Obsolete Hardware Devices from 10 Years Ago

Obsolete Hardware Devices from 10 Years Ago Discuss two hardware devices from 10 years ago that have become obsolete.

Obsolete Hardware Devices from 10 Years Ago
Obsolete Hardware Devices from 10 Years Ago

Explain how changes in technology contributed to each item’s obsolescence. Provide specific examples to illustrate your ideas.
Think about current hardware commonly used in organizations and predict which device may be obsolete 10 years from now. Justify your selection using reasons, facts, and examples. From the iPhone to the Garmin, advancements, and gadgets introduced this decade changed the whole world.

They’ve affected how we live, do business, acquire information, and connect with others.

We’ve gotten used to touch-screens, blazingly fast Internet, and the ability to have the world at our fingertips in seconds.

Self Training Webinar over PHP and MySQL

Self Training Webinar over PHP and MySQL Self Training (Webinars)
For this professional development activity, an online webinar is to be viewed by the student. The webinar must relate to the class and be at least 1 hour in length.

Self Training Webinar over PHP and MySQL
Self Training Webinar over PHP and MySQL

A different webinar will need to be used for each class should a student be given this assignment in multiple classes. Upon completion of the webinar, the student is to write a summary essay about the webinar.
The summary essay is to include:
This first section should have a heading of “Webinar Location“. The location of the webinar must also be included in the report. The report should start with the webinar location before detailing any of the report information. If the webinar is not
available through the information given, the report will be considered invalid. A notation to the reader should be here also if the webinar will require the signing up on a service.

Self Training Webinar over PHP and MySQL

If you happen to be using a pay service provided by a third party, the instructor most likely will not have that pay service at their availability. This would be counted as unavailable to the instructor and invalidate the report.
This second section should have a heading of “Webinar Summary”. The next section of the essay report that summarizes the contents of the webinar, should give no less than a list of the topics covered in the webinar. There should be more than just a list, there should be summaries of each of the topics covered in the webinar. A single paragraph cannot be used to summarize an hour long video. This is not to be a list of bullet items thrown together either. This section needs to be written like an essay with complete sentences and paragraphs.
This third section should have a heading of “Webinar and Course Coverage Comparison“. The next section of the essay report will detail out how the webinar relates to the class. Possible topics include mapping the webinar topics to the module in the class or the chapter in the text or the specific topic which the class and webinar both cover.

Self Training Webinar over PHP and MySQL

The student is to compare the coverage of the topic by the class and the coverage of the topic by the webinar. If a student chooses a topic not yet covered in the class at the time they watch the webinar or write the essay, the student will need to read ahead in the text and base the comparison on those readings. If there are portions of the webinar that the student would recommend others to view in relation to the topic, that information will also be presented in this section of the report along with why those sections of the webinar are recommended.
This fourth section should have a heading of “Presenter and Presentation Critique“. The next section of the essay report will take a different viewpoint. This section is to focus on the delivery and coverage style of the webinar instead of the content of the webinar. The section is to discuss HOW the topic was covered instead of WHAT the topic was. The section is to critique the webinar on the HOW and the METHODS used in conveying the information to the watcher. Not every webinar is for every person. The student is to look beyond the content and look at the way the content was presented. A webinar can have great content but be delivered in a way the viewer cannot process it. There are different learning styles.
The use of proper grammar and correct spelling will be part of the criteria on which this report will be evaluated. Word choice, fractional sentences, missing subject, and incorrect presentation voice are just some of the items that fall into this criteria. There is not a minimum length given but this is not a brief assignment and can not be properly completed without a significant level of detail presentation.

Self Training Webinar over PHP and MySQL

A report should be proofread before being submitted.
Reports on webinars that the instructor does not find relates to the class will not be considered valid either. If there is ANY question in the mind of the student on if a Webinar is acceptable, the student should contact the instructor for prior approval of the webinar. Webinars must be accessible by the instructor for evaluation so many internally presented webinars will not be accepted as the instructor will not have access to the webinar.
No other forms of self-based training will be acceptable for this professional development activity. This activity focuses on web-accessible webinar-style presentations.

Network Threat Identification Assignment

Network Threat Identification
                   Network Threat Identification

Network Threat Identification

Using a free timeline creator of your choice, create a timeline that outlines the history and evolution of cyber security threats.

Be sure that the timeline includes the following:

-A history of viruses, malware, and other recurring software enigmas
-A history and explanation of the birth of ransomware
-The evolution of firewalls and other network security defense systems
-The initiation of white hat vs. black hat hacking
-The evolution of tools (software and hardware) used to mitigate cyber security threats
-The historical exploits affecting current security architecture and deployment

We can write this or a similar paper for you! Simply fill the order form!

