Computer Science homework help

Unit 3 Graded Practice 1:  Adding a DSLAM
A DSLAM (Digital Subscriber Line Access Multiplexer) is a network device that receives signals from multiple customer Digital Subscriber Line (DSL) connections and puts them onto a single Ethernet connection. In this graded practice you will add a DSLAM which will allow DSL customers to connect to your network.
DSLAM in Packet Tracer
The DSLAM in packet tracer is found in network devices on the far right side.  Click on the cloud and then select PT-Empty from the right side and drag it to your desktop.
 
Click on the cloud and turn the power off (you may need to scroll to the right).  Fill the DSLAM with nine PT-CLOUD-NM-1AM are cards placed in all slots except the bottom left.  In the bottom left add a PT-CLOUD-NM-1CGE card.  This will give you 9 DSL connections for customers and a Gigabit Ethernet port to connect your DSLAM to the network.
Now turn the power back on.  Take a screenshot of your DSLAM.
Programming your DSLAM
In order for the DSLAM to transfer traffic from the DSL modem to the Ethernet port you must program the DSLAM.  Open the config tab and go to the DSL item under the Connections list.
On the right you will see your DSL to Ethernet connections.  Click the Add button.  You will see this will add the connection from Modem0 to the Ethernet port on the DSLAM.
Select from the drop down menu on the left Modem1 and click add.  This will add the second connection from Modem1 to the Ethernet port.
Continue adding ports until all modems have been added to the list.  Your DSLAM is now ready to add to your network.
Add a router
Add a 1941 router to your network and connect from your DSLAM to the G0/0 port on your router using a straight through copper cable.
Go to your router and programming as follows
Router> enable
Router# configure terminal
Router(config)# hostname R1
R1(config)# interface G0/0
R1(config-if)# ip address 10.___.1.1 255.255.255.0
R1(config-if)# no shutdown
 
Program a DHCP pool onto your router
 
R1(config)#ip dhcp pool mypool
R1(dhcp-config)#network 10.___.1.0 255.255.255.0
R1(dhcp-config)#default-router 10.___.1.1
Add a DSL modem from the WAN emulation tab
Connect from your DSL modems to the DSLAM using a phone cable and connect a computer to your DSL modem using an Ethernet cable.
 
 
 
 
 
 
 
 
 
 
Go to your PC and pull an IP address from your network.  To do this all you need to do is go to the Desktop tab of the PC and select DCHP under IP Configuration.
Take a screenshot.
 
Deliverable for Graded Practice 1

  • Screenshot of your filled DSLAM
  • Screenshot of your completed DSL network
  • Screenshot of ipconfig from your PC after connecting to the network

Computer Science homework help

Unit 3 Graded Exercise 1 Downloadable InstructionsPreview the document
In this graded exercise you are creating the second step of your ISP network. You will be using portions of your Unit 1 Graded Exercise: Create an ISP Network.   Your network will include Cable modems and DSL DSLAM both connected  through your network to the Tier1 Internet provider.  You will program  your routers for RIP protocol dynamic routing.   You will be using the  following packet tracer files:
Cable_HomeNetwork
DSL_HomeNetwork
Tier1Network_OL
Download the graded exercise instructions. Type your class number:  10.___.0.0/16 in all of the underline ___ indicators, answer the  questions as you go through the steps and add the screenshots where  indicated in the instructions document. Save using the following file  naming convention YourFirst_LastName_U3_GE1.  Submit the document with  the screenshots using the upload instruction.
  • attachment

