Best writers. Best papers. Let professionals take care of your academic papers

Order a similar paper and get 15% discount on your first order with us
Use the following coupon "FIRST15"
ORDER NOW

Assignment05

Every department and dormitory should be placed on their own subnet. When you design the subnetting make sure your design supports the following: (3 points) 3 subnets for 3 dorms each should support 400 hosts 4 subnets for 4 departments. The subnet for students should accommodate 300 students. All professors from all departments should be placed on the same subnet with a maximum capacity of 60 hosts. . A subnet for the administrative department which should support at least 30 hosts. The assigned IP address is 10.10.32.0/20. Do you think that using this IP address you can create all the necessary subnets with minimum wastage of host IP addresses? If yes, then design the subnet structure by showing the subnet names, subnet (network) numbers, subnet mask, and valid range of host IP address for every subnet. If no, then design the network that supports as many bigger subnets as possible and explain why you could not make all subnets.

Which of the following is an action that must be

Question Which of the following is an action that must be taken during Technology Maturation and Risk Reduction Phase to provide for effective cybersecurity?   1) Formulate cybersecurity performance and affordability parameters as requirements   2)  Ensure the final product baseline includes cybersecurity design/configuration  3)  Establish cybersecurity-relevant technical performance parameters and update the technical review entrance and exit criteria in the SEP  4) Establish and implement program and system cybersecurity and related program security metrics

What is the relationship between Systems Security Engineering (SSE) and

Question What is the relationship between Systems Security Engineering (SSE) and Program Protection?   1) SSE is a sub-discipline of Program Protection  2) Program Protection is a sub-discipline of SSE  3) Program Protection is the discipline that implements SSE   4) SSE is the discipline that implements Program Protection

Which key item associated with an Authorization to Operate (ATO),

Question Which key item associated with an Authorization to Operate (ATO), documents the results of the security control assessment?   1)  Preparation of the Security Authorization Package (SAP)   2) System Authorization Report (SAR)   3)  System Categorization   4) Selection, Implementation, and Assessment of Security Controls

Heuristic evaluation Guidelines review Consistency inspection Cognitive walkthroughs Formal usability

Question Heuristic evaluation Guidelines review Consistency inspection Cognitive walkthroughs Formal usability inspectionIn the first paragraph of this please help explain and describe one of these methods. Give both pros and cons for using this kind of method in project development. In the second paragraph please help me explain in the same way the first tool was for a second design tool from the list.

Pick a set of heuristics (Norman’s, Eight Golden Rules, Heuristics

Question Pick a set of heuristics (Norman’s, Eight Golden Rules, Heuristics for Gaming) and an interface to demonstrate how the heuristics apply (Word, Excel, Outlook, a game, etc) 2) Pick 5 of heuristics 3) make a presentation with Power Point

XML security standards, Research paper – I’m just looking for

Question XML security standards, Research paper – I’m just looking for an outline for a 8-10 paper. />Thanks in advance

Which of the following are components of the DoD’s response

Question Which of the following are components of the DoD’s response to cybersecurity threats? 1) Attack and Redundancy 2) Preparation and Mitigation3) Threat and Attack. 4) Denial and Resilience.

how netflix was able to use information systems to improve

Question how netflix was able to use information systems to improve decision making in a collaboration effort

Part 1:Technology changes offer great opportunities. However, it also causes

Question Part 1:Technology changes offer great opportunities. However, it also causes disruption. While technology presents many benefits to those who can afford access to it, those without quickly fall behind. At a global scale, many underdeveloped countries still have limited access to technology.How has the proliferation of internet, online, and computer technologies impacted underdeveloped countries? How do those compare to the impacts on developed countries? Part 2:As a separate post that is titled Part 2, use a resume builder to complete your resume and incorporate appropriate technological skills that you have gained. Additionally, identify appropriate workplace skills that might be appealing to a potential employer, from a technological perspective.

Questions: style=”color:rgb(0,0,0);background-color:rgb(246,236,183);”>1) Describe some reasons why Linux is installed on

Get college assignment help at Smashing Essays Question Questions: style=”color:rgb(0,0,0);background-color:rgb(246,236,183);”>1) Describe some reasons why Linux is installed on only a very small fraction of desktop computers. Are there particular categories of products or users who might see Linux as more appealing than conventional operating systems? Do you think Linux’s share of the desktop market will increase? Why or why not?2) What are some of the benefits of cloud computing? What are some of the drawbacks? Find an article about cloud computing online. Summarize and critique the article. Be sure to include the url of the article.3) Describe the hardware and software requirements of your chosen information system. Be sure to consider both the server-side and client-side hardware and software. If you do not have access to specific details about the server-side hardware and software, make reasonable assumptions based on the kind of hardware and software that you believe would be necessary to run your system.

How are various evidence-based practice (EBP) models used to achieve

Question How are various evidence-based practice (EBP) models used to achieve the goal of knowledge transformation? This topic expands on the information you have read concerning information vs. knowledge. Why and how must knowledge be transformed to be relevant, useful, and accessible to improve health outcomes through EBP?

