Questions
Introduction to the Problem Design an Amazon Virtual Private Cloud (VPC): "Scenario: You have a small...

Introduction to the Problem

Design an Amazon Virtual Private Cloud (VPC):

"Scenario: You have a small business with a website that is hosted on an Amazon Elastic Compute Cloud (Amazon EC2) instance. You have customer data that is stored on a backend database that you want to keep private. You want to use Amazon VPC to set up a VPC that meets the following requirements:

•          Your web server and database server must be in separate subnets.

•          The first address of your network must be 10.0.0.0. Each subnet must have 256 total IPv4 addresses.

•          Your customers must always be able to access your web server.

•          Your database server must be able to access the internet to make patch updates.

•          Your architecture must be highly available and use at least one custom firewall layer."

For the Program Level Assessment, short summary report using the following criteria:

Define the Problem

re-state the problem you are asked to solve and detail all relevant findings and recommendations.

Identify Strategies

Explain how your VPC design meets requirements in scenario.

Propose Solutions

How you can improve or change your design using additional services learned in class.

Evaluate Outcomes

Briefly explain how your design and propose solutions meets at least two of the pillars of AWS Well-Architected Framework.

Submit a Word Document

Using the section headers above, provide responses for each and summary report.

In: Computer Science

Create a set of use cases for the following system: A video store (AVS) runs a...

Create a set of use cases for the following system: A video store (AVS) runs a series of fairly standard video stores. Before a video can be put on the shelf , it must be catalogued and entered into the video database. Every customer must have a valid AVS customer card in order to rent a video. Customers rent videos for 3 days at a time. Every time a customer rents a video the system must ensure that the customer doesn't have any overdue videos. If so the overdue videos must be returned and overdue fee paid before the customer can rent any more videos. Likewise if the customer has returned overdue videos , but has not paid the overdue fee, the fee must be paid before any new videos can be rented. Every morning the store manager prints a report that lists overdue videos, if a video is 2 or more days overdue then the manager calls the customer to remind them to return the video. If a video is returned in damaged condition the manager removes it from the video database and may sometimes charge the customer.

Please help me! CREATE USE CASE DIAGRAM for the situation in exercise F – Use MS Word to draw it using Insert and Shapes menu) – 1p. Consider that for a customer to have a valid video store card the customer must create an account. Also consider that as a step after renting a video (or videos) the customer must pay for the rental(s). The assumption is that a customer pays only using credit card

In: Computer Science

Instructions: In your first reflective learning assignment on Personal Leadership Development, you will answer the following...

Instructions:

In your first reflective learning assignment on Personal Leadership Development, you will answer the following 2 questions.

Always use the title that you have been given. Do stick to the word count.

Use the title: Reflecting on My Personal Leadership Values and Vision

  1. Reflect on what you have learned about values, personal (Rokeach) and managerial (CVF). How will you use these results for your personal leadership development? ? (250 words)

  1. Write your Personal Leadership Vision.
    1. Ensure that you consider your values from the preceding exercises and the desirable behaviours and attitudes that were described in the thank you card exercise and the aspects of the Fundamental State of Leadership.
    2. Keep the characteristics of an effective vision in mind.
    3. Craft the vision carefully.
    4. Do not exceed 25 words.
    5. Make is memorable and motivational for you!

EXAMPLE:

Here’s a personal leadership vision built on the inputs from our sample person. From other assessments this person has completed, we know she is a “yellow” on the CVF. She prefers to act in the mentor and facilitator roles. Her Rokeach values results indicate that her top three terminal values are freedom, self-respect and, wisdom. Her top three instrumental values are ambitious, intellectual and responsible. Below is the first draft of her leadership vision:

“I am authentically engaged. Integrity and learning matter - always. I want to grow and grow others. I will make a difference.”

In: Operations Management

Review Question 9 in Chapter 12 of the textbook. The Company you work for is in...

Review Question 9 in Chapter 12 of the textbook.

The Company you work for is in the process of determining whether to have an information security audit (ISA) performed. Even though the Company is not (yet) required to have an ISA for compliance purposes with laws, rules, and/or regulations, they are very aware of the benefits such audit can provide. However, they also know how pricy these specialized audits are. Would you be inclined to advise your Company go through such type of audit, yes or no? Explain your position.