    DSL_HomeNetwork.pkt
  • attachment

    Cable_HomeNetwork.pkt
  • attachment

    Tier1Network_OL.pkt
  • attachment

    CIS225Unit3GradedExcerise1.docx

Information Systems homework help

Provide (2) 200 words response with a minimum of 1 APA references for RESPONSES 1 AND 2 below. Response provided should further discuss the subject or provide more insight. To further understand the response, below is the discussion post that’s discusses the responses. 100% original work and not plagiarized. Must meet deadline.
RESPONSE 1:
Before I discuss with you how to secure Node.js Application, first let’s have an overview of Node.js and what is all about.
Node.js is an open source, cross-platform runtime environment for developing server-side and networking applications. Node.js applications are written in JavaScript, and can be run within the Node.js runtime on OS X, Microsoft Windows, and Linux.Node.js also provides a rich library of various JavaScript modules which simplifies the development of web applications using Node.js to a great extent (TutorialPoints, 2020).
Now that we know what is Node.js, we will discuss how to keep your application secure from malicious dependencies.
There are some preventive action you can take to avoid your application being
– Lock your dependencies. Use package-lock.json or yarn.lock to prevent getting automatic updates when deploying (when doing npm/yarn install in your server). At least this way you will get fewer chances of getting a malicious update that the npm team hasn’t cleaned up yet.
However, this wouldn’t have prevented the event-stream from affecting you since the malicious code was available in the npm registry for weeks.
-Use npm audit, Snyk and/or GitHub security alerts to be notified when any of your dependencies could contain security vulnerabilities.
When perform all these action in order to secure your application not only is a important step to prevent attack but it also very important to know most type of attack to better secure your application.
Reference:
Diogo Souza( August 12, 2020).Security Best Practices for Node.js. Retrieved from https://blog.appsignal.com/2020/08/12/security-best-practices-for-nodejs.html
TutorialPoints(2020).Node.js – Introduction. Retrieved from https://www.tutorialspoint.com/nodejs/nodejs_introduction.htm
RESPONSE 2:
The Node.js application at its core is Java Script just like the client side. The core of Node.js makes it a target for the same attacks as Java Script. The application itself is vulnerable to SQL injections, Cross-Site Scripting, and Cross-Site Forgery Requests like the client side. Securing Node.js from the server side is the same as client for these attack vectors.
Cross-Site attacks can be defended against by using input validation. Input validation or properly encoded is a basic form for Node.js. The purpose of input validation is for the system to validate to input forms and ensure they are coming from the correct person or system (Sulemani, 2020).
SQL injections are used to find or retrieve information from the server by injecting a SQL statement instead of the field’s normal content (Sulemani, 2020). The use of parameterized statements in the application ensures the inputs are distinguished between data and code (Sulemani, 2020).
The basic security principles also work when securing Node.js applications. Ensuring the account used on the Node.js account is one with the minimal amount of privileges to do the required task (Sulemani, 2020). Hashing and adding salts to passwords inside the Node.js application is a basic security technique to guard the Node.js application. Salts are added to the password before it is hashed to make the Hash longer than it truly is. This technique protects the passwords from dictionary attacks that uses hashes of different words to crack passwords (Sulemani, 2020).
Adding or Removing HTTP headers in Node.js is another method to secure the application. HTTP headers can leak sensitive information about the application if they are not removed or secured properly. The Helemet.js module for Node.js is a security module for HTTP headers that protects against leaks (Sulemani, 2020).
Danny,
Reference
Sulemani, M. (2020, November 19). Best practices for securing your Node.js apps. Retrieved from Educative: Interactive Courses for Software Developers website: https://www.educative.io/blog/secure-nodejs-apps-best-practices

Computer Science homework help

 his week, you will be preparing for next week’s essay: the narrative. Take a moment and review the directions for the Week 3 narrative essay. Once you have a topic you want to write your narrative about, you will complete this three part assignment. Part I: Respond to Questions These questions are intended to guide you through your free write and outline and are part of the preparation for your narrative essay. 1. What specific event do you want to write about that had a lasting impact on your life? 2. In one sentence, describe the event. 3. Where and when did it happen? 4. What people were involved in the situation? 5. What people are your audience? Who would want to read your narrative? [Note: The answer to this question should not be “everyone” or “my instructor/classmates.” See Chapter 5 of your textbook for ideas on choosing your audience.] 6. What message do you want to convey to your audience? Part II – Prewriting Now expand the answers to your questions. Take 10-15 minutes to free write about your topic. Chapters 4 and 5 in your textbook can help you decide what kind of free writing you want to do, but don’t feel restricted by one genre. Write down everything that pertains to your topic, including questions your readers might have. Don’t worry about grammar or sentence structure; this is a brainstorming activity. Part III: Outline Next, create an outline as a preliminary structure for the narrative essay. Use several of the outlining rules on pp. 111-115 of The Writer’s Way, but be sure to include the following: · Outline in three to five parts only (rule no. 1) · Don’t describe; summarize (no. 5) · Outline whole sentences only (no. 8) You may use as many of the other rules as you feel necessary. The goal is to present a structure for how your final essay may look. As such, an outline is not a series of paragraphs or a rough draft. Here is a sample free write and outline that you can use to help you get started. Please submit your responses to both prompts in a single document.
Week 2 Reflective Journal Now that you have completed your Narrative Essay preparatory activities (free write and outline), reflect back on this process, how it went, and what you’ve learned from it. Write a brief reflection journal in which you address the following questions (from The Writer’s Way, p. P-6): 1. What just happened? (What did I/we do?) 2. What was the purpose of doing this activity? (Why did I/we do it?) 3. What did the reading in the textbook say about this activity? [For this question, identify one concept, idea, or instruction from the textbook that struck you as interesting or significant.] 4. What was the point of this reading? 5. How can I use this activity or information going forward? Important: Do not write just one-sentence answers to the above questions. Write at least a paragraph for each. You might want to review the additional explanations on p. P-6 before your proceed. You do not have to use APA Style for this assignment, but your journal must be double spaced.

