Posts

[Solved] Question 4 Network

[Solved] Question 4 Network

Business Case: Airport IT Network Expansion

An airport authority is seeking your expertise to establish a new IT network infrastructure for its operations. Here are the specifics of the given case.

The airport has a central terminal building with various departments and facilities that need to be interconnected through a robust network.

Within the terminal building, there are:

– Four administrative sections, each housing 30 desktop computers.

– Each section requires 10 portable/laptop computers with wireless connectivity (WiFi).

– A network printer is necessary for shared use in each administrative section.

– It’s imperative that all computers within each administrative section have access to the network.

Additionally, there is a Data Room within the terminal building containing:

– Databases for passenger and flight information.

– Databases for employee records.

– A Printer Server to manage printing for LANs.

– Web Server for internal applications.

– Email Server for communication within the organization.

Your role involves designing and illustrating network diagrams to visualize the proposed solutions.

Question 1: (Network Diagram 1) Develop and draw a network diagram depicting the LOCAL AREA NETWORK (LAN) for one administrative section within the terminal building. Focus on detailing the network setup for this specific section.

Question 2: (Network Diagram 2) Develop and draw a network diagram for  INTRANET. This network will connect all computers within the central terminal building, enabling them to communicate with each other and access the resources within the Data Room as well.  

Question 3: (Network Diagram 3) The airport authority operates branches in three different cities: DC, NYC, and MIAMI. Design an EXTRANET diagram to establish private communication between all sites. The Extranet should provide access to shared resources while maintaining security protocols.

Question 4:(Network Diagram 4)  Update your EXTRANET diagram to include provisions for internet connectivity. This addition will allow all branches and the central terminal to have access to the internet while safeguarding the network’s integrity.

Use https://www.draw.io  to develop/draw network diagrams

[Solved] Recursive Descent Parser

[Solved] Recursive Descent Parser

Write the two programs, needed to complete the assignment in c++, look at the Assignment 1 file for instructions for the first program and look at the Assignment 2 file for instructions for the second program. Everything needed to complete the assignments are posted, the assignments are connected, but two different programs.

Consider the grammar of “mini-language”, provided in file “grammar.txt”, and implement a lexical analyzer (a.k.a. scanner, lexer or tokenizer) for it

Consider the grammar of “mini-language”, provided in file “grammar.txt”, and implement a top-down, predictive, recursive descent parser for it. 

[Solved] 10 Real World Applications

[Solved] 10 Real World Applications

 

  1. Go to the Ailatech.com websiteLinks to an external site. and read their article on 10 Retailers who are using QR codesLinks to an external site.. Choose two of the retailers and compare their experiences. Would you use this type of app? Explain your answer.
  2. Go to Analytics Vidhya website’s page,  10 Real World Applications of Internet of Things (IoT) – Explained in VideosLinks to an external site., and choose two of the industry sector IoT videos. View the videos and write a report about what you learned about IoT use. What surprised you the most? What information was new to you?
  3. Visit the AT&T website’s page, and read the article What you Need to Know about IoT Wide Area NetworksLinks to an external site.
  4. Write a short report discussing the benefits of each type of network that can be used in an organization’s IoT and make a choice for your “business.”

Your paper should be in APA format and 3-4 pages, not counting the title page and reference pages. Make sure you have in-text citations and a reference page.

[Solved] Also Dont Use Chat

[Solved] Also Dont Use Chat

 

Write a concise, but complete report that answers the questions below.  Support your responses with citations (hyperlinks are okay).  

Part 1:  Use the National Vulnerability Database to look up the following vulnerabilities:  CVE-2019-13450 and CVE-2019-13567

1.  What are the vulnerabilities described in these two entries?

2.  What are the CVSS scores for each vulnerability?  Why is one rated to have a higher CVSS score than the other?  Explain.

3.  What STRIDE aspects apply to the vulnerabilities?

4.  What individuals / organizations provided references for these advisories?

Part 2:  Use the keyword search feature of the NVD to find a vulnerability affecting a commonly used software/service/platform (hint:  you can search by company name).    

1.  What is the CVE?  Provide the identifier and a link to the description.

2.  Give a brief description of the vulnerability in your own words.  No need to go into specific technical details, just a high-level description.  

3.  What is the CVSS score?  What factors merited the vulnerability receiving that score?

4.  Based on the entry can you tell:  who discovered it; whether an exploit exists; and if it has been patched.  Provide links to the appropriate references.   

and also dont use chat gpt coz my cllg can detect it very easily thank you 

[Solved] Addressing Course Learning Objective

[Solved] Addressing Course Learning Objective

 

For this week’s assignment, you will be addressing course learning objective 1.

