Computer Science Homework Help

Computer Science Homework Help. University of the Cumberlands Describe Potential Disadvantages of PaaS Questions

 

I’m working on a computer science writing question and need support to help me learn.

Select from four (4) topics from each chapter (Total 8) and discuss. Use only 50-words max per topic to discuss and present your answer.

Chapter 3 topics

  • Define and describe PaaS.
  • List the benefits of PaaS solutions.
  • Describe potential disadvantages of PaaS.
  • Describe how a cloud-based database management system differs from an on-site database.
  • List the computing resources normally provided with a PaaS.

Chapter 4 topics:

  • Define and describe IaaS.
  • Define and describe system redundancy. Discuss how you might use IaaS to implement a redundancy plan.
  • Define and describe load balancing. Discuss how you might use IaaS to implement load balancing.
  • Define and describe NAS. Assume you must implement a shared file system within the cloud. What company would you select? Why? What costs should your client expect to pay for cloud-based data on a gigabyte (GB) basis?
  • Define and describe colocation. Discuss how you might use IaaS to implement colocation.
  • Compare and contrast a cloud-based disk storage device (with a file system) with a cloud-based database.
  • Compare and contrast physical, dedicated virtual, and shared virtual servers. Search the web for companies that provide each. What cost should a customer expect to pay for each?

Requirements:

1 – You are required to use at least two-peer reviewed sources to answer the above questions.

2 – Please use APA formatting with intext citations

3 – No plagiarism

Computer Science Homework Help

Computer Science Homework Help

Computer Science Homework Help. Cumberland County College Cloud Computing Models Discussion

 

Please choose 4 topics from below chapters and explain 120 words on each; Total words : 120 *4 = ~500 words
Topics:

  • Define and describe IaaS.
  • Define and describe system redundancy. Discuss how you might use IaaS to implement a redundancy plan.
  • Define and describe load balancing. Discuss how you might use IaaS to implement load balancing.
  • Define and describe SSO.
  • Define and describe IDaaS.
  • Define SAML and describe its purpose.
  • Define and describe provisioning.
  • Define and describe FIDM.
  • List factors that make mobile ID management difficult.

2 APA References and No Plagiarism please

Computer Science Homework Help

Computer Science Homework Help

Computer Science Homework Help. AU Analyzing and Visualizing Data Collected by Smartphones Discussion

 

please note a system that you work with frequently that has a major data component. Note the type of data, how the data is managed and maintained, and any other important factors regarding the data in the system.Also, determine if there are any ethical or other regulatory considerations regarding the system they selected.

Computer Science Homework Help

Computer Science Homework Help

Computer Science Homework Help. Jawaharlal Nehru Technological University Zero Trust Model Report Discussion

 

Discussion: Multifactor Authentication

Multifactor authentication (MFA) requires users to authenticate their identities with at least two factors to access a system or an application. More than half of companies around the world use MFA. For companies that have not implemented MFA, reasons cited include cost, IT effort, and problems with deployments leading to user “friction.”

Some organizations deploy MFA only to executives because they have full access to sensitive information. Yet other organizations secure only some applications with MFA rather than all apps.

Answer the following question(s):

  1. Do you agree that deploying MFA only to executives is a secure approach to access management? Why or why not?
  2. Do you agree that requiring MFA for only some applications, regardless of user type, is a secure approach to access management? Why or why not?

Fully address the questions in this discussion; provide a valid rationale or a citation for your choices; and respond to at least two other students’ views.

The initial post should be at least  450 words in length.

Task 2 : Assignment: Achieving Zero Trust ( Word length 500 words)

Assignment Requirements

Zero trusts is a security stance for networking based on not trusting any users, devices, or applications by default, even those that are already on the network. The zero trust model uses identity and access management (IAM) as a foundation for an organization’s security program.

For this assignment:

Research the zero trust model.

Write a report that describes the following:

1. The purpose of zero trust and what differentiates it from other security models

2. An overview of how zero trust works in a network environment

3. How zero trust incorporates least privilege access through role-based access control (RBAC) and/or attribute-based access control (ABAC)

Computer Science Homework Help

Computer Science Homework Help

Computer Science Homework Help. North American College Installing Linux Distributions Computer Coding Task

 

  1. Install one of the Linux Distributions (ex:Ubuntu) to your computer.

(You can use any virtual machine like Virtual Box to install Linux)

  1. Do following items, explain and take screenshot
    1. Create a folder and a file
    2. Use grep command
    3. Use sort command
    4. Use pipe command

Computer Science Homework Help

Computer Science Homework Help

Computer Science Homework Help. INFA 610 UMDC Confidentiality, Integrity and Availability Aspects of Security Discussion

 

Hi, Please please give the answer to the discussion question below: (citations and references should be in APA style).

Confidentiality, integrity, and availability or the CIA triad of security: These three dimensions of security may often conflict. Confidentiality and integrity often limit availability. So, a system should provide only what is truly needed. This means that a security expert has to carefully analyze what is more important among these three dimensions of security in a system or application.

