Walden University Network Planning and Maintenance Discussion

Description

Routing is a fundamental function of a network. Routing is the process of selecting paths in a network along which to send network traffic. In many ways, routing is analogous to the postal mail delivery. The routing on the Internet and many other computer networks is based on IP addresses, although routing could use other information such as services. Assume that you are the designer of a new network scheme that does not depend on the current TCP/IP protocols.

Post the following to the Discussion Board:

What information do you think is best used for routing? Explain.

Since each computer has a Media Access Control (MAC) address for its network interface, what would be the biggest downside to using the computer’s MAC address for routing?

What is the most significant benefit to using IP addresses for routing? What is the primary technical goal you could meet because of this benefit?

Assignment: this due in 3days

A topology is a high-level blueprint of the network. It is a map that indicates network segments, interconnection points, and user communities. Its purpose is to show the logical organization of the network, not its physical geography or technical implementation. It depicts where routing and switching will occur and where security policies are to be applied. As a result, the topology is often different from the geographical map of sites. A network topology is normally derived from the network technical requirements. In this Application, you will further refine the network design you started the previous week. The following represents the network’s technical requirements:

Separate the subnets for the control office and for the stadium. Give each subnet its own separate IP address.

The two subnets are connected with the campus network.

There are different terminal devices: Console (computer), video cameras, temperature sensors, and mobile handsets.

The network requires both wired and wireless (WiFi) media technologies.

Submit a 2–3-page paper that includes the following:

Describe the two types of topology models covered in your readings in this week.

Evaluate each model by examining the advantages and disadvantages of each.

Select the model you believe is the best fit for these technical requirements and explain how your choice satisfies the technical requirements.

Create a network topology diagram for the Sports Management Division’s network that uses the model you selected. Include this as an appendix to your paper.

Show the layering and IP addressing allocation. Be sure to have the WiFi network represented.

Integrated Business Processes with ERP Systems Question

Description

1. What is the main objective of material planning? What are the basic questions addressed by material planning?

2. List and describe the steps in the material planning process.

3. Which master data are relevant for material planning?

4. Define and explain the relevance to material planning of the followingdata in the material master:a. Procurement typeb. MRP typec. Lot size keyd. Scheduling timese. Planning time fencef. BOM selection methodg. Availability check grouph. Strategy groupi. Consumption mode

5. Define and distinguish between consumption-based planning and materials requirements planning.

6. Explain how to reorder point planning works.

7. Explain the differences betweena. Dependent requirements and independent requirementsb. Planned independent requirements (PIRs) and customer requirements(CIRs).

8. Explain the common time estimates included in the material master.

9. Identify and discuss the different types of in-house production timesdefined in the material master.

10. Compare and contrast the three production planning strategies discussedin this chapter.

11. Explain the process by which CIRs consume PIRs, and provide an example.

12. What are product groups? What is the role of product groups in materialplanning?

13. Compare and contrast aggregation and disaggregation.

14. What is the role of the MRP controller in material planning?

15. Briefly describe the steps in the material planning process in terms of thetriggers, data, tasks, and outcomes.

16. Explain the functions and components of a planning table. Discuss thedifferent methods of generating a production plan with a planning table.

17. What are the different options for disaggregating a sales plan or a production plan?

18. Explain the differences between MRP and MPS.

19. Describe the tasks completed in the MRP step of the material planningprocess.

20. Explain the different control parameters that determine the way the tasksin the MRP step are executed.

21. Discuss the different MRP processing keys.

22. Describe the net requirements calculation.

23. Explain the scheduling process in MRP.

24. Define and discuss the types of procurement proposals that can be created in MRP.

25. Assess the advantages and disadvantages of creating planned orders andpurchase requisitions for externally procured materials.