You will be diagramming the course and impact of a real-world foodborne illness outbreak, choosing one of the outbreaks noted in these assignment instructions. Your diagram will be a one-page infographic that visually identifies and explains the way the outbreak occurred, from source to victims.

In short – your infographic should be a one-page document that shows graphically – using images and a few short explanations – the way a foodborne illness was transmitted from the source to the victim. That is – begin at the beginning. What food item became contaminated by a pathogen and caused the illness? How did that pathogen contaminate the food, and why/how were the victims served that food? There are safe food preparation practices that can prevent many foodborne illness outbreaks – what was the critical error that caused the contaminated food item to be served and caused illness?

The infographic must include the information noted below.

Name of the foodborne illness outbreak (the illness it caused)

Cause of the outbreak (virus, bacteria, parasite, etc.) – this is the actual pathogen

The path from source to victim, including the number of victims

The CRITICAL point where the outbreak could have been prevented must be identified. Identify if this was caused by a grower/producer, manufacturer, restaurant error, or something else.

A precaution (if possible) that would have prevented this outbreak

Your sources must be included, but they do not have to be formatted in APA format – you may include links to your online sources.

You may use any of the following to create your one-page infographic: PowerPoint (one slide), MS Word (save as a .pdf to preserve your formatting), an infographic creation site or software, such as Canva (www.canva.com for a free account). Please note that if you use a specific software other than Microsoft or Adobe, you may be required to convert it to a file that your instructor can open. Keep that in mind and if you have questions about whether or not your instructor will be able to open your file, please ask in advance.

Be sure to review the tips posted below the instructions in the course menu, for an example of the expectations for the infographic.

You may use any of the real-world outbreaks noted below for this infographic. If you wish to use a different outbreak that is not listed below, please contact your instructor for approval. You will have to research the specific outbreak in order to find the necessary information to complete the infographic and include all the required information. Hint: The CDC has very good information beyond what the web can provide for you – you must use at least two sources. https://www.cdc.gov/foodsafety/outbreaks/multistate-outbreaks/outbreaks-list.html

The sources must be reliable, academic resources. For tips on finding academic resources, please visit the student academic resource center in the library. https://www.apus.edu/apus-library/online-research/search/getting-started.html

Choices for outbreak cases for the infographic:

Salmonella Newport outbreak – October 2020 – U.S. and Canada

Salmonella Enteritidis – August to October 2020 – across the U.S. (fruit)

Salmonella Enteritidis- February through June 2021 – multiple U.S. states

Shiga toxin-producing Escherichia coli – Fall, 2020 – multiple U.S. states

e. Coli – May 2021 – Washington State, Arizona

Botulism – 2017 – California

The suggestion for successfully completing this assignment is to first review the instructions and rubric, then choose the outbreak you will use. Research that outbreak to be sure you have all the necessary information. Begin by outlining all the required information prior to starting your infographic to ensure you are including everything that is required.

Refer to the iRubric for details on how the assignment will be evaluated. Please ask for any necessary clarifications prior to submitting your assignment.

[Solved] Tells Us Absolutely Nothing

[Solved] Tells Us Absolutely Nothing

I have attached the rubric and the rest is here:

Please see the rubric for the details of how I grade. If something is missing – you get a zero for that portion. 

  • 55% Write reflectively and thoughtfully for at minimum 500-700 words (25%). Use Case Study (20%). Frame the problem without using the words “victim” or “criminal” – use people first language (5%). Make a reference to Robbins and Dowty Chapter 8 or my MODULE VIII Introduction to “Cultural Construction of Violent Conflict” (5%). What gives you hope?
  • 15% Add urls of websites, embed videos about peace-building efforts, reconciliation, restorative justice, etc. for your case study. Describe the resources you add to the board in detail. Don’t just paste them in and say, “This is interesting” (which tells us absolutely nothing and will not get credit). Tell us why you chose it and why it is important.
  • 10% Embed one image – one image of abstract art, a meme, a comic strip (etc etc) that says something you want to say visually. (Use the picture of a camera icon on the left top of the text box)

[Solved] Bulleted Fashion Submit Three

[Solved] Bulleted Fashion Submit Three

For this assignment, on a Word document, you will do the following

https://youtu.be/mVRYSC8YyYA?si=kzRVBQZ1oBzh7bQ1

https://youtu.be/O0xdaCEqrU0?si=y8Jy6slC1YdKhdh0

https://youtu.be/5Gwrd9dc1YI?si=zVQdkIRNvnjkUN2R

  • In a bulleted fashion submit three key points for each of the three videos. First name the video then underneath the name of the video put the key points in a bulleted fashion. They key points must be well written and thoughtful and complete sentences.
  • Three Videos Overall Reflective Summary. On the same document after the key points, write one brief paragraph from information that you learned in all the videos (about 6-9 sentences) discussing the following:
    • Why is differentiated instruction and assessment useful for all learners?
    • What do you think will be some of the challenges of implementing differentiated instruction?
    • What are some of things you will do as a teacher to overcome these challenges?

