Description
please help me in five hours.i will attach the document below
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Explanation & Answer
Review
Review
Anonymous
Excellent resource! Really helped me get the gist of things.
Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Most Popular Content
Windows Network Infrastructure Question and Responses
A minimum of 200 words is required for each discussion question, and they must be your own words. Including figures and qu ...
Windows Network Infrastructure Question and Responses
A minimum of 200 words is required for each discussion question, and they must be your own words. Including figures and quotes is value-added, but they will not count against your 200 word requirement. Be sure to examine the discussion grading rubric.Discussion Question 1:Describe a role that WSUS and Windows Defender play in securing a Windows Network Infrastructure. What should be the policy be to keep the nodes on your network updated with the latest security updates?Discussion Question 2:Describe in detail some of the aspects of DHCP related to Windows Server 2016 including leases, scopes, and commands, etc. Explain how DHCP is installed and configured on Windows Server 2016.Respond in your own words your opinion or add on, to the following response with 1 paragraph or more:Response 1WSUS is Windows Server Update Services and is a Microsoft provided program that will auto-update systems on a network for users throughout the network without having to go to each machine individually and manually updating them. It has many options to customize the update for the company for when the update is to happen. Windows Defender is a security program that Windows offers on all windows system. It is able to be customized with the option to allow certain programs to run on specified user accounts and not to run on others. Windows Defender is also able to be configured with specified rules for what specific programs to look for when scanning.Policy that should be used to keep the network up to date when using Windows Defender and WSUS are allowing automatic updates on the network so that the security is up to date. Another option to run is the enabling of the delay restart, as this will tell a user they have 15 minutes before the system will restart the machine and it cannot be delayed or set the specified time that will elapse before the restart happens. (Coreyp-At-Msft, n.d.) This may seem cruel if a user is working on a big file but it guarantees that a user cannot postpone an update indefinitely. Another option to add is the enable update by forcing machine from sleep mode. This way the machine will update even if it is in sleep mode and no one is working on it to prompt the update.Response 2The WSUS-Windows server update may be a patch as well as update part of the Windows server and could provide a good and fast protection. In particular, both the WSUS as well as Windows defender often serve a complementary function in providing protection to a particular system. In this case, the Windows defender is especially Microsoft’s stock anti-virus or anti-malware program, and is standard with different versions of Windows. Its earlier versions were only able to protect against spyware but current versions have the capacity to protect all kinds of malware and threats to systems. As such, the Windows server improves the security state of an individual node or system and is part of security option for most system administrators used to enhance security on different networks.Equally, WSUS also works jointly with the Windows defender, especially when it comes to providing security to networks. In this case, WSUS stands for Windows server update services and is classified as Microsoft’s live patching instrument. It is also a utility, which comes in standard with Windows server installations. It can also be activated on OS and is fundamentally important working with Windows Defender given that Windows defender is signature based, which suggests that it depends on stored series of known malwares in detecting, isolating, and preventing different threats, risks, as well as attacks.It is similarly critical that Windows defender remain up to date so that new and known variants of malware could be identified and perhaps prevented from attacking any system. Ensuring that Windows defender is regularly updated could be achieved through integrating it with the WSUS as well as Windows update as shown in the following images.
Troy University Write a Program Computer Science Task
A basketball team develop a program that hold the statistics (points per team and player). The team has 7 players.
Each pl ...
Troy University Write a Program Computer Science Task
A basketball team develop a program that hold the statistics (points per team and player). The team has 7 players.
Each player provides the following information:
Name
Position
Points in each game (10 games played)
Write a program that reports the following information to the output file “Basketball_report.txt”
Player 1 Name Position total points avg per game
Player 2 Name Position total points avg per game
…….
Team Total points: xxxx Avg per game : xxx.xx
Requirements of the program:
1) Create a class called Player: Write the proper attributes
Name (string), Description (string), points[] for every game (array of int) and the correct functions (Accessors and mutators that access and update the info of the variables. Create the right specification file and implementation file. (.h and .cpp files)
2) Create a player (player1) and initialize its members to the following values: name=””, description=”” and points [0,0,0,0,0,0,0,0,0,0] through a constructor. (Create a private function called by the constructor to build the array)
3) Create 5 more players using a copy constructor. (Keep those players in an array.
4) The program asks to enter every player’s info to the user and keep that info in the instance variables of every player (Use the mutators).
5) Create an extra object of the class player (player_extra) and assign player1 to player_extra . (Overload the =operator) Then change Player_extra points (use the mutator to update the array contents)
6) Use the iomanipulators to display the total points of the team ,average points per game, total points per player, and avg per player results in the output file.
Use fixed, setw(), setprecision(2), and showpoint.
