Peer-to-Peer and Client-Server Environments (graded)
What kind of network does your current or former workplace have: peer to peer or client-server? What problems does it have? What are some ideas to improve it? If you don’t know which, explain what you think would have worked best and describe the circumstances.
Faster Computing was impressed with your presentation. The company.pdframizmemonahmedabado1
Faster Computing was impressed with your presentation. The company is interested in moving
forward with the project, but the senior management team has responded to the presentation with
the following questions and concerns:
IMPORTANT: follow these instructions
your claims need credibility, The NIST docs will get you there.
they need assurance, what apps can they expect
They had an old way of doing business, is the new way you are suggesting manageable?
is your company a solution ? if youre telling them they will have to figure out, then your offering
is zero value.
Style: write in third person, no "I" or "we"; "...a study was performed...."
Use the bullet separators in your formatting
Use IEEE reference style
Security: use NIST SP800-53
Think Open Office or Libre for Windows apps
Log files, look at NIST SP800-92
Different types of linux, "keyword linux distros"
Note: you are writing to Faster Computing's management and not an audience of engineers and
administrators.
(12.3.2: Describe the implementation of controls.)
How will security be implemented in the Linux systemsboth workstations and servers?
(10.1.2: Gather project requirements to meet stakeholder needs.)
End users have expressed some concern about completing their day-to-day tasks on Linux. How
would activities such as web browsing work? How would they work with their previous
Microsoft Office files?
(12.4.1: Document how IT controls are monitored.)
The current Windows administrators are unsure about administering Linux systems. How are
common tasks, such as process monitoring and management, handled in Linux? How does
logging work? Do we have event logs like we do in Windows?
(2.3.2: Incorporate relevant evidence to support the position.)
Some folks in IT raised questions about the Linux flavor that was recommended. They would
like to see comparisons between your recommendation and a couple of other popular options.
What makes your recommendation the best option?
(10.1.3: Define the specifications of the required technologies.)
How does software installation work on Linux? Can we use existing Windows software?
How can Linux work together with the systems that will continue to run Windows? How will we
share files between the different system types?
The deliverable for this phase of the project is a memo. There is no minimum or maximum page
requirement, but all of the questions must be fully answered with sufficient detail. The
recommended format is to respond to the questions in a bulleted format. Provide sufficient detail
to fully address the questions. You must cite at least two quality sources.
(1.2.3: Explain specialized terms or concepts to facilitate audience comprehension.)
Create a memorandum template with a header of your own design or choosing, brief
introduction, addresses Faster Computing, Inc's questions, and summarizes your position on
adopting the specific version of Linux.
(1.4.3: Write concise and logical sentences in standard academic English that clarify
relations.
James Williams_IT110_IP1.doc.docxIT110-1404A-02 Introduction.docxpriestmanmable
James Williams_IT110_IP1.doc.docx
IT110-1404A-02 Introduction to Programming
Phase 1 Ip
James Williams
10/13/2014
Microsoft Software Company Williams, James
Phase 1 Ip
Table of Contents
Page #
1. Warranty Information 1
2. Product Support 5
3. Contact Microsoft 9
4. How to Setup 13
a. How to Operate 17
5. Regulatory Model 21
a. Regulatory Type 23
6. Laptop Model 27
7. Letters of Support (submitted independently)
Week 1: Project Description
Microsoft was founded in 1975. Our mission is to enable people and businesses throughout the world to realize their full potential. We work to achieve this mission by creating technology that transforms the way people work, play, and communicate. We develop and market software, services, and hardware that deliver new opportunities, greater convenience, and enhanced value to people's lives. We do business worldwide and have offices in more than 100 countries.
We generate revenue by developing, licensing, and supporting a wide range of software products and services, by designing and selling hardware, and by delivering relevant online advertising to a global customer audience. In addition to selling individual products and services, we offer suites of products and services.
Our products include operating systems for personal computers ("PCs"), servers, phones, and other intelligent devices; server applications for distributed computing environments; productivity applications; business solution applications; desktop and server management tools; software development tools; video games; and online advertising. We also design and sell hardware including the Xbox 360 gaming and entertainment console, Kinect for Xbox 360, Xbox 360 accessories, and Microsoft PC hardware products.
We provide consulting and product and solution support services, and we train and certify computer system integrators and developers. We also offer cloud-based solutions that provide customers with software, services and content over the Internet by way of shared computing resources located in centralized data centers. Cloud revenue is earned primarily from usage fees and advertising.
The product we will discussing is the Microsoft Surface Pro 3, the tablet that will replace your laptop. It is sleek and stylish design gives you the power of a laptop with the flexibility of a tablet. This tabet barely tips the scales at 1.76 pounds which allows you to take it everywhere. It has a 12 inch screen that is full HD and a screen resolution of 2160 x 1440. The battery life is excellent with up to 9 hours of continuous web browsing. This tablet also features a S.Pen and a 4th generation Intel Core processor. It runs off or our new addition to the family Windows 8. The Surface Pro 3 come in a variety of colors for your style/liking.
· Bing, our Internet search engine that finds and organizes the answers people need so they can make faster, more informed decisions;
· Windows Live Essentials suite, which allows users to upload, o ...
For more course tutorials visit
www.newtonhelp.com
NTC 300 Discussion Week 1 Class Discussion Questions
Discussion Question: Cloud Model System Requirements
You are working for a company initiating a cloud environment, and you are presenting cloud deployment options to the non-IT executives in your organization.
