Computer Science 2023 Plan For Info Security (business Continuity Plan)

2023 You have been hired as a consultant to design BCP for SanGrafix a video and PC game design | Assignment Collections

 

You have been hired as a consultant to design BCP for SanGrafix, a video and PC game design company. SanGrafix’s newest game has become a hot seller, and the company anticipates rapid growth. It’s moving into a new facility and will be installing a new network. Because competition is fierce in the game industry, SanGrafix wants to be fully secured, documented, and maintained while providing high availability, scalability, and performance.

Based on your current technology and information security knowledge, for this project you will design a BCP based off of the company profile below:
A. Primary location in San Francisco, CA
B. Secondary location/hot site in Sunnyvale, CA
C. Capable of supporting 220 users in these departments: Accounting and Payroll, 16; Research and Development, 48; Sales and Marketing, 40; Order Processing, Shipping, and Receiving, 36; secretarial and office management staff, 20; upper management (including the president, vice president, and general manager), 10; Customer Relations and Support, 30; Technology Support, 20.
D. Full OC3 Internet connection

First step is to issue a clear policy statement on the Business Continuity Plan.  At a minimum, this statement should contain the following instructions:

  • The organization should develop a comprehensive Business Continuity Plan.
  • A formal risk assessment should be undertaken in order to determine the requirements for the Business Continuity Plan.
  • The Business Continuity Plan should cover all essential and critical business activities.
  • The Business Continuity Plan should be periodically tested in a simulated environment to ensure that it can be implemented in emergency situations and that the management and staff understand how it is to be executed.
  • All staff must be made aware of the Business Continuity Plan and their own respective roles.
  • The Business Continuity Plan is to be kept up to date to take into account changing circumstances.

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Computer architecture

2023 1 Loop Unrolling 40 marks Consider the following loop loop l d f4 0 r1 | Assignment Collections

1. Loop Unrolling [40 marks]

Consider the following loop:

loop: l.d    f4,0(r1)    l1  
      l.d    f6,0(r2)    l2  
      mul.d  f4,f4,f0    m1  
      mul.d  f6,f6,f2    m2  
      add.d  f4,f4,f6    a1  
      s.d    f4,0(r1)    s1  
      daddui r1,r1,#-8   sub1
      daddui r2,r2,#-8   sub2
      bnez   r1,loop     br

Note: Our default is that FP arithmetics have 4 x-boxes.  

a) [4 marks] Using the names ‘l1’ to ‘s1’ for the first six instructions
in the body of this loop, draw the flow-dependence graph for just these
instructions.  Label each arrow with the dependence gap between the
producer and the consumer.

graph:

In what follows, focus on three flow-dependence types: i) FP arith to
FP arith, ii) FP arith to FP store, and iii) FP load to FP arith.  Denote
the number of m-boxes in memory references by ‘#m’, and the number of
x-boxes in FP arithmetics by ‘#x’.  By the way, memrefs have one x-box,
and arithmetics have one (never-used) m-box.

b) [6 marks] For each of the three designated flow-dependence types,
indicate the number of stalls in adjacent producer-consumer pairs as
functions of ‘#m” and ‘#x’.

FP arith —> FP arith =
FP arith —> FP store =
FP load  —> FP arith =

c) [10 marks] Suppose #m = 1 and #x = 4.  How many stalls occur in one
iteration of the loop if it is executed exactly as written?  Don’t
write out a space-time diagram; use the method of Chapter 3.

ans:

e) [10 marks] Unroll the loop twice.  If one reschedules the unrolled
loop optimally, how many stalls are left?  (Keep the branch as the last
instruction.  Show the rescheduled code using the _short_ names.)

ans:

f) [10 marks] Increases the ‘mul-add dependence gap’ to 5 cycles, leaving
everything else unchanged.  Unroll the loop three times.  If one reschedules
the unrolled loop optimally, how many stalls are left?  (Keep the branch as
the last instruction.  Show the rescheduled code using the _short_ names.)

ans:

2. Dynamic Instruction Scheduling I [30 marks]

Imagine that reservation stations only track whether floating-point operands
are valid, and that integer operands appear by magic whenever needed.

a) [10 marks] Stage instructions ‘l1’ to ‘s1’ to reservation stations rs1(l1)
to rs6(s1).  Show the contents of each reservation station.  Indicate both
present and pending operands in each station.  For the loads, you may make
the operand entries ‘blank’.  That is, mark all load dependences as resolved.
For the store, just invent a regular single-operand reservation station.

rs1(l1):
rs2(l2):
rs3(m1):
rs4(m2):
rs5(a1):
rs6(s1):

b) [10 marks] After both loads have completed, but no further action has
occurred, show the contents of each reservation station.  You may mark
entire reservation stations as ‘free’.  Syntax: result[rs9(a9)]; val[f12].
You may alter the tag inside parentheses if warranted. 

