Home >> Free Essays >> All Subjects >> IT

IT Examples and Topics

Ip Addresses



IP Addresses

Jason

School or Institution Name (University at Place or Town, State)

IP Addresses

Main Post:

Internet protocol address also known as IP address is a numerical string used to identify computers and related networking hardware on a network. There are two versions of the IP addresses known as IP version 4 and IP version 6. IP version 4 addresses contain a 32-bits long numeric string. Due to the exponential growth of connected devices IPv6 addressing scheme was introduced that contains 128-bit hexadecimal characters. An IP address provides information about the host and location of the host device connected to the internet. IP addresses also provide possibilities to broadcast the information in the entire network ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"a2lnk5sr3e2","properties":{"formattedCitation":"(Carleton, 1994)","plainCitation":"(Carleton, 1994)"},"citationItems":[{"id":2435,"uris":["http://zotero.org/users/local/gITejLE9/items/EPWC8XTN"],"uri":["http://zotero.org/users/local/gITejLE9/items/EPWC8XTN"],"itemData":{"id":2435,"type":"article-journal","title":"Making the TCP/IP connection","container-title":"InfoWorld; San Mateo","page":"54,58","volume":"16","issue":"23","source":"ProQuest","abstract":"TCP/IP is used widely by academic and commercial entities, and the number of addresses available for new networks is dwindling. The Internet Society is revising TCP/IP to accommodate more addresses. Internet Protocol (IP) addressing options are extremely flexible, and they are easy to set up incorrectly. An error in the setup of a network's IP addressing system can result in wild and irrational behavior. Guidelines for determining what any combination of IP address class, subnet mask, and routing configurations will result in for any IP device are presented.","ISSN":"01996649","language":"English","author":[{"family":"Carleton","given":"Russ"}],"issued":{"date-parts":[["1994",6,6]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Carleton, 1994). The binary form of the IPv4 address 192.168.46.20 is 11000000.10101000.00101110.00010100. As IP addresses are used to identify each device connected to the internet, the subnet mask provides information about the network. A subnet mask provides information that the host is connected to the designated network. Subnet masks are used to identify the network of a host. Subnet mask designates the bits in the IP address. It provides information that which bits are related to network and which of the bits are related to host address in a network.

Follow-up Post One:

IP addresses can be used by law enforcement agencies to trace criminals. IP addresses cannot be exactly traced due to virtual private networks. They are logical addresses and do not provide accurate details about the physical presence of a network host. Most of the time, IP addresses are written in a human-readable format as compared to their binary format.

Follow-up Post Two:

Subnet masks provide information about the network and the logical address of the host. Subnets allow the single network to be divided into smaller discrete networks. A subnet mask designates the bits related to network and bits related to the host in an IP address. There are different classes of subnet masks as the case with IP addresses.

References

Carleton, R. (1994). Making the TCP/IP connection. InfoWorld, 16(23), 54-54,58. Retrieved from https://search.proquest.com/docview/194301889?accountid=41759

Subject: IT

Pages: 1 Words: 300

IT

[Your Name]

[Instructor Name]

[Course Number]

[Date]

IT

Cybercrimes have changed significantly with the advancement in technology over the years. A decade or so ago, cybercrimes were conducted by a single man. The one-man cybercrime perpetrator sought to exploit vulnerabilities within a computer network. Most of the cybercriminals were the nerds who were obsessed with exploring newer avenues and there were not any financial motives behind it (Conteh and Royer, 4). However, in recent years, the domain of cybercrime has transformed into a well-organized branch of crime. Large groups are perpetrating cybercrimes for financial gains. Some of the most recent types of cybercrime include cyber-extortion, information theft, and phishing attacks. Cyber-extortion is done by cybercriminals to extract large amounts of money from big corporations by threatening them to exploit their vulnerabilities. In information theft, cybercriminals might steal valuable information from a corporation for financial gains. In phishing attacks, criminals might obtain sensitive information such as credit card and bank account details (Conteh and Royer, 3).

Large organizations have started offering cloud services in recent years. The most notable companies to offer cloud services are Amazon, Google, and Microsoft. The large amounts of computing resources provided anonymously offer a ripe opportunity for cybercriminals to steal vital information placed on the cloud. Cloud computing has changed how the digital data and evidence were collected and retrieved in case of cybercrime. Since the data on the cloud is stored in various locations. Cloud computing has ensured that digital evidence which is collected maintains its integrity to be beneficial in the legal proceedings.

The benefit of cloud computing in forensic investigation is that investigators can access data quickly in case of an incident of cybercrime (Aziz, Fouad and Hassanien, 2). A challenge facing the integration of cloud computing in forensic science is that in traditional evidence collection, investigators can explain to the jury about the nature of the evidence using legal jargon. However, it is a challenge for the investigators to comprehensively explain the data before the jury (Aziz, Fouad and Hassanien, 3).

Works Cited

Aziz, Amira Sayed A., Mohamed Mostafa Fouad, and Aboul Ella Hassanien. "Cloud computing forensic analysis: trends and challenges." Multimedia Forensics and Security. Springer, Cham, 2017. 3-23.

Conteh, Nabie Y., and Malcolm D. Royer. "The rise in cybercrime and the dynamics of exploiting the human vulnerability factor." International Journal of Computer (IJC) 20.1 (2016): 1-12.

Subject: IT

Pages: 1 Words: 300

IT

IT (Information Technology)

Author Name(s), First M. Last, Omit Titles and Degrees

What are some of the advanced switching technologies? How and why are they implemented?

Advanced switching technologies

Advanced switching technologies offer to transmit the data between specific points on a network. Some of their capabilities include power over Ethernet, spanning tree protocol, VLANs, port mirroring and port authentication. CITATION Enz17 \l 1033 (Gerrati, 2017)

Here are some of the advanced switching techniques

Message Switching: Users communicate by sharing messages that contain the whole data to be shared.

Circuit Switching: Two network nodes form a circuit i.e. a communications channel through the network before the nodes may communicate.

Packet Switching: Transmission of data to a network in the form of packet.

Telephone switching equipment: Establishing a path that links the caller's telephone to the receiver's telephone by making a physical connection.

Advanced switching technologies are implemented for a number of reasons i.e. they are cost effective, better channel efficiency, reduced traffic congestion.

What are some ways to make management of cisco devices simpler? What functions are included within the IOS?

Management of cisco devices

There are a number of ways that can be used to manage cisco devices in a simpler way.

Live network maps

They represent the connection between devices and other networks. The map is always up-to-date because it automatically adds or removes the devices when added or removed from the network.

Interface monitoring

It is used to set thresholds to the performance metrics of cisco devices and monitor them actively.

The basic function of Cisco IOS is to enable data communications between network nodes. Other than routing and switching, Cisco IOS provides a number of additional services that can be used to enhance the performance of network traffic. CITATION Jon16 \l 1033 (Jonathan, 2016)

These services include authentication, firewall capabilities, policy enforcement, deep packet inspection, Quality of Service, intelligent routing and proxy capability.

Reference

Gerrati, (2017). Advanced switching techniques for future telecommunication services. Semantic Scholar, 135

Jonathan, (2016). Monitoring and managing cisco environment with OpManager. Manage Engine.

https://www.manageengine.com/network-monitoring/cisco-monitoring.html

Subject: IT

Pages: 1 Words: 300

It

352g bjbj 7 x xb Fll80LZ0ppaaa@2aaaaauuuaXuauuu@NXu0ZurdruruPaauaaaaauaaaZaaaaraaaaaaaaal

IT

Students Name

Institutional Affiliation

Connectivity is always essential in any network as it helps the components of the network to share resources. Therefore, there is a need for diagnosing and testing connectivity to ensure continuous communication between the components of a network. During the process of diagnosing and testing, we use commands which are placed in the command prompt for the operating system of Microsoft or for the case of MAC we enter them in the terminal window. Some of the commands used include the ping which authenticates connectivity by transferring echo packets of Internet Control Message Protocol to the host. It then listens to the feedback of the echo. The traceroute command shows the path taken by the packets to arrive at its specified destination. The telnet command is used in testing various services for connectivity.

