ScenarioThe Corporation Techs’ current network consists of 1 web server (accessi

ScenarioThe Corporation Techs’ current network consists of 1 web server (accessible by the public), 2 application servers, 2 database servers, 2 file and print servers, and 50 workstations. The web server runs Linux/Apache, the other servers run Microsoft Windows Server, and the workstations run Microsoft Windows. The network is connected through a series of switches, is not physically connected to other networks, and runs Internet Protocol version 4 (IPv4). The network is protected by a single border firewall. The senior network architect, whom you work for directly, has verified the company’s business goals and has determined the features and functions required to meet those goals.
The senior network architect has asked you to create a network design that includes the following components:
-Current infrastructure elements
-A logical topology that separates the Accounting and Sales departments
-Redundant communications
-Justification for continuing with IPv4 or upgrading to IPv6
TasksFor this part of the project, perform the following tasks:
1.Conduct research to determine the best network design to ensure security of internal access while retaining public website availability.
2.Design a network configuration with physical and logical topologies. Identify major network elements (e.g., servers, switches, gateways) and their locations within the private and protected network segments.
3.Include a high-level plan that ensures communications are available 24/7.
4.Recommend whether to continue using IPv4 or upgrade to IPv6, and explain why.
5.Create a basic network diagram that illustrates the current network and enhancements. Include a few workstations to represent all workstations on the internal network. The diagram will be very high level at this stage and include only necessary details. You may use a software tool or simply pencil and paper. You will update this design later in the project.
6.Create a draft report detailing all information as supportive documentation.
7.Cite sources, where appropriate.
Required ResourcesInternet access
Submission RequirementsFormat: Microsoft Word (or compatible)
Font: Arial, size 12, double-space
Citation style: Your school’s preferred style guide
Length of report: 3–4 pages
Self-Assessment ChecklistI determined the best network design to ensure the security of internal access while retaining public website availability.
I designed a network configuration with physical and logical topologies, and identified major network elements and their locations within the private and protected network segments.
I created a plan that ensures communications are available 24/7.
I recommended whether to continue using IPv4 or upgrade to IPv6, and explained why.
I created a basic network diagram that illustrates the current network and enhancements.
I created a professional, well-developed report with proper documentation, grammar, spelling, and punctuation.
I followed the submission guidelines.
***NO plagiarism***