rs1(l1):
rs2(l2):
rs3(m1):
rs4(m2):
rs5(a1):
rs6(s1):

c) [10 marks] At this point, dispatch the two loads of the second iteration,
viz., ‘l3’ and ‘l4’, into reservation stations ‘rs1’ and ‘rs2’.  Moreover,
let instruction ‘m1’ of the first iteration complete.  Show the contents of
each reservation station.

rs1(l3):
rs2(l4):
rs3(m1):
rs4(m2):
rs5(a1):
rs6(s1):

3. Dynamic Instruction Scheduling II [15 marks]

a) [5 marks] Find a flow dependence in the original code, and show that it
cannot cause harm.

ans:

b) [5 marks] Find an antidependence in the original code, and show that it
cannot cause harm.

ans: 

c) [5 marks] Find an output dependence in the original code, and show that
it cannot cause harm.

ans:

4. Load Buffers and Store Buffers [15 marks]

a) [5 marks] Consider two code sequences:

l.d f4,0(r1)      l.d f6,0(r1)
s.d f6,0(r1)      s.d f6,0(r1)

Show that ignoring the register dependence and respecting the memory
dependence provides a uniform, correct solution to issue delay in
both code sequences.

ans:

b) [5 marks] Consider:

s.d f4,0(r1)
l.d f6,0(r1)

Assume these two instructions have been loaded into a store buffer and
a load buffer, respectively.  There is a memory dependence.  If we
delay the issue of the load until the store “completes”, operationally
what do we mean by “complete”?  (Forwarding is a different approach).

ans:

c) [5 marks] A _speculated_ load is allowed to progress through more
stages of an out-of-order pipeline compared to a _speculated_ store.
What is difference and why is it necessary?

ans:

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Assignment: Applications Of Graph Theory

2023 In 1736 a famous Swiss mathematician Leonhard Euler 1707 1783 started the work in the area | Assignment Collections

In 1736, a famous Swiss mathematician Leonhard Euler (1707 – 1783) started the work in the area of Graph Theory through his successful attempt in solving the problem of “Seven Bridges of Konigsberg.” Graph Theory solved many problems in multiple fields (Chinese Postman Problem, DNA fragment assembly, and aircraft scheduling.) In Chemistry, Graph Theory is used in the study of molecules, construction of bonds in chemistry, and the study of atoms. In Biology, Graph Theory is used in the study of breeding patterns or tracking the spread of disease.

 

Write a three to five (3-5) page paper in which you:

  1. Choose two (2) applications for graph theory within your area of specialization (Networking, Security, Databases, Data Mining, Programming, etc.).
  2. Examine how these applications are being used in your specialization.
  3. Determine how graph theory has advanced the knowledge in your area of specialization.
  4. Conclude how you will apply graph theory in your area of specialization.
  5. Use at least three (3) quality academic resources in this assignment. Note: Wikipedia and other Websites do not quality as academic resources.

 

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. In-text citations must be used appropriately and have a corresponding reference entry. Each reference must have at least one in-text citation.Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

 

The specific course learning outcomes associated with this assignment are:

  • Model relationships with graphs, functions, and trees.
  • Use technology and information resources to research issues in discrete math. 
  • Write clearly and concisely about discrete math using proper writing mechanics.

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Operational Excellence

2023 Assignment Provide a reflection of at least 500 750 words or 2 pages | Assignment Collections

 

Assignment:
Provide a reflection of at least 500-750 words (or 2 pages double spaced), in the APA format, of how the knowledge, skills, or theories of this course have been applied or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. (practical Connection)

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Assignment2

2023 Assignment Guidelines Evaluating one quantitative research article 50 points total Due on Sunday | Assignment Collections

 

Assignment Guidelines

Evaluating one quantitative  research article (50 points total)

Due on Sunday May 31st , 2020 at 11:59pm

Do your research on statistical  research methods and choose one article that used statistical quantitative research method. Review the article and write a report following  the steps below:

Your report paper should meet the following requirements:

• Be approximately 3-5 pages in length, not including the required cover page and reference page.

• Follow APA guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• The UC Library is a great place to find resources.

• Be clear with well-written, concise, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Scholarly articles can be found in the UC Online Library, in databases such as JSTOR or ProQuest. At least the article must be peer-reviewed, full-text article that used quantitative research methods from scholarly journals.

Note: When reading an article use the PECO to analyze the paper:

  • P – Population being study, techniques used in the paper
  • E – Exposure (what)
  • C – Control(how)
  • O- outcome

Scoring Rubric:

  1. The research paper used quantitative statistical methods to addressed the problems —20/20
  2. The paper is 3 to 5 pages excluding the cover page and references pages—-10/10
  3. The paper is APA formatted——10/10

Be clear with well-written, concise, using excellent grammar and style techniques.—-10

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 IoT Security Research

2023 Securing IoT Devices What are the Challenges Security practitioners suggest that key IoT security steps include 1 Make people aware | Assignment Collections

 

Securing IoT Devices: What are the Challenges?

