Scenario
The Director of the Information Technology received notice from the Board of Directors that they are interested in a new Data Center. The Board has decided on dedicating a section of the West wing of the building for the data center. They are requesting a high-level design depicting a Data Center floor plan that will include a basic hardware rack layout as well as physical access and security controls.
The Director of Information Technology selected you to create a Visio design showing the floorplan layout of the new data center which include a 42u hardware rack layout and physical access and security controls.
The Board members request a summary explaining the Data Center design, with an evaluation of Green initiatives that will be used in the Data Center.
Instructions
Create a Visio design showing the floorplan layout of the new data center which include a 42u hardware rack layout and physical access and security controls. Provide a summary to explain your design and an evaluation of Green Initiatives.
Create a Data Center floor plan design with space to host 3 offices, rack space, heating and cooling space and show physical access and security controls.
Using best practices for installing hardware racks, design one full 42u rack layout that include the following:
At least five 2u servers
At least one 4u storage unit
At least one network switch
At least one PDU
At least one UPS
Category: Computer Science homework help
Attached is the instruction and the memo template as well as the PDF file for th
Attached is the instruction and the memo template as well as the PDF file for the presentation section. please let me know if you need more information
Risk management project Project Part: Risk Mitigation Plan Senior management at
Risk management project
Project Part: Risk Mitigation Plan
Senior management at Health Network allocated funds to support a risk mitigation plan. They have requested that the risk manager and team create a plan in response to the deliverables produced within earlier phases of the project. The risk mitigation plan should address the identified threats described in the scenario for this project, as well as any new threats that may have been discovered during the risk assessment. You have been assigned to develop a draft of this new plan.
Submission Requirements
Format: Microsoft Word (or compatible)
Font: Arial, size 12, double-space
Citation style: Your school’s preferred style guide
Estimated length: 4–6 pages
Instructions Format Complete the assignment in a Word document and then uplo
Instructions
Format
Complete the assignment in a Word document and then upload the assignment for grading.
Make sure to include a title page (with your name and date) and a reference page (with your sources).
Double-space paper, 1-inch margins, 12-point font.
When submitting the paper, it will automatically be processed through Turnitin for review.
Use examples from the readings, lecture notes, and outside research to support your answers.
Use high-quality sources (no Wikis, blogs, or anonymously authored articles).
Follow APA guidelines for citing and referencing source material. Answer the below questions (250 words for each question):
This assignment is due by 2355 EST on Sunday.
Instructions: Provide an analysis of the three scenarios below.
1. (250 words + 1 high quality source)
Chapter 6 noted that Friendster has obtained several social networking patents that it could potentially assert against other social networking sites such as Facebook and MySpace. Suppose you are corporate counsel at one of these companies and you expect that you may eventually be sued by Friendster. Choose one of the following options and defend it. Note: You must use the literature to support your decision – DO NOT simply state your opinion. For example, you may see prior cases and use that as a model for your decision
Enforce blocking patent
Pursue licensing agreement
Work around the patent
2. (250 words + 1 high quality source)
Chapter 7 – The CEO of a small but promising start-up company needs an experienced engineer to head up a key aspect of the business and has selected Sam as a leading candidate. If hired, Sam would not only be exposed to the proprietary technology that already provides a significant advantage in the market but would be tasked with developing additional proprietary information and software. Sam is currently an employee of XYZ Corp., a competitor of the start-up. What potential problems might the CEO want to consider? What steps could the CEO take to address these problems?
3. (250 words – source not required)
Read about the Gramm Leach Bliley Act (GLBA) here: https://www.ftc.gov/tips-advice/business-center/guidance/how-comply-privacy-consumer-financial-information-rule-gramm and discuss the impact of GLBA on financial institutions. Specifically, address how GLBA helps protect your privacy.
Module 4 – Lab: Processing Array of Objects In this lab, you will create a
Module 4 – Lab: Processing Array of Objects
In this lab, you will create a GUI application using an array of objects. View the lab instructions and video provided below to help guide you through your efforts.
Module 4 – Project: Use ArrayList, Tabs, and JList Controls In this part of
Module 4 – Project: Use ArrayList, Tabs, and JList Controls
In this part of the project, you will use ArrayList, Tabs, and JList Controls. Read the CIS355A Module 4 Project GuideLinks to an external site. and view the project video below for instructions and details to help guide you through your efforts.
Risk Mitigation Plan Senior management at Health Network allocated funds to supp
Risk Mitigation Plan
Senior management at Health Network allocated funds to support a risk mitigation plan. They have requested that the risk manager and team create a plan in response to the deliverables produced within earlier phases of the project.The risk mitigation plan should address the identified threats described in the scenario for this project, as well as any new threats that may have been discovered during the risk assessment. You have been assigned to develop a draft of this new plan.
Discussion 3 Physical Vulnerability assessment of security perimeters of TechWor
Discussion 3 Physical Vulnerability assessment of security perimeters of TechWorx.
Assignment: Mr. Scott wants a Physical vulnerability assessment of the security perimeters of TechWorx.
Chapters 3.6 (Gupta and Goyal)
Chapter 4 (Fennelly)
Minimum Requirements:
Inside the Techworx building:
1st-floor reception and access to stairs, elevators, loading dock, and restrooms
2d floor offices and conference rooms
3rd floor: Executive offices
4th floor: IT Offices and data center
Define the three Perimeters (Outer, Inner, and Interior) for TechWorx and what are the key vulnerabilities of each of the perimeters. Note: In figure 2 below, there is no indication of an outer perimeter. You will need to create one for the organization.