ANNOTATED BIBLIOGRAPHIES The research process is iterative, focused on finding s

ANNOTATED BIBLIOGRAPHIES
The research process is iterative, focused on finding substantiating published research for your selected topic. As research is conducted, it can be very difficult to organize and maintain large collections of relevant research materials. Thus, researchers use different tools and techniques to ensure they have their sources organized, categorized, and in a format that enables them to quickly recall each article’s topic and primary points of relevance, thus making it easier to locate and include in various formal research documentation.
One such tool is an annotated bibliography, which is a listing of references with a short annotation describing the content, the purpose, the quality, and the relevance of the resource to a research topic.
Annotation for a single resource provides you with a summary and an evaluation of a specific resource.
An annotated bibliography contains multiple annotations and provides you with a good perspective on what’s currently being published about a topic.
An annotated bibliography is not a formal component of formal research documentation; however, it is a useful tool that contributes significantly to the development of formal research documents. Reviewing an annotation in an annotated bibliography is much easier than returning to and reviewing the original resource materials you collected during the research process. Think of the annotation as a detailed note to yourself about the content in the resource, the quality of the resource, and the applicability of the resource to your research topic.
Additionally, a well-constructed annotated bibliography can make it easy to copy and paste the content into a literature review, including citations and formatted references. However, modern researchers may use other tools to add reference content in their literature reviews, instead of an annotated bibliography. Examples of such tools include RefWorks and EndNote. You can learn more about these options in the library. For this course, the traditional annotated bibliography is required.
RESOURCE ANNOTATIONSIt’s generally a good idea to create an annotation for every collected resource to help you analyze and organize your research materials. When you create a resource annotation, you’re forced to read the resource more carefully and critically instead of just documenting information.
Annotations should be written concisely and should include only significant and relevant details about the resource, such as a summary of the main points in the article, the purpose of the article, an evaluation of the resource quality, and the value of the resource in relation to your topic.
Figure 1
Annotation Example
AnnotationKey
(1) Merrill, M. D. (2007). The Proper Study of Instructional Design. In R. A. Reiser and J. V. Dempsey (Eds.). Trends and Issues in Instructional Design and Technology (Vol. 2, pp. 336-341). Upper Saddle River, NJ: Pearson Prentice Hall.
(2) In this chapter, the definition of instructional design as a field, the application of instructional design theory, and the role of an instructional designer is questioned and distinguished. (3) The author calls for clarification of instructional designing and attempts to debunk the claim that everyone is a designer. (4) The author has been well-versed in the field of instructional design for four decades with over fifteen publications and has created three theories that help define instructional design and technology. (5) The article brings to light the current misconceptions about the practice of instructional design and proposes alternative ways to research and apply instructional design theories.
(1) Reference
(2) Summary
(3) Purpose
(4) Evaluation
(5) Reflection
The image above provides a visual example of an annotation identifying the five sections of an annotation.
Reference: Provides a properly formatted resource reference.
Summary: Summarizes the key points of the article. Ask yourself, “What is this article about?”
Purpose: Indicates the purpose of the article. Ask yourself, “Why was this article written?”
Quality Evaluation: Evaluates the quality of the article. Ask yourself, “Is the author, publisher, and content in this article credible, accurate, and relevant?” You may need to do a little extra research to answer this question.
Relevance Reflection: Reflects on the relevance of the article to your research topic. Indicate why the resource should be included in an annotated bibliography with other similar resources. Ask yourself, “How does this resource support or relate to my research topic?”
It’s important to note that you are not required to limit the different components of the annotation to a single sentence. You may use several sentences to summarize, evaluate, and reflect on the resource. However, you should try to omit background materials, references to previous work by the same author, and any information that is apparent from the title.
Annotation Formatting Tips:
Do not use in-text citations in an annotation.
Start the annotation on the next line after the reference.
Do not add an extra line or additional spacing between the reference and the annotation.
Use double spacing throughout.
Use formal academic writing. Never use first or second person references in research papers.
SIGNATURE ASSIGNMENT PREVIEWThe culminating signature assignment due towards the end of the course may require you to complete some work ahead of the due date. To ensure you are prepared and have adequate time to complete this assignment, please review the instructions by looking ahead to the signature assignment. Contact your professor if you have questions.
Assignment: Develop an Annotated Bibliography
Instructions
For this assignment, you must select a research topic in your specialization and use the template provided in the weekly resources to create an annotated bibliography containing at least 5 scholarly resources. Plan to use your completed assignment to help you with the development of a literature review in the next assignment. You will also be required to add this annotated bibliography as an appendix to the research proposal you will develop at the end of the course.
NOTE: Your research topic does not need to be the topic you intend to use during your dissertation, but if you choose your topic wisely, you can use the materials you create in this course to guide your dissertation.
Your annotated bibliography should contain the following:
An introduction that describes the topic, not the resources or annotations.
A selection methodology that describes why the resources were included in the annotated bibliography
An annotation section that includes APA formatted annotations for each of the five scholarly resources.
A reference list that provides a list of the resources following APA guidelines.
Formal academic writing is used. Never use first or second-person references in research papers.
Length: 5-7 page academic paper following APA guidelines
References: Include a minimum of 5 scholarly resources
The completed assignment should address all of the assignment requirements, exhibit evidence of concept knowledge, and demonstrate thoughtful consideration of the content presented in the course. The writing should integrate scholarly resources, and reflect academic expectations and current APA standards.
References:

