using Social Media as an avenue for communicating with their customers and promoting their brand.
  2. Review and critique, including providing screen captures, the social media presences of three (3) other businesses that sell similar products to Dr Dorothy “Dodo” Little’s.
  3. How should the business manage their social media presence?
    • Develop a draft Social Media Policy for the business that they can implement if they were to embark on a social media strategy.

 (Use Baltzan et al Chapter 11 Section 2 – Social Media to assist you in answering this topic)

Report: Conclusions and Recommendations to the Business (500-800)                     10%

Your report should include separate conclusions and recommendations sections.

  1. Conclusions provide a summary of your key findings from the body of the report.
  2. Recommendations provide a summary of the recommendations to the business based on the research conducted in the report.

Report: Referencing and Appropriateness of Sources                                                20%

References are required and the Harvard AGPS standard of referencing must be used. This standard is detailed on USQ Library Site <http://www.usq.edu.au/library/referencing>.

 

Ensure that your reports are fully referenced, including any reference to the text book. Your report should include in-text references and a List of References.

Do not repeat verbatim large slabs of information from other sources such as the text – you must put the ideas/information in your own words.

You must use at least ten (10) academically sound sources other than the textbook in completing this report.

[1] This may be achieved by using a Cloud Solution.

[2] This may be achieved by using a Cloud Solution.

[3] This may be achieved by using a Cloud Solution.

STRUCTURE OF THE PAPER

Letter of Transmittal
Executive Summary
Introduction
Report Section 1 – E-Business and Mobile Business (( 6 qutions ))
Report Section 2 – Hardware, Software and Networking Infrastructure (( 4 qutions ))
Report Section 3 – Business Intelligence (( 3 qutions ))
Report Section 4 – Collaboration Systems(( 3 qutions ))
Report Section 5 – Social Media(( 3 qutions ))
Conclusions to the Business
Recommendations to the Business
Referencing
journal

ORDER NOW your custom paper to have it completed successfully on time.

Check Our Guarantees here

Engineering Problems 1-4


Problem 1

Use the random function and a rounding function described in this chapter to simulate the rolling of a die ten times. The function should produce a vector of ten values corresponding to ten die rolls. The die should have a range of [1 , 6]. Do the following operations on the vector with the die results. a. Compute the mean. b. Compute the median. c. Compute the standard deviation. d. Sort the vector values in ascending order. Note: The outcome of each operation will vary each time the random function is executed.

Problem 2

In MATLAB, use the built in complex function to generate a vector of complex numbers ranging from 0 + 0𝑖𝑖 to 10 + 10𝑖𝑖 with increments of 1.

Problem 3

Using the following complex number, 𝑍𝑍 = 3 + 5𝑖𝑖, use MATLAB to do the following operations: a. Compute the absolute value. b. Compute the angle. c. Obtain the real part. d. Obtain the imaginary part. e. Obtain the conjugate.

Problem 4

The Euler formula establishes a relationship between complex exponentials and trigonometric functions. It is defined as the following: 𝑒𝑒𝑖𝑖𝑖𝑖 = cos(𝜃𝜃) + 𝑖𝑖sin(𝜃𝜃) Where 𝑖𝑖 represents the imaginary number √−1 𝜃𝜃 represents an angle in radians. A modified version of this equation is used in electrical engineering to aid in the analysis of periodic signals like a cosine wave: 𝑒𝑒𝑗𝑗(2𝜋𝜋𝑓𝑓𝑜𝑜𝑡𝑡+𝜃𝜃) = cos(2𝜋𝜋𝑓𝑓𝑜𝑜𝑡𝑡 + 𝜃𝜃) + 𝑗𝑗sin(2𝜋𝜋𝑓𝑓𝑜𝑜𝑡𝑡 + 𝜃𝜃) Where 𝑗𝑗 is the same as 𝑖𝑖 (electrical engineers use 𝑖𝑖 for current and instead use 𝑗𝑗 to represent complex values) 𝑓𝑓𝑜𝑜 is the frequency of the wave in Hertz. 𝜃𝜃 is called the phase angle in radians (For this problem assume 𝜃𝜃 = 0) 𝑡𝑡 is time in seconds Create a vector 𝒕𝒕⃗ of time values ranging from [0, 2] with an increment of . 01 for the vector. Let the frequency of the wave be 𝑓𝑓𝑜𝑜 = 1. Use the exponential function in MATLAB to obtain a vector of complex values. In MATLAB, you can use 1𝑖𝑖 to create 𝑗𝑗 inside the exponential function. Your function should look like this: 𝒗𝒗�⃗ = 𝑒𝑒1𝑖𝑖2𝜋𝜋𝑓𝑓𝑜𝑜𝑡𝑡 Once you have the vectors 𝒗𝒗��⃗ and 𝒕𝒕⃗. Use the built in ‘real’ function in MATLAB to obtain only the real values of 𝒗𝒗��⃗. Finally, put the following in your code to see the plot of this function: 𝑝𝑝𝑝𝑝𝑝𝑝𝑝𝑝(𝑡𝑡⃗, 𝑟𝑟𝑟𝑟𝑟𝑟𝑟𝑟(𝒗𝒗��⃗))

%d bloggers like this: