Enterprise Risk Management ISO 27001 standard & ISMS framework Research Paper

Enterprise Risk Management ISO 27001 standard & ISMS framework Research Paper

I don’t understand this Computer Science question and need help to study.

 

please address the following in a properly formatted research paper:

  • Do you think that ISO 27001 standard would work well in the organization that you currently or previously have worked for? If you are currently using ISO 27001 as an ISMS framework, analyze its effectiveness as you perceive in the organization.
  • Are there other frameworks mentioned has been discussed in the article that might be more effective?
  • Has any other research you uncover suggest there are better frameworks to use for addressing risks? Enterprise Risk Management ISO 27001 standard & ISMS framework Research Paper

ORDER NOW FOR CUSTOMIZED SOLUTION PAPERS

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing. Enterprise Risk Management ISO 27001 standard & ISMS framework Research Paper

CSE 4600 Homework 1 Shell Programming

CSE 4600 Homework 1 Shell Programming

Computer Programming

CSE 4600 Homework 1 Shell Programming

ShellProgramming.html

Homework 1 Shell Programming

Place your order!

Highlights

1. Different Shells 2. Writing and executing Shell script example 3. Variables 4. Conditionals 5. Loops 6. Arithmetic Evaluation 7. Homework Exercise

1. Different Shells

There are several different shells, they offer their own advantages and disadvantages. For instance, some allow for auto completion using the tab key; others don’t.

A few common shells are the following:

Bourne shell (sh) Bourne again shell (bash) C-shell (csh) C shell with file name completion and command line editing (tcsh) Korn shell (ksh)

To see what shells exist on your current Unix system, try the following command:

$ cat /etc/shells

To see what shell you are using, try the following command:

$ echo $0

From the command line, you can type various commands which have the same responses in each of these shells. For instance chmod, ls, cd, and touch. CSE 4600 Homework 1 Shell Programming

2. Writing and executing Shell script example

If you need to type the same commands over and over again, it is good to create a shell script.

For example, you could create a basic shell script by:

1. Typing the following lines into a file called team.sh:

#!/bin/bash

 

CSE 4600 Homework 1 Shell Programming

ShellProgramming.html[8/26/20, 1:53:44 PM]

# team.sh ls -l mkdir team cd team touch alice monica george

2. Making the file executable:

chmod +x team.sh

3. Executing the file at the command line:

$ sh team.sh or $ ./team.sh

Executing team.sh will do the following: first do a long listing of the current directory, then make a directory called team, and create files: alice, monica, and george under the team directory.

Any line preceded with # is a comment (or anything after the # is ignored):

#!/bin/bash #list the files in the current directory ls -l

#make a directory called team mkdir team

#change into the team directory and create three files. cd team touch alice monica george

The special notation used on the first line of the shell script (beginning with a number sign (#), then an exclamation point (!), followed by the full path name of the shell on the computer’s file system) states that we will interpret the commands with the bash shell on our Linux system.

There is a major split between Bourne-compatible shells (such as sh and bash) and csh-compatible shells (such as csh and tcsh). These differences show up in such things as conditional statements and loops.

For the remainder of this lab, we will be focusing on bash shell scripts. For more details about bash, please click Bash Guide for Beginners, and Bash Shell Programming. CSE 4600 Homework 1 Shell Programming

3. Variables

You can use variables as in any programming languages. There are no data types. A variable in bash can contain a number, a character, a string of characters. To declare a variable and assign with a value, use VARIABLE_NAME=VALUE expression (with no spaces in between). For instance,

#!/bin/bash city=”San Bernardino” course=”CSE4600 OS” capacity=30

In the above example, we have declared a few variables with different data types. But Bash does not have a type system, it can only save string values. Hence internally, Bash saves them as a string.

 

CSE 4600 Homework 1 Shell Programming

ShellProgramming.html[8/26/20, 1:53:44 PM]

There is a difference in shell scripts between the name of a variable and its value:

If myvar is the name of a variable, then $myvar is a reference to its value. The only time a variable is “naked” (without the $) is when it is declared, assigned, or exported.