Us the data in the Excel Data Analysis Assignment Raw Data and Answer Form.xlsx

Us the data in the Excel Data Analysis Assignment Raw Data and Answer Form.xlsx Download Excel Data Analysis Assignment Raw Data and Answer Form.xlsxfile to answer the questions in the Answer Form.
Complete the tasks as specified in: Excel Data Analysis Assignment Required Tasks.docxDownload Excel Data Analysis Assignment Required Tasks.docx
Place your answers in the Answer Form tab
Place the state population table in the Population Table Answer Form tab.
Upload JUST the Answer Form and Population Table Answer Form as a pdf file to Canvas
Upload the entire .xlsx file to Canvas

1-From what does the IoT architecture consist of? Give two examples? 2-What does

1-From what
does the IoT architecture consist of? Give two examples?
2-What does the term Extended Reality (XR) refer to? What are its different types?
3-Explain in two different scenarios if AI can be more intelligent than human.
4-Discuss the security concerns of using rescue and firefighting drones and
explain which considerations should be considered to enable communication with
other drones.

This is a group Technology Paper for my class. I have an outline of my portion o

This is a group Technology Paper for my class. I have an outline of my portion of the paper within the attached document. I also have in that document the requirements of the paper. I need at least a page and a half of content with 11 point font along with 3 power point slides with notes. You can add sources to the 2 I already have in the paper if needed.

PRACTICAL CONNECTION ASSIGNMENT At UC, it is a priority that students are provi

PRACTICAL CONNECTION ASSIGNMENT
At UC, it is a priority that students are provided with strong educational programs and courses that allow them to be servant-leaders in their disciplines and communities, linking research with practice and knowledge with ethical decision-making. This assignment is a written assignment where you will demonstrate how this course research has connected and put into practice within your own career.Assignment:
Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. Requirements:
Provide a 500 word (or 2 pages double spaced) minimum reflection.
Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.
Share a personal connection that identifies specific knowledge and theories from this course.
Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment.
You should NOT, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.
Submit your assignment by going to the Practical Connection link above.
My course is
INFORMATION TECHNOLOGY, PH.D. (M.S./PH.D.)
Subject – Infer Stats in Decision-Making (DSRT-734-M30) – Full term

Business case: Blue Hills Water Authority The United States has about 153,000 pu

Business case: Blue Hills Water Authority
The United States has about 153,000 public drinking water systems. And Bule Hills Water Authority is the local one. Water systems are important for the health and stability of the nation.
You were tasked to improve the IT system of Blue Hills Water Authority by incorporating embedded systems in their Water Distribution Management System. Blue Hills Water Distribution Management System (DMS) has been used to monitor and control the water distribution system. DMS systems collect data from sensors and other devices in the distribution system, such as pressure gauges and flow meters. This data is used to identify and locate leaks, monitor water pressure, and optimize water distribution.
QUESTION 1: Draw the block diagram for the Embedded system that you would propose to improve the Blue Hills Water DMS. Your diagram must have the following sections: Memory, Sensors, actuators, human interface, and processor.
QUESTION 2: You are going to propose a solution for how the Develop the Embedded OS for the proposed Embedded for Blue Hills Water DMS. Would you prefer to take an existing OS and adapt it or Design and implement an OS for the Blue Hills Water DMS? Explain your solution with Advantages and disadvantages.
QUESTION 3: Blue Hills Water Authority decided to use Smart water meters on customer premises. They ask you to use Purpose-Built Embedded OS for these devices. Your OS will provide the following
operate with limited resources
adapt to hardware evolution
support a wide range of applications
support a diverse set of platforms
be robust
What kind of Embedded OS you would recommend? Explain your solution.
QUESTION 4 : Blue Hills Water managers would like to reduce IT operating costs, increase productivity, and simplify data center management. So, they would like to have one physical hardware that can run multiple OS and applications for the Water Distribution Management System. They would like to run multiple operating systems on a single computer. What is your solution for this request?