What are the most critical areas/limited access areas that we should secure in the building?
Include at least one supporting figure, image, or diagram. (you may have more than one)
Ensure you address all three security perimeters.
What type of access control systems do you recommend for TechWorx and why? Note: I am not asking for a specific model and brand. At this point, we are just brainstorming what types of systems we will need.
Mr. Scott was very happy to hear about the NIST Cybersecurity Framework. He is anxious to get started on protecting TechWorx equipment and personnel. For this assignment only consider physical perimeters. We will cover computer/network (logical) perimeters in future assignments.
Figure 2TechWorx Corporate Office
Grading Rubric for Discussion Board (attached) Download Grading Rubric for Discussion Board (attached)
It is time to show off all of your incredible talent and all that you have learn
It is time to show off all of your incredible talent and all that you have learned by programming a simple card game, we will use the concept of poker, but without actual cards. You will have three separate, or internal classes that will:
Instantiate a Card
Instantiate a Deck of those Cards, and shuffle and deal them.
Play the game.
In this project you will simulate the playing of a simple card game. You are given a Card and Deck class to use. The Card class should not be changed or renamed, I will use my own Card class when testing your files.
This assignment should be submitted in two classes; Main+lastName, Deck+lastName, or using internal declared classes, but will not be referenced in this manner henceforth. The first class, Deck, will be a modification of the class I have provided. You will need to implement the shuffleDeck method in order for this class to be usable, which has already been written for you in a method.
The second class, Main, will use the Card class and your modified Deck class to create a shuffled Deck object and deal the two hands. The hands should be dealt in alternating order, starting with the first hand. As the cards are dealt into each hand they should be removed from the deck.
For example, each hand is shown for the following Deck.
seven of spades <-- Index 0, top card
queen of spades <-- Index 1, etc.
ten of spades
eight of spades
three of spades
king of hearts
queen of hearts
jack of clubs
four of clubs
eight of clubs
king of diamonds
seven of hearts
Hand 1: Hand 2:seven of spades queen of spadesten of spades eight of spadesthree of spades king of heartsqueen of hearts jack of clubsfour of clubs eight of clubs
Each of these cards should be removed from the deck.
After dealing the hand, Main should use the point value attribute of each card to calculate the total point value of each hand. The hand with the highest point value wins. In the case of a draw, the second hand wins. In this game ace = 1, jack = 11, queen = 12, and king = 13. In the deck the card in the first position (index 0) is the top of the deck.
Lastly, Main will declare the winning hand. See the following sample run for the exact format that will be expected.
Sample Run of Main:
Hand 1: Total points 22
three of clubs (point value = 3)
two of clubs (point value = 2)
six of hearts (point value = 6)
ten of hearts (point value = 10)
ace of spades (point value = 1)
Hand 2: Total points 27
four of spades (point value = 4)
ten of clubs (point value = 10)
three of diamonds (point value = 3)
eight of diamonds (point value = 8)
two of hearts (point value = 2)
Hand 2 wins
Play again (y/n)?
To plan for the program, you should review the given classes. Knowing which methods are available to you will be very helpful in designing your game. Then, you should plan the algorithms that you will design.
Use the following table to plan your program.
Card/Deck Methods & VariablesMain
Card - Methods & Variables
String suit, String rank, int pointValue
public Card(String cardRank, String cardSuit, int cardPointValue)
public String suit()
public String rank()
public int getPointValue()
public boolean matches(Card otherCard)
public String toString(); use to print each card with a for each
Deck - Methods & Variables
private ArrayList
constructor method; instantiate deck ArrayList object, populate elements with cards by calling initialization method, and shuffle it by calling shuffleDeck() (written for you).
method to initialize the deck with 52 cards and set their point values; Ace of Clubs through King of Spades.
method to return the top card from the deck and remove it from the stack; return type should match what you are returning.
Main.main
instantiate a new Deck object based on Card element types
establish two arrays, one for each hand to be dealt
deal 5 cards to each hand calling the getTopCard() method from Deck{}
total up the values for each hand using getPointValue() from Card{}
display the cards and their point values for each hand
determine the winning hand and display
You do NOT need to hand in Card, nor customize the class or the instantiation usage of Card in Deck or Main! But you still need to change Deck and Main to include your last name.
PLAGIARISM will earn a ZERO! Copying someone else’s code online, or another student is also considered plagiarism.
The purpose of conducting a systematic review of literature is to comprehensivel
The purpose of conducting a systematic review of literature is to comprehensively and rigorously summarize existing research on a specific topic, providing an evidence-based foundation for decision-making and identifying gaps for future studies. Unlike a traditional literature review, a systematic review follows a predefined protocol, employs a systematic search strategy, and critically appraises studies for inclusion based on predefined criteria. The key steps involve formulating a research question, searching multiple databases, screening and selecting relevant studies, extracting data, assessing study quality, and synthesizing the findings. Writing a systematic review requires adherence to a structured format, ensuring transparency and replicability of the process. For guidance on systematic review writing, you can refer to https://literaturereviewwritingservice.com/help-with-writing-a-systematic-review/.