To print a value, we use echo command. It is a binary file located inside /bin. It takes arbitrary arguments which could be a string or a variable.

city=”San Bernardino” echo $city

We can read user input in the terminal using read command. When the user input the text and hit enter, that entire text will be saved in a variable.

#!/bin/bash # readeg.sh echo “Enter a name:” read name echo “Your name is:” $name

Execute the above script, we may get,

Enter a name: John Your name is: John

An example of assigning and using variables is the following code:

#!/bin/bash #file: variables.sh

var1=”My string with spaces” echo “var1 is: ” $var1 echo

echo “Enter a number: ” read var2 echo “var2 is: ” $var2 echo

A sample run would yield the following results:

$ ./variables.sh var1 is: My string with spaces Enter a number: 30 var2 is: 30

4. Conditionals

At times you need to specify different courses of action to be taken in a shell script, depending on the success or failure of a command. The if construction allows you to specify such conditions. CSE 4600 Homework 1 Shell Programming

The general syntax of the if command is:

 

CSE 4600 Homework 1 Shell Programming

ShellProgramming.html[8/26/20, 1:53:44 PM]

if TEST-COMMANDS then CONSEQUENT-COMMANDS else ALTERNATE-CONSEQUENT-COMMANDS fi

The TEST-COMMAND takes one of the following syntax forms:

test EXPRESSION [ EXPRESSION ] [[ EXPRESSION ]]

The TEST-COMMAND list is executed, and if its return status is zero, the CONSEQUENT-COMMANDS list is executed, otherwise the ALTERNATE-CONSEQUENT-COMMANDS list is executed. The return status is the exit status of the last command executed, or zero if no condition tested true.

The TEST-COMMAND often involves numerical or string comparison tests, but it can also be any command that returns a status of zero when it succeeds and some other status when it fails. Unary expressions are often used to examine the status of a file. Please refer to File test operators for more file test operators.

You can use the exit status of commands in conditions. Be careful that you are checking the status variable directly after executing the command.

#!/bin/bash #file cond.sh

echo -n “Enter a number: ” read VAR

if (( $VAR > 0 )) then echo “$VAR is greater than 0.” else echo “$VAR is equal or less than 0.” fi echo

FILE=/etc/resolv1.conf if [ -f “$FILE” ] then echo “$FILE exists” else echo “$FILE does not exist” fi echo

read WORD FILE=main.cpp grep $WORD $FILE

if [ $? == 0 ] then echo “$WORD is in $FILE” else echo “$WORD is not in $FILE” fi echo

5. Loops

The for loop

The for loop is the first of the three shell looping constructs. This loop allows for specification of a list of values. A list

 

CSE 4600 Homework 1 Shell Programming

ShellProgramming.html[8/26/20, 1:53:44 PM]

of commands is executed for each value in the list. The syntax for this loop is:

for NAME in [ LIST ] do COMMANDS done

The return status is the exit status of the last command that executes. If no commands are executed because LIST does not expand to any items, the return status is zero. CSE 4600 Homework 1 Shell Programming

NAME can be any variable name, although i is used very often. LIST can be any list of words, strings or numbers, which can be literal or generated by any command. The COMMANDS to execute can also be any operating system commands, script, program or shell statement. The first time through the loop, NAME is set to the first item in LIST. The second time, its value is set to the second item in the list, and so on. The loop terminates when NAME has taken on each of the values from LIST and no items are left in LIST.

The while loop

The while construct allows for repetitive execution of a list of commands, as long as the command controlling the while loop executes successfully (exit status of zero). The syntax is:

while CONTROL-COMMAND do CONSEQUENT-COMMANDS done

CONTROL-COMMAND can be any command(s) that can exit with a success or failure status. The CONSEQUENT- COMMANDS can be any program, script or shell construct.

As soon as the CONTROL-COMMAND fails, the loop exits. In a script, the command following the done statement is executed.

The return status is the exit status of the last CONSEQUENT-COMMANDS command, or zero if none was executed.