Please provide an example (and justification) where the confidentiality of a system is more important than the integrity or availability of that system. Then provide an example where the integrity of a system is more important than the confidentiality or availability of that system. Finally, provide an example of a system where the availability of a system is more important than the confidentiality or integrity of that system. For example, you might say availability is more important than integrity and confidentiality in a cell telephone system since one must be able to reach their loved ones in an emergency. Someone else might argue confidentiality/privacy is more important in such a system.

Computer Science Homework Help

Computer Science Homework Help

Computer Science Homework Help. University of the Cumberlands Permissionless and Permissioned Blockchains Questions

 

I’m working on a Computer Science question and need guidance to help me study.

1)Describe how permissionless and permissioned blkckchains differ in how each type approaches disput resolution among participants.

2)Explain how Ethereum’s design affects the blockchin’s vulnerability to Denial of Service attacks.

3)In one of the papers you read this semester, Koteska (2017) presented current quality issues in blockchain implementations. Using issues presented in the paper, describe the quality issue you think Hyperledger Fabric is best able to address and which quality issue Hyperledger Fabric is least able to address. Explain your justification for each choice.

Koteska, B., Karafiloski, E., & Mishev, A. (2017). Blockchain implementation quality challenges: a literature. In SQAMIA 2017: 6th Workshop of Software Quality, Analysis, Monitoring, Improvement, and Applications (pp. 11-13).

4) According to Zakir (2019), when does a new block that stores communication messages between aircraft and ATC get created? How does this approach improvide communication security in terms of message confidentiality, integrity, and availablility?

Zakir, Y., Hasan, K. S., Wiggins, N. S., & Chatterjee, A. (2019, October). Improving Data Security in Message Communication between ACT and Aircraft using Private Blockchain. In 2019 Sixth International Conference on Internet of Things: Systems, Management and Security (IOTSMS) (pp. 506-513). IEEE.

Computer Science Homework Help

Computer Science Homework Help

Computer Science Homework Help. Comp graphic and visualization

 


In this assignment, you will create commented code for a 3D pyramid in modern OpenGL.

If you encounter any challenges while completing this assignment, be sure to post your questions or issues to the General Questions discussion. It is essential to ask for help when you need it and successfully complete each activity, as the course will continue to build on earlier learning as your skills progress.

Prompt

Before you begin, be sure to review the module resources for this week’s topics. Then, if you have not done so already, navigate to the CS 330 folder in GitHub. From there, download the ZIP file containing all of the items within this folder, including assignment tutorials for Module Two through Module Six. There are two essential parts to these tutorials: the markdown (MD) files that walk you through how to work with different OpenGL capabilities, and the solution (SLN) file that contains all the code for each section of the tutorials. On your own machine, open the solution (SLN) file in Visual Studio and navigate to the Module Three tutorial sections in the Solution Explorer. While you may open the markdown (MD) file using an external text-based program, we recommend you instead follow along with the Module Three Tutorial in GitHub so it is easier to review the different sections, code, and supporting images. Going through all the sections in the tutorial and attempting the embedded exercises will help you practice the skills you will need to demonstrate in this assignment.

Once you understand the content in the tutorial, you will begin this assignment by opening a new Visual Studio project that has all the libraries set up correctly (which you learned how to do in a previous module). The goal of this assignment is to write commented modern OpenGL code to create a 3D pyramid.

3D pyramid built using OpenGL. None of the faces of the pyramid are solid, so they can all be seen through. Only the lines connecting each vertex are visible, along with one line bisecting the square base into two triangles. Each vertex is assigned its own color, which then turns to a gradient as it transitions to the color assigned to the next vertex.3D pyramid built using OpenGL. All faces of the pyramid are solid and cannot be seen through. Each vertex is assigned its own color, which then turns to a gradient as it transitions to the color assigned to the next vertex.

Your pyramid should use the indices and the Vertex Array Object, with each vertex on the pyramid being assigned a color of your choice. Employ the Model View Projection matrix to display the pyramid in a perspective angle.

Specifically, you must address the following rubric criteria:

  • Create code to address the required functionality. The work you complete in OpenGL must meet the required functionality and visual representation that are outlined for this particular topic. Achieving this result may require multiple attempts or the application of programming strategies, but that is okay! Working in iterations is an important part of any coding project. You may also wish to refer back to relevant sections of this week’s tutorial for further guidance or review.
  • Apply logic and proper syntax to code. Source code should be free of logical or syntax errors that prevent the application from running as expected. You will be given credit for code that is well on its way to meeting specifications or solving the problem.
  • Apply commenting and formatting standards to facilitate understanding of the code. All code should be well commented. This is a practiced art that requires clarity and concision. Your comments should explain the purpose of lines or sections of the code and may also include the method you used to achieve a specific task in the code. Be sure to document any sections of code that are producing errors or incorrect results. Also, all code should be organized to meet formatting standards.

Guidelines for Submission

Submit a completed ZIP folder with all of your code, which may include one or multiple CPP files along with Visual Studio project files. Also make sure the ZIP folder includes an EXE file, because without this your code will not be able to run. Checking for the EXE can be used as a quick reference on the functionality of your code before you submit. Reference the Visual Studio Export Tutorial, linked in this week’s resources, for guidance on how to download the necessary ZIP folder.

Computer Science Homework Help