Categories
Technology

Option 1 . Review with NetAcad As part of Discussion Board #4 assignment,

Option 1 . Review with NetAcad
As part of Discussion Board #4 assignment, students should have accounts on the NetAcad. If revision required, please identify 10-12 areas from NetAcad, and ask them to review . To earn grade for this assignment, students will perform those steps from NetAcad and submit a document in canvas ( week14.netAcad.doc ) with all screen captures .
Create a sсrіpt using name week14.sh (note: don’t forget shebang and execute permission) and test it with an echo. Print “My Name – Your Name!” on the screen — Replace ‘Your Name’ with your First and Last Name ( 10)
Modify the sсrіpt from step 1 to include a variable. The variable will hold the contents of the message “My Name Your Name!” screen — Replace ‘Your Name’ with your First and Last Name ( 10)
Store the output of the command “hostname” in a variable. Display “This sсrіpt is running on _.” where “_” is the output of the “hostname” command. You will see your machine ( 10)
Display all NOVA campus names “AL”,”AN”,”LO”,”MA”,”Wo”,and “MEC” on the screen with each appearing on a separate line. Try not to allow any gap between the lines. (20)
Add a function in this sсrіpt that will display the number of files in the present working directory. Name this function “no_of_files” and call this function in your sсrіpt. If you use variable in your function, remember to make it a local variable ( hint : use ls ) ( 40)
Modify the sсrіpt from step 5 and make the “no_of_files” function accept a directory as an argument. Next, have the function display the name of the directory followed by a dash ( -) Finally display the number of files to the screen on the next line. Call the function at least three times. First on the “/usr” directory, next on the “/lib” Directory and finally on the “/etc” directory. (40)

Categories
Technology

Option 1 . Review with NetAcad As part of Discussion Board #4 assignment,

Option 1 . Review with NetAcad
As part of Discussion Board #4 assignment, students should have accounts on the NetAcad. If revision required, please identify 10-12 areas from NetAcad, and ask them to review . To earn grade for this assignment, students will perform those steps from NetAcad and submit a document in canvas ( week14.netAcad.doc ) with all screen captures .
Create a sсrіpt using name week14.sh (note: don’t forget shebang and execute permission) and test it with an echo. Print “My Name – Your Name!” on the screen — Replace ‘Your Name’ with your First and Last Name ( 10)
Modify the sсrіpt from step 1 to include a variable. The variable will hold the contents of the message “My Name Your Name!” screen — Replace ‘Your Name’ with your First and Last Name ( 10)
Store the output of the command “hostname” in a variable. Display “This sсrіpt is running on _.” where “_” is the output of the “hostname” command. You will see your machine ( 10)
Display all NOVA campus names “AL”,”AN”,”LO”,”MA”,”Wo”,and “MEC” on the screen with each appearing on a separate line. Try not to allow any gap between the lines. (20)
Add a function in this sсrіpt that will display the number of files in the present working directory. Name this function “no_of_files” and call this function in your sсrіpt. If you use variable in your function, remember to make it a local variable ( hint : use ls ) ( 40)
Modify the sсrіpt from step 5 and make the “no_of_files” function accept a directory as an argument. Next, have the function display the name of the directory followed by a dash ( -) Finally display the number of files to the screen on the next line. Call the function at least three times. First on the “/usr” directory, next on the “/lib” Directory and finally on the “/etc” directory. (40)

Categories
Technology

I need an annotated bibliography (6 sources) and then a paper (12 pages) using t

I need an annotated bibliography (6 sources) and then a paper (12 pages) using these sources. You must have one book source, an interview with an expert (published or personal), and two scholarly journal articles.

Categories
Technology

Instructions will be uploaded later. Important Info

Instructions will be uploaded later.
Important Info

The order was placed through a short procedure (customer skipped some order details).
Please clarify some paper details before starting to work on the order.

Type of paper and subject
Number of sources and formatting style
Type of service (writing, rewriting, etc)

Categories
Technology

How is the dataset generated in 3 printing? What it′s the purpose? Flaws in the

How is the dataset generated in 3 printing?
What it′s the purpose?
Flaws in the dataset.
How is machine learning applied to this dataset?

Categories
Technology

Research one nation state backed advanced persistent threat (apt) and write a 2-page paper that includes the following:

Research one nation state backed advanced persistent threat (APT) and write a 2-page paper that includes the following:
Summary of the APT and Nat …

Categories
Technology

The second research paper the student should compare the two different paradigms for certification and accreditation: vulnerability focused versus risk based.