The difference between traceroute and ping is that traceroute shows the actual direction taken to arrive on the server as well as the time. On the other hand, ping shows if the server can be reached and the time taken to receive and send information to the server. The difference between tenet and ping is that telnet can be used to troubleshoot connectivity in web servers while ping can be used to fix communication so long as the computer runs on IP address. The similarity is that both are used as troubleshooting tools in communication (What are Traceroute, Ping, Telnet and Nslookup commands - Hosting, n.d.). The ACLS does not have any effect on the telnet because access is inbound, and as a result, there would be no match in the source and destination addresses.

Some of the ways to secure the entire network include putting in and monitoring the performance of firewall which can assist in blocking unauthorized access to the network or computer. The firewall provides rules to the outgoing and incoming traffic in the network and hence controls the access to a network or a computer. Another way is installing and maintaining anti-virus software which prevents hackers from cracking into the network. Updating networks password can as well help in providing security to the network because only authorized people will have access to the network. Other ways include the creation of a virtual private network.

Some of the types of ACLs include the standard access lists which only allows filtering of packet at the source IP address. They, therefore, have a less intensive processor for the router (Types of ACL - Standard and Extended ACLs ICND1 100-105, n.d.). Another type is the extended access lists, which is precise during filtration at the destination and source of the IP address. They use extra CPU time and also difficult to configure.

References

Types of ACL - Standard and Extended ACLs ICND1 100-105. (n.d.). Retrieved from https//www.learncisco.net/courses/icnd-1/acls-and-nat/type-of-acls.html

What are Traceroute, Ping, Telnet, and Nslookup commands - Hosting. (n.d.). Retrieved from https//www.namecheap.com/support/knowledgebase/article.aspx/9667/2194/what-are-traceroute-ping-telnet-and-nslookup-commands

IT PAGE MERGEFORMAT 4

Running head IT 1

/0B S w x l

n

_IU QcpaRhD(hCJOJQJaJhD(huCJOJQJaJhD(hsCJOJQJaJ-hD(hD(CJOJQJaJfHq hD(h73CJOJQJaJhD(hBCJOJQJaJhD(h6CJOJQJaJhD(h_tCJOJQJaJhk(CJOJQJaJhD(hD(CJOJQJaJhD(hm

CJOJQJaJhD( 0123456789@AB dagdD(Bx d-DM agdgd

dgdD(mabcefhiklnqstwwdJ3jhD(hm

CJOJQJUaJmHnHuhk(CJOJQJaJmHnHujhD(hm

CJOJQJUaJhm

CJOJQJaJhm

jhm

U)hhBCJOJPJQJaJph)hhm

BCJOJPJQJaJphhD(BCJOJPJQJaJphhhD(hCJOJQJaJhD(hm

CJOJQJaJabdeghjkmdK0d-DM K0gdd-DM agdmnahhm

CJOJQJaJhD(hm

CJOJQJaJhm

hD(hD(CJOJQJaJ5 01hpD(/ s666666666vvvvvvvvv6666666666666666666666666666666666666666666666666666666hH66666666666666666666666666666666666666666666666666666666666666666p626FVfv2(6FVfv6FVfv6FVfv6FVfv6FVfv6FVfv8XV 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ OJPJQJ_HmH nH sH tH JJ Normal dCJ_HaJmH sH tH DA D

Default Paragraph FontRiR

0 Table Normal4 l4a (k (

0No List XX cpformatdddCJOJPJQJJaJ@ D(0HeaderdH.. D(0 Header Char D(0FooterdH.1. D(0 Footer CharPKContent_Types.xmlN0EH-J@ULTB l,3rJBG7OVa(7IRpgLr85vuQ8CX6NJCFB..YTe55 _g -Yl6NPK6 _rels/.relsj0 Qv/C/(hO Chvxp_P1H0ORBdJE4bq_6LR70O,En7Lib/SePKkytheme/theme/themeManager.xml M @w7c(EbCA7K

Y,

e.,H,lxIsQ ,jGW)E 8PKRtheme/theme/theme1.xmlYF/lMBql4F3 iCCiH/6MwFcd

4IsNXp xpop,

we.pC0pm 8MQoDBF1vtp .4IPaQ4qm0qnAy0bfU LlRJ3TlNS)a)Cv.xys@oE@)xRe_-4PHI.rm3g--PP

Yu),j-BXRH8@ I7E10(2O4k LEzqO2POuz_gx7 svnB2,E3p9GQd H

xuv 0F,FK sO3w vfSVbsyX p5veuw 1z@ l,ib

I jZ29LZ15xl.(zmd@23ln-@iDtd6lB63yy@tHjpUyeXry3sFXI

O5YYS.7bdn671.

tn/w/t6PssL. JiN AI)t2 Lmx(-ixQCJuWlQyI@

m2DBAR4 wnaQ

W0xBdT/.3-FbYLKK 6HhfPQh)GBms_CZys

v@c)h7JicFS.NP

eI Q@cpaAV.9HdHVXAYr A pxSL93U5U

NC(pu@d4)t9M4WP5flk_X-C wTB Y,

Ao Ye zxTVOlp

/gTpJ

EG,

AozAryerb/Ch, Eoo.

YgJW____RVW/79AkWjZuk y_Zklc,bUvPK

theme/theme/_rels/themeManager.xml.relsM 0woo5

6Q

,.aic21hqm@RNdo7gK(MR(.1rJT8VAHubP8g/QAs(LPK-Content_Types.xmlPK-6 0_rels/.relsPK-kytheme/theme/themeManager.xmlPK-Rtheme/theme/theme1.xmlPK-

theme/theme/_rels/themeManager.xml.relsPK xml version1.0 encodingUTF-8 standaloneyes

aclrMap xmlnsahttp//schemas.openxmlformats.org/drawingml/2006/main bg1lt1 tx1dk1 bg2lt2 tx2dk2 accent1accent1 accent2accent2 accent3accent3 accent4accent4 accent5accent5 accent6accent6 hlinkhlink folHlinkfolHlink/ ///EEH Bm

)H8@0( B S b d e g h j k m n n b d e g h j k m n n lnIUa c a b n n s G D(73_t6Buk(9s@m

b d @a a a a @UnknownGAx Times New Roman5Symbol3. Cx Arial7.@CalibriACambria Math1hiuGiuG 0 JHP P92xx hphpOh0

px

hpNormalhp2Microsoft Office Word@@5@5 .,0 hp

Title

(),-./014Root Entry FKO61TablerWordDocument7SummaryInformation(DocumentSummaryInformation8CompObjr F Microsoft Word 97-2003 Document MSWordDocWord.Document.89q

Subject: IT

Pages: 1 Words: 300

IT



IT

Jason

School or Institution Name (University at Place or Town, State)

Main Post:

With the increase in mobility of the computers in modern organizations, there is a higher difficulty faced by administrators when it comes to determining whether a system update has been carried out in every single computer or just some of those computer systems. In the past when the trend was based on the users updating the updates manually, it was easier to keep track of the systems as to which ones have been and which ones have not been updated. But the modern trend has shifted towards automatic updates which have made it difficult to track if a system or a set of systems have been updated and to check on such systems, and we can make use of the available solutions like System Center Configuration Manager (SCCM) released by Microsoft.

Windows Server Update Service (WSUS) is one of the solutions deployed by organizations for centralizing the deployment of the updates with minimizing the amount of update traffic which is downloaded from the internet ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"A8KQxsWV","properties":{"formattedCitation":"(Garcia, 2005)","plainCitation":"(Garcia, 2005)","noteIndex":0},"citationItems":[{"id":479,"uris":["http://zotero.org/users/local/tjMYMZX7/items/N797L22V"],"uri":["http://zotero.org/users/local/tjMYMZX7/items/N797L22V"],"itemData":{"id":479,"type":"article-journal","title":"Windows Patch System Closing Gap; Review: Microsoft's no-cost WSUS gains important features, better interface.","container-title":"eWeek; New York","page":"45-46","volume":"22","issue":"18","source":"ProQuest","abstract":"Garcia reviews Windows Server Update Services.","ISSN":"15306283","shortTitle":"Windows Patch System Closing Gap; Review","language":"English","author":[{"family":"Garcia","given":"Andrew"}],"issued":{"date-parts":[["2005",5,2]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Garcia, 2005). As compared to one thousand computers running on a network downloading the 100MB update, one WSUS server is able to download the required update and distribute it to every other one thousand computers on that same network. This mechanism is perfect for the clients and can work fine till we take the saturated WAN links on the network. For a network to be compatible with the modern era, it must not have different computers at the branch office downloading the same updates from the WSUS server located at the head office across the lower bandwidth WAN link. To solve this problem, the WSUS can be separately configured at every branch location, such that the branch office clients obtain the updates from their local WSUS server.

