Assignments

7

Differences And Similarities Between HTTPS And VPN

Hypertext Transfer Protocol Security (HTTPS) is a connection protocol for communication between web browser and server which employs Transfer Layer Security encryption to safeguard data between website and user. HTTPS protocol enables collecting resources such as HTML documents. On the other hand, the Virtual Protocol Network (VPN) establishes an encrypted tunnel between the server and the device user (Rao & Nayak, 2014). It ensures that traffic from users’ device is encrypted and secured from IPS and any other person.

3

The Basic Steps For Certifying The Product's Country Of Origin

One of the key ways to take advantage of the Free Trade Agreement (FTA) is to understand the Rules of Origin (ROOs). Put simply, to qualify for the reduced-duty benefit, the product exported must originate from an FTA party or must contain a specified percentage of U.S. inputs and components.

7

NumPy Assignment

For this assignment, you will need to write Python code using NumPy to solve the following problems. Calculate the product of the elements in each column. Transpose the second array and calculate its dot product with the first array.

3

Company Analysis

The first process you are considering is hiring a new employee to work for your large company. To get started, you must: a. List the activities that are likely to be recorded in a database related to hiring an employee. b. Brainstorm what types of analyses you could perform by looking at the activities and time stamps for those activities. Suggest three analyses that you could perform if this data was collected and put into a process mining dashboard. As you consider the analyses, think about analyses that ​‌‍‌‌‍‍‍‍‌‌‍‍‌‍‍‌‌‌‌​would be useful to internal and external auditors, the HR Department and other groups.

7

Basic Concepts Databases

You were just hired by an airline industry to create a database to record the various airlines and the pilots that work for them Discussions with the industry representatives focused on two initial entities, Airlines and Pilots; the following key points were agreed: 1. Each pilot is assigned a unique PilotID. 2. Each AirlineID is unique 3. Each pilot may work for one airline, each airline can have many pilots. 4. FName, LName, JobTitle and Salary describe each pilot (with the obvious meaning) 5. AirlineID, NPlanes, NRoutes, NPilots describe each airline (NPlanes number of planes, NRoutes number of routes, NPilots number of pilots) 6. No fields beyond those in the report are needed.

6

Walden Week 5 Manufacturer MPG Claim Hypothesis Testing Paper

Companies often develop and test hypotheses about their products. For example, car manufacturers will test their cars to determine fuel efficiency and miles per gallon. To ensure that products are safe and that they perform as advertised, regulatory and consumer protection groups also test companies’ claims.

11

Analysis Essay: Waterboarding Is A Torture

Christopher Hitchens argues in his article, “Believe me, It's Torture,” that the interrogation technique known as waterboarding is actually torture. Christopher Hitchens accepted to be subjected to waterboarding in order to have a better understanding of the procedure (Hitchens 1). The technique involves one being fastened to a board and smothered occasionally with wet towels. Hitchens characterizes the process as a gradual, deliberate drowning. Additionally, he states that interrogators have means for circumventing the victim's attempts to ease the procedure.

8

Nuclear Enegy

Fission is the splitting of a heavy, unstable nucleus into two lighter nuclei, and fusion is the process where two light nuclei combine together releasing vast amounts of energy. The question is; What are the advantages and disadvantages of nuclear fission? How do these differ from the advantages and disadvantages of nuclear fusion?

7

Technical Differences Between 802.11ac And 802.11n Essay

There are several variants of the 802.11 standards include a, b, g, n, and ac, with more on the way (Vanhatupa, 2013). These prefixes appended to 802.11 denote various Wi-Fi standard versions. Each of these variants includes a unique set of features and capabilities. The standards will result in improved in the performance level of networking devices, depending on their features and capabilities. This study will examine the distinction between 802.11n and 802.11n Wi-Fi.

7

Why VMware VSphere Is More Suitable Than Hyper-V?

 Virtualization allows a single piece of computer hardware to be shared among several virtual machines (VMs). Aside from lowering equipment costs and generating extensive cost savings, virtualization eases resource and IT management, improves business continuity with minimal downtime, and allows faster hardware and software provisioning. Virtualization has changed the way we provision server infrastructure, build out development environments, and purchase hardware. It has allowed great efficiencies in the enterprise data center that simply are not possible with running on physical servers to host mission critical workloads. A hypervisor that runs on top of the hardware and allows direct access to its components brings virtualization’s capabilities to the fore. The two major players in the enterprise datacenter space today are Microsoft Hyper-V and VMware vSphere hypervisors. They are both extremely powerful hypervisors on which can be run on enterprise data center production workloads. Each have various characteristics that make them unique. Each of these characteristics serve the basis on which many make the decision to go with one hypervisor or another for running their enterprise data centers.

3

Simple Predictive Analysis

Discuss the nature of the sample (sex, age, closing, and sample size). Present the findings from the analysis and translate the results into a recommendation for whether or not to roll out a mentorship program coupling more older, more experienced salesperson with younger, less experienced salespersons.

7

INFORMATION TECHNOLOGY

Project 1 Step 1: Conduct a Security Analysis Baseline In the first step of the project, you will conduct a security analysis baseline of the IT systems, which will include a data-flow diagram of connections and endpoints, and all types of access points, including wireless. The baseline report will be part of the overall security assessment report (SAR).