Faster Computing was impressed with your presentation. The company.pdframizmemonahmedabado1
Faster Computing was impressed with your presentation. The company is interested in moving
forward with the project, but the senior management team has responded to the presentation with
the following questions and concerns:
IMPORTANT: follow these instructions
your claims need credibility, The NIST docs will get you there.
they need assurance, what apps can they expect
They had an old way of doing business, is the new way you are suggesting manageable?
is your company a solution ? if youre telling them they will have to figure out, then your offering
is zero value.
Style: write in third person, no "I" or "we"; "...a study was performed...."
Use the bullet separators in your formatting
Use IEEE reference style
Security: use NIST SP800-53
Think Open Office or Libre for Windows apps
Log files, look at NIST SP800-92
Different types of linux, "keyword linux distros"
Note: you are writing to Faster Computing's management and not an audience of engineers and
administrators.
(12.3.2: Describe the implementation of controls.)
How will security be implemented in the Linux systemsboth workstations and servers?
(10.1.2: Gather project requirements to meet stakeholder needs.)
End users have expressed some concern about completing their day-to-day tasks on Linux. How
would activities such as web browsing work? How would they work with their previous
Microsoft Office files?
(12.4.1: Document how IT controls are monitored.)
The current Windows administrators are unsure about administering Linux systems. How are
common tasks, such as process monitoring and management, handled in Linux? How does
logging work? Do we have event logs like we do in Windows?
(2.3.2: Incorporate relevant evidence to support the position.)
Some folks in IT raised questions about the Linux flavor that was recommended. They would
like to see comparisons between your recommendation and a couple of other popular options.
What makes your recommendation the best option?
(10.1.3: Define the specifications of the required technologies.)
How does software installation work on Linux? Can we use existing Windows software?
How can Linux work together with the systems that will continue to run Windows? How will we
share files between the different system types?
The deliverable for this phase of the project is a memo. There is no minimum or maximum page
requirement, but all of the questions must be fully answered with sufficient detail. The
recommended format is to respond to the questions in a bulleted format. Provide sufficient detail
to fully address the questions. You must cite at least two quality sources.
(1.2.3: Explain specialized terms or concepts to facilitate audience comprehension.)
Create a memorandum template with a header of your own design or choosing, brief
introduction, addresses Faster Computing, Inc's questions, and summarizes your position on
adopting the specific version of Linux.
(1.4.3: Write concise and logical sentences in standard academic English that clarify
relations.
James Williams_IT110_IP1.doc.docxIT110-1404A-02 Introduction.docxpriestmanmable
James Williams_IT110_IP1.doc.docx
IT110-1404A-02 Introduction to Programming
Phase 1 Ip
James Williams
10/13/2014
Microsoft Software Company Williams, James
Phase 1 Ip
Table of Contents
Page #
1. Warranty Information 1
2. Product Support 5
3. Contact Microsoft 9
4. How to Setup 13
a. How to Operate 17
5. Regulatory Model 21
a. Regulatory Type 23
6. Laptop Model 27
7. Letters of Support (submitted independently)
Week 1: Project Description
Microsoft was founded in 1975. Our mission is to enable people and businesses throughout the world to realize their full potential. We work to achieve this mission by creating technology that transforms the way people work, play, and communicate. We develop and market software, services, and hardware that deliver new opportunities, greater convenience, and enhanced value to people's lives. We do business worldwide and have offices in more than 100 countries.
We generate revenue by developing, licensing, and supporting a wide range of software products and services, by designing and selling hardware, and by delivering relevant online advertising to a global customer audience. In addition to selling individual products and services, we offer suites of products and services.
Our products include operating systems for personal computers ("PCs"), servers, phones, and other intelligent devices; server applications for distributed computing environments; productivity applications; business solution applications; desktop and server management tools; software development tools; video games; and online advertising. We also design and sell hardware including the Xbox 360 gaming and entertainment console, Kinect for Xbox 360, Xbox 360 accessories, and Microsoft PC hardware products.
We provide consulting and product and solution support services, and we train and certify computer system integrators and developers. We also offer cloud-based solutions that provide customers with software, services and content over the Internet by way of shared computing resources located in centralized data centers. Cloud revenue is earned primarily from usage fees and advertising.
The product we will discussing is the Microsoft Surface Pro 3, the tablet that will replace your laptop. It is sleek and stylish design gives you the power of a laptop with the flexibility of a tablet. This tabet barely tips the scales at 1.76 pounds which allows you to take it everywhere. It has a 12 inch screen that is full HD and a screen resolution of 2160 x 1440. The battery life is excellent with up to 9 hours of continuous web browsing. This tablet also features a S.Pen and a 4th generation Intel Core processor. It runs off or our new addition to the family Windows 8. The Surface Pro 3 come in a variety of colors for your style/liking.
· Bing, our Internet search engine that finds and organizes the answers people need so they can make faster, more informed decisions;
· Windows Live Essentials suite, which allows users to upload, o ...
For more course tutorials visit
www.newtonhelp.com
NTC 300 Discussion Week 1 Class Discussion Questions
Discussion Question: Cloud Model System Requirements
You are working for a company initiating a cloud environment, and you are presenting cloud deployment options to the non-IT executives in your organization.
Design Document – Week 1 – ProposalCourse ID IT 491 CAPSTONE .docxcarolinef5
Design Document – Week 1 – Proposal
Course ID: IT 491
CAPSTONE PROJECT
Instructions:
This template must be filled out completely and turned into the course instructor. If you need assistance please contact the instructor prior to the due date.