[Solved] Pop Culture Happy Hour

[Solved] Pop Culture Happy Hour

https://lms.hypothes.is/app/basic-lti-launch

  1. Click the large gray button below that says “Load 3.1 Social Annotation Analyzing a Podcast” to be taken to the reading with the social annotation tool Hypothes.is activated.
  2. Read the transcript for the podcast “Bad Bunny Unleashes a Genre-Smashing Summer Blockbuster” from NPR’s Pop Culture Happy Hour.
  3. Look for one example of each of these rhetorical elements as you read.
    • ethos (credibility or trustworthiness established through professional expertise, research, education, work, or experience)
    • pathos (emotion that helps listener relate to topic)
    • logos (facts, examples, reasoning that help the listener understand and relate to the topic)
    • audience (the target demographic and details that reveal the demographic)
    • purpose (inform, persuade, entertain)
    • language (formal, informal, conversational, academic plus organization of information)
    • audio (music, sound effects, background sound/ambiance, silence and their effect on the delivery and composition of the podcast)
  4. Create an annotation for at least two rhetorical elements. Analyze how each element is operating and its effect on the podcast. Tag each annotation with the corresponding term. (Select new examples that other students have not analyzed.)
  5. Reply to at least two of your classmates annotations with a comment or question about their analysis of the rhetorical element.

[Solved] Working Bibliography Create 4

[Solved] Working Bibliography Create 4

This two-part assignment must be labeled as “PART A: Research Proposal” and “PART B: Bibliography”. Submit as one document. 

PART A: Research Proposal

Create your Proposal in a 450-500 word response. Note reminders to assist you in writing your proposal. There is no one format for the Proposal; do not get lost in Proposals that are for Master’s or Doctoral studies. For your research writing, consider presenting in this format: 

  1. Research Objectives: in one paragraph or in bulleted points, state what the project is aiming to do.
  2. Background Information: in one or two paragraphs or in bulleted format, include background information you have gained about the issue. What is your knowledge thus far on the issue? What have you found out? How does it make you feel?
  3. Methodology: as you begin to determine your stance on the issue, move to build your research method. Determine how you plan to actually research the project. Earlier lessons have moved you through selecting and documenting sources; make sure to do so wisely. But continue to illustrate that you have worked through the best possibilities for your research journey.
  4. Conclude by reiterating what you believe you will uncover and possibly solve.

PART B: Bibliography 

Create your Working and Annotated Bibliographies. There is no defined word-count for this part of the assignment.  

  • Aim for 8-12 sources for your Working Bibliography 
  • Create 4-6 summaries for the Annotated Bibliography 
  • All bibliographical information must be included 
    1. Create a Working Bibliography that lists possibilities that show that you are examining varied literature to gain knowledge on the subject and issue—later to be trimmed or altered.
    2. Create an Annotated Bibliography of selected works from the Working Bibliography; this should be a selection of about half of the Working Bib where you summarize the significance of the authors’ findings; each summary should run 3-5 sentences. 

[Solved] Planned Firewall Architecture Provides

[Solved] Planned Firewall Architecture Provides

 

Almost all of us have some type of Ethernet network at home. Usually, the Internet service provider (ISP) installs a gateway to the Internet at your house, and your network connects to the gateway using a home router. The TCP/IP stack of your intranet computers are configured to use the ISP router as a gateway to the Internet. Many of us also use Wireless Ethernet (IEEE 802.11 standard) to connect to the Internet. .

For this interactive assignment, assess your current home network. (If you do not currently have a home network, you may consider your work network for this assessment.) In a separate document, create a diagram that illustrates your intranet setup and your Internet connection. Consider the potential vulnerabilities of your current network setup as well as your digital resources. Create a second diagram in your document that illustrates an ideal network, including firewall(s) and other controls that would protect your digital resources against hackers. Attach your completed diagram document to your initial post. Within the initial post, explain how the design of the network best suits your needs and typical usage. Additionally, explain how your planned firewall architecture provides better security than your current network setup.