Response parameters:

The initial post should be between 250 and 350 words

The initial post must demonstrate effective communication skills and analysis that is thoughtful and objective

You must support your responses by searching beyond the chapter (i.e., IT literature and/or any other valid external source). Include examples, as appropriate, to evidence your case point

Use APA formatting (including working web links) to cite all of your sources

Plagiarism

You are expected to write primarily in your own voice, using paraphrase, summary, and synthesis techniques when integrating information from class and outside sources. Use an author’s exact words only when the language is especially vivid, unique, or needed for technical accuracy. Failure to do so may result in charges of Academic Dishonesty.

Overusing an author’s exact words, such as including block quotations to meet word counts, may lead your readers to conclude that you lack appropriate comprehension of the subject matter or that you are neither an original thinker nor a skillful writer.

In: Operations Management

double_vowels Given a string, return a copy of the string with all of the vowels doubled....

double_vowels

Given a string, return a copy of the string with all of the vowels doubled. Consider the five letters 'aeiou' as vowels.


double_vowels('pencil') → 'peenciil'
double_vowels('xyzzy') → 'xyzzy'
double_vowels('catalog') → 'caataaloog'

middle_hash

Given a string, do three hash marks '###' appear in the middle of the string? To define middle, we'll say that the number of chars to the left and right of the '###' must differ by at most one.


middle_hash('aa###bb') → True
middle_hash('aaa###bb') → True
middle_hash('a###bbb') → False

fence_post

Given two strings, fence and post, return a string made up of count instances of post, separated by instances of fence.

<i>Note</i>: This is an example of the classic "fence post" programming problem. It's a variant of the off-by-one-error (OBOE).


fence_post('X', 'Word', 3) → 'WordXWordXWord'
fence_post('And', 'This', 2) → 'ThisAndThis'
fence_post('And', 'This', 1) → 'This'

balanced_x_y

We'll say that a String is xy-balanced if for all the 'x' chars in the string, there exists a 'y' char somewhere later in the string. So 'xxy' is balanced, but 'xyx' is not. One 'y' can balance multiple 'x's. Return true if the given string is xy-balanced.


balanced_x_y('aaxbby') → True
balanced_x_y('aaxbb') → False
balanced_x_y('yaaxbb') → False

repeated_prefix

Given a string, consider the prefix string made of the first N chars of the string. Does that prefix string appear somewhere else in the string? Assume that the string is not empty and that N is in the range 1..len(str).


repeated_prefix('abXYabc', 1) → True
repeated_prefix('abXYabc', 2) → True
repeated_prefix('abXYabc', 3) → False

In: Computer Science

Now we want to display which error was thrown in our voting program. Add the appropriate...

Now we want to display which error was thrown in our voting program.

Add the appropriate code to the try/except statement so the exception is displayed.
Run the program and, when prompted, enter the word 'old' so your output matches the output under Desired Output.

# Set the variable
age = input("What is your age?")

# Insert a try/except statement
# here when you convert the input
# to a number using int()
try:
age = int(age)
if age >= 18:
print("Go vote!")

except:
print("Please enter a valid age!")

Output :

invalid literal for int() with base 10: 'old'
Please enter a valid age!

We're still working with pie. Now we want to use the finally clause to display a message no matter what happens with our code.

Add the appropriate code to the try/except statement so that the message "Enjoy your pie!" is displayed regardless of the error caught (or not caught).
Run the program and, when prompted, enter the number 3 so your output matches the output under Desired Output.

# Get Input
pieces = input("How many pieces of pie do you want? ")

# Attempt to convert to integer
try:
percentage = 1/int(pieces)
except ValueError:
print("You need to enter a number!")
except:
print("Something went wrong!")
else:
print("You get", format(percentage, ".2%"), "of the pie!")

Output:

Enjoy your pie!
You get 33.33% of the pie!

both problems are python

In: Computer Science

A foundation of operations in both manufacturing and service environments is vital in order to drive...

A foundation of operations in both manufacturing and service environments is vital in order to drive inefficiencies and examine ways to achieve greater supply chain integration with suppliers and customers. In this assignment, you will compare one manufacturing and one service driven company through creating visual representations of how the product or service is created and delivered, accompanied by a written summary. Select two companies of interest, one manufacturing company (e.g., a shoe company) and one service company (e.g., a technical support company). Provide a brief summary of each company including compelling evidence illustrating the company is either a manufacturing or a service company. Avoid selecting a company that could be arguably both. Manufacturing Research the manufacturing process for the selected company. Create a manufacturing process map. Explain the elements of infrastructure for the manufacturing company using flow charts and be sure to provide a key. Cite three to five sources to support your process map. Service Research the service process for the selected company. Create a service process map. Explain the elements of infrastructure for the service company using flow charts and be sure to provide a key. Cite three to five sources to support your process map. Summary Provide a 750-word summary describing the differences and similarities between manufacturing and service environments. For each company, identify if customer-introduced variability is available. If not, how would you implement flexibility for customer-introduced variability?