The second research paper the student should compare the two different paradigms for certification and accreditation: Vulnerability Focused versus Risk Based.

Categories
Technology

Provided correct subnet information based on the scenario selected provided correct subnet information with the subnets having different sizes and the resulting subnetting is minimizing wasted addresses

Project 1: Networking in the Cloud Technical Report Meets Expectation Exceeds Expectation
3.1: Identify numerical or mathematical information that is relevant in a problem or situation. Provided correct subnet information based on the scenario selected Provided correct subnet information with the subnets having different sizes and the resulting subnetting is minimizing wasted addresses
3.2: Employ mathematical or statistical operations and data analysis techniques to arrive at a correct or optimal solution. Came up with the correct subnetting information, which maybe done by using subnetting tables Provided detailed calculations showing full understanding on the mechanics of subnetting by using binary calculations
6.2: Demonstrate the role of networking in cloud. Completed the labs as described and outlined in the project steps Explored the labs beyond the project steps and incorporate findings into the project report
6.8: Review, evaluate, and utilize emerging technologies related to cloud to support business needs. Discussed emerging technologies in cloud computing as covered in the course materials and project steps Discussed other emerging technologis in cloud computing not covered in the course materials and project steps
8.2: Assess network security and privacy risks associated with cloud infrastructure. Discussed security issues related to cloud infrastructure as covered in the course materials and project steps Discussed other security issues related to cloud infrastructure that were not covered in the course materials and project steps
9.5: Design virtualized network infrastructure to meet business needs. Summarized lesson learned from the readings and labs by proposing a cloud infrastructure appropriate for the scenario Designed the virtualized network infrastructure for the scenario that incorporated other techniques, systems, models, etc that are not covered in the course materials or project steps

Categories
Technology

Summarized lesson learned from the readings and labs by proposing a cloud infrastructure appropriate for the scenario designed the virtualized network infrastructure for the scenario that incorporated other techniques, systems, models, etc that are not covered in the course materials or project steps

Project 1: Networking in the Cloud Technical Report Meets Expectation Exceeds Expectation
3.1: Identify numerical or mathematical information that is relevant in a problem or situation. Provided correct subnet information based on the scenario selected Provided correct subnet information with the subnets having different sizes and the resulting subnetting is minimizing wasted addresses
3.2: Employ mathematical or statistical operations and data analysis techniques to arrive at a correct or optimal solution. Came up with the correct subnetting information, which maybe done by using subnetting tables Provided detailed calculations showing full understanding on the mechanics of subnetting by using binary calculations
6.2: Demonstrate the role of networking in cloud. Completed the labs as described and outlined in the project steps Explored the labs beyond the project steps and incorporate findings into the project report
6.8: Review, evaluate, and utilize emerging technologies related to cloud to support business needs. Discussed emerging technologies in cloud computing as covered in the course materials and project steps Discussed other emerging technologis in cloud computing not covered in the course materials and project steps
8.2: Assess network security and privacy risks associated with cloud infrastructure. Discussed security issues related to cloud infrastructure as covered in the course materials and project steps Discussed other security issues related to cloud infrastructure that were not covered in the course materials and project steps
9.5: Design virtualized network infrastructure to meet business needs. Summarized lesson learned from the readings and labs by proposing a cloud infrastructure appropriate for the scenario Designed the virtualized network infrastructure for the scenario that incorporated other techniques, systems, models, etc that are not covered in the course materials or project steps

Categories
Technology

Select an article to read that is of particular interest to you, then perform additional internet research on the topic.

Security Week provides expert insights and analysis on information and IT security news.
Visit https://www.securityweek.com/ to view an RSS feed of the latest Security Week headlines. Select an article to read that is of particular interest to you, then perform additional internet research on the topic.
Open Word and create a short paper based on the one of the articles in ″ RSS Feed – Security Week″ feed that interests you. Submit the paper at the appropriate link.
Papers should be a minimum of two paragraphs.
The first paragraph should contain a link to the article and a summary the content of the RSS feed that you have chosen. Your instructor should be able to understand the ideas in the article based on your summary.
The second paragraph should contain your thoughts on the feed: What did you learn? Is this a subject that you will do additional research on? Why is the information in this article important to IT professionals?
Paragraphs should be coherent. Your paper should be free of spelling and grammatical errors. Text speak is not acceptable for this assignment.