This is an individual assignment and all work must be original and should be designed, submitted, and documented entirely by the student.
This assignment is worth 50 points.
It is strongly recommended that you get your topic selection approved by your instructor BEFORE submitting week one work.
Name:
STUDENT NAME: Pierre Logon
Project Title:
PROJECT TITLE: Penetration Testing
Project Fundamentals:
PROBLEM DEFINITION (Your IT project should solve a well-defined problem):
Each question should have a 1 to 2 paragraph response. This section is worth 15 points.
· Organization - Who is the organization you are completing work for? Is this a fictional or real company? How large is the company?
The organization is a virtual company that will be use for the purpose of the project.
· Problem - What is the problem(s) you are addressing? (i.e. are you moving locations, are you improving performance of existing computers, are you expanding your services, are you creating a new department, are you improving security? etc.)
The problem that I am addressing is the vulnerability of the network of this virtual company and the assessment to address it.
· Outcomes - What will be the desired outcome of this project? These outcomes should be measurable and specific.
The organization is a virtual company that will be use for the purpose of this project.
The company is a small company with the size of 10 employees.
I will be using Vmware to create servers ,network routers and desktop for the purpose of the demonstration in the virtual machine.
I will then test my network environment for Denial of Service vulnerability
TECHNOLOGY SOLUTION You should have a top-level idea of the solution or how you will solve the problem:
This section is worth 20 points. This section should be 3-4 paragraphs and should include the following information.
· What is the proposed solution?
· How do you propose to complete your project?
· What tools and/or methodology (e.g. Network Diagram, IP Addressing, Security Technologies, Virtualization, Operating Systems, etc.) will be used to design, implement, and deliver the proposed solution?
· What type of resources (e.g., software, hardware, virtualization techniques, etc.) will you need to complete your project?
The proposed solution is to assess the penetration testing with WIRESHARK
OBJECTIVE ALIGNMENT Because this project is a demonstration of the skills you have learned throughout your time here at Herzing University, your project should address each of the program outcomes. Describe how your proposed project meets each of these specific course outcomes:
Each objective should be addressed in one or two complete sentences. This section is worth 15 points.
· Apply industry stan.
1 SDEV 460 – Homework 4 Input Validation and BusineVannaJoy20
1
SDEV 460 – Homework 4
Input Validation and Business Logic Security Controls
Overview:
This homework will demonstrate your knowledge of testing security controls aligned with Input
validation and business logic. You will also use the recommended OWASP testing guide reporting format
to report your test findings.
Assignment: Total 100 points
Using the readings from weeks 7 and 8 as a baseline provide the following test and analysis descriptions
or discussion:
1. Testing for Reflected Cross site scripting (OTG-INPVAL-001)
The OWASP site list multiple approaches and examples for blackbox testing reflected XSS
vulnerabilities. In your own words, describe Reflected Cross Site scripting. Then, List and
describe 4 different examples that could be used for testing. Be sure to conduct additional
research for each example to provide your own unique test example. This most likely means you
will need to conduct some research on Javascript to make sure your syntax is correct.
2. Testing for Stored Cross site scripting (OTG-INPVAL-002)
The OWASP site list multiple approaches and examples for blackbox testing Stored XSS
vulnerabilities. In your own words, describe Stored Cross Site scripting. Then, List and describe 2
different examples that could be used for testing. Be sure to conduct additional research for
each example to provide your own unique test example. This most likely means you will need to
conduct some research on Javascript to make sure your syntax is correct.
3. Testing for SQL Injection (OTG-INPVAL-005)
SQL Injection remains a problem in applications yet could easily fixed. The following SQL
statement is in an HTML form as code with the $ variables directly input from the user.
SELECT * FROM Students WHERE EMPLID='$EMPLID' AND EMAIL='$email'
Would a form or application that includes this code be susceptible to SQL Injection? Why?
What specific tests would you perform to determine if the applications was vulnerable?
How would you fix this problem? Be specific be providing the exact code in a Language of your choice.
(e.g. Java, PHP, Python …)
4. Test business logic data validation (OTG-BUSLOGIC-001)
While reviewing some Java code, an analysis provided the following code snippets that contain
logic errors. For each example, describe the issue and provide code that would fix the logical
error:
a.
2
int x;
x = x + 1;
System.out.println("X = " + x);
b.
for (i=1; i<=5; i++) ; {
System.out.println("Number is " + i);
}
c.
if ( z > d) ; {
System.out.println("Z is bigger");
}
d.
String m1="one";
String m2="two";
if(m1 == m2) {
System.out.println(“M1 is equal to M2”);
}
e. The formula for the area of a trapezoid is:
A = (b1+b2)/2 * h
The following Java code is the implementation. Fix the logical error
double area;
double base1 = 2.3;
double base2 = 4.8;
double height = 12.5;
area = base1 + base2/2.0 * ...
For more course tutorials visit
www.tutorialrank.com
NTC 300 Discussion Week 1 Class Discussion Questions
Discussion Question: Cloud Model System Requirements
You are working for a company initiating a cloud environment, and you are presenting cloud deployment options to the non-IT executives in your organization.
For more course tutorials visit
www.tutorialrank.com
NTC 300 Discussion Week 1 Class Discussion Questions
Discussion Question: Cloud Model System Requirements
You are working for a company initiating a cloud environment, and you are presenting cloud deployment options to the non-IT executives in your organization.