Please no Elkay examples and can you make the flow chart bigger.

In: Operations Management

earning Objectives and Outcomes Outline the proper steps to be performed in examining a laptop computer...

earning Objectives and Outcomes

  • Outline the proper steps to be performed in examining a laptop computer for evidence of a crime.

Assignment Requirements

You are an experienced digital forensics specialist for DigiFirm Investigation Company. The local police are investigating a man who they suspect is distributing child pornography. They have seized his laptop computer, which runs the Windows 10 operating system. The police are shorthanded and have contracted with DigiFirm to assist with the forensic investigation of the laptop. Chris, your team leader, has asked you to assist with the case.

There are several examinations you can complete on a computer running Windows 10. Before beginning any digital forensics investigation, it’s a good idea to plan your approach.

For this assignment:

Write a report that outlines the steps to be performed in examining the laptop for evidence of the crime, in order of importance. Be sure to explain why certain steps must be performed before others.

Required Resources

  • Course textbook
  • Internet

Submission Requirements

  • Format: Microsoft Word
  • Font: Arial, size 12, double-space
  • Citation Style: Follow your school’s preferred style guide
  • Length: 1–2 pages

Self-Assessment Checklist

  • I researched the process of examining a computer running Windows 10 for evidence.
  • I outlined the steps, in order of importance, to be performed to locate evidence on the computer.
  • I explained why certain steps must be performed before others.
  • I created a professional, well-developed report with proper documentation, grammar, spelling, and punctuation.

In: Computer Science

Wanda of Salty Pawz just doesn’t understand her friend Jamie sometimes. They have been working together...

Wanda of Salty Pawz just doesn’t understand her friend Jamie sometimes. They have been working together since the first dog biscuit came out of the oven, but now that the business is expanding, she can’t seem to get Jamie motivated to compete the tasks she delegates to her. She pays Jamie a salary now, so it’s not like the old days when she was working in exchange for dog treats. She has even given Jamie more responsibility; Jamie now supervises two other employees, a challenge Wanda assumed that Jamie wanted.

One afternoon she stops Jamie in the hallway and asks her if everything is going OK. Jamie responds that things are fine. Later that same week Wanda and Jamie are meeting about an upcoming promotion they are holding at the local animal shelter. Jamie takes a few notes but doesn’t share Wanda’s enthusiasm for the event. Wanda comes right out and asks Jamie if she has lost interest in the business. Jamie shrugs and says no, she is good with everything.

Why do you think Jamie might have lost her motivation and enthusiasm for the business at this point? How could Wanda motivate Jamie more effectively? Make sure the reasons you present are supported by sound motivational theory as established by leaders in the field.

This assignment should be a minimum of one short paragraph and a maximum of two paragraphs. Word totals for this work should be in the range of 200–300 words.

In: Operations Management

Research Basics: Lesson 1 ENGLISH 1021-41 ESSAY FUNDAMENTAL INSTRUCTIONS: Read and watch each web page/video/resource. Type...

Research Basics: Lesson 1 ENGLISH 1021-41 ESSAY FUNDAMENTAL

INSTRUCTIONS:

  • Read and watch each web page/video/resource.
  • Type a summary of the top takeaways/things you learned from each section/link whether they have a video or not. Each paragraph should have complete sentences and there needs to be at least 4 sentences. Think of it as at least one sentence about each of the four top things you learned from each resource you review.
  • So, again, you will type up paragraph for each section/link. Label your paragraphs by each section you are writing about. So, give a heading or label that says: What is Research? Information Cycle, and Planning: Keywords and Search Strings, then add you paragraphs about what you learned in each area. Put these paragraphs all together in ONE WORD DOCUMENT.
  • Label it Research Basics: Lesson 1 and submit it all together to the Research Basics: Lesson 1 assignment folder by April 20 at 11:59 pm.

This week you will be looking at these sections/links:

What is Research?

Information Lifecycle

Planning: Keywords and Search Strings - Learn how to identify keywords from a research topic and format them into search strings.

NOTE: This link may have words on the web page AND a video. Make sure to view and summarize/give top 4 take always from all included content (what you see/read)

In: Operations Management