Security practitioners suggest that key IoT security steps include:

1) Make people aware that there is a threat to security;

2) Design a technical solution to reduce security vulnerabilities;

3) Align the legal and regulatory frameworks; and

4) Develop a workforce with the skills to handle IoT security.

Final Assignment – Project Plan (Deliverables):

Address each of the FOUR IoT security steps listed above in terms of IoT devices.

Explain in detail, in a step-by-step guide, how to make people more aware of the problems associated with the use of IoT devices.

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Assignment 1: Business Rules And Data Models

2023 ASSIGNMENT INFORMATION Due Date Monday October 17 2016 9 00 AM Points Possible 100 | Assignment Collections

ASSIGNMENT INFORMATION

  1. Due Date
    Monday, October 17, 20169:00 AM
    Points Possible
    100[removed]
  2.  

    Click the link above to submit your assignment.

    Students, please view the “Submit a Clickable Rubric Assignment” in the Student Center.

    Instructors, training on how to grade is within the Instructor Center.

    Assignment 1: Business Rules and Data Models

    Due Week 2 and worth 100 points

    Suppose a local college has tasked you to develop a database that will keep track of students and the courses that they have taken. In addition to tracking the students and courses, the client wants the database to keep track of the instructors teaching each of the courses.

    Use the internet to research the types of information that a college would want to track in a database. Focus your attention on information that could represent entities within a database as well as attributes of such entities.

    Write a two to three (2-3) page paper in which you:

    1. Describe the purpose of the database.
    2. Based on your research and / or common knowledge of a college and the information tracked by a college, describe the entities of the database and the attributes of each entity.
    3. Based on your research and / or common knowledge of a college and the information tracked by a college, describe the business rules that could impact the structure of the database.
    4. Determine the information that the conceptual model of the database would include and determine the information that the physical model of the database would include. 

    Your assignment must follow these formatting requirements:

    • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
    • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. 

    The specific course learning outcomes associated with this assignment are:

    • Describe the role of databases and database management systems in managing organizational data and information. 
    • Compose conceptual data modeling techniques to capture the information requirements.
    • Use technology and information resources to research issues in database systems.
    • Write clearly and concisely about relational database management systems using proper writing mechanics and technical style conventions.

    Click here to view the grading rubric for this assignment.

 

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Network Security

2023 A In no less than 250 words explain the difference between an access control list ACL that is used | Assignment Collections

A.) In no less than 250 words, explain the difference between an access control list (ACL) that is used in routers to block traffic and firewalls.  What similarities do they share? 

B.) Answer Below Question in a sentence each:

1 List three design goals for a firewall.

2 List four techniques used by firewalls to control access and enforce a security policy.

3 What information is used by a typical packet filtering firewall?

4 What are some weaknesses of a packet filtering firewall?

5 What is the difference between a packet filtering firewall and a stateful inspection firewall?

6 What is an application-level gateway?

7 What is a circuit-level gateway?

9 What are the common characteristics of a bastion host?

10 Why is it useful to have host-based firewalls?

11 What is a DMZ network and what types of systems would you expect to find on such networks?

12 What is the difference between an internal and an external firewall?

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Write A Work Document Of 250 Words About A Hypothetical Situation

2023 Consider this hypothetical situation David Doe is a network administrator for the | Assignment Collections

 

Consider this hypothetical situation:

David Doe is a network administrator for the ABC Company. David is passed over for promotion three times. He is quite vocal in his dissatisfaction with this situation. In fact, he begins to express negative opinions about the organization in general. Eventually, David quits and begins his own consulting business. Six months after David’s departure, it is discovered that a good deal of the ABC Company’s research has suddenly been duplicated by a competitor. Executives at ABC suspect that David Doe has done some consulting work for this competitor and may have passed on sensitive data. However, in the interim since David left, his computer has been formatted and reassigned to another person. ABC has no evidence that David Doe did anything wrong.

What steps might have been taken to detect David’s alleged industrial espionage?

What steps might have been taken to prevent his perpetrating such an offense?

Write your answer using a WORD document. About 250 words

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 pip55

2023 Research system integration implementation closeout processes and challenges Identify what the major objectives are for the closeout phase and why | Assignment Collections

  • Research system integration implementation closeout processes and challenges.
    • Identify what the major objectives are for the closeout phase and why this is important to successful completion.
  • Discuss 5 major challenges involved with planning the closeout phase of the overall implementation life cycle.
  • Describe the major tasks that you will need to properly close out your System Integration Project Proposal.

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now