  • Identify a hidden drawback and its consequences to the consumer

Question

  • Identify a hidden drawback and its consequences to the consumer using loyalty cards.How does the possible theft of this compiled data affect the situation?

One of the three main tenants of information security is

Question One of the three main tenants of information security is availability. It is also one of the least thought about. Explain the importance of availability? Do you believe it should be more important than the other two tenants (confidentiality/integrity)? Why is it important to know the value of your data when it comes to availability?

how does maritime transportation impact the economy? Please share your

Question how does maritime transportation impact the economy? Please share your thoughts and include an example.

“Seriously addressing and correcting STRIDE threat is an important step

Question “Seriously addressing and correcting STRIDE threat is an important step in the threat modeling process”. i need to write an essay describing techniques used to authenticate and also ensure privacy when addressing threat modeling on your job. Include in this paper:Two examples of authentication process used.Two steps used to ensure privacy.plz help

I need help with the course IFSM-300 at UMUC, for

Question I need help with the course IFSM-300 at UMUC, for the Stage 4 March 2019 version />IV.         System Recommendation A.     System Justification Provided with the Stage 4 Assignment Instructions is a brochure that describes an IT solution that the CIO has selected, with the HR Director’s endorsement, to meet the needs of improving MTC’s hiring process.  In Stage 1, you analyzed the strategy and objectives for MTC and how a technology solution to improve the hiring process would contribute. In Stage 2, you analyzed how to improve the hiring process with a technology solution, and in Stage 3 you identified specific requirements. After reviewing the EZ-ATS Brochure, briefly describe the selected solution. Then, describe how that selected solution aligns with achieving the strategy, improves the process, and meets the requirements. Write two to three clear, concise, well-organized paragraphs to summarize this assessment. Don’t just repeat information from previous stages but synthesize this information and provide strong information and justification to explain why this proposed solution is a good fit for MTC. Remember you are writing a report to your boss, the CIO of MTC, that he can use to convince the leadership team why this is the best solution based on your analysis.B.     Implementation Areas  To successfully implement this technology solution, MTC will need to develop an Implementation Plan and below is a list of key implementation areas that should be included. First, provide a brief introduction to this section – what it contains and why an Implementation Plan is so important for MTC. Then address each of the seven (7) areas below to explain what MTC needs to do (with support by the vendor). Below the numbered heading, write one to two paragraphs to address the area. The sub-areas (a,b,c, etc.) contain questions and areas to help guide your thinking about what should be covered and should be incorporated within your response to the major category. For an explanation of the implementation areas, refer to the Week 7 Reading “Implementing a SaaS Solution”. The vendor brochure provides information for some of these areas, but you need to include what MTC must do as well.  Remember you are writing this section to help MTC plan for a successful implementation. It is not sufficient to just indicate “Vendor provides” or “employees need to be trained.” In addition to incorporating course content, external research on implementation areas will strengthen your understanding and explanation.  The goal for this section is to help MTC know what needs to happen in each area to help support a successful implementation of EZ-ATS. 1. Vendor agreement (MTC must enter into a contractual agreement with the vendor before full implementation. This identifies responsibilities as well as costs.) Incorporate answers to the following questions in your paragraph – do not include the questions themselves.a. What does the vendor require from MTC to be able to start using the system?b. How much will it cost to get access to and configure the system for MTC’s use? c. How much will it cost per month to support 60 system users? d. What option is offered for MTC to just try out the system to see how it works?2. Hardware and telecommunications (Although this is a SaaS solution, MTC must ensure that its IT infrastructure can support the use of the system and that its employees can correctly access the system.) Include the following:a. List the types of hardware MTC employees can use to access the system. b. Identify what kind of telecommunications will be used for the solution, including local connectivity inside MTC and Internet access from outside MTC.3. Configuration (Even SaaS solutions require a degree of configuration for each client. What needs to be done to implement the MTC job requisitions, workflow, reports, terminology and/or logo/graphics?) Include the answers to the questions below, but not the questions themselves.a. What options does the vendor offer for configuring the off-the-shelf system to MTC’s needs? b. How will the configuration be done and by whom? 4. Testing a. Once MTC has signed up and configured the system, how will it test the system to see if it is working properly for its needs? Describe how MTC will conduct User Acceptance Testing. (This would be a good area for you to research.)b. Choose one of the user requirements (listed in Section III of your BA

List and describe the two dimensions the role of IT

Question List and describe the two dimensions the role of IT has in an organization. Also, include the four broad roles of IT.