The following is an example of these two looping structures:

#!/bin/bash #file: loops.sh FILE=’./main.cpp’

#A while loop with user input echo “Enter a letter or x to quit ” read var1

while [ $var1 != “x” ] do echo “Enter a letter or x to quit ” read var1 done

#A for loop echoing the contents of file if [ ! -f $FILE ] then echo “$FILE is not found.” exit 1 else for var2 in $(cat $FILE) do echo $var2 done fi

ORDER NOW FOR CUSTOMIZED SOLUTION PAPERS

CSE 4600 Homework 1 Shell Programming

ShellProgramming.html[8/26/20, 1:53:44 PM]

6. Arithmetic Evaluation

We can perform arithmetic operations in Bash even though Bash does not support number data type.

We have two kinds of operators:

arithmetic relational

Using $((expression)) syntax, we can also perform arithmetic operations.

The following table summarizes some of these operators:

Arithmetic Operators * multiplication / division + addition – subtraction % modulo-results in the remainder of a division ++ increment operator — decrement operator Relational Operators > greater-than < less-than >= greater-than-or-equal-to <= less-than-or-equal-to = equal in expr == equal in let != not-equal & logical AND | logical OR ! logical NOT

An example of several of these are in the following sample code:

#!/bin/bash # file: arithmetic.sh

num1=3 num2=10

echo $num1 echo $num2

res=$((num1+num2)) echo “num1 + num2 = $res”

res2=$((num1*5)) echo “num1 * 5 = $res2”

 

CSE 4600 Homework 1 Shell Programming

ShellProgramming.html[8/26/20, 1:53:44 PM]

res2=$((num1%5)) echo “num1 % 5 = $res2”

#Decrement or increment ((res2++)) #increment operator # ((res2–)) #decrement operator

echo $res2

#Logical assignment mybool=$((!($res2==$res)))

# mybool=$(($res2 > $res)) echo $mybool

A sample run of the program would look like this:

$ ./arithmetic.sh 3 10 num1 + num2 = 13 num1 * 5 = 15 num1 % 5 = 3 4 1

7. Homework exercise

Your task is to create a bash shell script that is able to backup all the C++ program files in your current directory.

The algorithm is as follows:

Prompt the user to enter a backup directory name. If the backup directory does not exist in the current directory, then create the backup directory. For each .cpp file in the current directory,

If there have been changes to the file since the last backup or no copy exists in the backup directory, then copy the current .cpp file to the backup directory and print a message that the file has been backuped. Otherwise, no copy will be made, and print a message that the file is the latest. CSE 4600 Homework 1 Shell Programming

Deliverables:

1. The code of bash shell script hw1.txt. The shell script file should be hw1.sh, but .sh files can not uploaded to Blackboard, please revise the extension as .txt and then upload it to Blackboard.

2. The script log file hw1log.txt showing the test cases outlined below

Test Cases captured in hw1log.txt :

1. Start by removing your backup directory (rm -r backup) 2. Ensure that there are some .cpp files in the current directory 3. Show the directory using ls -l 4. Run the backup script file hw1.sh several times as specified below:

Type “backup”, to create a backup directory ls -l backup Run your backup script file hw1.sh ls -l backup Append to all the files and rerun your backup script file hw1.sh an good way to append is to type: echo “something” >> file.cpp Append to one file and rerun your backup script file hw1.sh

 

CSE 4600 Homework 1 Shell Programming

ShellProgramming.html[8/26/20, 1:53:44 PM]

Create a new .cpp file (using touch) and rerun your backup script file hw1.sh

Notes

Do not create a zip file Submit on Blackboard, before submitting, please change the extension name of hw1.sh as hw1.txt, .sh files can not be uploaded to Blackboard Be mindful the due date!

Copyright © 2020. All rights reserved.

 

  • Local Disk
    • CSE 4600 Homework 1 Shell Programming

DAT380 University of Phoenix Advanced Database Architectures Paper

DAT380 University of Phoenix Advanced Database Architectures Paper

Description

ORDER  A PLAGIARISM FREE PAPER  NOW

Your organization uses Microsoft® Excel® to maintain its inventory. The company is growing rapidly and has reached the point where an inventory database is needed.