Follow Up Post# 1:

By configuring the group policies of the network related to the updates, some of the casualness regarding the installation of updates could be mitigated. By enabling the Windows Update Power Management for automatically waking up the system for installing any scheduled updates, allows the administrator to wake the computer up at the administrator’s own specified time, to install the required updates. This is useful as this allows the administrator to set the computer for updates when it is known that no one would be using a particular PC on which the update is to be installed. This method only has one limitation: the BIOS of that computer must be able to support the mechanism of waking up from hibernation.

Follow Up Post# 2:

There is a fear among administrators that by installing the updates, they may break something. It is to be remembered that in this era if an update causes a few problems, they are not so which can completely crash the computer system. If any failure occurs, it is subtle. An administrator cannot find a problem soon enough after an update is installed on the test computer. People using the OS or applications on a daily basis are to find more faults as compared to a layman who only has a general familiarity with such issues.

References

ADDIN ZOTERO_BIBL {"uncited":[],"omitted":[],"custom":[]} CSL_BIBLIOGRAPHY Garcia, A. (2005). Windows Patch System Closing Gap; Review: Microsoft’s no-cost WSUS gains important features, better interface. EWeek; New York, 22(18), 45–46.

Subject: IT

Pages: 1 Words: 300

IT



IT

[Name of the Writer]

[Name of the Institution]

IT

Main Post

Network attacks are increasing day by day, and everyone is having threats of cyber attacks. Anyone can become a victim of a hacker, and they can infect their network by malware or Trojans. However, it is not appropriate to pay a ransom to have the system released from the attacker because if a one person pays attacker a ransom for releasing his/her system it will appreciate him/her and they will attack someone else again. They cannot only attack someone else but also to your system again. These attacks are not new as they were introduced in 1989 when the first attack occurred in which malware was spread between computers and floppy disks.

Many people are still only aware of the term virus, but they are not aware of malware and Trojan horses. However, there are certainly other methods which can help you to release system from the attacker instead of paying him/her ransom. If the attacker used encryption method to attack your system or network you can easily access to your system by putting your system into a safe mode. However, if an attacker uses another method simply to install a new operating system as soon as possible because you have no guarantee that an attacker will release your system after you pay the amount to them. It's better to try yourself because it is not that difficult (Efrony & Shany, 2018).

Follow up 1

Malware is a term that describes a malicious software or code that is very harmful systems. It can completely destroy your network, computer systems or mobile devices. Malware attacks can make changes in your computer and also can delete data from your computer easily. It may reduce the speed of your system and its difficult to identify.

Follow up 2

Trojan horse is another malicious computer program which bluff users and help attackers to get access to their systems. It can allow attackers to steal your confidential data and gain access to your system. They can also delete, modify, block and copy your data. Trojans can also disturb the performance of the computer network.

References

Efrony, D., & Shany, Y. (2018). A rule book on the shelf? tallinn manual 2.0 on cyberoperations and subsequent state practice. The American Journal of International Law, 112(4), 583-657. doi: http://dx.doi.org/10.1017/ajil.2018.86

Subject: IT

Pages: 1 Words: 300

IT



IT

[Name of the Writer]

[Name of the Institution]

IT

Absolute Positioning

Absolute positioning is the position property of the Cascading style sheet (CSS) layout. It allows the developer to place the elements anywhere on a page. The position attributes top, left, right and bottom are used to set the location of the element on a page. Absolute property basically allows developers to move elements in a page relative to their current place. However, they are removed from the document flow, so absolute positioned elements are neither affected by other elements on the page nor affect the other elements on a page. However, one thing needs to be considered while using absolute positioning that doesn't overuse the absolute position on a page because inappropriate use of absolute positioning can limit the liability of website. Absolute position in HTML page positions the HTML element to its nearest positioned parent. By default, absolute position elements arranged above other elements whose position is not (Bos et al., 2005).

Difference between embedded and external style sheets

External CSS is used to define all the CSS style attributes in one file for a web page. You can simply define the style attribute for HTML tag in the external sheet, but you must remember that style tag is not used in external CSS. While in embedded style sheet <style> tag is used inside <head> tag in Html page for styling. The embedded style sheet is similar to the inline sheet but different from external sheets because embedded styling is also defined inside an HTML document as compared to external CSS which is defined externally in another document. The advantage of embedded CSS is that only a single page is affected by the stylesheet, but it increases the loading time of page that’s why external sheets are preferred because they provide faster loading speed (York, 2004). Below is the difference of syntax between both embedded and external CSS.

External CSS: h1 { color: red; padding: 10px; font-size: 20px; margin: 10px; font family: 10px}

Embedded CSS: <head><style> The attributes you want to use </style></head>

References

Bos, B., Çelik, T., Hickson, I., & Lie, H. W. (2005). Cascading style sheets level 2 revision 1 (css 2.1) specification. W3C working draft, W3C, June.

York, R. (2004). Beginning Css Cascading Style Sheets For Web Desg. John Wiley & Sons.

Subject: IT

Pages: 1 Words: 300

IT



IT

[Name of the Writer]

[Name of the Institution]

IT

Main Post

Web developers should use div, ul and li tags instead of using tables to format the content of a web page. The div tag is the best solution for developers to format a content because div layout is easier to maintain and it provides more flexibility for viewers. Div tag uses less code of lines as compared to tables which makes the code more complex and makes it difficult for the developer sometimes to understand the code. Ul and li tags are also the best option for formatting content. Instead of using tables to create a navigation bar, developers must use li and ul tags which makes navigation bar more responsive (Formatting with cascading style sheets, 1998). CSS with bootstrap is another option instead of using tables. However, still many websites are using old table styling structure to format content.

The purpose of fixed-size content is to fix the position of the content, and it will not be changed even after adjusting the size of the browser. Fixed-size helps in specifying the size of elements on a web page. However, people don't prefer using fixed-size because it is not responsive. Fixed-size content is usually used by websites to fix the size of background images in the layout.

Follow up 1

The best way to replace tables is by using CSS with bootstrap. Bootstrap is a framework which makes easy for developers to create a layout of a website. Developers use grids instead of a table for designing the layout of the page. Grids make it more comfortable to design a layout as compared to tables.

Follow up 2

Fixed size content made look and feel of website unprofessional. It is better to use fixed position to adjust the content at a specific place on a page to make the website responsive. Fixed size content makes website unresponsive for viewers who are opening them on cell phones, tablets, etc., so it is essential not to prefer fixed size.

References

Formatting with cascading style sheets. (1998, 02). Inside the Internet, 5, 8-10. Retrieved from https://search.proquest.com/docview/191090098?accountid=41759

Subject: IT

Pages: 1 Words: 300

IT



IT

Jason

School or Institution Name (University at Place or Town, State)

Main Post:

