Lab 02 | File and Memory Management Part 1: File Management in Linux OSLinks to

Lab 02 | File and Memory Management
Part 1: File Management in Linux OSLinks to an external site.
Part 2: Memory Management in Linux OSLinks to an external site.
Paste only screenshots and answers to the questions on one document
Convert it to PDF
Turn in ONE PDF with all of your screenshots and answers to Part 1 and 2.

Discuss the Privacy issues related to the use of Biometric devices. Fully addres

Discuss the Privacy issues related to the use of Biometric devices.
Fully address the question(s) in this discussion; provide valid rationale or a citation for your choices; and respond to at least two other students’ views.
Initial post should be at least 350 words in length. Each reply post should be at least 150 words in length.

Many organizations have adopted cloud computing. In this assignment, you will re

Many organizations have adopted cloud computing. In this assignment, you will research cloud computing and explore its advantages and disadvantages. You will also consider best practices for adopting cloud computing, selecting a particular cloud computing service model, and assessing and mitigating security risks.
For your research, please consult Chapters 13 and 14 of your textbook and these articles:
“A Brief Review: Security Issues in Cloud Computing and Their Solutions.”
“Cloud Computing Security Risks: Identification and Assessment.”
“Cloud Computing – Recent Trends in Information Technology.”
Note: If you wish you may consult additional articles, but this is not required.
Requirements
Specifically, you will write a 3 page paper in which you:
Outline the planning process that needs to be in place before adopting cloud computing.

Be sure to identify the stakeholders who need to be involved and the discussions that need to take place.

Evaluate the advantages and disadvantages of cloud computing.
Describe the methodology you would use to select a cloud computing service model.
Review the security risks and mitigation activities that need to take place before adopting cloud computing.
Go to Basic Search: Strayer University Online Library to locate and integrate into the assignment at least three quality, peer-reviewed academic resources, written within the past five years.

Include your textbook as one of your resources.
Wikipedia and similar websites do not qualify as quality resources.

Discuss the Privacy issues related to the use of Biometric devices. Fully addres

Discuss the Privacy issues related to the use of Biometric devices.
Fully address the question(s) in this discussion; provide valid rationale or a citation for your choices; and respond to at least two other students’ views.
Initial post should be at least 350 words in length. Each reply post should be at least 150 words in length.

Many organizations have adopted cloud computing. In this assignment, you will re

Many organizations have adopted cloud computing. In this assignment, you will research cloud computing and explore its advantages and disadvantages. You will also consider best practices for adopting cloud computing, selecting a particular cloud computing service model, and assessing and mitigating security risks.
For your research, please consult Chapters 13 and 14 of your textbook and these articles:
“A Brief Review: Security Issues in Cloud Computing and Their Solutions.”
“Cloud Computing Security Risks: Identification and Assessment.”
“Cloud Computing – Recent Trends in Information Technology.”
Note: If you wish you may consult additional articles, but this is not required.
Requirements
Specifically, you will write a 3 page paper in which you:
Outline the planning process that needs to be in place before adopting cloud computing.
Be sure to identify the stakeholders who need to be involved and the discussions that need to take place.
Evaluate the advantages and disadvantages of cloud computing.
Describe the methodology you would use to select a cloud computing service model.
Review the security risks and mitigation activities that need to take place before adopting cloud computing.
Go to Basic Search: Strayer University Online Library to locate and integrate into the assignment at least three quality, peer-reviewed academic resources, written within the past five years.
Include your textbook as one of your resources.
Wikipedia and similar websites do not qualify as quality resources.

 The goal of this assignment is to create a PowerPoint presentation comparing a

 The goal of this assignment is to create a PowerPoint presentation comparing a performance of Classical music to pop/rock music using musical terms and scholarly information to express your ideas. 
 