Database capabilities for organizational data management

Database capabilities for organizational data management
         Database capabilities for organizational data                                    management

Database capabilities for organizational data management

Assignment Overview
The case for this module revolves around the question of large-scale data and the implications of database capabilities for organizational data management. As we’ve said, the change from data as a scarce resource to data as overabundance is still a major concern for organizations. Here, you’ll have a chance to consider the value of data and information. Data storage and management was seldom considered a particularly exciting topic; however, when data is used for making better decisions and/or enhancing organizational performance, it is amazing how quickly organizational (and personal) interest can be created.

The new state of having rather too much data to fit into the established databases is increasingly called “big data.” Big data arises from a combination of cheap storage, multiple data input streams, and a general sense that with all of this, there ought to be valuable data in there somewhere. Here are a couple of sources that begin to discuss these issues; you can undoubtedly find more:

Challenges and Opportunities with Big Data (2013).

Mehrotra, P., Pryor, L., Bailey, F. and Cotnoir, M. (2014). Supporting “Big Data” Analysis and Analytiics at the NSAS Supercomputing Facility. NAS Technical Report: NAS-2014-02.

Kaisler, S., Armour, F., Espinosa, J.A., and Money, W. (2013). Big data: Issues and challenge moving forward. 46th Hawaii International Conference on Systems Sciences, 1-10.

The trick to coping with “big data” is, of course, better data analytics — that is, that set of statistical mining, and related analytical tools that can be used to identify patterns in the data, assess a variety of associations, and generally illuminate the knowledge that might otherwise be buried in the mounds of numbers. Today, analytics is a rapidly expanding field.

Raghupathi, W. and Raghupathi, V. (2014). Big data analytics in healthcare: Promise and potential. Health and Information Science and Systems, 2(3), 1-10.

ISO/IEC JTC 1 Information Technology Big Data, Preliminary Report, 1-36.

Fujitsu (2015). The White Book of Big Data: The definitive guide to the revolution in business analytics.

So the case for this module revolves around the challenges of “big data” — that is, how to manage it, create reasonable analysis strategies, and at the same time avoid becoming totally dependent on it. Data makes a very good servant, but not a very attractive master.

Case Assignment
When you’ve had a chance to read these articles, anything from the Background that is helpful to you, or anything else you may have come across, please write a 3- to 5-page paper discussing the question:

Problems and Opportunities created by having too much data, and what to do about them

Your paper should be between three and five pages. Take a definite stand on the issues, and develop your supporting argument carefully. Using material from the background information and any other sources you can find to support specific points in your argument is highly recommended; avoid making assertions for which you can find no support other than your own opinion.

Your paper is to be structured as a point/counterpoint argument, in the following manner.

Begin this paper by stating your position on this question clearly and concisely
Citing appropriate sources, present the reasons why you take this position. Be sure to make the most effective case you can.
Then present the best evidence you can, again cite appropriate sources, against your position — that is, establish what counterarguments can be made to your original position.
Finally, review your original position in light of the counterarguments, showing how they are inadequate to rebut your original statement.
By the end of your paper, you should be able to unequivocally re-affirm your original position.

Assignment Expectations
Length: Follow the number of pages required in the assignment excluding cover page and references. Each page should have about 300 words.

We can write this or a similar paper for you! Simply fill the order form!

Unix fundamentals Assignment Available

Unix fundamentals
Unix fundamentals

Unix fundamentals

You have created the directory structure and some base files to be used by the Web server and Web site. For the Web site to be created in a production environment, you need to package your commands in a script so that the patching team can run them on the production environment. Your task for this assignment is the following:

Create a Bourne shell script. The script should do the following:

Explain what the script will do and who is the author in a comment area.
cd to your home directory
Show your current working directory.
List the contents of the current directory.
Create the directory structure and create the files as defined in the previous Individual Project.
For each directory and file, test to see if the file or directory already exists; if it does exist, do not recreate; if it is missing, create it.
In the end, generate a directory listing showing the structure and content of the new directories.
At the beginning of the script, set a variable called INSTALL_DIRECTORY that will contain the location of the directory into which the Web server will be installed. At the end of the script, display the contents of this variable along with a message to the installer about the location in which the directories were created.

A small hint for creating the content of the httpd.conf file: use the echo command in your script. The script is not interactive and should create all objects automatically. Also, the ServerRoot and DocumentRoot should contain correct values based on your directory names.

If you need to test that directories are created or not based on them already existing, remove files and directories ahead of time to ensure you know the exact state of your environment.

Finally, save your script in a Word document as “yourname_IP5.docx”. Click the “Edit” button on this submission node to submit the saved document.

Here are some tips if you have problems to submit your Word document:

We can write this or a similar paper for you! Simply fill the order form!

