Information Technology Question

Q. Develop an APA-formatted paper that presents a detailed analysis and research-based information
pertaining to ALL of the following topics:
Define and present examples of Big Data in relationship to decision-making and technologies that
enable Big Data analysis. Present and provide examples of how Big Data can help organizations
become more efficient.
1. Define and present examples of Hadoop open-source software utilities. Describe in detail
how these utilities aid in the networking of several computers for the purpose of harnessing
large amounts of data and computation.
2. Describe, compare, and contrast HBase and other Big Data Databases. Provide examples
and applications for these various databases.

Project #2 – e-Commerce Risk Analysis Overview E-Commerce companies have become increasingly important in this era of global pandemics

Project #2 – e-Commerce Risk Analysis
Overview
E-Commerce companies have become increasingly important in this era of global pandemics and resulting restrictions on businesses and individuals. Consumers are ordering products online in larger numbers than ever before due to business closures or restricted operating hours. Companies positioned in the e-Commerce industry are experiencing growth beyond previous predictions. But, at the same time, some E-commerce companies are seeing their business decline drastically due to travel restrictions and the reluctance of businesses and individuals to travel for any but the most critical of reasons. Added into the risk picture are risks from the actions of cybercriminals, hackers, and nation-state actors are taking advantage of these unsettled times resulting in increased risks for companies whose business models depend upon the Internet for financial transactions, orders, and communications both internal and external. For a company considering an expansion into e-Commerce there can be an increased number of risks overall especially in the areas of information technology and online ordering.
For this project, you will prepare a Risk Analysis to be presented to the governance board (executives and senior managers) at Bay

This project is required for you to login onto my digital textbook. Log onto https://morganstate.instructure.com/login/ldap You go onto canvas

This project is required for you to login onto my digital textbook. Log onto https://morganstate.instructure.com/login/ldap
You go onto canvas the link i pasted up there
Scroll down to Access Module 1 SAM book project which is worth 200 points and click launch external tool and then you can start

The course name is INSS141.W01_Spring 2022

Please message me with any questions

This project is required for you to login onto my digital textbook. Log onto https://morganstate.instructure.com/login/ldap You go onto canvas

This project is required for you to login onto my digital textbook. Log onto https://morganstate.instructure.com/login/ldap
You go onto canvas the link i pasted up there
Scroll down to Acess Module 2 SAM Text Book Project which is worth 200 points, click launch external tool and then you should be able to start

This project requires you to log onto my online textbook, here are the directions This project is required for

This project requires you to log onto my online textbook, here are the directions
This project is required for you to login onto my digital textbook. Log onto https://morganstate.instructure.com/login/ldap
You go onto canvas the link i pasted up there
Scroll down to Excel SAM capstone which is worth 200 points press launch extrenal tool and it will take you to the website

If you have any questions please message me!

You have to explain:Explain what cryptocurrencies are, How they came in existence,What was the first crypto,What technology is it

You have to explain:Explain what cryptocurrencies are, How they came in existence,What was the first crypto,What technology is it based on,Then you have to comment what kind of a trend it is, Ex: It is very fascinating, complex, yet simplealso comment on how it is changing the world,What does the future look like with crypto in it, what role will it play according to you,what do you think about it. will it be good or bad.Please add at least one graph showing the develpoement of crypto,graph of how many crypto are there, in what quantity.Please read the commentary of the people in that field and think of those idea and write your own comments.You need to write three main comments.Although I have not given you enough guidelines, I hope you understand what I am asking for. This is a commentary essay I have provided you some documents for you to understand it more properly, also added the image that needs to be usedI have added some papers as well for reference.You need to write commentary about cryptocurrencies not on a particular cryptocurrency.

IT Sourcing and Development in a Global Economy – NEP2

Included supporting documents and tips….

Tips…..

To prevent the trap that students often fall into, I encourage you to use all the learning resource sections, even those deemed “non-essential,” to complete the task before submitting your work. That process helps prevent revisions. To start, IT Sourcing and Development in a Global Economy design helps you explore and understand the strategic, operational, tactical, and security-related impacts of Sourcing and supporting a global IT project. You will also learn to apply the organization’s ethics, cultural issues, and regulatory considerations in a global environment.