Information technology plays the role of utility in modern business. Most of the time, critical business information is stored in laptops of employees. In the previous case, the data was leaked due to the negligence of a marketing department employee. When critical business information is leaked on the internet the business may suffer from reputation loss, and competitors can use the data for their business interests. So, the new laptops will be equipped with an encryption program before they are handed to respective employees. Encryption program will encrypt all of the data stored on the laptops, and no none will be able to recover any information even if the laptop is stolen or lost. Encryption is the best solution to ensure confidentiality, integrity, and availability of critical business information. A simple user account password is not enough to protect the data stored on the laptop because the intruder may use a guest account to access the storage devices ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"a2j1hs7lujs","properties":{"formattedCitation":"{\\rtf (\\uc0\\u8220{}US Patent Issued to Mitsubishi Electric on Feb. 3 for \\uc0\\u8216{}Encryption device, encryption system, encryption method, and encryption program\\uc0\\u8217{} (Japanese Inventors),\\uc0\\u8221{} 2015)}","plainCitation":"(“US Patent Issued to Mitsubishi Electric on Feb. 3 for ‘Encryption device, encryption system, encryption method, and encryption program’ (Japanese Inventors),” 2015)"},"citationItems":[{"id":1730,"uris":["http://zotero.org/users/local/gITejLE9/items/3PRY3LS7"],"uri":["http://zotero.org/users/local/gITejLE9/items/3PRY3LS7"],"itemData":{"id":1730,"type":"article-newspaper","title":"US Patent Issued to Mitsubishi Electric on Feb. 3 for \"Encryption device, encryption system, encryption method, and encryption program\" (Japanese Inventors)","container-title":"US Fed News Service, Including US State News; Washington, D.C.","publisher-place":"Washington, D.C., Iceland, Washington, D.C.","source":"ProQuest","event-place":"Washington, D.C., Iceland, Washington, D.C.","URL":"https://search.proquest.com/pqrl/docview/1650618680/citation/9003962273C844EBPQ/3","language":"English","issued":{"date-parts":[["2015",2,3]]},"accessed":{"date-parts":[["2019",1,28]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Japanese Inventors, 2015). Therefore, guest accounts on the laptops will also be blocked to protect accidental loss of information as well. Employees will also be briefed about the security policy enforced and the encryption software installed on the laptops.

Follow up Post One:

Laptops like any mobile device pose a risk to the stored information in case of loss or intruders access to the laptop. A BIOS level password is not enough as the thief may connect the hard drive to any other computer and may have full access to the data stored on the device. Therefore, encryption is the best solution to protect the data.

Follow up Post Two:

When data on a laptop is encrypted, it cannot be recovered without having access to the encryption key which is only known to the owner of the device. The data on the laptop will be protected even if the intruder knows about the encryption algorithm used to protect the data as long as the key is kept secret.

References

ADDIN ZOTERO_BIBL {"custom":[]} CSL_BIBLIOGRAPHY US Patent Issued to Mitsubishi Electric on Feb. 3 for “Encryption device, encryption system, encryption method, and encryption program” (Japanese Inventors). (2015, February 3). US Fed News Service, Including US State News; Washington, D.C. Retrieved from

https://search.proquest.com/docview/1650618680?accountid=41759

Subject: IT

Pages: 1 Words: 300

IT

IT

Jason

School or Institution Name (University at Place or Town, State)

Answer 1:

Network address translation (NAT) provides many benefits. It saves the IPv4 addresses because a single public IP address can be used to represent a whole network. In this way, the source and destination IP addresses will be hidden. NAT provides an added layer of security and usability. For example, NAT will be useful in an organization that has a number of hosts represented by a single NAT IP address that is routable publicly. In this way, the organization will not need to change the internal addressing of the hosts if they are going to change their service provider in the future ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"5ppJeD5b","properties":{"formattedCitation":"(Passmore, 2004)","plainCitation":"(Passmore, 2004)","noteIndex":0},"citationItems":[{"id":14,"uris":["http://zotero.org/users/local/B1350FEi/items/CRZT3VYB"],"uri":["http://zotero.org/users/local/B1350FEi/items/CRZT3VYB"],"itemData":{"id":14,"type":"article-journal","title":"The NAT Traversal Problem","container-title":"Business Communications Review; Hinsdale","page":"12-13","volume":"34","issue":"12","source":"ProQuest","abstract":"Despite proliferation of network address translation (NAT) routers and firewalls, the networking industry has been late to recognize that anything should be done to standardize NAT behavior. The predictable consequence of this lack of standards has been wide variation in the way NAT implementations operate, with developers forced to guess what features or functions should be included in their routers or firewalls. This has made it nearly impossible for developers of products like IP phones, videoconferencing systems, collaboration software or network games to implement consistent techniques, or even bags of tricks to achieve NAT traversal. The problem is that many peer-to-peer applications fail to communicate in the presence of NAT. Peer-to-peer communications is often difficult to establish if one or both peers are located behind NAT routers because of the following: 1. Each peer behind a NAT router is only aware of its private IP address. 2. Many peer-to-peer protocols like the Session Initiation Protocol require embedding of IP address or TCP/UDP port numbers in signaling and control packets. 3. Peer-to-peer applications may require unsolicited session establishment from the public side of the NAT router.","ISSN":"01623885","language":"English","author":[{"family":"Passmore","given":"David"}],"issued":{"date-parts":[["2004",12]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Passmore, 2004). On the other hand, because the requests will be made from a single address for all connected hosts a remote server configured to limit the number of requests for a single host may block the NAT IP address. In this way, the internet service may deteriorate for organizations or individuals using NAT routers.

Answer 2:

Different methods of packet switching are being used in network switches. In the store and forward method, the bytes received are stored in the memory of the switch. The switch continues to store the fragments of the frame until the complete frame is received at the switch. While the fragments are being received and stored in memory a cyclic redundancy check is performed. If there are no errors found, then the packet is transmitted to the appropriate port. In fragment free method, the switch reads only the 64 bytes of the IP packet to know about the destination media access control (MAC) address ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"HEUOcqUW","properties":{"formattedCitation":"(De Zan, 1994)","plainCitation":"(De Zan, 1994)","noteIndex":0},"citationItems":[{"id":16,"uris":["http://zotero.org/users/local/B1350FEi/items/T4MKALLR"],"uri":["http://zotero.org/users/local/B1350FEi/items/T4MKALLR"],"itemData":{"id":16,"type":"article-journal","title":"Store-and-forward switching hubs strategic choice","container-title":"Computer Technology Review; Los Angeles","page":"12","volume":"14","issue":"8","source":"ProQuest","abstract":"The central argument in favor of cut-through switching is that it introduces lower latency into a network than a store-and-forward device. However, most modern file-transport protocols ensure that latency remains an insignificant performance factor regardless of the length of a given transfer. What really matters when evaluating network prformance is throughput. In independently conducted public tests of switch performance, both cut-through and store-and-forward devices have been delivering performance at or very near the throughput limit for years. A more important difference between the 2 architectures becomes clear when examining the way modern high performance networks are being built. Cut-through Ethernet switches will never be able to directly connect to higher speed backbone technologies. On the other hand, store-and-forward switches provide Ethernet to FDDI and Ethernet to 100 Mbyte per second Ethernet translation today, and will soon provide connections to even higher speed Asynchronous Transfer Mode backbones.","ISSN":"02789647","language":"English","author":[{"family":"De Zan","given":"Paul"}],"issued":{"date-parts":[["1994",8]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (De Zan, 1994). After knowing the destination Mac address a switching decision is made. In this way, runt ethernet frames that are smaller than the size of 64 bytes are not forwarded. Any network is considered to have a broadcast storm when it is flooded with broadcast or multicast packets.

References

Passmore, D. (2004). The NAT traversal problem. Business Communications Review, 34(12),

12-13. Retrieved from https://search.proquest.com/docview/224979390?accountid=41759

De Zan, P. (1994). Store-and-forward switching hubs strategic choice. Computer Technology

Review, 14(8), 12. Retrieved from

https://search.proquest.com/docview/220600035?accountid=41759

Subject: IT

Pages: 1 Words: 300

IT

IT

[Name of the Writer]

[Name of the Institution]

IT

Main Post

There are many techniques that can be applied to recover the data from the Active Directory. Active Directory offers powerful criteria and filtering options that one must be familiar with before using it for recovering data in real life. As an administrator, I need to make sure that I have created a backup of the directory because for backup we need to make sure that we have something which can be used for the recovery of the data. However, an administrator doesn't have control over the backups directly, which makes difficult to validate the backups. It is important that the active directory is matching a replica of the active directory in the domains. If the data directory doesn't match with the replica one, then it will be difficult to restore the data. So the last option will be to reinstall windows and use Dcpromo to replicate all of the data back into the system. This might be the last option to recover data from the active directory because without a backup I can only recover data through some tools which may not be able to find all the data which is lost. Backups are always essential to recover the loss the data otherwish it will be difficult (Pande, 1999).

Follow up posts

In many organizations, the responsibility of backups and restoring of data is given to the different team not the administrative team because they don’t have direct control over the backup processes and many backup tools are required to create a backup of active directory which are the responsibility of the team who perform daily backups of the directories.