Linux Implementation ProposalPhelpsTech, LLC. has a new resear.docxsmile790243
Linux Implementation Proposal
PhelpsTech, LLC. has a new research and development group - Medals. All systems in Medals will run the Linux operating system and will access resources, as well as share resources, with PhelpsTech, LLC.’s Microsoft Active Directory domain. The domain consists of several Windows Server 2012 R2 servers running various services (Microsoft Active Directory, DNS, DHCP, web services, printing and file services).
PhelpsTech, LLC. also has around 500 client operating system desktops/laptops that run Windows 7 and Windows XP. There is a mix of desktop and laptop systems.
Current Desktop/Laptop Configuration for Windows 7:
Processor: Intel Core i3 Second Generation
Memory: 4GB RAM
Hard Drive: 350GB
Network Card: 10/100/1000 Mbps
USB Ports: 4 USB 2.0
Monitor: 20inch LCD
Current Desktop/Laptop Configuration for Windows XP:
Processor: Intel Core 2
Memory: 2GB RAM
Hard Drive: 80GB
Network Card: 10/100 Mbps
USB Ports: 4 USB 2.0
Monitor: 15inch LCD
Your boss, the Chief Technical Officer Katie Ledecky, wants you to come up with a proposal to replace all Windows XP systems with Linux. You will research and select the Linux distribution of choice and justify why you picked it.
Requirements
In addition the requirements in the grading rubric, the final submission should contain at least 5 to 7 pages worth of text written by the student (not counting title page, images, diagrams, tables, or quotations that may be used), but may be longer, not to exceed approximately 7 pages’ worth of student-supplied text. It must be double-spaced, have 1-inch margins, and use 12-point Times New Roman or 10-point Arial/Helvetica font. A title page is required.
You must turn this assignment to both the assignment area within our LEO classroom as well as to the TurnItIn website. Failure to do so may result in point deductions. Follow the TurnItIn instructions provided within the class.
You must address the following in your proposal and may make any assumptions which are not specified:
· Research and justify whether Medals will use existing computer hardware that is being used with the Windows XP systems, or if new hardware will be required.
· Plan for migration from Windows XP to Linux.
· Explain how some windows services can interact with Linux services during the transition.
· Printing
· File Sharing
· DNS
· Central Authentication
· Determine the hardware to be used and the installation options.
· How will users log onto the systems? Explain.
· How will systems receive IP addresses? Explain.
· How will DNS be accessed by the Medals systems? Where will DNS be hosted and how with the Linux systems be configured to use it?
· Explain how files on the network may be accessed by Medals. Make sure you cover how both windows and linux can access the same shared files.
· Explain how Medals can securely share files from a central location within their group and other selected groups/users in the company.
· How will central authentication be handle ...
For more classes visit
www.snaptutorial.com
NTC 300 Discussion Week 1 Class Discussion Questions
Discussion Question: Cloud Model System Requirements
You are working for a company initiating a cloud environment, and you are
Just Click on Below Link To Download This Course:
https://www.devrycoursehelp.com/product/devry-cis-355a-full-course-latest/
Go to a job posting site (CareerBuilder, Dice, ComputerJobs, etc.) or use search engines to find Java developer or Java programmer positions. Copy and paste the job posting into the Discussion area. Briefly explore all the topics that you will learn in this class this session. What are the skills you will learn in this course that are also requirements for the positions you see posted by you and your classmates?
Just Click on Below Link To Download This Course:
https://www.devrycoursehelp.com/product/devry-cis-247-full-course-latest/
The Object-Oriented Paradigm supports abstractions through Classes. Classes are software-programming abstractions; they encapsulate a set of related attributes (data members) and behaviors (methods) while, at the same time, they hide essential details from their users.
Design Document – Week 1 – ProposalCourse ID IT 491 CAPSTONE .docxcarolinef5
Design Document – Week 1 – Proposal
Course ID: IT 491
CAPSTONE PROJECT
Instructions:
This template must be filled out completely and turned into the course instructor. If you need assistance please contact the instructor prior to the due date.
This is an individual assignment and all work must be original and should be designed, submitted, and documented entirely by the student.
This assignment is worth 50 points.
It is strongly recommended that you get your topic selection approved by your instructor BEFORE submitting week one work.
Name:
STUDENT NAME: Pierre Logon
Project Title:
PROJECT TITLE: Penetration Testing
Project Fundamentals:
PROBLEM DEFINITION (Your IT project should solve a well-defined problem):
Each question should have a 1 to 2 paragraph response. This section is worth 15 points.
· Organization - Who is the organization you are completing work for? Is this a fictional or real company? How large is the company?
The organization is a virtual company that will be use for the purpose of the project.
· Problem - What is the problem(s) you are addressing? (i.e. are you moving locations, are you improving performance of existing computers, are you expanding your services, are you creating a new department, are you improving security? etc.)
The problem that I am addressing is the vulnerability of the network of this virtual company and the assessment to address it.
· Outcomes - What will be the desired outcome of this project? These outcomes should be measurable and specific.
The organization is a virtual company that will be use for the purpose of this project.
The company is a small company with the size of 10 employees.
I will be using Vmware to create servers ,network routers and desktop for the purpose of the demonstration in the virtual machine.
I will then test my network environment for Denial of Service vulnerability
TECHNOLOGY SOLUTION You should have a top-level idea of the solution or how you will solve the problem:
This section is worth 20 points. This section should be 3-4 paragraphs and should include the following information.
· What is the proposed solution?
· How do you propose to complete your project?
· What tools and/or methodology (e.g. Network Diagram, IP Addressing, Security Technologies, Virtualization, Operating Systems, etc.) will be used to design, implement, and deliver the proposed solution?
