Identify a high-quality article on the topic of quality assurance in IT. This may be a scholarly article, journal or trade magazine article, or other online article.

Discussion Question

Assignment Instructions

Identify a high-quality article on the topic of quality assurance in IT. This may be a scholarly article, journal or trade magazine article, or other online article. (To judge whether an article is high-quality, ask yourself if you would cite the article as an authoritative source to the CEO of your company.) In a post of about 400 words, provide an overview of the article for your classmates. Provide a link to the article and summarize the key concepts it discusses.

Read the articles below and write an informative 2-page essay about the potential risks associated with spreadsheets.

Risks Inherent in Spreadsheets.

As part of your AOL assignment discuss the risks associated with spreadsheets.

Read the articles below and write an informative 2page essay about the potential risks associated with spreadsheets:

1. Spreadsheet horror stories: https://handsontable.com/blog/articles/2020/10/spreadsheethorrorstories
2. 5 of the most terrifying Excel spreadsheet horror stories we’ve ever heard:
https://www.caspio.com/blog/5ofthemostterrifyingexcelspreadsheethorrorstoriesweveeverheard/
3. Spreadsheet horror stories:
https://www.qcommission.com/blog/spreadsheethorrorstories.html
4. Spreadsheet blunders costing business billions:
http://www.cnbc.com/id/100923538
5. Every spreadsheet has an error: 7 lessons motivated by Reinhart and Rogoff:
https://www.forbes.com/sites/billconerly/2013/04/25/everyspreadsheethasanerror7lessonsmotivatedbyreinhartandrogoff/?sh=3110e9553f2b
6. Eight of the worst Excel blunders:
https://www.cio.c

Design a network for a luxury residence hall that will serve honor students at the University of Houston.

Designing a Network

MAIN DETAILS: Design a network for a luxury residence hall that will serve honor students at the University of Houston. The residence will be eight floors, with a total of 162 two-bedroom, one-bathroom apartments on floors 3–8. The first floor has an open lobby with a seating area and separate office area, whereas the second floor has meeting rooms. Floors 1 and 2 are smaller than the upper floors (100 feet by 70 feet)because a parking garage is built around the outside of these floors. The measurement of the third to eight floors is 240 by 150 feet. The offices and server room on the first floor is for the university’s residence hall administration, which manages all the university’s residences. One design goal is to keep this network as separate as possible from the network in the rest of the building to provide greater security.

Deliverables:

1. Design the LANs for the first floor and second floor only, the distribution layer backbone that will connect the different floors in the building, and the part of the network that will connect to the campus core backbone. So what is needed in this first part of the project are maps of the first three floors in Visio or a similar program following the below instructions and documentation for the subnets to explain the maps.

Specify where the network equipment would be placed (use the floor plans provided). The required maps for your design are listed inside the CIS3347 file. The design must contain the type of cables, name of the devices, Wi-Fi channels, IPs, subnets, connections, and other related information for the physical topologies.

Document the subnets for the first floor, per LAN, and per access – secured or guest. Plan carefully when listing the CIDR ranges for each subnet. The recommendation is to use the provided reference tables when deciding the ranges for your subnets.

Tagging of photos and geotagging is a great way to let your friends know [a] the subject and occasion for the photos, and [b] where the photo was taken. But, is there such a thing as too much information?

IT-501-09 INFORMATION SYSTEM DESIGN AND ANALYSIS AND MANAGEMENT IN IT

Tagging of photos and geotagging is a great way to let your friends know [a] the subject and occasion for the photos, and [b] where the photo was taken. But, is there such a thing as too much information?

What are some of the major issues with geotagging? What concerns you the most?

Case 1: Using the example of an online cell phone apps store, list relevant data flows, data stores, processes, and sources/sinks. Assume that, the customer would like to purchase an application for his smartphone. Question 1 Draw a CONTEXT DIAGRAM Hint (context diagram). Use Draw.io and make sure you “ Turn on The Data Follow Diagram “ module.

Explain how statistical anomaly detection and rule-based intrusion detection are used to detect different types of intruders.