A function that creates a string of the path to a directory

A function that creates a string of the path to a directory
A function that creates a string of the path to a directory

A function that creates a string of the path to a directory

Given a folder with images in it, create an HTML page named index.html that contains links to each JPEG file in the directory as follows:

Write a function that creates a string of the path to a directory.

Generate a thumbnail (half the size) copy of each image.

Use makeEmptyPicture to create a blank picture in the correct size, then scale down the original picture into the blank picture.

Name the new image “half-” + the original filename (e.g., if the original filename was fred.jpg, save the half-size image as half-fred.jpg). The anchor in the link to each full-size picture should be the half-size image.

Review Ch. 13, “Making Text for the Web,” of Introduction to Computing and Programming in Python.

Zip your Python .py file, resulting HTML, and supporting image files and submit the.zip file so the code can be validated.

We can write this or a similar paper for you! Simply fill the order form!

Computer Files Encryption Essay Paper

Computer Files Encryption
    Computer Files Encryption

Computer Files Encryption

Description

  • Describe the five basic attacks on authentication systems.
  • Outline the symmetric encryption process and explain the components involved in the process.
  • Summarize the different situations in which people use file encryption software.
  • Describe the different categories of asymmetric encryption algorithms and how they are used in practice.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

We can write this or a similar paper for you! Simply fill the order form!

Writing a Program Software Application

Writing a Program Software Application The first step in writing a software application is to determine the requirements. There is no value in writing a program that does not address the needs of the client.

Writing a Program Software Application
Writing a Program Software Application

Requirements can be gathered in many ways, but ultimately, the requirements serve to document what the application should and should not do. After the requirements are written, the application design can be prepared, followed by the actual coding. For this project, you will gain some practice in the design phase of software development by designing a program that will meet a given set of requirements.

In this assignment, you will develop a console program that simulates a restaurant menu. The project instructions are as follows:

Program Requirements:

Each item on the menu must have a different price.

Your menu must define at least 10 different items.

Program Requirements:

Display the menu to the user.

Allow the user to select an item from the menu. (Record the selection in a variable.)

Once the user has selected an item, ask them how many they want (quantity). (Record the quantity in a variable.)

Calculate the total. (Sales tax is not included in this exercise.)

Ask the user to enter the amount of their payment. (Record this amount in a variable.)

Subtract the order total from the payment amount and present any remainder on screen as the customer’s “change”.

Remind the program operator to thank the customer for their patronage.

Remember to test your program fully to ensure that all functions operate correctly.

Documentation Requirements:

Create a document in Word and add the following:

Title page

Course number and name

Project name

Student name

Date

List the data items that must be stored and used by the program. Each data item should be given a name for reference. Create a diagram that illustrates where this data comes from (such as “selected by the user,” “entered by the user,” “item name from menu,” “price from menu,” etc.) and how it is handled by your program (what happens to that data).

List the decisions the program must make. References to the data items in the previous step should be used where appropriate.

Describe the flow of operation of the program so that a potential user can understand how it works. All key activities should be included, and references to the data items and decisions listed in the previous steps should be used.

Project deliverables are as follows:

Create a ZIP file that includes:

Project folder containing your Java program (see Program Requirements above).

Word document (see Documentation Requirements above).

Upload your ZIP file to the course portal.

t Petersburg State University

(65)

0/3 (100%)

0/0 (N/A)

$175.00

2 days

5

0

assignment

Operating System Interface in Hardware and Applications

Operating System Interface in Hardware and Applications The operating system serves as an interface between hardware and applications

Operating System Interface in Hardware and Applications
Operating System Interface in Hardware and Applications

For this assignment, create a visual representation of the association between the hardware components described in your text in Computer Hardware Review, Section 1.3(CPU, Memory, and Disks) with its associated operating system abstraction described in Operating System Concepts, Section 1.5 (Processes, Memory, and Files). Possible programs for creating your diagram include but are not limited to Microsoft PowerPoint, Microsoft Visio, or bubbl.us. Operating System (OS) is one of the core software programs that run on the hardware and makes it usable for the user to interact with the hardware so that they can send commands (input) and receive results (output).

Book and the Internet on Wireless Attacks

Book and the Internet on Wireless Attacks 1) Using your book and the Internet, please explain the following Wireless Attacks:

Book and the Internet on Wireless Attacks
Book and the Internet on Wireless Attacks
  1. Wardriving
  2. Warflying
  3. Warchalking

Be sure to cite your sources, the post must contain at least three sources (one can be your textbook).

Rob Shimonski would like to thank Martin Grasdal (contributing author on the Security+ book) for original content creation. Martin has by far created one of the most outstanding and complete chapters on Wireless fundamentals and security in the Security+ book that you will find anywhere. In general, attacks on wireless networks fall into four basic categories: passive attacks, active attacks, man-in-the-middle attacks, and jamming attacks.