Computer Science homework help

For this project, select an organization that has leveraged Cloud Computing technologies in an attempt to improve profitability or to give them a competitive advantage.  Research the organization to understand the challenges that they faced and how they intended to use Cloud Computing to overcome their challenges.  The paper should include the following sections each called out with a header.
• Company Overview:  The section should include the company name, the industry they are in and a general overview of the organization.
• Challenges: Discuss the challenges the organization had that limited their profitability and/or competitiveness and how they planned to leverage Cloud Computing to overcome their challenges.
• Solution:  Describe the organization’s Cloud Computing implementation and the benefits they realized from the implementation.  What was the result of implementing Cloud Computing?  Did they meet their objectives for fall short?
• Conclusion:  Summarize the most important ideas from the paper and also make recommendations or how they might have achieved even greater success.
Requirements:
The paper must adhere to APA guidelines including Title and Reference pages.  There should be at least three scholarly sources listed on the reference page.  Each source should be cited in the body of the paper to give credit where due.  Per APA, the paper should use a 12-point Time New Roman font, should be double spaced throughout, and the first sentence of each paragraph should be indented .5 inches.  The body of the paper should be 3 – 5 pages in length.  The Title and Reference pages do not count towards the page count requirements.
  • attachment

    Capture.JPG

Information Systems homework help

There are 3 deliverables of the assignment. Attached the word documents and an excel sheet for your reference.
Architecture Design 
Summary:
You need to submit two assignments here:
1) The Non-Functional Requirements excel sheet.
2) A summary of Architectural Design document – what Architecture are you using and why: Thin Client-Server, or Thick Client-Server and why?  2-Tiered, 3-Tiered, or N-tiered and why? This can be a word document or pdf.
3) Hardware/Software Specification
Summary:
.doc, .pdf, or .xls files only
Submit Hardware/Software Specification. You can submit any type of document, but it must cover your client (if any) and your servers (if any). For example, if you list a 3-Tiered client-server Architecture than what Hardware and Software will your client need, and what Hardware and Software will your two Servers need? Like the text, you must cover the Hardware, Software, OS, and Network requirements.
  • attachment

    ArchitectureDesign.docx
  • attachment

    HardwareSoftwareSpecification.docx
  • attachment

    NonFunctionalRequirementsSheet.xlsx

information Systems homework help

It is a priority that students are provided with strong educational programs and courses that allow them to be servant-leaders in their disciplines and communities, linking research with practice and knowledge with ethical decision-making. This assignment is a written assignment where students will demonstrate how this course research has connected and put into practice within their own career.
Assignment:
Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.
Requirements:
Provide a 500 word (or 2 pages double spaced) minimum reflection.
Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.
Share a personal connection that identifies specific knowledge and theories from this course.
Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment.
You should not provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.
Don’t forget that the grade also includes the quality of writing.

Information Systems homework help

aMidterm 2 Part 2:
Problem 1: (10 Points)
 
Consider a factory that produces light bulbs.  The factory has an old piece of equipment, and the factory owner is considering replacing the old equipment with a new machine.  The owner is considering two options, with the following details:
 

Machine A Machine B
Cost to purchase the machine $50,000.00 $20,000.00
Variable cost per light bulb $0.18 $0.26
Fixed cost per year $100,000.00 $25,000.00
Life span (years) 10 10
Number of light bulbs factory will sell per year 600,000 500,000

 

  • The factory sells each light bulb for $0.40, the discount rate is 12%, and the corporate tax rate is 25%. The purchase of the machine occurs at year 0 and subsequent cash flows occur from years 1 through 10. Assume straight-line depreciation to zero for both machines. Assume no investment in net working capital. There is no salvage value.
  • The factory needs only one new machine. Which machine should the factory owner buy?