The course of study highlights:

· Competency 1: IT Sourcing of Stakeholders and Elements, where you will determine which stakeholders, documents, tools, or skills are necessary to ensure successful Sourcing and support of global IT projects.

· Competency 2: The Solutions Development and Operating Strategies, where you will propose appropriate Sourcing and operational strategies for global IT projects.

· Competency 3: Ethics, Regulations, and Multiculturalism, where you will explain how adherence to ethics, an understanding of regulations, and sensitivity to multiculturalism can contribute to the success of global IT projects.

Here is the information that has helped students complete the task.

***The old Webinar can be found here***It is tied to the old resources but still has valuable information.
Read all the required reading. Many of the revisions requested by evaluators and questions about the task itself are in the lessons and Udemy video.
The video scope is excellently defined and I would recommend that you review it all. However, please pay particular attention to the following highlighted areas as they will help you answer questions in the task.

For culture and communications, read all the articles in section three, and the remaining sections for security and risk.
Remember to include more than one option where the rubric calls for it; this is a task that benefits from the time put into detail.
Here is a link to address section B so that you can complete the revisions. Stakeholders are everyone impacted by the project, including groups outside your company. i.e., when a city does street repairs, one of the identified stakeholders is the city’s population, who will use the resource.
Either company can meet your needs. However, it may be more difficult or require more negotiation to accomplish the company’s end goals
Research goes a long way when looking at areas of concern, especially regarding intellectual property and outsourcing.
The EAR reads like a radio manual, and it is hard to determine what applies and what does not. Part one of category 5 is about telecommunication. Read part one, describe what it pertains to, and why it may or may not apply to this case. Part two has is about business transactions and encryption. If you were to take note and pay particular attention to the following links, I think you will answer the question with ease.
Here is the link for section J, the EAR.
In our course material there is the following information as well.
The regulation of exported encryption controls is of particular importance to IT organizations that are considering outsourcing arrangements. What is the currently acceptable level of encryption, where do the outsourcing companies reside, and what would happen if Endothon does not comply? The Export Administraton Regulations (EAR) are often misunderstood or misapplied, which can result in violations and costly penalties for the organization. Making an effort to understand these regulations, and how they apply to the outsourcing arrangement being considered, is well worth the time.
Supplemental Article: Shane, J. R.,

You have been hired by a consulting firm in downtown Chicago as the Network Manager. They are still using

You have been hired by a consulting firm in downtown Chicago as the Network Manager. They are still using a legacy token ring network in their current environment as the prior Network Manager refused to learn about updating networking standards. Your first task is it bring their networking infrastructure up to current industry standards. You will be submitting this to the Chief Information Security Officer, so it should be written like a standard BUSINESS PROPOSAL (spelling and grammar will matter). If you do not know the format of a business proposal Google it. You need to turn in:

• Spreadsheet with a breakdown of the items you plan to purchase in this upgrade scenario along with links to each item and costs (URL for each item).

• Visio (or similar program) diagram of what you are designing exactly.

• Remember, this is a BUSINESS DOCUMENT you are giving to the Chief Information Security Officer (neatness, ease of reading, appeal, organization, format, grammar, spelling, and overall design will count for your grade).

II. SCENARIO

This section will detail the current situations and all the items you have on hand and budgeting.

• You support a staff of 400 employees in a one-floor office building, with access to power, ceiling, and basement. There are no right-of-way issues. The square footage is 30,000 square feet for the office space.

i. 400 Desktop computers (remember the token ring network, what needs to change).

ii. 100 Laptops

iii. 6 Servers (one email, two files, one print, and two DNS/DHCP/AD)

iv. 2 Multi-function Printers ~ 2

v. 400 VoIP Phones

vi. The legacy token ring network

• You have an ISP, but it is not renewing your contract. You need a new one for the Internet to your office. What speed do you need?