2 Extra point(voluntary) : Update the program to read the input data from a file called “data.txt” this should contain all the info for every player but the “player_extra” in every line.
ISM 645 UAGC Mission & Vision Statement and Strategic Horizon for the Acme Company
Vision/Mission/Time Horizon Statement: Agreeing on an IT Strategy
Prior to beginning work on this interactive assignment, ...
ISM 645 UAGC Mission & Vision Statement and Strategic Horizon for the Acme Company
Vision/Mission/Time Horizon Statement: Agreeing on an IT Strategy
Prior to beginning work on this interactive assignment, read Chapter 1 from the course text, the Mission Statements (Links to an external site.) article, the Vision Statements (Links to an external site.) article, and review the relevant information from this week’s lecture. This interactive assignment will allow you to practice creating an IT Mission Statement and a Company Vision Statement, as well as develop some of the company’s time horizon, goals, and strategic initiatives. Before developing an IT mission statement and IT vision statement, read through the statement comparisons in the ISM645 Mission Vision and Time Horizon Worksheet to provide a backdrop for your work.
Writing the Mission & Vision Statement, and Strategic Horizon: Read the ISM645 Acme Corporate Strategic Summary Plan. Taking on a role as an IT leader of the Acme Company, you will create the IT Mission Statement and the IT Vision Statement. You will present these statements to the Acme Company executive committee. Additionally, you will create an IT Strategic Time Horizon. The Strategic Time Horizon provides the timing for the implementation of the major elements that support the Vision and Mission. Use the ISM645 Mission Vision and Time Horizon Worksheet to help you to create these statements and to view how other companies have created these elements.
Create a PowerPoint presentation for delivery to the executive board that includes the following elements:
An IT Mission Statement for the Acme Company
An IT Vision Statement for the Acme Company
An IT Strategic Time Horizon for the Acme Company
Attach your PowerPoint to your initial post. In the body of your initial post, explain how these statements are representative of the company’s qualities, values, and time horizon.
Your initial post should be a minimum of 250 words.
Rasmussen Collage Dealing with Two Populations Computer Science Worksheet
Competency
Formulate and evaluate hypothesis tests for population parameters based on sample statistics using both Critica ...
Rasmussen Collage Dealing with Two Populations Computer Science Worksheet
Competency
Formulate and evaluate hypothesis tests for population parameters based on sample statistics using both Critical Regions and P-Values, and be able to state results in a non-technical way that can be understood by consumers of the data instead of statisticians.
Dealing with Two Populations
Inferential statistics involves forming conclusions about a population parameter. We do so by constructing confidence intervals and testing claims about a population mean and other statistics. Typically, these methods deal with a sample from one population. We can extend the methods to situations involving two populations (and there are many such applications). This deliverable looks at two scenarios.
Concept being Studied
Your focus is on hypothesis tests and confidence intervals for two populations using two samples, some of which are independent and some of which are dependent. These concepts are an extension of hypothesis testing and confidence intervals which use statistics from one sample to make conclusions about population parameters.
Network Architecture Paper
Using either the OSI Reference Model or the TCP/IP Protocol Suite, describe how each layer of the Model/Suite represents t ...
Network Architecture Paper
Using either the OSI Reference Model or the TCP/IP Protocol Suite, describe how each layer of the Model/Suite represents the communication flow between organizational levels and across departments/division of an actual hierarchical business. Be sure to include a communication flow diagram showing the logical and physical connections.The paper must use APA 6th ed., 7th printing
formatting and contain a title page, 3 to 5 pages of content, and a minimum of
three peer-reviewed references.Please access the Purdue Owl Online Writing Lab ( the link for this is https://owl.english.purdue.edu/owl/ ) as an APA resource. Your assignment will be graded based on the rubric, which can be viewed when clicking on the assignment link.
University of Maryland University College Observations and Benefits to Virtualization Discussion
Having previously used virtualization tools, such as VMware, VirtualBox, HyperV, or others. Share your experiences. What a ...
University of Maryland University College Observations and Benefits to Virtualization Discussion
Having previously used virtualization tools, such as VMware, VirtualBox, HyperV, or others. Share your experiences. What are your observations? How do you think virtualization might be beneficial?
Similar Content
Using Microsoft Excel
Using Microsoft Excel
Plagiarism, whether intentional or unintentional, is a
big problem for universities. Not only i...
i need help with my research seminars and methodology
Literature Review Assignment Review due date: 1 May, 2017. Selection of topic/area/theme of review by: 20 Marc...
CS 222 ABAC Computer Program Debugging Code with GDB Worksheet
the instruction attached in file bellow. read it and let me know if you have any questionsit due on November 8th at 11:50p...
computer science..............................
Provide (1) example of a module name that is acceptable to the compiler but not recommended according to the features of g...