· What type of resources (e.g., software, hardware, virtualization techniques, etc.) will you need to complete your project?
The proposed solution is to assess the penetration testing with WIRESHARK
OBJECTIVE ALIGNMENT Because this project is a demonstration of the skills you have learned throughout your time here at Herzing University, your project should address each of the program outcomes. Describe how your proposed project meets each of these specific course outcomes:
Each objective should be addressed in one or two complete sentences. This section is worth 15 points.
· Apply industry stan.
1 SDEV 460 – Homework 4 Input Validation and BusineVannaJoy20
1
SDEV 460 – Homework 4
Input Validation and Business Logic Security Controls
Overview:
This homework will demonstrate your knowledge of testing security controls aligned with Input
validation and business logic. You will also use the recommended OWASP testing guide reporting format
to report your test findings.
Assignment: Total 100 points
Using the readings from weeks 7 and 8 as a baseline provide the following test and analysis descriptions
or discussion:
1. Testing for Reflected Cross site scripting (OTG-INPVAL-001)
The OWASP site list multiple approaches and examples for blackbox testing reflected XSS
vulnerabilities. In your own words, describe Reflected Cross Site scripting. Then, List and
describe 4 different examples that could be used for testing. Be sure to conduct additional
research for each example to provide your own unique test example. This most likely means you
will need to conduct some research on Javascript to make sure your syntax is correct.
2. Testing for Stored Cross site scripting (OTG-INPVAL-002)
The OWASP site list multiple approaches and examples for blackbox testing Stored XSS
vulnerabilities. In your own words, describe Stored Cross Site scripting. Then, List and describe 2
different examples that could be used for testing. Be sure to conduct additional research for
each example to provide your own unique test example. This most likely means you will need to
conduct some research on Javascript to make sure your syntax is correct.
3. Testing for SQL Injection (OTG-INPVAL-005)
SQL Injection remains a problem in applications yet could easily fixed. The following SQL
statement is in an HTML form as code with the $ variables directly input from the user.
SELECT * FROM Students WHERE EMPLID='$EMPLID' AND EMAIL='$email'
Would a form or application that includes this code be susceptible to SQL Injection? Why?
What specific tests would you perform to determine if the applications was vulnerable?
How would you fix this problem? Be specific be providing the exact code in a Language of your choice.
(e.g. Java, PHP, Python …)
4. Test business logic data validation (OTG-BUSLOGIC-001)
While reviewing some Java code, an analysis provided the following code snippets that contain
logic errors. For each example, describe the issue and provide code that would fix the logical
error:
a.
2
int x;
x = x + 1;
System.out.println("X = " + x);
b.
for (i=1; i<=5; i++) ; {
System.out.println("Number is " + i);
}
c.
if ( z > d) ; {
System.out.println("Z is bigger");
}
d.
String m1="one";
String m2="two";
if(m1 == m2) {
System.out.println(“M1 is equal to M2”);
}
e. The formula for the area of a trapezoid is:
A = (b1+b2)/2 * h
The following Java code is the implementation. Fix the logical error
double area;
double base1 = 2.3;
double base2 = 4.8;
double height = 12.5;
area = base1 + base2/2.0 * ...
For more course tutorials visit
www.tutorialrank.com
NTC 300 Discussion Week 1 Class Discussion Questions
Discussion Question: Cloud Model System Requirements
You are working for a company initiating a cloud environment, and you are presenting cloud deployment options to the non-IT executives in your organization.
For more course tutorials visit
www.tutorialrank.com
NTC 300 Discussion Week 1 Class Discussion Questions
Discussion Question: Cloud Model System Requirements
You are working for a company initiating a cloud environment, and you are presenting cloud deployment options to the non-IT executives in your organization.
Linux Implementation ProposalPhelpsTech, LLC. has a new resear.docxsmile790243
Linux Implementation Proposal
PhelpsTech, LLC. has a new research and development group - Medals. All systems in Medals will run the Linux operating system and will access resources, as well as share resources, with PhelpsTech, LLC.’s Microsoft Active Directory domain. The domain consists of several Windows Server 2012 R2 servers running various services (Microsoft Active Directory, DNS, DHCP, web services, printing and file services).
PhelpsTech, LLC. also has around 500 client operating system desktops/laptops that run Windows 7 and Windows XP. There is a mix of desktop and laptop systems.
Current Desktop/Laptop Configuration for Windows 7:
Processor: Intel Core i3 Second Generation
Memory: 4GB RAM
Hard Drive: 350GB
Network Card: 10/100/1000 Mbps
USB Ports: 4 USB 2.0
Monitor: 20inch LCD
Current Desktop/Laptop Configuration for Windows XP:
Processor: Intel Core 2
Memory: 2GB RAM
Hard Drive: 80GB
Network Card: 10/100 Mbps
USB Ports: 4 USB 2.0
Monitor: 15inch LCD
Your boss, the Chief Technical Officer Katie Ledecky, wants you to come up with a proposal to replace all Windows XP systems with Linux. You will research and select the Linux distribution of choice and justify why you picked it.
Requirements
In addition the requirements in the grading rubric, the final submission should contain at least 5 to 7 pages worth of text written by the student (not counting title page, images, diagrams, tables, or quotations that may be used), but may be longer, not to exceed approximately 7 pages’ worth of student-supplied text. It must be double-spaced, have 1-inch margins, and use 12-point Times New Roman or 10-point Arial/Helvetica font. A title page is required.