When someone deletes the active directory object, there are many things which happen inside the system. Deleting a single object doesn’t directly have a mutual relationship to the record which is being removed from the database active directory. When someone deletes the object from the active directory, the isDeleted attribute is set to true, which means all the objects attributes are removed from the database.

References

Pande, S. K. (1999). Database recovery when data sharing. Enterprise Systems Journal, 14(2), 38-48. Retrieved from https://search.proquest.com/docview/218674243?accountid=41759

Subject: IT

Pages: 1 Words: 300

IT

IT

Jason

Institutional Affiliation(s)

IPv6- Advantages and Disadvantages

This world is a global village and its protagonists lauds this connectivity in myriad ways. Internet is the main actor when it comes to this global connectivity and here comes the role of t Internet protocols- set of rules governing internet connectivity. Previously ipv4 posed several challenges that were amended with the arrival of this ipv6. However, this new version of internet protocol has its own merit and demerits. The advantages of ipv6 are: more address space to accommodate internet users, SLAAC privacy extensions, added simplified processes, and more security and quality. The list of disadvantages is: more complexity in addresses, incapability issue with machines that have ipv4, and higher costs. This view is highlighted in the ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"l1rwYqt5","properties":{"formattedCitation":"(Chakravorty, 2008)","plainCitation":"(Chakravorty, 2008)","noteIndex":0},"citationItems":[{"id":15,"uris":["http://zotero.org/users/local/ZD9MNZ2P/items/KCHYI3I4"],"uri":["http://zotero.org/users/local/ZD9MNZ2P/items/KCHYI3I4"],"itemData":{"id":15,"type":"paper-conference","title":"Challenges of IPv6 Flow Label implementation","container-title":"MILCOM 2008 - 2008 IEEE Military Communications Conference","page":"1-6","source":"IEEE Xplore","event":"MILCOM 2008 - 2008 IEEE Military Communications Conference","abstract":"The Internet Protocol version 6 (IPv6) protocol represents an emerging networking capability designed to enhance transport, management and security of IP packets through the networks. IPv6 packet header required for this protocol is much larger than that of the current IPv4 protocol. The processing of IPv6 packets can be complex depending on how many packet header options are needed for a given mode of transmission. There are currently no standards available from Internet Engineering Task Force (IETF), the body that develops all Internet networking standards, related to the use of the flow label. The current IETF standards define the concept of flow of IP packets based on the three tuple of source and destination addresses and the flow label. This definition requires that the bit content of flow label be delivered unmodified at the destination end-system. However, this requirement has its disadvantages in that the network treats the flow label as a component of the fixed bit space of the packet header - not unlike the address bits. This paper discusses an emerging flow label technology called 6LSA and then examines the challenges associated with Flow Label implementation as originally conceived and the advantages of the current state of using the Flow Label.","DOI":"10.1109/MILCOM.2008.4753408","author":[{"family":"Chakravorty","given":"S."}],"issued":{"date-parts":[["2008",11]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Chakravorty, 2008). Nevertheless, ipv6 is an improved version of the ipv4 and definitely has amended the issue of the previous version but still it is not devoid of some shortcoming. The, challenges related to the flow label are still a part of the latest internet protocol ipv6.

Designing LAN- Some Considerations

Network is a unique and effective way to share digital resources. With the dawn of internet and its increasing complexity, the digital world devised a way to share its resources over a distance and with adequate amount of efficiency. LAN is one such type of network that can manage the limited resources in a better way. It is local area network which requires several significant considerations. It necessitates the harmonious balance between the shared information and the adequate amount of security. A practical guide ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"FErRGgjW","properties":{"formattedCitation":"(Held & Jagannathan, 2004)","plainCitation":"(Held & Jagannathan, 2004)","noteIndex":0},"citationItems":[{"id":17,"uris":["http://zotero.org/users/local/ZD9MNZ2P/items/AUBPS3F5"],"uri":["http://zotero.org/users/local/ZD9MNZ2P/items/AUBPS3F5"],"itemData":{"id":17,"type":"book","title":"Practical Network Design Techniques, Second Edition: A Complete Guide For WANs and LANs","publisher":"CRC Press","number-of-pages":"319","source":"Google Books","abstract":"The authors of Practical Network Design Techniques, Second Edition: A Complete Guide for WANs and LANs build upon the popular first edition by combining pre-existing network design fundamentals with new material on LAN devices and topologies, wireless local networks, and LAN internetworking issues.This new edition has two parts. The first part focuses on wide area networks; the second, which is entirely new, focuses on local area networks. Because Ethernet emerged victorious in the LAN war, the second section pays particular attention to Ethernet design and performance characteristics.The volume retains much valuable information from the first edition, and integrates and prominently highlights WAN information that is also relevant to the LAN design process.To maximize the book's utility, the authors include a number of practical networking problems and their solutions, along with examples of methods needed to perform economic comparisons among differing communications services and hardware configurations. The second edition provides a thorough understanding of major network design problems and is an invaluable reference for data communications professionals.","ISBN":"978-1-4398-3223-3","note":"Google-Books-ID: kHFe7wnjKpwC","title-short":"Practical Network Design Techniques, Second Edition","language":"en","author":[{"family":"Held","given":"Gilbert"},{"family":"Jagannathan","given":"S. Ravi"}],"issued":{"date-parts":[["2004"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Held & Jagannathan, 2004) throw light on the considerations that need to be kept in mind while designing any local area network. In short, the sound knowledge of emergency breakdown is necessary in designing LANs and the adjustment of all hardware and software resources.

References

ADDIN ZOTERO_BIBL {"uncited":[],"omitted":[],"custom":[]} CSL_BIBLIOGRAPHY Chakravorty, S. (2008). Challenges of IPv6 Flow Label implementation. MILCOM 2008 - 2008 IEEE Military Communications Conference, 1–6.

Held, G., & Jagannathan, S. R. (2004). Practical Network Design Techniques, Second Edition: A Complete Guide For WANs and LANs. CRC Press.

Subject: IT

Pages: 1 Words: 300

IT 357

Title page

Cybercrime

Summary

Hackers stole the data of 106 million people from Capital One, a financial services firm. Targeted customers were Americans and Canadians the incident was reported on 30th July, 2019 while the alleged attacker was Paige Thompson who was arrested for conducted an online breach CITATION BBC192 \l 1033 (BBC, 2019). The company revealed that the names, addresses and phone numbers were acquired of 106 million customers. The attacked also managed to get the information of credit cards of hundreds of clients. The details shared by Capital One further reveals that social security numbers of 140,000 people were stolen 80,000 of which were linked to bank accounts. This also included stolen information of insurance numbers of one million of the people who were interconnected to Capital One. The hacker had managed to obtain the credit scores, balances and payment histories of the clients. The company mentioned to conduct future examinations for the determination of breach and its nature. Since this incident Capital One has decided to enhance it breach policy further by strengthening its security infrastructure. The company shared concerns about losing its credibility and need for improving its security policy. The US Justice Department arrested the alleged hacker Paige Thompson, a 33 years old guy for committing computer fraud and abuse. The case was presented in the Federal Court in Seattle. The court documented the online breach while Thompson is more likely to face five years imprisonment and penalty of $25,000.

The present case is represents the practical application of cybercrime in the form of online security breach. Financial companies bear the responsibility of offering adequate security and protection to its customers. However breaches like the one experienced by Capital One negatively impacts the relationship of the company with the clients. The failure of company to protect customer data was the violation of Federal rule and Safeguards rule. Due to this failure company will have to incorporate many changes for improving security system and one was the designing of new legislations and regulations. The case also highlights the inadequate cyber security strategy adopted by Capital One which poses future threats. The company is currently lacking appropriate cyber security framework which indicates the need for integrating a strong mechanism for eliminating all possible threats of cyber crime. The forensic analysis of the Justice Department of the case also stresses on the need of reviewing different information processes for ensuring compliance with the security standards. The incident also poses future risks of data breach that can deteriorate the reputation and business of the firm.