University of The Cumberlands How To Prevent Cyberattacks Discussion
Companies prepare for cyberattacks using common cybersecurity resources. Select one of the seven resources listed and expl...
write paragraph and conclusion
I have project with my group and want to write my part of the work which is one page and half with conclusion.also, includ...
Forensic Write Blocker.edited
Good practices within digital forensics require the use of write-blockers electronic tools during the creation or acquisit...
Cyber Security
The following is an email header from a suspicious source. In this case, the header is indicating that the email is origin...
Discussion Questions 6 Sixth Final Copy
The IT team must implement countermeasures that protect the company against potential threats to their data. The professio...
Related Tags
Book Guides
Get 24/7
Homework help
Our tutors provide high quality explanations & answers.
Post question
Most Popular Content
Windows Network Infrastructure Question and Responses
A minimum of 200 words is required for each discussion question, and they must be your own words. Including figures and qu ...
Windows Network Infrastructure Question and Responses
A minimum of 200 words is required for each discussion question, and they must be your own words. Including figures and quotes is value-added, but they will not count against your 200 word requirement. Be sure to examine the discussion grading rubric.Discussion Question 1:Describe a role that WSUS and Windows Defender play in securing a Windows Network Infrastructure. What should be the policy be to keep the nodes on your network updated with the latest security updates?Discussion Question 2:Describe in detail some of the aspects of DHCP related to Windows Server 2016 including leases, scopes, and commands, etc. Explain how DHCP is installed and configured on Windows Server 2016.Respond in your own words your opinion or add on, to the following response with 1 paragraph or more:Response 1WSUS is Windows Server Update Services and is a Microsoft provided program that will auto-update systems on a network for users throughout the network without having to go to each machine individually and manually updating them. It has many options to customize the update for the company for when the update is to happen. Windows Defender is a security program that Windows offers on all windows system. It is able to be customized with the option to allow certain programs to run on specified user accounts and not to run on others. Windows Defender is also able to be configured with specified rules for what specific programs to look for when scanning.Policy that should be used to keep the network up to date when using Windows Defender and WSUS are allowing automatic updates on the network so that the security is up to date. Another option to run is the enabling of the delay restart, as this will tell a user they have 15 minutes before the system will restart the machine and it cannot be delayed or set the specified time that will elapse before the restart happens. (Coreyp-At-Msft, n.d.) This may seem cruel if a user is working on a big file but it guarantees that a user cannot postpone an update indefinitely. Another option to add is the enable update by forcing machine from sleep mode. This way the machine will update even if it is in sleep mode and no one is working on it to prompt the update.Response 2The WSUS-Windows server update may be a patch as well as update part of the Windows server and could provide a good and fast protection. In particular, both the WSUS as well as Windows defender often serve a complementary function in providing protection to a particular system. In this case, the Windows defender is especially Microsoft’s stock anti-virus or anti-malware program, and is standard with different versions of Windows. Its earlier versions were only able to protect against spyware but current versions have the capacity to protect all kinds of malware and threats to systems. As such, the Windows server improves the security state of an individual node or system and is part of security option for most system administrators used to enhance security on different networks.Equally, WSUS also works jointly with the Windows defender, especially when it comes to providing security to networks. In this case, WSUS stands for Windows server update services and is classified as Microsoft’s live patching instrument. It is also a utility, which comes in standard with Windows server installations. It can also be activated on OS and is fundamentally important working with Windows Defender given that Windows defender is signature based, which suggests that it depends on stored series of known malwares in detecting, isolating, and preventing different threats, risks, as well as attacks.It is similarly critical that Windows defender remain up to date so that new and known variants of malware could be identified and perhaps prevented from attacking any system. Ensuring that Windows defender is regularly updated could be achieved through integrating it with the WSUS as well as Windows update as shown in the following images.
Troy University Write a Program Computer Science Task
A basketball team develop a program that hold the statistics (points per team and player). The team has 7 players.
Each pl ...
Troy University Write a Program Computer Science Task
A basketball team develop a program that hold the statistics (points per team and player). The team has 7 players.
Each player provides the following information:
Name
Position
Points in each game (10 games played)
Write a program that reports the following information to the output file “Basketball_report.txt”
Player 1 Name Position total points avg per game
Player 2 Name Position total points avg per game
…….
Team Total points: xxxx Avg per game : xxx.xx
Requirements of the program:
1) Create a class called Player: Write the proper attributes
Name (string), Description (string), points[] for every game (array of int) and the correct functions (Accessors and mutators that access and update the info of the variables. Create the right specification file and implementation file. (.h and .cpp files)
2) Create a player (player1) and initialize its members to the following values: name=””, description=”” and points [0,0,0,0,0,0,0,0,0,0] through a constructor. (Create a private function called by the constructor to build the array)
3) Create 5 more players using a copy constructor. (Keep those players in an array.