You must turn this assignment to both the assignment area within our LEO classroom as well as to the TurnItIn website. Failure to do so may result in point deductions. Follow the TurnItIn instructions provided within the class.
You must address the following in your proposal and may make any assumptions which are not specified:
· Research and justify whether Medals will use existing computer hardware that is being used with the Windows XP systems, or if new hardware will be required.
· Plan for migration from Windows XP to Linux.
· Explain how some windows services can interact with Linux services during the transition.
· Printing
· File Sharing
· DNS
· Central Authentication
· Determine the hardware to be used and the installation options.
· How will users log onto the systems? Explain.
· How will systems receive IP addresses? Explain.
· How will DNS be accessed by the Medals systems? Where will DNS be hosted and how with the Linux systems be configured to use it?
· Explain how files on the network may be accessed by Medals. Make sure you cover how both windows and linux can access the same shared files.
· Explain how Medals can securely share files from a central location within their group and other selected groups/users in the company.
· How will central authentication be handle ...
For more classes visit
www.snaptutorial.com
NTC 300 Discussion Week 1 Class Discussion Questions
Discussion Question: Cloud Model System Requirements
You are working for a company initiating a cloud environment, and you are
Just Click on Below Link To Download This Course:
https://www.devrycoursehelp.com/product/devry-cis-355a-full-course-latest/
Go to a job posting site (CareerBuilder, Dice, ComputerJobs, etc.) or use search engines to find Java developer or Java programmer positions. Copy and paste the job posting into the Discussion area. Briefly explore all the topics that you will learn in this class this session. What are the skills you will learn in this course that are also requirements for the positions you see posted by you and your classmates?
Just Click on Below Link To Download This Course:
https://www.devrycoursehelp.com/product/devry-cis-247-full-course-latest/
The Object-Oriented Paradigm supports abstractions through Classes. Classes are software-programming abstractions; they encapsulate a set of related attributes (data members) and behaviors (methods) while, at the same time, they hide essential details from their users.
Just Click on Below Link to Download This Course:
https://www.devrycoursehelp.com/product/devry-gscm-520-all-week-quiz-latest/
Devry GSCM 520 All Week Quiz Latest
Devry GSCM 520 Week 1 Quiz Latest
Question 1.1.(TCO 1) One reason for studying operations and supply chain management (OSCM) is which of the following?(Points : 5)
OSCM is essential for understanding organizational behavior.
Most business graduates do OSCM work regardless of their job title.
All managers should understand the basic principles that guide the design of transformation processes.
Just Click on Below Link to Download This Course:
https://www.devrycoursehelp.com/product/devry-gscm-326-full-course-latest/
Devry GSCM 326 Week 2 Discussion DQ1 & DQ 2 Latest
DQ 1
Deming’s 14 Points (graded)
Are Dr. Deming’s 14 points clear, concise, and achievable? If not, what do you think he had in mind? In Deming’s view, who needs to do what and why?
DQ 2
Just Click on Below Link to Download This Course:
https://www.devrycoursehelp.com/product/devry-gsp-115-week-3-assignment-latest/
DeVry GSP 115 Week 3 Assignment latest
Week 3: Loops and Branching
Instructions
Complete the following assignments. Copy and paste your finished code into a Word document, clearly identifying which assignment it is. Also, capture the output of the program and paste that into the Word document. If there are questions to be answered, put the answers after the output. When you complete all three of this week’s assignments, save the document as yourLastName_GSP115_W3_Assignments.docx.Submit it to the Week 3 assignment Dropbox.
Just Click on Below Link to Download This Course:
https://www.devrycoursehelp.com/product/devry-gsp-115-all-assignments-latest/
DeVry GSP 115 All Assignments latest
DeVry GSP 115 Week 1 Assignment latest
Week 1: Simple Data Types
Instructions
Complete the following assignments. Cut and paste your finished code into a Word document, clearly identifying which assignment it is. Also, capture the output of the program and paste that into the Word document. If there are questions to be answered, put the answers after the output. When you complete all three of this week’s assignments, save the document as yourLastName_GSP115_W1_Assignments.docx. Submit it to the Week 1 assignment Dropbox.
Just Click on Below Link to Download This Course:
https://www.coursetutor.us/product/nu625-7-full-course-herzing-university/
• Locate an article that relates to how the roles of the advanced practice nurse have historically evolved.
Just Click on Below Link to Download This Course:
https://wiseamerican.us/product/bio-101-introduction-biology-tui/
BIO 101 MODULE 1 INTRODUCTION TO SCIENCE
BIO 101 MODULE 1 DISCUSSION
Discussion: Life’s Extreme Environments
Discussion Topic
Everything we know about life comes from studying our own planet. Recent discoveries about life forms in extreme environments have renewed scientists’ interest in looking for life elsewhere.
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
This is a presentation by Dada Robert in a Your Skill Boost masterclass organised by the Excellence Foundation for South Sudan (EFSS) on Saturday, the 25th and Sunday, the 26th of May 2024.
He discussed the concept of quality improvement, emphasizing its applicability to various aspects of life, including personal, project, and program improvements. He defined quality as doing the right thing at the right time in the right way to achieve the best possible results and discussed the concept of the "gap" between what we know and what we do, and how this gap represents the areas we need to improve. He explained the scientific approach to quality improvement, which involves systematic performance analysis, testing and learning, and implementing change ideas. He also highlighted the importance of client focus and a team approach to quality improvement.