Case Study 1: The Brazilian Federal Data Processing ServiceRead the

Question Case Study 1: The Brazilian Federal Data Processing ServiceRead the case study titled, “Brazil to fortify government email system following NSA snooping revelations,Use the Internet to research the architectures that other government organizations and intelligence agencies use for email privacy, if any.Three to four (2-3) page paper in which you:Examine the proposed business ethical problem that the Brazilian Federal Data Processing Service is presently experiencing. Determine whether you agree or disagree that Brazil’s problem is an ethical one that should be corrected. Provide a rationale for your response.Assess the levels of security deficiencies inherent in the Brazilian Federal Data Processing Service original enterprise architecture. Conclude whether or not Brazil could have previously considered its current problem and built an original architecture that would have prevented the problem in question. Provide a rationale for your response.Evaluate the quality of the Brazilian Federal Data Processing Service’s proposed architecture plan geared toward solving the security problem. Suggest two (2) other possible architecture solutions that the Brazilian Federal Data Processing Service should consider. Justify your response.Determine whether or not one (1) of the governments or intelligence agencies that you researched has taken precautions to avoid a security breach similar to the one that the Brazilian Federal Data Processing Service had experienced. If this government organization or intelligence agency has taken precautions to avoid a similar security breach, provide one (1) example of such a precaution. If this government organization or intelligence agency has not taken precautions to avoid a similar security breach, recommend one (1) action that it can take in order to avoid a similar security breach.Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.Your assignment must follow these formatting requirements:Be typed,using font (size 12), with one-inch margins on all sides; citations and references with proper format. Check with your professor for any additional instructions.The specific course learning outcomes associated with this assignment are:Analyze the types of organizational and computer architectures for integrating systems.Develop an enterprise architecture plan to address and solve a proposed business ethical problem.Use technology and information resources to research issues in enterprise architecture.Write clearly and concisely about Advanced Computer Architecture topics using proper writing mechanics and technical style conventions.Note: Use quality resources for assignment Grading for this assignment will be based on answer quality, logic / organization of the paper, and language and writing skills, using the following rubric.

When conducting your own data backups to media or tape

Question When conducting your own data backups to media or tape where should you store your back up in order to have it available to you should your server room be destroyed?

You politely tell Wanda you have some work to get

Question You politely tell Wanda you have some work to get done before the meeting, and you assure her that the team will address the concerns she has. “I’m hoping not to get blamed for choosing Véracité,” she admits. “But the person I really feel awful for is Annette. She was trying to do the right thing, and not only did her company shut her down, now her private communications are out there for all of us, and all of Véracité, to see.” She stands up. “Anyway, I’ll let you get to it.” You now know that the primary issue is how to use Annette’s memo to benefit consumers and advance your company’s goals while honoring the standards that protect confidential information. You may think that only your company and Annette are involved. However, if you think a bit, you’ll realize that other people have a stake in this situation as well. Every ethical dilemma involves more than just you and one other person. In ethical decision making, we call people who may be affected by your decision stakeholders. As you are Being Intelligent, you’ll consider the people involved in the dilemma and determine who’ll be affected by your decision. Expanding your circle of concern and consideration allows you to make your decision intelligently, as you’ll have a greater understanding of the potential consequences. Stakeholders can be divided into primary and secondary groups. Primary stakeholders are those who:Have to take action or are directly involved in this situation, such as the decision-makers in your company;Will be significantly impacted by your action, or even those affected by your inaction; orHave interests that should be protected, such as your business partners.Secondary stakeholders are those who:Are so far removed from the situation that you don’t have to worry about them,Have delegated responsibility to others, like Wanda, who is now relying on a team decision; orAre interested observers but don’t have any real involvement in the situation, such as groups or agencies far removed from your decision.Below is a list of people who might qualify as primary stakeholders. Only six of them are primary stakeholders. Four of them are secondary stakeholders. Check the six people or groups of people you think are primary stakeholders. Who are the primary stakeholders in this problem?  You, Chief Information Officer of G-BioSportYou are responsible for recommending a course of action to the leadership team. Annette Girard, Director of Clinical Research of FR Pharmaceuticals and the author of the confidential memo you possessShe raised concerns about FR Pharmaceuticals omitting data. Now, her memo is in your hands. The U.S. Food and Drug Administration (FDA)They are currently evaluating whether or not to approve Armexotrol for sale in the U.S. Your information could change their mind. Carson Nelson, Chief Executive Officer of G-BioSportYour recommendation on how to proceed goes directly through Carson. The final decision is his to make. Wanda Sellers, the EVP of Sales and Marketing of G-BioSportShe engaged Véracité, and she brought the memo to the leadership team’s attention. Current and future users of ArmexotrolThe evidence in your possession suggests a damaging side effect that consumers of the drug aren’t currently aware of. Norman Yang, your friend at the FDAYou have the opportunity to send the confidential memo directly to Norman. He could then use it to delay or halt Armexotrol’s approval. The European Medicines Agency (EMA)They approved Armexotrol for sale in the EU. If it is proven unsafe because of Annette’s memo, they’ll look irresponsible. Véracité, the marketing firm hired to research ArmexotrolThey prepared the report that included Annette’s memo. How they got that memo is still unknown—but they certainly aren’t supposed to have it. FR Pharmaceuticals, the makers of ArmexotrolThe memo you have can significantly impact their U.S. product launch.- Exactly 6 stakeholders must be selected!

 
Looking for a Similar Assignment? Order now and Get 10% Discount! Use Coupon Code "Newclient"