26. Define MRP element.

27. Discuss the different reporting tools that are useful in material planning.

28. Distinguish between the stock/requirements list and the MRP list

https://coursenotesnow.com/wp-content/uploads/edd/…

Pen State University Excel Tables Worksheet

Description

To get credit for this assignment:

  1. Your TA should be able to open your file by clicking on its link.
  1. Requirements:Excel TablesThe Orders worksheet shows orders from a SuperStore. Some research needs tobe done to locate a group of information.
    1. Convert the Orders dataset into an Excel Table (remember you only need to selectone cell to create excel table)
    2. Then, locate the records of the Orders dataset that comply with all thefollowing characteristics:
      1. City is San Antonio or Chicago.
      2. Segment is Consumer.
    3. Format the Sales and Profit to be currency ($)
    4. Enter customer (or customers) name with the most distinct product ids from thisPage 1 of 2

filtered set into cell A306

  1. E Add a Total row and use the properties of the Total Row to calculate:
    1. the sum of quantity.
    2. the sum of profit.
  2. F Apply the Blue, Table Style Medium 9 to the table.

Pivot Tables and Pivot Charts

Pivot Table 1 :

  1. Use the Orders worksheet and create a Pivot Table on new worksheet with afilter on Category, row of Sub-Category, and sum of Quantity, Sum of Sales,Sum of Profit
  2. Filter the information so that only “Furniture” is displayed.
  3. Which sub-category of Furniture has the most sales revenue? Answer in cell J1 ofthis sheet.
  4. Format the Sum of Sales and Profit column to be currency ($)
  5. Rename the PivotTable’s worksheet: Pivot Table 1.

Pivot Table 2 & Pivot Chart:

  1. Use the West Coast Coffee worksheet and create another Pivot Table thatdisplays the average of Sales $ organized by: Month and Product as row labels(in that order) and State as column labels. Format all sales numbers as currency($)
  2. In cell J1 of this sheet put in the state that has the lowest average coffee sales $
  3. In cell J2, for the state with the most coffee sales ($)(Be careful, this means youneed the sum of sales), what is the highest sales ($) month?
  4. Collapse the Product rows and create a 3D Clustered Column Pivot Chart.
  5. Apply Chart Style 5 and Quick Layout 3.
  6. Enter as Title of the Chart: Average Sales Totals.
  7. Rename the PivotTable’s worksheet: Pivot Table 2.
  8. Move the Pivot Chart to its own worksheet. Rename this new worksheet asPivot Chart.

University of the Cumberlands Database Systems Discussion

Description

Database Systems

Week 8: Discussion 1 (Chapter 25):

How do you define big data? What are the implications from the three industry trends (Three V’s), presented in the textbook, by the Gardner Group? Three V’s presented in the textbook are as follows: Volume, Velocity, and Variety.

once I receive the main discussion content then I will post the peer discussion in chat

  • peer response should be returned in next 10hrs

Please ensure the initial post and two response posts are substantive, not the same for both classmates, and have enough details to show us that you read the posting and have original feedback to offer. Substantive posts will do at least TWO of the following: Ask an interesting, thoughtful question pertaining to the topic Expand on the topic, by adding additional thoughtful information Answer the question posted by another student in detail, and I say again (IN DETAIL). A simple two-line response will not earn you credit for your reply, and I will deduct points accordingly. Under NO circumstance will late work be accepted for any reason at all. Please complete all work and all assignments early in the week to avoid issues and conflicts. I will refer you back to this message if you ask me, and I will not entertain the discussion even if your power was out on the last day your assignment or discussion was due.

Week 8: Discussion 2 :

Take time to reflect about the course. What have you learned in this course, and what are you “Looking Ahead” to learn more about? As you are wrapping this course, your education into a successful career.

Week 8: Discussion 1: 1 word document

Week 8: Discussion 2: 1 word document

Please give everything in separate word documents because I don’t want to confuse with references and please add text citations for everything and reference at end of the document and answers should be minimum 1 page for each discussion

Thanks

Data Mart Dimensional Models Report

Description

Choose one of the data warehousing / data mart dimensional models listed below. Copy the data model into a MS Word document. In your MS Word document. (You can copy the data model graphic by right-clicking on it. On PCs, the keyboard combination of ctrl-V is the shortcut command for pasting.)

In the MS Word document,

1) identify the fact table 

2) identify the dimension tables, 

3) for each dimension table, identify the attribute(s) that would be matched to an attribute in the fact table, and 

4) list four queries that could be produced from this data model. For example, the queries from a data model of real estate sales that could typically be produced by matching a fact table to one or more dimension tables include: a) list of properties sold by each real estate agent, b) total properties sold by state, c) types of properties sold by month and year, d) dollar value of properties sold by each real estate company, e) total homes sold by real estate agent by company by year.