Choose an excerpt from two concerts, one of a pop or rock concert of your choice and one of a performance of music from the Classical Era (1750-1800 AD) chosen from the list below. Watch approximately 10 minutes of each concert. 
After viewing the concert excerpts, construct a PowerPoint presentation comparing the two concerts. The presentation should include the following slides:
Slide 1: An introduction providing an overview of the main points of the presentation. The introduction slide should mention both concerts.
Slide 2: Describe the music performed at each concert. Be sure to discuss specific musical attributes of the concerts, such as melody, harmony, timbre, texture, rhythm and form.
Slide 3: Explain why you did or did not enjoy the concerts.
Slide 4: Evaluate similarities and differences between music in the Classical era and rock/pop music. This section should reflect knowledge and understanding of the information presented about Classical music in the course reading. Be sure to address specific attributes of your chosen Classical composition. 
Slide 5: Discuss the types of people who attended concerts in the Classical era and those who attend rock or pop concerts today, and why people attended concerts in the Classical era versus today. (Be certain to use specific information from scholarly sources to support your points about the types of people who attended concerts during the Classical era.)
Slide 6: Analyze how new technologies, such as digital media and the internet, change the ways music is experienced.
Slide 7: A conclusion wrapping up the main points of the presentation. The conclusion slide should mention both concerts.
Slide 8: A reference slide citing the sources used in the project. The reference slide should reference both concerts and the sources used in the presentation. Please note that any source listed in the reference section needs to be cited in at least one of the previous slides in the presentation. Here is an excellent resource for formatting references and citations in the body of the text.

 Azure DevOps and most DevOps tool suites provide information radiators that hel

 Azure DevOps and most DevOps tool suites provide information radiators that help leaders and the team understand the status of the sprint and project. As discussed in Chapter 6, the Taskboard is the main collaborative tool that is used by the entire team to communicate the status of tasks. Chapter 6 also discusses best practices for the Taskboard and specific issues that manifest if the Taskboard is not managed correctly. The industry term for describing these issues is referred to as “smells.” For your discussion this week, pick and discuss a smell that can be evident by examining the Taskboard, and explain why the issue goes against best practices in Professional Scrum. Be sure to provide an example to illustrate your points. 

  For this discussion post, select an industry. You may use the same industry yo

 
For this discussion post, select an industry. You may use the same industry you used in earlier discussions, or you may select a new industry.
Please respond to the following in a post of 150 – 200 words:
Distinguish between incident detection precursors and incident detection indicators.
For your selected industry, describe the challenges associated with incident detection precursors and incident detection indicators.
Note:
Support your response with examples based on your experience or through research you conduct.
Remember to cite any sources you use, including your textbook, using the Strayer Writing Standards format.

   Diagram Prompt: Global University Network Infrastructure for xyz University D

  
Diagram Prompt: Global University Network Infrastructure for xyz University
Design a global university network infrastructure diagram for xyz University with the following components:
1. University Locations
a. Four main university campuses located in different country regions: North America, Europe, Asia, and Oceania
2. Dedicated Servers
a. Each university campus hosts dedicated servers to support various services, including academic resources, databases and email servers.
b. Highlight the geographical distribution of these servers in their respective regions.
3. Virtual Private Networks
a. Implement VPN connections between each university campus and the main data center at the headquarters in San Diego California USA.
b. Clearly label and annotate the VPN connections with the right meta data. 
4. Virtual Local Area Networks
a. Create four separate VLANs to segment network traffic for different purposes: Academics, Administration, Research, and Student Services.
b. Ensure proper VLAN separation for security and efficient network management.
5. Devices and Gateways
a. Place individual devices (e.g. computers, printers, IP phones) on each VLAN.
b. Assign unique gateway addresses for each VLAN.
c. Illustrate the connection paths between devices and gateways.
6. UDP Streaming Service
a. Design a UDP-based streaming service for distributing video content across the university campuses.
b. Represent the flow of video data through the network, highlighting its path from the streaming server to end-to-end devices. 
Ensure the diagram is organized, clearly labeled, and visually represents the interactions and connectivity among the different components of the university’s global network infrastructure. Use appropriate symbols, annotations, and color coding to enhance clarity. Your diagram should effectively convey the complexity of the network while maintaining readability. 

   Methodology Development Analysis  Overview This part of the project develops

  
Methodology Development Analysis 
Overview
This part of the project develops the methodology and begins analysis of the information security solution. The problem statement, project scope, risk analysis, and literature review performed in the Project: Problem Identification must justify the selection of the elements that require analysis for the final fault-tolerant security solution. For example, if the final solution requires a network security solution, an analysis may begin by evaluating the network architecture diagram in Project: Problem Identification.