 
 
 
Problem 2: (20 Points)
 
Your company, Dawgs “R” Us, is evaluating a new project involving the purchase of a new oven to bake your hotdog buns. If purchased, the new oven will replace your existing oven, which was purchased seven years ago for a total installed price of $1 million.
 
You have been depreciating the old oven on a straight-line basis over its expected life of 15 years to an ending book value of $250,000, even though you expect it to be worthless at the end of that 15-year period. The new oven will cost $2 million and will fall into the MACRS five-year depreciation class life. If you purchase the new oven, you expect it to last for eight years. At the end of those eight years, you expect to be able to sell it for $100,000. (Note that both of the ovens, old and new, therefore have an effective remaining life of eight years at the time of your analysis.) If you do purchase the new oven, you estimate that you can sell the old one for its current book value at the same time.
 
The advantages of the new oven are twofold: Not only do you expect it to reduce the before-tax costs on your current baking operations by $75,000 per year, but you will also be able to produce new types of buns. The sales of the new buns are expected to bring your company $200,000 per year throughout the eight-year life of the new oven, while associated costs of the new buns are only expected to be $80,000 per year.
 
Since the new oven will allow you to sell these new products, you anticipate that NWC will have to increase immediately by $20,000 upon purchase of the new oven. It will then remain at that increased level throughout the life of the new oven to sustain the new, higher level of operations.
 
Your company uses a required rate of return of 12 percent for such projects, and your incremental tax rate is 34 percent. What will be the total cash flows for this project?
 
Using project cash flows; solve for NPV, IRR, Payback period, Discounted payback period and Profitability Index of the project and define the investment decision as accept or reject for each method. (Assume your benchmark for payback and discounted payback period methods as 5 years or less)
 
 
Note: MACRS 5 yr is as follows; 20%, 32%, 19.20%, 11.52%, 11.52%, 5.76%
 
 
 
 
 
 
Problem 3: (20 Points)
 
Download daily prices for Apple Inc (AAPL) and Simon Property Group (SPG) from the last two years. (Between 11/15/2018 and 11/15/2020) (You may get the data from finance.yahoo.com or other sources online and use adjusted close prices)
In an Excel spreadsheet;
 

  1. Calculate daily percentage returns for both stocks and then calculate their average return, variance, standard deviation of returns.
  2. Calculate covariance and correlation of APPL and SPG
  3. Consider you have a portfolio consists of 200 shares of Apple (Share price is $118) and 500 shares of SPG (Share price is $80). Calculate portfolio expected return, variance, and standard deviation
  4. APPL beta is 1.35 and SPG beta is 1.34. Calculate expected return of each stock with a risk free rate of 1% and expected market return of 3%.

 
Problem 4: (10 Points)
 
Consider the following two bonds:
Bond A
Term to maturity: 10 years from today
Face value: $1,000
Annual Coupon rate: 6%
Number of payments per year: 2
Bond B
Term to maturity: 20 years from today
Face value: $1,000
Annual Coupon rate: 9%
Number of payments per year: 2

  • Compute the price for each bond. The current YTM for each bond is 8%. Then make a table comparing the bond prices when the YTM varies from 1%, 2% … 17%.

Information Systems homework help

Submit a Word document that addresses each of the following: (4-5 Pages without title and reference pages)

  • Define scalability.
  • List five to ten potential relationships that align with the Pareto principle, such as how 80 percent of sales come from 20 percent of customers.
  • Compare and contrast vertical and horizontal scaling.
  • Explain the importance of the database read/write ratio.
  • Assume a site guarantees 99.99 percent uptime. How many minutes per year can the site be down?
  • List and describe five ways you think the cloud will change the future of TV.
  • List and describe five potential uses for intelligent fabric.
  • List and describe five ways the cloud will influence the mobile application market, or vice versa.
  • Discuss the importance of HTML 5.
  • Discuss how the cloud will impact future operating systems.
  • List and describe three potential location-aware applications.
  • List and describe five ways intelligent devices may work together.

Note: No Plagiarism, APA format, All references must be scholarly articles