• The computers and printers are in working order and do not need to be replaced. How do you upgrade them from the legacy token ring network to a current standard? What item needs to be added to the desktop?

• The overall budget is $125,000 for all equipment, services, etc.

• You must determine IEEE standard networking design and protocols to be used (choice of IPv4 or IPv6, justify your choice)

• Your proposal must also identify and justify at least 2 different VLANs you plan to implement.

• When it comes to the office’s overall layout, the desktops are in rows with 50 computers per row (so 8 rows total).

• The servers are all located in a server room, and this is where the current ISP drop is situated. The 2 printers are situated against the walls, one in the North and South of the floor.

• What networking equipment do you need? You need to createa wired or a wireless network and justify your decision. Routers, switches, access points, cabling, media, etc., make it your own and create something exciting but make sure it works.

•The VoIP phones are currently using power bricks to power them, located at each person’s desk. Figure out a way to use the VoIP phones without the power brick and implement it.

answer to 2 scenarios

Please reply with answers for each of the below. Answers are freeform, but I do suggest keeping them as concise as possible

Scenario1: You are on a project to implement the new feature Apple Airplay for Webex Devices in our campus networks (campus networks are the wireless networks we operate in our San Jose Offices for employee use). Assume that our campus network is a standard Layer2 network design with wireless APs connected to a switch and switch connected to a gateway(router). Webex devices connect to the same switch.
How would you learn the basics of this technology in the first week of the project? Please be as specific as possible.
How would you recommend the planning of the project to take this from idea (new feature) to implementation (have it working on our actual production network). [*I am looking for how you structure a plan and communicate it]
How would you define a “Definition of Done”? – the criteria to measure against so you can explain to your boss what the goal is and what success looks like

Scenario2: You are tasked with executing a Proof of Concept for the following: Given a single switch (Catalyst C9300X-48HX) we want to test the hypothesis that an identifiable change in power draw (amps) can be correlated with specific operations executed on the switch (CLI commands). For example, if you, as switch administrator, create a diagnostic report on the C9300 by running the command [c9300# show tech] that the power used by the switch will change in response.
You are asked to build a Proof of Concept lab and identify test cases to validate this hypothesis. Assume your equipment lists is (1) C9300X-48HX, (1) power monitor outlet (device that measures realtime power usage), (1) webapp that retrieves the data from the power monitor and displays it and all needed cabling.
Briefly describe how you would physically build this lab
What measurements and data would be necessary to complete this PoC? as detailed as possible.
What are some data quality issues or other problems you might run into?
Create a test case using Description, Measurements and Pass/Fail criteria format.

CSAS 2126 Data Structures and Algorithms Priority Queues, Tree, and Disjoint Sets Questions 1. Priority queue [20 points] Complete

CSAS 2126 Data Structures and Algorithms
Priority Queues, Tree, and Disjoint Sets

Questions
1. Priority queue [20 points]
Complete the exercise from textbook 6.18 (page 285)

2. Tree [10 points]
Complete the exercise from textbook 4.15 (page 184)

3. Disjoint Sets [20 points]

Consider the set of vertices A-P, and the relationships {(D, A), (B, E), (C, P), (I, J), (L, N), (O, D), (K, L), (L, A), (F, M), (G, M), (H, P), (L, G), (E, K)}. Show the final forest if
a) The tree for the right element is always pointed at the left element.
b) The smaller tree is always pointed at the larger tree, pointing right at left if of equal rank.
c) The smaller tree is always pointed at the larger tree, and path compression is used.
In each case, give the total number of pointers followed in searching and the number of pointers added or changed during the algorithm. Then, for each forest, give (1) the maximum depth of a node, and (2) the cost of searching, averaged over the 16 nodes. [Remember that a search starts at the node and runs to the root. Do not use path compression on those searches.]

Instructions
• For all the questions, either you can write a clear pseudocode/Algorithm or C programming language.
• There are 3 questions and try to complete the first 2. For problem statement 3 –after the Monday session (April 11’ 2022), you can start doing the assignment