Analysis

In cyber security defence system the need for exchanging data for supporting the management of vulnerabilities, incidents and threats of cybercrime activities are crucial. The exchange is essential for the attainment of a common goal for the exploitation of collaborative opportunities. It is vital to determine the speed at which the cyber attacks unfold that is used for exhibiting a need for supporting timely decision-making and automating response to the possible greatest extent. Only the structured and quality assured data for automated response helps in achieving the goals. The problem is identified as the exchange of information over systems favoring general availability and re-use over integrity affecting quality assurance and traceability leading to loss of metadata. The failure of Capital One to integrate adequate cyber security measures have been the central cause of this incident. The technical factors include loss of confidentiality, loss of accountability, integrity and availability. Cyber security policy suggests undertaking the requirements of law for documenting activities of the cyber and information security systems.

The organizations dealing with important and confidential information need to adopt certain security measures that are for minimizing the threats associated with the information systems. The strategy on cybercrime involves strengthening the regulatory framework of banks and financial institutions. A universal method of regulation for transferring cross-border data minimizes risks of cybercrime. Making cyber security a personal issue enhances the security framework. Training and education, awareness programs related to cyber security issues minimize risks of cyber attacks. The elimination of digital gender gap and capacity building also improves the security.

The case of Capital One highlights the cyber security issues. To assure the quality of the shared data the tracking evolution remains one of the fundamental problems in information technology. Enabling more efficient system allows, having successful cyber defence security system and the management process is capable of protecting the organization and its ability to secure IT assets. Primarily the risk IT management is treated as a necessary component of the management function. To fulfil the IT requirements the company has adopted the OWASP rating method CITATION Gar02 \l 1033 (Stoneburner, Goguen, & Feringa, 2002). It also suggests need for designing process for setting up boundaries, mapping defence goals and valuing them. The cyber security measures depicts provision of the latest view on the current level of protection and the threats faced by the company. Emphasis should be on secure development, awareness level, monitoring capabilities and procedures.

The solutions that Capital One has already adopted include automation, detection, mitigation and correlation of network threat alerts within the cyber intelligence reports and databases available on cloud repositories. The cyber security strategy suggests the need for integrating Intrusion Detection System which will offer enhanced protection. This technology involve setting of a detection system from a network to specific host. It is installed in a VPN device for examining traffic after its decryption. It is host-based and monitors suspicious activities of a single host. Capital One has failed to establish sensors used for the collection of data, analyzers for determination of intrusion and user interface for controlling system behavior. Cyber forensic assumes that the behavior of the intruder is different from the legitimate users. Anomaly detection relies on a collection of data related to the legitimate users for a specific timeframe. The assessment of the behaviors assists in identifying if the behavior is legitimate or not. The approaches used for detection are statistical, knowledge-based and machine learning. Host-based IDS are capable of adding a secure layer of software to the sensitive or the vulnerable systems. The detection of the suspicious behavior depends on the signature or heuristic approach. The security and privacy feature prevents the issues of theft and operational flaws. Another significant advantage of Linux is that it is adaptable to different systems that means the user is not limited CITATION Jen17 \l 1033 (Marsh, 2017). The wide options that Linux offers make the advantages more visible for the audience. Linux offers to enhance security that makes hacking difficult and offers a more efficient system compared to Windows. Linux supports different programme languages. It also allows a range of applications that add more convince the users.

The overall analysis of the case in relevance to the cyber security measures indicates that Capital One needs to upgrade its cyber security framework by developing controls and implementation of access control policy that will improve company’s potentially of mitigating the risks of online thefts in future. Weak cyber security controls emphasizes the need for enhancing the security framework which will lead to prevention of cyber attacks.

References

BIBLIOGRAPHY BBC. (2019). Capital One data breach: Arrest after details of 106m people stolen . Retrieved 10 06, 2019, from https://www.bbc.com/news/world-us-canada-49159859

Friedman, A., & Singer, P. W. (2013). Cybersecurity and Cyberwar: What Everyone Needs to Know.

Heller, M. (2015 йил 05-January). Employee Stole Data of 350,000 Clients: Morgan Stanley. Retrieved 2016 йил 13-July from http://ww2.cfo.com/technology/2015/01/employee-stole-data-350000-clients-morgan-stanley/

Marsh, J. (2017). Linux: Advantages and Disadvantages of Open-Source Technology. Retrieved 2017 йил 08-oct from https://www.storagecraft.com/blog/linux-advantages-disadvantages-open-source-technology/

Moore, T., & Pym, D. (2016). Editorial. Journal of Cybersecurity, Volume 2, Issue 2 , 119-120.

MSN. (2016 йил 06-June). Morgan Stanley Fined $1M by SEC Over Client Data Breach. Retrieved 2016 йил 13-July from http://www.msn.com/en-us/money/topstories/morgan-stanley-fined-dollar1m-by-sec-over-client-data-breach/ar-AAgRzGC

Stoneburner, G., Goguen, A., & Feringa, A. (2002). Risk Management Guide for Information Technology Systems. National Institution of Standards and Technology.

Subject: IT

Pages: 4 Words: 1200

IT 357

Student’s Name

Instructor’s Name

Course Code

Date

Information technology

1.0. What are the permissions for your .login file? Who can access this file and what can they do with it? (Hint: ls –al /etc/passwd)

The .login files contains settings which are executed when login. The permission to the .login file is 644, which the file is readable and only writable by the owner. However, the administrator can have access to .login files. At .login files an administrator can be able to edit files, create accounts and provide other commands.

2) What are the permissions for the /etc/passwd file? Who can access this file and what can they do with it? List two possible ways this file could be abused.

Unauthorized edit

Editing

3) Where are the encrypted passwords stored on Linux/Unix machines? (Hint: What file?)

- The encrypted passwords are stored in the /etc/shadow file in the Linux/Unix machines.

4) How might a forensic examiner use a password cracker (be specific)?

- John the Ripper can be used through the command prompt to crack password.

5) Why might a forensic examiner want to check /etc/passwd?

- The forensic examiners are required to check password to be able to gather evidence.

6) What logins and passwords did you find in the shadow file?

- Shadow files contain username and password in an encryption status.

7) Where are passwords stored in Windows 7? (Hint: File path) How are they stored?

- The passwords are stored in C:\users\username\AppData\Roaming\Microsoft\credentials.

8) How do you create a new user account?

Choose Start→Control Panel and in the resulting window, click the Add or Remove User Accounts link. The Manage Accounts dialog box appears.

Click Create a New Account. ...

Enter an account name and then select the type of account you want to create.

Click the Create Account button and then close the Control Panel

9) Do some searching and list some password cracking applications: (Not the ones listed in the instructions)

- John the Ripper, Ophcrack, AccessData and PSTools: are some of the applications which can be used in crackling password.

10) What federal law makes it illegal to traffic in passwords (Hint: review Lecture 2, full name and/or code section #):

- The Computer Fraud and Abuse Act (CFAA) I makes it illegal to traffic any password.

11) What is an encrypted volume?

- Encrypted volume is a technology which converts data or information codes which can only be decrypted by the owner only. It offers advanced security

12) How can you tell that an encrypted volume is running? (Give multiple examples)

-You checked at the BitLocker when it is on. It indicates that the encryption volume is running.

- If the entropy is high it shows that encrypted volume is working.

13) What is the estimated time it would take to crack AES 256 bit encryption using Brute Force?

- Using Brute Force it may take 500 million years to crack AES 256 bit encryption.

14) Include a screen shot of the file/file contents in FTK Imager.

Figure 1: FTK image

15) What happens when you try to export and open the encrypted test file from FTK Imager?

- A new dialogue box will open which indicates something wrong happens.

16) Include a screen shot of the file/file contents in FTK Imager.

Figure 2: FTK image appears when opening a encrypted file

17) What happens when you try to export and open the test file from FTK Imager?

- An error message is received and file reboot

18) What is PSTools and what does it show?

PSTools is a commandline tool package which has got some tools like the psexec, psservice, psloggedon, pslist and other standard command line. These commands are used to manage both local and remote systems and therefore, they are used to manage some remote systems. It is also regarded as cmds tools suite which contains cmd utilities. It mostly helps in providing remote administration work for windows.