Your organization’s database needs include the following:

  • Multiple departments will require access to the database, including eCommerce, manufacturing, sales, and customer service
  • Employees will use the database to:
  • Enter data
  • Reference data
  • Use data to auto-populate new orders and customer service records
  • Analyze data and create reports

Recommend three of the following six database architecture types that would work for your organization:

  • Hierarchical
  • Network
  • Relational
  • Distributed Relational
  • Object-Oriented
  • Cloud

Include the following in your recommendation:

  • Your top three recommended architectures, in order, using the number 1 as your best recommendation
  • Your rationale for recommending each architecture
  • The characteristics that make each architecture a top recommendation
  • The current usage trends of these architectures in the industry and how it affected your recommendation for each. DAT380 University of Phoenix Advanced Database Architectures Paper
  • Potential concerns or disadvantages of each architecture
  • Summary of reasons for not recommending the remaining three architectures
  • Citations for any graphics, images, video, or audio used

Create your recommendation as either:

  • A 3- to 4-page technical summary in Microsoft® Word
  • A 14- to 16-slide multimedia-rich presentation with detailed speaker notes. DAT380 University of Phoenix Advanced Database Architectures Paper

Object-Oriented Data Model and SQL Assignment

Object-Oriented Data Model and SQL Assignment

Description

ORDER  A PLAGIARISM FREE PAPER  NOW

 

Refer to the Week 1 – Required Learning Activity: Appendix A, Database Systems.

Consider any relevant feedback from your Week One Individual Assignment titled, “DreamHome Case Study” that will support the completion of this week’s assignment. Object-Oriented Data Model and SQL Assignment

Create a data model for an object-oriented database in Microsoft® Visio® using the following resources:

  • The information presented in Appendix A, “User Requirements Specification for DreamHome Case Study” of Database Systems: A Practical Approach to Design, Implementation and Management (6th edition)
  • The distributed database created in the Week One Individual Assignment, “DreamHomeCase Study”

Write a minimum of four queries for building the database structure and map to the data model.

Note: The results of this assignment will be used in future DreamHome-related Individual Assignments in Weeks Three, Four, and Five.

Compress the following files into a ZIP folder:

  • The Microsoft® Visio® file with the data model for an object-oriented database.
  • Microsoft® Word file containing the SQL queries for building the database structure.

Submit the ZIP file. Object-Oriented Data Model and SQL Assignment

Conceptual Modeling Design

Conceptual Modeling Design

Database Design

Musical artist managers sometimes find it hard to organize shows for their artists. Having taken a look at some of these issues there is a proposal to use certain applications developed by companies to help manage artists in a much easier way. here I propose the use of the back on-stage database.

This helps artist managers in various ways. being an application, the information that will be required is for the manager to sign up with the app then fill in the detail about the company and the artist. It helps in booking gigs for the clients, has inquiry follow-ups this includes keeping invoices with inline payments (Zhou, 2019). This is meant for the managers and their staff members who are taking part in preparing events for the artists. the back on stage needs information in the artist this includes the name and the type of music   they produce, the targeted crowd to help during finding gigs for the artists, amount paid in the events, and number of the artist. Conceptual Modeling Design

The system should be able to capture the marketing of the artist should be sure to reach the targeted audience for the artist. should be reliable where the event should certain returns in terms of cash flow and music sales and promotions (Zhou, 2019). the database should cover artist performance schedules, venues, communication between the manager artists and the audience. payouts this is in terms of promotions, such as t-shirts caps, and hoods it also builds hype during artist performance. the database will store music released, schedule performance and tours.  the best database should store information conceding the manager’s duties and the client’s needs (Zhou, 2019). The database should help the manager plan and reduce the expenditure in paying event managers and people to help put up or book events.

References

Zhou, N. (2019). Database design of regional music characteristic culture resources based on improved neural network in data mining. Personal and Ubiquitous Computing, 24(1), 103–114. https://doi.org/10.1007/s00779-019-01335-9

develop an Entity Relationship Diagram (ERD) for the database that models your chosen domain. This assignment consists of three steps that should be completed by Sunday of Week 2 at 11:59 p.m., CT:

 

  1. Identify entities;
  2. find relationships; and
  3. Draw the ERD blueprint.

 

ORDER   A PLAGIARISM FREE PAPER   NOW

Step 1: Identify Entities

Identify the entities. These are typically the nouns and noun-phrases in the descriptive data produced in your analysis. Do not include entities that are irrelevant to your domain.  Conceptual Modeling Design

For example, in a college database project, the entity candidates are departments, chair, professor, course, and course section. Since there is only one instance of the university, we exclude it from our consideration for now.