Week 2 Network Infrastructure Discussion Response

Description

When designing a Local Area Network (LAN), I would start off my physical diagram with the layout of the physical space (office, home, etc…) that the network connectivity devices would exist within. At each workstation or server, I would include the Network Interface Card (NIC) associated with the system. I would then identify the type of network connection (cable type or wireless connection) that NIC has to other network equipment, and the ports into which any physical cables were connected. Stemming out from there would be the actual switches, hubs, modems, or routers providing us with the ultimate connection out to the internet. Also included would be firewalls and DHCP servers. Including all of these details will help understand the physical and logical design of the network and in troubleshooting any issues that arise during its use.

Bring Your Own Device (BYOD) is becoming more common in the corporate world and brings with it some advantages and disadvantages to any organization. Allowing employees to use their personal devices can enhance communication and productivity particularly with employees who do not spend the majority of their time at a desk at the corporate headquarters. Personnel tend to be more comfortable with their own devices and there is an added benefit of the organization not having to pay for these devices. The disadvantages tend to come in the form of security and access to employee data. Personnel who use their own devices outside of the workplace are more likely to introduce malware and other security vulnerabilities that those under the regular control of the organization. Examining data logs will be more difficult in the event of a security incident. Additionally, if an employee leaves the company, any corporate data they house on their own device may be difficult to retrieve and to secure from unauthorize release to third parties.

Lammle, T. (2012). CompTIA Network+ Study Guide, Second Edition. Sybex

Melo, S. (2020, March 5). Advantages and Disadvantages of BYOD. (DataScope). https://datascope.io/en/blog/advantages-and-disadv…

LACC Data Warehouse for Restaurants ABC Questions

Description

Design the data warehouse for Restaurants ABC

Restaurants ABC restaurant company supplies equipment to 55 different restaurants in 20 cities across US. They have 2 product lines: front of house equipment and kitchen equipment. For front of house equipment, they have products such as tables, chairs, tablecloths, napkin holders, cutlery and so on. For kitchen equipment, they have products such as saucepans, knives and chef clothing.

An operational database is used to support day-to-day operation. In the operational database, they record the following data:

For each customer, they record data such as Customer Name, Contact No, City and State.

For each product, they record data such as Product Name, Product Line. A product line contains many products.

For each transaction, they record data such as Order Date, Customer Name, Product Names, Sales, Cost, Profit, Salesperson Name. A transaction may contain many products.

For each Salesperson, they record data such as Salesperson Name, YearsWithABC, Department. A department has many salespersons.

Now they wish to construct a data warehouse and BI solution to help them analyze the performance in terms of sales, cost and profit. The data will be extracted from the operational database, transformed and loaded to the data warehouse. Your task is to design the structure of the data warehouse to meet the following requirements.

They wish to analyze the sales, cost, and profit by product and customer. They also would like to analyze the sales, cost and profit ratio by product line and time period (day, month, year). Last, they also wish to analyze the sales, cost and profit ratio by city and state. They also need to analyze the sales, cost, and profit by salesperson.

Questions:

What are the facts/measures in this case? How many dimension tables do we need in the data warehouse?

Design the fact table and dimension tables. Use a star schema.

  1. What is the grain of the fact table?
  2. Convert the star schema to a snowflake schema by normalizing the product table.
  3. Your Turn:
  4. Based on the current snowflake schema, further normalize the salesperson table.

USF Troubleshooting Common Hardware and System Software Challenges Question

Description

Troubleshooting Common Hardware and System Software Challenges

As we read chapters 4, 5, 6, and 7, we studied system software and the various hardware components that help make up a computer. Throughout Ch. 11, we learned how data flows through databases. For this activity, we will build “Escape Rooms” based on the information from these chapters. Using Google Forms, we will create a question from each chapter.

Using Google Forms, we will create a question from each chapter. Escape Rooms will be posted to this forum. See if your classmates can escape!