Subject: IT

Pages: 3 Words: 900

IT Trends



IT trends

Students Name

School

There is hardly any industry that is changing as fast as information technology. If you look at the breathtaking development of the last 20 years, then it is noticeable that changes in the IT are normal but not always they happen as fast as at the moment. The trends that offer a lot of potential for the next few years are and are guaranteed to be relevant in 2019 are:

Digital twins are in their infancy

Digital twins could be useful in many areas. For example, the artificially created images of real objects that could be used to perform stress tests without straining the actual object. There are also concrete ideas for the application in medicine and the automotive industry. However, as the digital twins are a product of several other technologies, such as AI and VR, their dissemination would strongly depend on how AI and VR evolved.

More IT security for competitive advantages

Data outflows, security holes, hacks, hardly a day goes by without a new IT security problem being reported. It is important for companies to understand that the IT organization alone cannot guarantee sufficient security, but that the entire company and all its employees must be held accountable here. Companies that are still at an early stage in terms of data protection and IT security advises the online magazine to formulate a clear agenda.

Companies combine the cloud

More and more companies are migrating to the cloud, and in many places, cloud computing has already become firmly established. It is assumed that the use of the cloud will change. On the one hand, more services are to be sourced from the cloud and companies will realize that it makes sense to combine private, public cloud and data center and to adapt it to the needs of customers.

Block Chain

Although blockchain-based cryptocurrencies such as Bitcoin 2018 were on everyone's lips, it is not yet clear in which areas Blockchain will replace existing technologies. It is assumed that Blockchain, for example, could be dangerous for the business models of banks and rights management companies. But it will take a few more years for the technology to gain a foothold across industries.

References

2019, L. (2019). Latest Trending Technologies for Better Career In 2019. Retrieved from

https://socialprachar.com/latest-trending-technologies-for-better-career-in-2019-2/

Rathore, A. (2019). Technology trends that will outline IT industry in 2019. Retrieved from

https://yourstory.com/2019/02/technology-trends-will-outline-industry-2019

Top 5 IT industry trends for 2019. (2019). Retrieved from

https://www.asianage.com/technology/in-other-news/020119/top-5-it-industry-trends-for-2019.html

Subject: IT

Pages: 1 Words: 300

IT-Security

Name

Professor name

Subject

Date

It security

The article discusses the reality of intelligence and its role in life. The discussion between Morell and Krebs emphasize on the issues faced by the technology people regarding cyber security and protection of the IT infrastructures of organizations. Krebs uses his work experience in IT company to explain what IT specialists focus on when they are playing the role of security provider. Morell is more concerned to uncover what challenges cyber security pose to the governmental institutes. He also inquires what cyber security people focus on during their job of making infrastructure secure CITATION CBS19 \l 1033 (CBS).

The discussion reveals that maintaining security of intellectual property of institutes has become a challenging issues as Krebs mentions the event when China had stolen information of US government through hacking. Such incidents makes it essential for the state institutes to hire cyber security team and invest for making It infrastructure more secure and safe. Breach of confidential information is one of the biggest risks faced by states like USA due to the cyber attacks. The information shared in the article by Krebs, a cyber security specialist also reveals that US government has invested huge amount of money for enhancing the IT related security during the last decade. It is also possible for the cyber attackers to steal election information from the data system.

The security analyst highlight some of the important methods that are needed for dealing with cyber attacks such as strengthening an effective cyber policy. It is also critical to adopt an adequate security framework that minimize the potential threats of cyber attacks. It is stressful for the security analysts to assure that the sensitive information is protected from hackers or attackers. The recommendations suggest need for a strong regulatory and legislative space.

Work Cited

CBS. Transcript: Chris Krebs talks with Michael Morell on "Intelligence Matters". 2019. 05 09 2019 <https://www.cbsnews.com/news/transcript-chris-krebs-talks-with-michael-morell-on-intelligence-matters/>.

Subject: IT

Pages: 1 Words: 300

JavaScript

IT

[Name of the Writer]

[Name of the Institution]

Javascript

Main Post

Javascript is the programming language used for web development. It is the essential part of a web page because it allows developers to make the web page more responsive and interactive. Javascript also supports object-oriented programming style. It consists of APIs for working with different functions. It is the most important language for web developers including HTML and CSS. Javascript is also very easy to learn. The advantage of Javascript language is that it is supported by almost all browsers. Javascript is relatively easier than other languages, and its syntax is very easy to understand. Many websites these days prefer using Javascript to fetch data from web servers. Javascript makes the execution of the web page fast. It allows users to create form validations such as incorrect field elements or missing field elements which are compulsory. Javascript helps in decreasing the load on the server and provides versatility. However, there are many disadvantages of the Javascript script. Javascript language code is accessible to everyone which is one of the biggest disadvantages of this language. The code of javascript executes on the computer of the users so that it can be utilized for evil purposes. A single error can stop the working of the whole web page in javascript.

Follow up 1

JQuery is the library of the Javascript which makes easier for users to write code. It is also very easy to learn and provides the whole functionality of the Javascript in fewer lines of code. JQuery is not a language. It is just a library which works faster than Javascript and simplifies event handling.

Follow up 2

Ajax is the new technique which is used to create a more interactive web application with the help of Javascript, HTML, and CSS. With the help of Ajax, Javascript communicates directly with the server. Ajax allows users to update a web page without reloading it. Ajax request data from a server, then receive data from a server and sent data to a server.

References

JavaScript for programmers. (DVD JavaScript fundamentals 1 and 2 included). (2009, 09). Scitech Book News, 33 Retrieved from https://search.proquest.com/docview/200145241?accountid=41759

Subject: IT

Pages: 1 Words: 300

Knowledge Audit

o bjbj .2zfzfeF F 8H tdzkkk6nkkkkkkkkkkkkkk (Laykkw0 kkkk kkkkkkkkkkkk kkkkkkkkkkkkkF X

KNOWLEDGE MANAGEMENT AUDIT AT TEMBE ELEPHANT PARK

Students Name

Course

Professors Name

Date

Introduction

Tembe Elephant Park (TEP) is a wildlife conservation organization located in South Africa tasked with the conservation, management and the sustainable preservation of the biodiversity of the landscapes and assets in the conservancy (Mearns 2012, p. 9893). The organization mainly relies on research to gather information and formulate policies and guidelines to conserve the wildlife in the conservancy as well as the supporting habitat. Furthermore, TEP uses the information for strategic and operational decision-making to ensure harmonious human relations with the local communities surrounding the conservancy. Nevertheless, there are gaps within the organizations knowledge management strategies especially in terms of information flow as well as retaining knowledge, particularly amongst the employees. This gap has continued to hinder the effective management of the biodiversity of the park in addition to the loss of information applicable for future reference not only at TEP but other conservancies across the country.

Data Flow

Within TEP, information is gathered through objective-driven research by mapping out the species within the ecosystem, especially the elephants and the endangered antelopes as well as the natural habitat. Additionally, the researchers rely on the local community for additional information, especially the wildlife-human interactions as well as the socio-economic benefits of the conservancy. There are regular workshops and group interactions for the stakeholders to facilitate information sharing and knowledge flow throughout the group (Mearns 2012, p. 9895). The collected information is stored and used for evidence-based decision making, in addition to serving as reference points for other wildlife conservation organizations. Still, there are gaps identified in the process of knowledge management within the organization.

Knowledge Gaps

Among the problems identified in the process of knowledge management includes the treatment of research data as secondary sources instead of the primary sources used for the basis of decision making. Information collected is integrated and stored in mass for general reference. However, this information, having been collected locally is tailored for primary use within the conservancy and if applied for secondary decisions, its effectiveness reduces. There is also little synchronization between the employees of the park including the permanent, temporary and volunteer employees. Minimal coordination reduces the chances of information exchange between these employees, resulting in a data gap. Establishing harmony between the employees ensures that information is shared equally across all dimensions to minimize redundancy and exhaust all resources including data assets within the organization (Perez-Soltero 2009, p. 126). The lack of synchronization further leads to loss of important information especially when the employees leave the organization either by resigning or completing their contracts.

Additionally, TEP like all organizations experiences high competition for resources for data management due to the high demand for these tools. Therefore, long-term data management has been ineffective leading to the loss of invaluable information over time. Consequently, researchers have no means to reference methodologies used in past research. The learning opportunities offered within TEP are only available for the permanent employees hence limiting the pool of workers that retain this information and understand it on a first-hand basis. With the opportunities opened to the employees on contract and temporary positions as well as volunteers, the organization can tremendously increase the impact of these lessons on the conservation efforts within the park.