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxEduSkills OECD
Andreas Schleicher presents at the OECD webinar ‘Digital devices in schools: detrimental distraction or secret to success?’ on 27 May 2024. The presentation was based on findings from PISA 2022 results and the webinar helped launch the PISA in Focus ‘Managing screen time: How to protect and equip students against distraction’ https://www.oecd-ilibrary.org/education/managing-screen-time_7c225af4-en and the OECD Education Policy Perspective ‘Students, digital devices and success’ can be found here - https://oe.cd/il/5yV
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
How to Split Bills in the Odoo 17 POS ModuleCeline George
Bills have a main role in point of sale procedure. It will help to track sales, handling payments and giving receipts to customers. Bill splitting also has an important role in POS. For example, If some friends come together for dinner and if they want to divide the bill then it is possible by POS bill splitting. This slide will show how to split bills in odoo 17 POS.
How to Create Map Views in the Odoo 17 ERPCeline George
The map views are useful for providing a geographical representation of data. They allow users to visualize and analyze the data in a more intuitive manner.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Devry CIS 246 Full Course Latest
1. Devry CIS 246 Full Course Latest
Just Click on Below Link To Download This Course:
https://www.devrycoursehelp.com/product/devry-cis-246-full-course-latest/
Or
Email us
help@devrycoursehelp.com
Devry CIS 246 Full Course Latest
Devry CIS 246 Full Course [ all discussions and all i labs ]
Devry CIS 246 Week 1 Discussions Latest
Networking in Society (graded)
Explain ways that networking has changed society in the past 10 years. Do you feel that computer networking has impacted your life?
Please explain.
.
Peer-to-Peer and Client-Server Environments (graded)
What kind of network does your current or former workplace have: peer to peer or client-server? What problems does it have? What are
some ideas to improve it? If you don’t know which, explain what you think would have worked best and describe the circumstances.
2. Devry CIS 246 Week 2 Discussions Latest
Transmission Basics (graded)
The lecture covers several standards. Which ones are most common? Which ones are more or less obsolete? What can you find out about
the future of transmission and media types? What is happening with 10 Gbps? What about 100 Gbps?
Networking Hardware and Topologies (graded)
Let’s figure out what kind of networking equipment an organization would need to buy. You can make assumptions on size and budget.
What do we need to purchase? Why do we need to purchase it? That is, what will it do for us? How do we hook them together? That is,
how do we cable them (or not cable them) together? Why is there such a big difference in price with the brands? How do network
topologies figure into our selections and designs?
Devry CIS 246 Week 3 Discussions Latest
TCP/IP (graded)
There is an alphabet soup of protocols in TCP/IP: HTTP, FTP, SMTP, POP3, TCP, UDP, IP, ARP, ICMP, and others. What are the characteristics
of these protocols? What are they used for? Has there been an evolution in any of these protocols? Are there any weaknesses or
disadvantages?
Network Servers (graded)
3. Search the Internet for Windows servers by Dell, IBM, HP, and others. What are the features and prices? Which ones do you think would be
appropriate for the various Windows Server 2008 editions? It is okay not to understand all of the specifications. When you find something
you don’t know, ask the class.
Devry CIS 246 Week 4 Discussions Latest
Understanding and Applying Active Directory (graded)
Active Directory (AD) is arguably the most critical component of Windows Server 2008, certainly for larger organizations. It enables
corporations to manage and secure their resources from a single directory service and with a common interface—a very powerful tool.
Because it is so powerful and offers so many features and capabilities, it sometimes can be complex to those looking at it for the first time.
This week, we are going to learn about AD in detail, starting with the fundamentals. As we progress during the week, you will begin to see
it’s not that intimidating after all. First, though, let’s get the fundamentals down. What exactly is a directory service and what are some
examples in industry? Next, let’s get the definition of Active Directory down—what exactly is it and what benefits does it provide? After
this, we’ll look at the details on how it is implemented in the business environment.
Linux Versus Windows Administration (graded)
In what ways do you think administering Linux is better than Windows? In what ways is Windows better than Linux? This can be with
regard to having to manage a single server or multiple servers.
Devry CIS 246 Week 5 Discussions Latest
Wireless Networks (graded)
4. Today, wireless transmission media are commonplace in business as well as residential applications, and their application is growing. This
week, we will learn about wireless technology by starting with the fundamentals. How are wireless signals carried? What are the obstacles
to successful transmissions and their repercussions? What standards govern wireless transmissions? How do we secure our wireless
networks?
VoIP (graded)
Traditionally, packet-switched networks carried primarily data and the public switched telephone network (PSTN) carried telephone calls
and fax transmissions. Convergence is the use of one network to carry data, voice, and video communications simultaneously. Let’s begin
this discussion by identifying and discussing key terms such as IP telephony or VoIP, VoATM, VoDSL, Internet telephony, FoIP, and video
over IP.
Devry CIS 246 Week 6 Discussions Latest
Network Security (graded)
In this topic please discuss security measures you see in everyday life that you could adopt in a network environment. You can also include
security implementations of places you have worked.
Network Integrity and Availability (graded)
In this topic, we will discuss measures that can be taken to ensure that a network’s programs, data, services, devices, and connections are
sound and protected from anything that might render them unusable. What situations can compromise integrity and availability and what,
specifically, can we do to protect our networks?
Devry CIS 246 Week 7 Discussions Latest
5. Using a WAN (graded)
Find WAN organizations (ISPs) that will connect you to the Internet or connect your offices. What services do they offer? What costs are
involved?