 

Step 2: Find Relationships

Discover the semantic relationships between entities. In English, the verbs connect the nouns. Not all relationships are this blatant; you may have to discover some on your own. The easiest way to see all the possible relationships is to build a table with the entities across the columns, and down the rows. Then, fill in cells to indicate where relationships exist between the entities.

 

 

  Departments Chair Professor
Departments      
Chair      

 

Step 3: Draw the ERD Blueprint

Draw the entities and relationships you have discovered. View the example of a college database project ERD blueprint. To create your ERD, the domain (or subset of a domain) that you chose for your project should include the following characteristics:

  • Size. An appropriately sized domain results in a database with about a dozen entries (more or less).
  • Relationship. The entities comprising your domain should be interrelated.
  • Functionality. The scope of the diagram shows the operations or functions that the database project addresses. It also identifies the functions that fall outside of the application.
  • Description. Define the data requirement of your entities. For example:
  • Student Entity: Members of the public who register and pay for courses are considered students. The data stored on each student includes student number, name, address, email address, previous classes, and experience. Also stored is the date for registration and the classes they are registered in. The student number is unique for each student.
  • Course Entity: The school offers a variety of Online design courses through its website (these are considered course, not the on-location seminars). The data stored on each course includes the course number, the name of the course, the course description, and prerequisites (if any). The course number is unique, etc.  Conceptual Modeling Design

 

 

Computer Science homework help

THIS ASSIGNMENT  MUST BE SUBMITTED IN FOUR SEPARATE PARTS.  The first submission will be  Steps 2, 3, and 4, Next will be Steps 5,6, and 7, Then Step 8, and  Finally Step 9

INTRO:

Since you have become familiar with foundations of cloud computing  technologies, along with their risks and the legal and compliance  issues, you will now explore cloud offerings of popular cloud providers  and evaluate them to recommend one that would be the best fit for  BallotOnline.

In this project, you will first learn about networking in the cloud  and auxiliary cloud services provided by cloud vendors. Next, you will  explore cloud computing trends, best practices, and issues involved in  migrating IT deployments to the cloud, as well as typical architectures  of cloud deployments. Then, you will apply your findings to propose a  general architecture for BallotOnline’s cloud deployment to best address  the company’s business requirements.

Once you have selected a deployment architecture, you will research  two leading cloud vendors: Amazon Web Services (AWS) and Microsoft  Azure. Exploring and comparing the tools available for application  migration will enable you to recommend a vendor to the executives in  your final report. The final deliverable is a written report to  BallotOnline management, describing the results of your research and  recommending the cloud deployment architecture and the vendor for its  deployment, with justification.

Your final report should demonstrate that you understand the IT needs  of the organization as you evaluate and select cloud providers. The  report should include your insights on the appropriate direction to take  to handle the company’s IT business needs. You will also be assessed on  the ability to integrate relevant risk, policy, and compliance  consideration into the recommendations, as well as the clarity of your  writing and a demonstration of logical, step-by-step decision making to  formulate and justify your ideas.

Step 1: Research Networking and Auxiliary Services in the Cloud

The executives at BallotOnline have been impressed with your research on cloud computing thus far. While there are a variety of cloud providers (https://lti.umuc.edu/contentadaptor/page/topic?keyword=Cloud%20Providers),  BallotOnline is considering using Amazon Web Services (AWS) and  Microsoft Azure, two of the top providers in the market. BallotOnline’s  executives want you to help determine which would be the best provider  for the organization.

You will start with learning about internet networking basics (https://lti.umuc.edu/contentadaptor/page/topic?keyword=Internet%20Networking%20Basics) and cloud networking (https://lti.umuc.edu/contentadaptor/page/topic?keyword=Cloud%20Networking). You will also research many cloud services (https://lti.umuc.edu/contentadaptor/page/topic?keyword=Cloud%20Services)  that cloud providers make available to their customers to help them  take full advantage of cloud service and deployment models.

