Q1)List the different network management standards mentioned in the slides? Whic

Q1)List the different network management standards mentioned in the slides? Which of them is the most widely implemented?
Q2)1. What is the purpose of the network layer in the OSI model? 2. How does network layer handle errors?
Q3)1. What is the difference between MDB and MIB? 2. Give two examples of managed object.
Q4)
1. What is the figure below? 2. Explain the information giving in the figure.

Scenario: Your sister just moved into a new home and needs you to help her get a

Scenario:
Your sister just moved into a new home and needs you to help her get all of her computer devices connected to the network and the Internet.
Your sister and her family have the following devices:
2 laptops: one for work, one for gaming and video streaming
2 mobile devices: one Apple-iPad, one Samsung Android tablet
2 mobile phones: one iPhone, one Android phone
3 wireless security cameras
1 Amazon Alexa
2 wireless printers
2 smart TVs that can be used as projectors
Instructions:
For this assignment, you must diagram a network depicting the physical device configuration of your sister’s home network using cloud services for data storage and sharing. (Use a graphical software tool like Visio or DIA to draw the network diagram.)
You must then create a second diagram of the floor layout with all appliances and computer device distributions.
Embed both diagrams into a paper and indicate how the router and each device should be configured so they have access to the Internet and file-sharing capability.
Length: 3-5 page pager with an embedded original network diagram
The completed assignment should address all of the assignment requirements, exhibit evidence of concept knowledge, and demonstrate thoughtful consideration of the content presented in the course. The writing should integrate scholarly resources, reflect academic expectations and current APA standards,

Develop a findings report on the company’s ability to close a project effectivel

Develop a findings report on the company’s ability to close a project effectively and efficiently. this report will provide a gap analysis to project managers and company management on the areas of their project management framework that require development. Needs to include: listing and description of the deliverables and work products project managers will use in project closure management.; an executive summary and conclusion, this summary must offer a high-level description of your consulting effort and a summary of your findings, the conclusion should focus on the organizational changes necessary to implement your recommendations. Provide a gap analysis and recommendations for the following documents that I have attached: Project charter, scope management plan & WBS, and the risk and change management plan. This paper must be 8 pages long and include 8 credible references.

The Wireless Access Point (WPA) is a critical device, which serves as a connecti

The Wireless Access Point (WPA) is a critical device, which serves as a connection between the wired, and the wireless network. Discuss the similarities and differences of a WAP and a wireless router. As a system/network administrator, discuss in detail the steps that you would take to implement security at the WAP?
What is encryption? Discuss why encryption is necessary when transmitting data in wireless networks. As a network or systems administrator, discuss how you would create and enforce an encryption policy for the network that you are administering.
Discuss security protocols used in wireless networks. Why are they necessary? Compare and contrast the Wired Equivalent Privacy (WEP), and the Wi-Fi Protected Access (WPA) security protocols. When would you use WEP or WPA? What are the advantages and disadvantages of using WEP or WPA?
Please be sure to validate your opinions and ideas with citations and references in APA format.

On your personal computer at home that you use to complete your Herzing work, pe

On your personal computer at home that you use to complete your Herzing work, perform a condensed risk management analysis by addressing the items below. Be sure to list the elements pertaining to your system, the major vulnerabilities that you discovered, and how you intend to mitigate the risks/threats.
Asset identification
Vulnerability and threat assessment
Threat mitigation
Please be sure to validate your opinions and ideas with citations and references in APA format.

The success or failure of a company might depend on project scheduling which can

The success or failure of a company might depend on project scheduling which can be performed in many ways. For the first part of this paper, discuss two ways to perform project scheduling. In the second part, discuss two vital tools of project management techniques.
This paper needs to be 2 pages in length and should include 3 credible references.

The success or failure of a company might depend on project scheduling which can

The success or failure of a company might depend on project scheduling which can be performed in many ways. For the first part of this paper, discuss two ways to perform project scheduling. In the second part, discuss two vital tools of project management techniques.
This paper needs to be 2 pages in length and should include 3 credible references.

This activity requires you to complete the word document below and the tables. P

This activity requires you to complete the word document below and the tables.
PROJECT 1 – Computer Math.docxDownload PROJECT 1 – Computer Math.docx
The following videos and EMATES will help you complete this assignment.
EMATE – Binary Number SystemLinks to an external site.
EMATE – Binary ChallengeLinks to an external site.
EMATE – HexadecimalLinks to an external site.
Please watch video first: https://www.youtube.com/watch?v=t_kA5KQxByc&t=120sLinks to an external site.
How To Convert Binary To Decimal Tutorial (The Easy Way)Links to an external site.
Hexadecimal to Decimal ConversionLinks to an external site.
How To Easily Convert Hexadecimal To Binary And To Decimal TutorialLinks to an external site.
Find the Manufacturer using MAC AddressLinks to an external site.