Linux and Windows Integration (graded)
What are some ways you could integrate Linux servers into a Windows network to share information? What would be the advantages and
disadvantages? Feel free to get into the details of Samba, which is covered in the lab. Are there any other products out there? You can get
creative on this one. You could also offer scenarios for FTP, Web, or even Telnet.
Devry CIS 246 Week 1 Lab Report Latest
This document contains the template you will use to complete this assignment. Save the file by adding your last name to the filename (e.g.
CIS246_W1_Lab_Report_EK_Smith.docx).
Follow the steps for this week’s lab. At various points in the instructions, you will be asked to answer a question or capture a screenshot to
document your work – type your answers and place screenshots into this document, then submit this completed Lab Report to the
appropriate weekly Dropbox.
Screenshots
Screenshot of the configuration screen showing the time zone, computer name, and IP address. (50 points)
6. Devry CIS 246 Week 2 Lab Report Latest
This document contains the template you will use to complete this assignment. Save the file by adding your last name to the filename (e.g.
CIS246_W2_Lab_Report_EK_Smith.docx).
Follow the steps for this week’s lab. At various points in the instructions, you will be asked to answer a question or capture a screenshot to
document your work – type your answers and place screenshots into this document, then submit this completed Lab Report to the
appropriate weekly Dropbox.
Lab 2a: Install and Configure Active Directory
1. 1.Is the firewall turned on? (3 points)
2. 2.How do you turn off the IE Enhanced Security Configuration.? (3 points)
3. 3.Which link allows you to change the computer name? (3 points)
Screenshots
#1 configuration screen (3 points)
#2 First Diagnostic screen (3 points)
#3 Scroll down to get the rest of the Diagnostics screen (3 points)
#4 Screenshot of telnet command (4 points)
#5 Active Directory installed. Computer name including domain name (4 points)
#6 Windows 7. Computer name including domain name (4 points)
Lab 2b: Organize Users and Groups
Screenshots
#7 Your name logged on to the Windows 7 PC (4 points)
#8. The name of the user in the group (4 points)
#9. Both groups in the middle panel (4 points)
#10. Ability to delete OU (4 points)
#11. Delegated user (4 points)
7. Devry CIS 246 Week 3 Lab Report Latest
This document contains the template you will use to complete this assignment. Save the file by adding your last name to the filename (e.g.
CIS246_W3_Lab_Report_EK_Smith.docx).
Follow the steps for this week’s lab. At various points in the instructions, you will be asked to answer a question or capture a screenshot to
document your work – type your answers and place screenshots into this document, then submit this completed Lab Report to the
appropriate weekly Dropbox.
Screenshots
#1. Show the permissions for Server Operator
#2. Show the Utilities Properties window
#3. Show the error message
#4. Show your name and show the error message
#5. Show that the drive is R: and the size is 1 KB
#6. Show the November text file with the letter Z: in the text box at the top of the window
Devry CIS 246 Week 4 Lab Report Latest
This document contains the template you will use to complete this assignment. Save the file by adding your last name to the filename (e.g.
CIS246_W4_Lab_Report_EK_Smith.docx).
Follow the steps for this week’s lab. At various points in the instructions, you will be asked to answer a question or capture a screenshot to
document your work – type your answers and place screenshots into this document, then submit this completed Lab Report to the
appropriate weekly Dropbox.
Screenshots
#1. Properties for drive C: (10 points)
#2. chdksk warning (10 points)
8. #3. Backup destination drive (10 points)
#4. New printer (20 points)
Devry CIS 246 Week 5 Lab Report Latest
This document contains the template you will use to complete this assignment. Save the file by adding your last name to the filename (e.g.
CIS246_W5_Lab_Report_EK_Smith.docx).
Follow the steps for this week’s lab. At various points in the instructions, you will be asked to answer a question or capture a screenshot to
document your work – type your answers and place screenshots into this document, then submit this completed Lab Report to the
appropriate weekly Dropbox.
Screenshots
#1. Ping from Windows 7 based on your name (12 points)
#2. Web Server Role (12 points)
#3. Web page with URL based on your name (13 points)
#4. ipconfig information showing DHCP server and IP address. (13 points)
Devry CIS 246 Week 6 Lab Report Latest
This document contains the template you will use to complete this assignment. Save the file by adding your last name to the filename (e.g.
CIS246_W6_Lab_Report_EK_Smith.docx).
Follow the steps for this week’s lab. At various points in the instructions, you will be asked to answer a question or capture a screenshot to
document your work – type your answers and place screenshots into this document, then submit this completed Lab Report to the
appropriate weekly Dropbox.
Screenshots
25 points
In the space provided below, write a minimum of five college-level sentences in your own words that describe your experiences
with this lab assignment. Include an overview of the major tasks accomplished in this lab and any difficulties you encountered in
the completion of this lab assignment.
9. Devry CIS 246 Week 7 Lab Report Latest
This document contains the template you will use to complete this assignment. Save the file by adding your last name to the filename (e.g.
CIS246_W7_Lab_Report_EK_Smith.docx).
Follow the steps for this week’s lab. At various points in the instructions, you will be asked to answer a question or capture a screenshot to
document your work – type your answers and place screenshots into this document, then submit this completed Lab Report to the
appropriate weekly Dropbox.
Screenshots
Task 2Configure the networks file
Step 2: Append network
Clear the screen and use cat to display the contents of the /etc/networks file. Capture the Element K desktop in the text box
below.
DeVry Courses helps in providing the best essay writing service. If you need 100% original papers for Devry CIS 246 Full Course Latest,
then contact us through call or live chat.
Download File Now