Network and Internet Security

Explain how statistical anomaly detection and rule-based intrusion detection are used to detect different types of intruders.

An example of a host-based intrusion detection tool is the tripwire program. This is a file integrity checking tool that scans files and directories on the system on a regular basis and notifies the administrator of any changes. It uses a protected database of cryptographic checksums for each file checked and compares this value with that recomputed on each file as it is scanned. It must be configured with a list of files and directories to check, and what changes, if any, are permissible to each. It can allow, for example, log files to have new entries appended, but not for existing entries to be changed. What are the advantages and disadvantages of using such a tool? Consider the problem of determining which files should only change rarely, which files may change more often and how, and which change frequently and hence cannot be checked. Hence consider the amount of work in both the configuration of the program and on the system, administrator monitoring the responses generated.

Write a program to produce Dragon curves with rounded corners, as shown in Fig. 8.4.

Computer graphics

1 Write a program to produce Dragon curves with rounded corners, as shown in Fig. 8.4.

2 Program ColorCircles.java in Sect. 7.3 is based on the additive color system. Modify this program so that it produces the diagram for the subtractive color system as shown in Fig. 7.2b

3 Complete Problem 8.3 (page 280) of the textbook.

Textbook: https://cloudflare-ipfs.com/ipfs/bafykbzacecigpnafypxp4s44qu7pzxkfm2ofzmnalblnhhjlz22c7o6izf63s?filename=Leen%20Ammeraal%2C%20Kang%20Zhang%20-%20Computer%20Graphics%20for%20Java%20Programmers-Springer%20International%20Publishing%20%282017%29.pdf

Task: Edit the “tool used”slide and for the tools used, you can look in `package.json` for each repo and see what was used.

Edit the “tool used “slide for bucket list project

https://cis-linux2.temple.edu/bucketlist/home

Task: Edit the “tool used”slide and for the tools used, you can look in `package.json` for each repo and see what was used.

Design a simple processor called “X” using a Hardware Description Language (HDL) such as Verilog or VHDL.

Design a simple processor called “X”

Overview: In this assignment, you will be designing a simple processor called “X” using a Hardware Description Language (HDL) such as Verilog or VHDL. The processor should be able to perform basic arithmetic and logic operations. The detailed description of X can be found at the end of this document.

The goal of this assignment is to help you understand the basic concepts of HDL and how to design a simple yet functional processor using HDL.

  • https://www.studypool.com/questions/download?id=2817653&path=uploads/questions/6364028/20230421180257attachment_2__8_.pdf&fileDownloadName=attachment_1
  • https://www.studypool.com/questions/download?id=2817653&path=uploads/questions/6364028/20230421180302attachment_1__11_.pdf&fileDownloadName=attachment_2

 

Write a summary (between 1,500-2,500 words that describes the technology and how it can be used, its implications, and issues related to either information. Create a presentation slides on the above topic.

Module 12 – Mini Presentation – Communicating Research

QUESTION

  1. The objective of this assignment is to challenge you to effectively communicate the state of scholarly literature and research for a specific cybersecurity topic orally and in The topic in question is:

Blockchain technology in the context of information security

  1. Write a summary (between 1,500-2,500 words that describes the technology and how it can be used, its implications, and issues related to either information.
  2. Create a presentation slides on the above topic.

Explain how statistical anomaly detection and rule-based intrusion detection are used to detect different types of intruders.

Network and Internet Security

Explain how statistical anomaly detection and rule-based intrusion detection are used to detect different types of intruders.

An example of a host-based intrusion detection tool is the tripwire program. This is a file integrity checking tool that scans files and directories on the system on a regular basis and notifies the administrator of any changes. It uses a protected database of cryptographic checksums for each file checked and compares this value with that recomputed on each file as it is scanned. It must be configured with a list of files and directories to check, and what changes, if any, are permissible to each. It can allow, for example, log files to have new entries appended, but not for existing entries to be changed. What are the advantages and disadvantages of using such a tool? Consider the problem of determining which files should only change rarely, which files may change more often and how, and which change frequently and hence cannot be checked. Hence consider the amount of work in both the configuration of the program and on the system, administrator monitoring the responses generated.