Computer Science
Ethical Hacking
Youve spent time in the labs learning about scanning, ports, and the services provided from those ports. In this discussion exercise, youll look at a port scan of a Windows Server and answer some questions.There are several ports open. Select one or more ports from the following list and describe what the service does.Can you provide recommendations about whether that service should continue to be used? Why or why not?If the service is likely to cause security-related issues, can you choose a replacement service that will still meet the IT needs to the end users?Provide references and examples to back up your claim.This is not intended to be an extensive assignment. You shouldnt spend too much time on it in terms of references and examples.root@kali:~# nmap 192.168.1.10Starting Nmap 7.80 ( https://nmap.org ) at 2020-02-04 11:52 ESTNmap scan report for 192.168.1.10Host is up (0.00069s latency).Not shown: 971 filtered portsPORT STATE SERVICE7/tcp open echo13/tcp open daytime17/tcp open qotd19/tcp open chargen21/tcp open ftp23/tcp open telnet25/tcp open smtp42/tcp open nameserver53/tcp open domain80/tcp open http88/tcp open kerberos-sec110/tcp open pop3135/tcp open msrpc139/tcp open netbios-ssn143/tcp open imap389/tcp open ldap443/tcp open https445/tcp open microsoft-ds464/tcp open kpasswd5593/tcp open http-rpc-epmap636/tcp open ldapssl3268/tcp open globalcatLDAP3269/tcp open globalcatLDAPssl3389/tcp open ms-wbt-server49154/tcp open unknown49156/tcp open unknown49157/tcp open unknown49158/tcp open unknown49165/tcp open unknownMAC Address: 00:0C:29:ED:2E:72 (VMware)Nmap done: 1 IP address (1 host up) scanned in 17.35 seconds
Technology Infrastructures
Using the library and Internet, search for information about the need for data warehousing. Additionally, consider how different approaches toward collecting data warehouse requirements help organizations in their decision-making processes.From your research, identify the needs, basic elements, and trends in data warehousing.Discuss how approaches to collecting data warehouse requirements can help the chosen organization in the decision-making process.Why would this collection of data warehouse requirements help the organization?Describe characteristics of applications and technology infrastructures commonly used in healthcare (e.g., clinical, administrative, financial).Differentiate various forms of graphical modeling methods used in health analytics.Employ comparative analysis strategies (e.g., indicators, benchmarks, budgets, systems, performance) using business intelligence tools.
Technological Society
Final Research Paper Final Research Paper (Based on work done in the midterm prospects) Worth 300 points. Introduction: What is your research question? Why is it important for the study of human communication? Why is it important for your major/career field? Why is it important for a technological society? Section 1: Explain the issue: Tell us the story of your selected topic problem or issue Section 2: Historical Connections: These problems are not new! What similar problems and conflicts have taken place during human history? Section 3: What connections can you make to the textbook? Use specific examples from the textbook. Section 4: Call to action: Why must this be addressed? What do the experts say? Why should we care? How can we save ourselves? What can we actually do? What is your call to action? Conclusion: Summarize your paper. Papers should be typewritten in APA or MLA format. The final paper should be approximately 6-8 pages not including the bibliography. 12 point font, Times New Roman, 1-inch Margins. Potential Topic Issue Areas (Would Need Focused): The following are general umbrella issues involving communication, technology, social media, and popular culture. Please choose a specific area and then find a specific topic that has meaning and interest for you. If you have an idea for an issue area that is not represented on this list, please contact the instructor. Social Media, Popular Culture, Technology & Business Social Media, Popular Culture, Technology & Friendship Social Media, Popular Culture, Technology & Intimacy Social Media, Popular Culture, Technology & Family Life Social Media, Popular Culture, Technology & Education Social Media, Popular Culture, Technology & Journalism Social Media, Popular Culture, Technology & Advertising Social Media, Popular Culture, Technology & Entertainment (Film, TV, Music, Gaming, Radio) Social Media, Popular Culture, Technology & Criminal Justice Social Media, Popular Culture, Technology & The Digital Divide Social Media, Popular Culture, Technology & Religion Social Media, Popular Culture, Technology & Children Social Media, Popular Culture, Technology & African American Culture Social Media, Popular Culture, Technology & Freedom of Speech / Expression Any other suggestions one may have
Technical Society