Step 2: Research Cloud Trends, Best Practices, and Migration Issues

The cloud computing revolution is redefining ways that companies of  all sizes use information technology. The cloud landscape shifts  rapidly, and current trends reflect this rapid pace of change. You  likely got an idea about this in the last step when you conducted  research on cloud architecture. Now, continue gathering information for  your final report by assessing:

In a separate piece of paper Discuss: Cloud Trends and Migration Issues, and post your findings.

Post your thoughts about new trends in cloud computing as well as  migration strategies for cloud deployments. Here are some possible  discussion topics:

1.   Which trends in the cloud computing industry do you consider the most important?

2.   What kind of future developments in the cloud industry would benefit companies like BallotOnline the most?

3.   Considering that BallotOnline would migrate the existing  application to the cloud, what elements should its migration strategy  embrace?

Your discussions will be helpful in determining proposed deployment architecture as well as a cloud vendor for BallotIOnline.

Step 3: Research Typical Architectures of Cloud Deployments

In the previous step, you considered best practices and trends in the  cloud industry. Next, you will have to look at the kinds of  architectures needed for cloud.

Because most elements of cloud deployments are implemented in a  virtualized environment controlled by software, the degree of freedom in  defining your deployment of cloud reference models is unprecedented (https://lti.umuc.edu/contentadaptor/page/topic?keyword=Cloud%20Reference%20Models).  You can define the number of virtual servers required and the  configuration, and even change them dynamically as needed. You can also  define your virtual local area networks (LANs) and subnets, and place  servers in them to implement network security requirements.

The basic cloud deployment components are cloud consumer, cloud  provider, and cloud carrier, with cloud brokers and auditor as possible  additions.

Typical cloud architectures  (https://lti.umuc.edu/contentadaptor/page/topic?keyword=Typical%20Cloud%20Architectures)  of cloud deployments vary from single server (suitable for  proof-of-concept engagements) and multiserver architectures with various  servers carrying different software components and occupying different  security zones, to geographically dispersed deployments to achieve high  availability, resilience, and speed of delivery. There are several issues to consider when selecting a server architecture, including cost, scalability, performance, and use of management (https://lti.umuc.edu/contentadaptor/page/topic?keyword=Issues%20to%20Consider%20When%20Selecting%20a%20Server%20Architecture).

For this step, research the typical architectures of cloud  deployments and begin to consider what might be a good fit for  BallotOnline. Discuss your findings in a separate piece of paper and Discuss: Cloud Architectures.

Describe your findings about typical cloud deployment architectures. In particular, provide answers to these questions:

1.   Which features of these architectures would be difficult to implement in traditional, noncloud IT deployments?

2.   Which architectural elements would be important for the BallotOnline deployment?

3.   Which architectural elements are less important for BallotOnline?

Step 4: Propose Cloud Architecture for BallotOnline Deployment

Now that you have looked into cloud architectures, in this step, you  will propose the cloud deployment architecture for BallotOnline,  applying the knowledge of typical architectural elements of cloud  deployment from the project’s initial step. You will also consider  trends and migration issues from a previous step. Your recommendation  should consider the company’s business requirements.

Recall that the company has an existing web application that it wants  to move to the cloud, and also that the company wants to expand its  business to other parts of the world. In earlier projects, you learned  about and analyzed the IT business requirements for BallotOnline. Among  them were demands for application and data security, data encryption, and separation for deployments overseas (https://lti.umuc.edu/contentadaptor/page/topic?keyword=Application%20and%20Data%20Security). Also, the application should handle load peaks during election times in different regions.

Specific technical requirements state that BallotOnline is a web  application, written using the popular open-source LAMP (Linux, Apache,  MySQL, PHP) software suite and the PHP application (https://lti.umuc.edu/contentadaptor/page/topic?keyword=PHP%20Application).

Action Item

Describe your proposed architecture by submitting a report with a  drawing of the architecture (hand-drawn or computer-created) diagram and  explaining its elements in a separate piece of paper.

There are some sample drawings here under typical cloud architectures to give you an idea (https://lti.umuc.edu/contentadaptor/page/topic?keyword=Typical%20Cloud%20Architectures).