4) The program asks to enter every player’s info to the user and keep that info in the instance variables of every player (Use the mutators).
5) Create an extra object of the class player (player_extra) and assign player1 to player_extra . (Overload the =operator) Then change Player_extra points (use the mutator to update the array contents)
6) Use the iomanipulators to display the total points of the team ,average points per game, total points per player, and avg per player results in the output file.
Use fixed, setw(), setprecision(2), and showpoint.
2 Extra point(voluntary) : Update the program to read the input data from a file called “data.txt” this should contain all the info for every player but the “player_extra” in every line.
ISM 645 UAGC Mission & Vision Statement and Strategic Horizon for the Acme Company
Vision/Mission/Time Horizon Statement: Agreeing on an IT Strategy
Prior to beginning work on this interactive assignment, ...
ISM 645 UAGC Mission & Vision Statement and Strategic Horizon for the Acme Company
Vision/Mission/Time Horizon Statement: Agreeing on an IT Strategy
Prior to beginning work on this interactive assignment, read Chapter 1 from the course text, the Mission Statements (Links to an external site.) article, the Vision Statements (Links to an external site.) article, and review the relevant information from this week’s lecture. This interactive assignment will allow you to practice creating an IT Mission Statement and a Company Vision Statement, as well as develop some of the company’s time horizon, goals, and strategic initiatives. Before developing an IT mission statement and IT vision statement, read through the statement comparisons in the ISM645 Mission Vision and Time Horizon Worksheet to provide a backdrop for your work.
Writing the Mission & Vision Statement, and Strategic Horizon: Read the ISM645 Acme Corporate Strategic Summary Plan. Taking on a role as an IT leader of the Acme Company, you will create the IT Mission Statement and the IT Vision Statement. You will present these statements to the Acme Company executive committee. Additionally, you will create an IT Strategic Time Horizon. The Strategic Time Horizon provides the timing for the implementation of the major elements that support the Vision and Mission. Use the ISM645 Mission Vision and Time Horizon Worksheet to help you to create these statements and to view how other companies have created these elements.
Create a PowerPoint presentation for delivery to the executive board that includes the following elements:
An IT Mission Statement for the Acme Company
An IT Vision Statement for the Acme Company
An IT Strategic Time Horizon for the Acme Company
Attach your PowerPoint to your initial post. In the body of your initial post, explain how these statements are representative of the company’s qualities, values, and time horizon.
Your initial post should be a minimum of 250 words.
Rasmussen Collage Dealing with Two Populations Computer Science Worksheet
Competency
Formulate and evaluate hypothesis tests for population parameters based on sample statistics using both Critica ...
Rasmussen Collage Dealing with Two Populations Computer Science Worksheet
Competency
Formulate and evaluate hypothesis tests for population parameters based on sample statistics using both Critical Regions and P-Values, and be able to state results in a non-technical way that can be understood by consumers of the data instead of statisticians.
Dealing with Two Populations
Inferential statistics involves forming conclusions about a population parameter. We do so by constructing confidence intervals and testing claims about a population mean and other statistics. Typically, these methods deal with a sample from one population. We can extend the methods to situations involving two populations (and there are many such applications). This deliverable looks at two scenarios.
Concept being Studied
Your focus is on hypothesis tests and confidence intervals for two populations using two samples, some of which are independent and some of which are dependent. These concepts are an extension of hypothesis testing and confidence intervals which use statistics from one sample to make conclusions about population parameters.
Network Architecture Paper
Using either the OSI Reference Model or the TCP/IP Protocol Suite, describe how each layer of the Model/Suite represents t ...
Network Architecture Paper
Using either the OSI Reference Model or the TCP/IP Protocol Suite, describe how each layer of the Model/Suite represents the communication flow between organizational levels and across departments/division of an actual hierarchical business. Be sure to include a communication flow diagram showing the logical and physical connections.The paper must use APA 6th ed., 7th printing
formatting and contain a title page, 3 to 5 pages of content, and a minimum of
three peer-reviewed references.Please access the Purdue Owl Online Writing Lab ( the link for this is https://owl.english.purdue.edu/owl/ ) as an APA resource. Your assignment will be graded based on the rubric, which can be viewed when clicking on the assignment link.
University of Maryland University College Observations and Benefits to Virtualization Discussion
Having previously used virtualization tools, such as VMware, VirtualBox, HyperV, or others. Share your experiences. What a ...
University of Maryland University College Observations and Benefits to Virtualization Discussion
Having previously used virtualization tools, such as VMware, VirtualBox, HyperV, or others. Share your experiences. What are your observations? How do you think virtualization might be beneficial?
Earn money selling
your Study Documents