Scenario:

You just started a new job working at an IT Help Desk. You have not yet been trained on how to navigate the company’s knowledge base. You must send your calls to the senior technician you are shadowing. Your job is to observe how the senior technician handles complex tech issues.

  • In Part 1 – you play the customer; you are to describe a problem you need an answer to.
  • In Part 2 – you play the Senior Technician; you are responding to the customer’s problem – answering questions to solve the customer’s issue.

To complete this activity, do the following:

Part 1 – The Customer

  1. Review the tutorial: How to Build a Digital Escape Room Using Google Forms

Escape Room Requirements:

  1. Create a scenario (description of problem) for your room. The problem doesn’t have to be overly complex. The problem description must provide sufficient details for the technician to understand your problem and provide a response (solution).
  2. Create one question that aligns with each chapter (for example – “How many bits make up a byte?” might be your Ch. 5 question) and makes-up your problem.
    • Chapter 4 question
    • Chapter 5 question
    • Chapter 6 question
    • Chapter 7 question
  3. Create a “Congratulations” screen for the player when they “escape.”

When your escape room is complete:

  1. Post your game to the discussion forum.

Cybersecurity Tool Presentation

Description

Assignments:
In the research assignment, you have to research and prepare a presentation on one cybersecurity tool of your choice from the provided list:

– Antiviruses:
a. Norton Security
b. Windows Defender
c. ESET NOD32 Antivirus
d. Kaspersky Antivirus

– Firewalls:
a. Windows Firewall
b. ZoneAlarm

Assignment Description:

?? Please read the instructions carefully, especially the underlined

In this assessment component you have to study, research, prepare a tutorial, and present to the class ??((one topic))?? of your choice. Your presentation should include the analysis and a tutorial on a specified tool. In your presentation, only a few slides and a few minutes should be spent on a general discussion with the most time devoted to a particular tool tutorial. Try to include a short tool’s demo into your presentation too. It is better if the tutorial and the presentation contain a few practical examples, which usually help to make the presentation content more demonstrative, interesting, entertaining, and easy for understanding.
In the presentation, it is important to emphasize your analysis and conclusions. Do not forget to add references to the sources

OUTLINE FOR A PRESENTATION:

1. Introduction.
a. What is this talk about?
b. Why does it matter? What applications does it have or might
have?
c. What will you cover? (Show a short outline of the talk)
d. What is the connection to other topics in this course

e. Discuss the tool’s advantages and disadvantages,
2. References.
a. What did you read or study?
b. Where did you find it?
3. Main topic. Tell about this subject in some depth. This is the longest
part of the talk. If you provide a tool demonstration, it should go here.

4. Analysis.
a. What do other experts think about this?
b. What do you think and why?

JNTU Ethical Hacking and Scamming and Phishing Attacks Discussion

Description

Sub: Ethical Hacking

Task: Discussion

Write in 300 words, Explain in your own words what “FOOTPRINTING” (or digital reconnaissance) is and how you would go about gathering the information you need to determine the location of a recently stolen late model car that was last seen in the parking lot of our college.

Task: Research Assignment 

Write in 500 words, After responding to the weekly discussion topic on FOOTPRINTING, you now have an idea as to how to conduct a digital investigative project. For this assignment, you are asked to develop your own crime scenario. Explain the incident that occurred, and then list the steps you would follow to solve this case (examples might include: a lost child, an unauthorized charge on your credit card, an unidentified charge made with your EZ PASS, etc.).Be sure it includes your reference citation.

Sub: policy, legal and compliance 

Task: Discussion  

Discuss in 500 words your opinion whether Fair Use of copyrighted material should be expanded, contracted, or left alone. Justify your choice.  

Use at least three sources. Use the Research Databases available from the Danforth Library, not Google.   Include at least 3 quotes from your sources enclosing the copied words in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs. Do Not Doublespace.

=================================================================

Sub: Building Web Applications 

Task: Discussion

Learn About creating good password security.

An IT Security consultant has made three primary recommendations regarding passwords:

Prohibit guessable passwords

such as common names, real words, numbers only

require special characters and a mix of caps, lower case and numbers in passwords

Reauthenticate before changing passwords

user must enter old pw before creating new one

Make authenticators unforgeable 

do not allow email or user ID as password