Step 5: Research AWS

You’ve described your proposed architecture and included a diagram to  provide leadership a way to envision the system. Now, it’s time to look  closely at the leading cloud providers to see if their services will  fit BallotOnline’s needs.

Each cloud provider provides a unique profile of services, so it is  good practice to compare cloud vendors and evaluate their reliability,  performance, ease of use, cost, security and compliance measures. As  more providers enter the marketplace, many will specialize on specific  needs and use cases, making this evaluation even more critical.

In this step, you will explore AWS and assess the feasibility of this platform for deploying the architecture proposed in the previous step (https://lti.umuc.edu/contentadaptor/page/topic?keyword=Explore%20AWS). You should also consider issues related to AWS Pricing (https://aws.amazon.com/pricing/).

Based on your research, determine to what degree AWS supports the  elements of the BallotOnline business and technical requirements.

Share your thoughts in a separate piece of paper and Discuss: Amazon Web Services Feasibility.

Post your findings on the features and services of AWS, including:

1.   Do you find the AWS offering feature-rich? Which features do you  like the most? Do you feel there are some features missing?

2.   What features support architectural elements such as  auto-scaling, load balancing, application auditing, or multigeography  deployments?

3.   Does the website, tutorials, and services usage seem easy and user-friendly?

Step 6: Research Microsoft Azure

Now that you have had a chance to research AWS, it’s time to explore Microsoft Azure (https://lti.umuc.edu/contentadaptor/page/topic?keyword=Explore%20Microsoft%20Azure), another cloud provider that could be used to deploy the proposed architecture. You should also consider issues related to Microsoft Azure pricing (https://azure.microsoft.com/en-us/pricing/).

Based on your research, determine to what degree Microsoft Azure  supports the elements of the BallotOnline business and technical  requirements. Share your thoughts in a separate piece of paper and Discuss: Microsoft Azure Feasibility

Post your findings on the features and services of Microsoft Azure, including:

1.   Do you find the Azure offering feature-rich? Which features do  you like the most? Do you feel there are some features missing?

2.   What features support architectural elements like auto-scaling,  load balancing, application auditing, multi-geography deployments?

3.   Does the website, tutorials, and services usage seem easy and user-friendly?

Step 7: Generate AWS Proof of Concept (POC)

With your research complete, you will now deploy a simple one-page  PHP application to the AWS cloud. It will allow you to explore  deployment methods, ease of use, provisioning speed, etc., for the  Amazon cloud.

Action Item

As you may have already discovered in your research on AWS, it makes a cloud migration tool called Elastic Beanstalk available for customers to migrate their existing applications into the AWS cloud (https://aws.amazon.com/elasticbeanstalk/). We will use this tool to deploy your AWS proof of concept (POC) (https://lti.umuc.edu/contentadaptor/page/topic?keyword=Proof%20of%20Concept%20(POC)).

Follow the steps in the AWS lab instructions to complete your AWS POC (https://content.umgc.edu/file/c91e7ce0-9040-442d-b244-0b511f07cbad/4/AWS%20Lab%20Instructions.pdf).

In a word single page, upload the URL linking to your application running in the AWS portal.

Step 8: Generate Azure Proof of Concept (POC)

Now that your AWS POC is complete, you can proceed with a similar POC deployment for the Microsoft Azure cloud.

Action Item

Follow the steps in the Azure lab instructions to complete your Azure POC (https://content.umgc.edu/file/c91e7ce0-9040-442d-b244-0b511f07cbad/3/MicrosoftAzureLabInstructions.html).

In a word single page, upload the URL linking to your application running in the Azure portal.

You are ready for the last step: writing the final report with  recommendations on the cloud providers for the BallotOnline executives.

Step 9: Write the Final Report Evaluating AWS and Azure Providers

Now that you have completed your research, shared your ideas with  colleagues, and explored the two vendors, it is time to compile your  findings and recommendations for the BallotOnline executives. You may  find these considerations for cloud provider selection helpful in making your decisions (https://lti.umuc.edu/contentadaptor/page/topic?keyword=Considerations%20for%20Cloud%20Provider%20Selection).