Essay Question: We are a highly technical society. Our everyday lives revolve around the Internet: we benefit from the Internet, but we can also be victims of cyber criminals. To understand how criminals use the Internet to their advantage, one must understand how we communicate on the Internet. In this paper, you are required to describe in detail how we communicate on the Internet, based upon your readings. Discuss the major networking building blocks and their functions. Secondly, discuss software applications’ vulnerabilities, such as those found in web browsers.General Requirements1. Document Format.a. MS Word documentb. One-inch (1″) marginsc. Times New Roman fontd. Twelve (12) pitche. Not including your title page, this assignment should be 4-6 pages.f. Double space, except for your bibliography’s citations.g. You must use 5 scholarly sources in supporting this assignment.2. Citation Format: The Chicago Manual of Style. As stated in the Academic Integrity Briefings, information taken directly from another source must beplaced in quotations and cited following the Chicago format contained in the week one “lessons” folder. You must cite all other information from your sources, even if you do not quote directly. DIRECT QUOTING SHOULD BE KEPT TO A MINIMUM.5 pages/NO Title page
Security Construction
The security construction requirements for facilities on military installations and U.S. government facilities can vary. Discuss from your experience and research, key differences between the two.
Characteristics Of An Effective Manager
Discuss 1.1: Your Ideal Manager? 10 10 unread replies. 10 10 replies. Prompt After completing this week’s readings and reviewing the content within the “Explore” section, respond to both of the prompts below. In your response, use applicable course terms and concepts, as appropriate. To receive full credit, you will need to reference and properly cite at least 2 sources. One reference should be from your course text (e.g. roles, responsibilities, functions) and the other reference should be from the Internet or CCC Online Library. Both references should strengthen and support your answers to the questions. If you were to work for an ideal manager, how would you describe him or her? What characteristics and traits would this manager have? Please remember, your post should be 150-200 words long and contain at least 2 references. Follow-up posts should add “value” to the discussion and help to move the subject and conversation along.
Role Of Computers In Science
Explain the role of computers in science Biotechnology, medicine, and computer science. 1: Define the area in general (1-2 pages) 2: Define the role of that Technology in the specific domain (1-2 pages), talk about the significance of that area, and the role of that tech in that area. 3: Possible variants and enhancements of that tech. (1-2 pages), incorporate numbers and data-based perspective, IF POSSIBLE. 4: Use at least 10 citations; scholarly, peer-reviewed
Role That Technology And Information Systems Play
The case examined the differences between Zara and rival The Gap. Once you have read through the case in Chapter 1 and respond to the following questions:Discuss how of Zara has been able to create a sustainable competitive advantageIdentify and discuss the role that technology and information systems play in creating and maintaining Zaras competitive advantageDiscuss where Zara has succeeded where others such as Gap have failed consider what role, if any information systems paly in this success.Discuss how Zara creates and maintains a relationship with their customers. Consider the role that technology plays in facilitating the relationship with the customer. Discuss how other firms in other product groups or industries might use these same techniques to develop deeper relationships with their customersYOU MUST HAVE AT LEAST 6 REFERENCES IN APA FORMAT. Please see the provided link.https://saylordotorg.github.io/text_information-systems-a-managers-guide-to-harnessing-technology-v2.0/s07-zara-fast-fashion-from-savvy-s.html
Data Protection
2 paragraph for each questionQ1) Make the case for the value of consultants.Q2) Describe and explain the differences between expert vs. collaborative consulting models.Q3) Describe and explain how you would use and apply a diagnostic model in consulting.Q4) Describe how you would evaluate the success of a consulting engagement.Q5) Handling the collection and protection of data in a consulting engagement.Q6) Best practices in conducting client interviews.
Innovative Delivery Models
Week 6 Module 1 Discussion: Linking Payment to QualityDescribe the key components of innovative delivery models (such as ACOs, Patient-Centered Medical Homes, and Bundled Payments). Discuss the role that health care reform and the ACA have had in these initiatives.How do these elements improve quality of care and reduce costs?
Use Promo Code: FIRST15