Describe the primary logical networking topologies in common use.etwork technologies are the method a NIC uses to access the medium and send data frames. Describe the major LAN networking technologies.

Use slides for reference:

Answer the questions in detail:

1. Distinguish between physical and logical topologies.
2. Describe the primary physical networking topologies in common use.
3. Describe the primary logical networking topologies in common use.
4. Network technologies are the method a NIC uses to access the medium and send data frames. Describe the major LAN networking technologies.
5. Describe collisions and collision domains

What formula or function does he put in columns B through F in Row 13 that will give him the total expenses for the week in each category?

Be sure to make an electronic copy of your answer before submitting it to Ashworth College for grading. Unless otherwise stated, answer in complete sentences, and be sure to use correct English spelling and grammar. Sources must be cited in APA format. Your response should be four (4) pages in length; refer to the “Assignment Format” page for specific format requirements.

Tell Bill how to do the following tasks:
What formula or function does he put in Column F that will show the total expenses for each day?
What formula or function does he put in columns B through F in Row 13 that will give him the total expenses for the week in each category?
Bill wants the entry in Column G to remind him of expenses that require receipts for the accountant. Tell Bill what to put in Column G to do this:
Explain to Bill what networking options he has. Go through each type or configuration of network possible for him, making sure that you explain the pros and cons of each configuration. Finish with your suggestion for the network that he should set up and explain what new hardware will be required to do this.
With the possibility of three business computers in his home, and all of his business records possibly vulnerable, this would be a good time to advise Bill on how to set up a routine plan to protect and defend his new network.

Provide a list of the five most important concerns for safety and security of the network and the computers in the network. For each concern, specify the action to be taken, and if applicable, what software you recommend be added to the system. Justify each of your recommendations.

Create a Python function that generates random numbers from 1 to 20 and appends them to a List

Due on April 6, 2022 @ 5:00 pm
Objectives–The goal of this lab is to practice Python programming: functions & files
Before you start – The prerequisites for lab 6 are still standing for this lab.
Create a Python function that generates random numbers from 1 to 20 and appends them to a List. The function will prompt the user for the list’s length, after which it will generate random integers ranging from 1 to 20 and append them to it. Make sure that the main program will print out the list.
To test your program.
What to submit
Create a folder called “Lab_8.”
You must submit the source code for all exercises above. The source code files will be
saved in the “Lab_8” folder that you created on your hard drive.
Name each source code file as follows: exercise.py

Zip your folder “Lab_8” as a SINGLE zip file. The zip file should be named:
“lab8_S22.zip.”Any other file format will be rejected, and you will get Zero for this portion of your lab work.
It’s your responsibility that the zipped file of your submitted work is not empty or
damaged

Construct a model of a byte adder based on the bit adder.Create a program in Python 3 which implement the model of the adder.

Fundamentals of Computing
Coursework
Numerical Data Program with Report

Summary
This is an individual coursework worth 60% of the total module mark. It requires developing of a program in Python which simulates the behaviour of a digital circuit performing integer addition and writing a report to describe the model, algorithm, data structures, program and testing performed.

Tasks
⦁ Construct a model of a byte adder based on the bit adder
⦁ Specify an algorithm for integer addition based on binary operation
⦁ Select suitable data structures to represent the information
⦁ Create a program in Python 3 which implement the model of the adder
⦁ Describe the program
⦁ Test the program with some sample data to demonstrate its behaviour
⦁ Write a report to present the work

How did the ideas or changes affect the establishment and status quo? What was the context in which this person proposed ideas/change?

Narrated Power point

For this project, select a person whom you believe had significant influence  on a movement for social, economic, and/or political change in the 20th and 21st centuries. Explore and address the following in your project:

Summarize the person’s ideas.
How did the ideas or changes affect the establishment and status quo?
What was the context in which this person proposed ideas/change?
How did the government or the people respond to the ideas/change?
What sort of following or support did he/she have?
How have the ideas/actions of the person influenced contemporary cultures and ideas?
For the final presentation, make sure to go beyond the surface information and go into depth about the person you are researching.

 

Describe lab content concisely, adequately, and appropriately by objectively stating the goals, objectives, and/or purpose of the lab in bullet format. Do not quote or copy and paste from any course content.

TCP Dump Lab

Delete all highlighted instructions  before submitting this assignment – the instructions are helpful guidelines for a satisfactory grade and they should NOT be included in the submitted document.
Course # Your Name Lab Assignment Title
Date of Lab Semester Week #, Lab #
Fill in the appropriate information in the table above for your title page info.
Title
Describe lab content concisely, adequately, and appropriately by objectively stating the goals, objectives, and/or purpose of the lab in bullet format. Do not quote or copy and paste from any course content.
Use the common definitions for the terms goals, objectives, or purpose as a guide in completing this section.
Do not include the actual specificatio

How does the varying soil properties influence the stability of the slope? Draw the slope to scale on a graph paper or using CAD and split the sliding section up into a suitable number of slices.

Component B1 – Site investigation design problem
A geotechnical investigation report for a proposed building is on blackboard under the coursework material folder.

Produce a detailed critique of the geotechnical investigation report following the recommendation of the code of practice for ground investigations as outlined in BS 5930:2015+A1:2020 and other relevant materials.
(a) Write a review on ten case histories of recent slope failures and summarise your findings using table, stating the case and the cause of failure.
(b) An embankment slope consisting of a granular fill is underlain by a deep deposit of clay of specific gravity of 2.65.

The granular fill has a bulk unit weight of 19.3 kN/m3, effective cohesion, c′ = 7.2 kPa and internal friction angle, φ′ = 30°.

If the clay soil has varying moisture content and undrained shear strength at different times of the year as presented in Table 1, investigate the stability of the embankment slope using the slip circle shown in Figure 1.

How does the varying soil properties influence the stability of the slope? Draw the slope to scale on a graph paper or using CAD and split the sliding section up into a suitable number of slices.

What are some common sense rules and regulations that should be implemented in cyberspace? What is the importance of cyberspace and why is it so critical to the Air Force and national security?

The United States Air Force Path to Cyberspace Superiority: The Impact of Governance and Cyber Threat Actors on Cyber Readiness

In most developed countries, people spend as much time in the physical world as they do in cyberspace. Cyberspace represents the ideal environment for information sharing and social connection. The United States Air Force ruminates cyberspace as a domain for war, in addition to land, sea, air, and space. However, achieving cyberspace superiority entails overcoming the security threats found in cyberspace and lack of governance.
Research Questions
This study will address the following research questions:
What would the United States Air Force have to do to achieve cyberspace supremacy?
How can the typical computer user protect himself/herself from vulnerabilities and cyber threat actors?
What are some common sense rules and regulations that should be implemented in cyberspace?
What is the importance of cyberspace and why is it so critical to the Air Force and national security?
Do the current applicable rules and regulations in cyberspace are enough to deter cybercrime?
What are the limitations with prosecuting international cyber threat actors?
Are certain hardware and software classified as hacking tools? If yes, should the authorities account for the individuals who buy them?
Is it an achievable goal for the Air Force to attain cyberspace supremacy?
How can cyberspace users and/or organizations protect their ICT systems from cyber threat actors?