Use the Final Report Evaluating AWS and Azure Providers Template  to write your report and submit your work to the classroom  (https://content.umuc.edu/file/c91e7ce0-9040-442d-b244-0b511f07cbad/3/FinalReportEvaluatingAWSandAzureProvidersTemplate.docx).

Rubrics:

Check Your Evaluation Criteria

Before you submit your assignment, review the competencies below,  which your instructor will use to evaluate your work. A good practice  would be to use each competency as a self-check to confirm you have  incorporated all of them. To view the complete grading rubric, click My  Tools, select Assignments from the drop-down menu, and then click the  project title.

2.2: Locate and access sufficient information to investigate the issue or problem.

2.3: Evaluate the information in a logical and organized manner to determine its value and relevance to the problem.

2.4: Consider and analyze information in context to the issue or problem.

2.5: Develop well-reasoned ideas, conclusions or decisions, checking them against relevant criteria and benchmarks.

5.4: Articulate insights to leadership on the appropriate course of direction on the identified IT business needs.

6.1: Articulate the systems architecture of the cloud – cloud infrastructure, cloud service, cloud platform, and cloud storage.

6.6: Evaluate and select cloud providers (AWS, Azure, VMware, Google Cloud, IBM).

6.8: Review, evaluate, and utilize emerging technologies related to cloud to support business needs.

FinalReportEvaluatingAWSandAzureProvidersTemplate1 AWSLabInstructions1 MicrosoftAzureLabInstructions (1) FinalReportEvaluatingAWSandAzureProvidersTemplate (1)

Computer Science homework help

Looking for 3 hour AI tutor  in the following 24 hr

Computer Science homework help

You will need to ensure to use proper APA citations with any content that is not your own work.

Question 1

Suppose that you are employed as a data mining consultant for an Internet search engine company. Describe how data mining can help the company by giving specific examples of how techniques, such as clustering, classification, association rule mining, and anomaly detection can be applied.

Question 2

Identify at least two advantages and two disadvantages of using color to visually represent information.

Question 3

Consider the XOR problem where there are four training points: (1, 1, −),(1, 0, +),(0, 1, +),(0, 0, −). Transform the data into the following feature space:

Φ = (1, √ 2×1, √ 2×2, √ 2x1x2, x2 1, x2 2).

Find the maximum margin linear decision boundary in the transformed space.

Question 4

Consider the following set of candidate 3-itemsets: {1, 2, 3}, {1, 2, 6}, {1, 3, 4}, {2, 3, 4}, {2, 4, 5}, {3, 4, 6}, {4, 5, 6}

Construct a hash tree for the above candidate 3-itemsets. Assume the tree uses a hash function where all odd-numbered items are hashed to the left child of a node, while the even-numbered items are hashed to the right child. A candidate k-itemset is inserted into the tree by hashing on each successive item in the candidate and then following the appropriate branch of the tree according to the hash value. Once a leaf node is reached, the candidate is inserted based on one of the following conditions:

Condition 1: If the depth of the leaf node is equal to k (the root is assumed to be at depth 0), then the candidate is inserted regardless of the number of itemsets already stored at the node.

Condition 2: If the depth of the leaf node is less than k, then the candidate can be inserted as long as the number of itemsets stored at the node is less than maxsize. Assume maxsize = 2 for this question.

Condition 3: If the depth of the leaf node is less than k and the number of itemsets stored at the node is equal to maxsize, then the leaf node is converted into an internal node. New leaf nodes are created as children of the old leaf node. Candidate itemsets previously stored in the old leaf node are distributed to the children based on their hash values. The new candidate is also hashed to its appropriate leaf node.

How many leaf nodes are there in the candidate hash tree? How many internal nodes are there?

Consider a transaction that contains the following items: {1, 2, 3, 5, 6}. Using the hash tree constructed in part (a), which leaf nodes will be checked against the transaction? What are the candidate 3-itemsets contained in the transaction?

Question 5

Consider a group of documents that has been selected from a much larger set of diverse documents so that the selected documents are as dissimilar from one another as possible. If we consider documents that are not highly related (connected, similar) to one another as being anomalous, then all of the documents that we have selected might be classified as anomalies. Is it possible for a data set to consist only of anomalous objects or is this an abuse of the terminology?