With the identified knowledge management limitations, researchers face challenges while formulating measure systems and indicators for decision-making. Nonetheless, technology is a tool viewed today as a solution to data challenges faced by organizations including TEP (Perez-Soltero 2013, p. 16). Yet, there is still a limitation to using technology within the organization because of the remote nature of the location of the conservancy and the temporary basis of the majority of the employees.

Recommendations

According to a case study by Liebowitz (2000, p. 9), harnessing information from employees frequently ensures that it is reliable as it is still fresh in their minds. Therefore, frequent and free workshops are necessary for gathering this knowledge and storing it for the future to prevent data loss when the employees are gone. By use of knowledge management tools, the company can continuously elicit information from employees and share it effectively to prevent loss. Additionally, TEP employees should identify special skills that each employee possesses, and organize sessions to discuss areas of interest as opposed to entering this data on a computer. The face-to-face discussions will ensure that the tacit information is elicited and stored for future use.

In another study by Ragsdell (2014, p. 277), it is not only important to document all information gathered, but tagging the relevant information to avoid wasting time during subsequent research exercises. Furthermore, the integration of systems supports the singular view of data for easier comprehension by everyone. However, in large organizations like TEP, there is always a risk of leaking confidential either knowingly or unknowingly. Therefore, a clear layout of the confidential and non-confidential information should be given to all employees to maintain data integrity. With well-defined data structures, information can flow freely and all valuable data assets managed sustainably for future reference.

Figure SEQ Figure ARABIC 1 A Process Diagram for Tembe Elephant Park

References

Liebowitz, J.et al.(2000) The Knowledge Audit,Knowledge Process Management, 7(1), pp. 310.

Mearns, M., 2012. knowing what knowledge to share collaboration for the community, research, and wildlife. Expert Systems with Applications, Volume 39, pp. 9892-9898.

Perez-Soltero, A.et al.(2009) A computer prototype to support knowledge audits in organizations,Knowledge Process Management, 16(3), pp. 124133.

Perez-Soltero, A.et al.(2013) A Methodology for Documenting Key Knowledge Through the Application of Knowledge Audit Techniques The Case of a Mexican Pulp Company,IUP Journal of Knowledge Management, 11(3), pp. 728.

Ragsdell, G.et al.(2014) Knowledge Audit Findings from the Energy Sector,Knowledge Process Management, 21(4), pp. 270279.

Knowledge Audit PAGE MERGEFORMAT 2

5678GHIJQbghu C s u w

b@VhShyfhh-hhm7hvh_hPA0hlNch hqhuOhZPh.hG(hWhahNhnhh ohP hhh(/h9678GHIJQbgu -. 00gdn agdP

agd(/

gdVjwxy,-AUVf01Ngm-.oIV 0VWXabc8xhbhJhhcZhqh8phPh4 hpOh/h hhvh h(hG(hhwhhjth4lR hkh4lRhah(hxh-h9xe/0NWrJKLMNOPQRkq , N h z h.6mHnHuh.mHnHuhkh.6 hkh.hkh.BCJOJQJaJphht7h1mHnHujh1Uh1 jh Sh1UmHnHuhjthJh4lRh-lhcZhhe20JKLMNOPQRh cdegdngd. 00gd. 00gd. dagd.gdRJgd1gdt7 gd1gd./McdefghijklmnopqjhUmHnHuhmHnHujhUhh(/hRjhRUhjth.hkh.6 hkh. eghjkmnpqgdnagd dgd ,1h/ Dd s APicture 5Cb-wb4) Dnwb4)PNG

IHDR4psRGBgAMA a pHYsodtEXtCreation Time20191002 232237dIXIDATxugwM7B R p-XPkzUWE@Hg7sM23pf9sfq ,YBayqAu0nYX-Qcn 0,_xo p

7 1gRBw)MOgt4o

27pxx S,,AVrRo

Dlw/zkr_vKdVlLAJ7m37pD.XdmBmY - gn4tmLxWnc7g__7hO

4 62mvvq TMj(/aGm)TU vvE-3-54zQgD wVo 2gp)6kBn(c7 KoVANaR6(zd(oXcNysswm 7in B(QxMUw7yuolwYcoOA059bGuPsH, M(H .UVVj-/Fasrpg T1wVHozhI3Ss

VA5Ua,Ut)

vkj 1_TZyB7f /JpyMBNosmGaGZvfZoCNpK nJM_-Bp-fsn7UioXU6b8,UiW

Qc74SmAC45Uszt-tSUtbx

TIE((mWm0nnnLo-5TiB8 zB92O/C

1nJo/_9

eUUsU.jnup GRmPR5jpTPirsE_.PN9zWw_hrS 7 zwTat60Dyvp_ UlH7ua NM XxcZ-)19y5dg5Un6_-sqck ufzltor4w_5 @_vwuI7zs,CYWa pCp P0a TA TvG fg9wr3_ L9ou UuQ_B@GxOOvPiu,.

qlGK07D8Cy 2p7 @.-5bi4ST7qMXEbzkNb 8PK@y KZqqwp 7 Tl pKyHao.t4oMter on@nY N.10X3 Nnm Fx..xNC5 BCIOrx7 3Fug6.jamtBzhR)FdIGhN9fmh9

N3JN.VhT6pKV1BMyV/vhN)Ywo/c8K /D@t,G5MjWt0 )dRs7J5sfQHvvVNelbsz9OuzUao_4oXnvLi7_3Zk0 pg2on -.PR 69G.UWLV_Av_wU)gFQu o3uRsAWV0 u)XGaMSkCG (,C-oFwYrnW(Y QHaW-4eSSmyv4RGZORn @pj SW j-

7G/ U5Qj7inycQEhy0a43JKUpGFa0_e vcar @akssMOuUy,CSU75WaXp7y/T_

JJMNMUp .)14Xx394/sHCCKLMtJ j9.4Px,AaIH5O5RVLUyvKnR4mvw/pWlSun4kUkCL0(DS3mLA(pBtEg/choj7H(_UjpE2Tzxf7@r LSpBPoz0T55 g D N_U0aX,5FwN 4i /WuRkLWpiWM_WP7n1SzhNmrmfg-mb 2nW)cTUcKeNMyOn2BZCy 4zP_7r9-@LwOxFti.8w-(/18y XU_4HiD6_s/pW1rTiKrQGtpdm

uR6O8-By_hhBjTIMk-K.bVQCzlYlua.j_jj . @gNk7r DirFOtnGXShmVs

jRBDA(@28 i7S_lX5okIXU)-UU

8 eNhumRlTRUeJUl0CGwpKOn,@PtXIVWi_7HbQtDKJht415UsNZt/xJUquMUC6Vx8H@t9Vlqiy8jMp-YTMR@kp5n0Dr7_3s)lcnsUgr_wqA8JAVrGsZKsDC )qhZMna tB5MZCAP oq65kLMvwDA/OA7qM,I_z7BTU6VhPNuUmjm4UBhjK3o_3Sb tWO9o/u2hn S,,(-We/ noXt 7 p_LM I-s37@QBEop

7 p

7 p

7 eyk0.8Noo_M lLo

7pZo

V1k CU/f(n_nM-7pT4-RQGUp0qAu nYX-Qcn ET/ 4TMwsG4tNrj_vMnIVf5V MWOSz.wWRdd1vEeVkqlj(zx /lWV /wSD@t,G8b7vD

.znygp-Yne WL9OgRg_SwEzkFvtci.t@)IIWRLSe5UUjnww54iMTm_un_izhIYQrpmSx pJuS_KV1MhjP5el42JzBdunsIh/F

KUsIsN Mn dT4_onq7TwiGo.WP

Oj. 4p)9n7DC_emx pjV oBp0cGy-94ZS3p4Usi5

lCq8nYSuVBPUpSf mk.4tqaip0nrzg/WPU@ 85k

YpLAip-TMnznHa Vwgjx3SS/hf,lpW7_9Wd7B8

sUsbBn9wJ7 @LwOxGGsPt (B6U FR3u8U ZzjtLB6

0vwA_c Basj T/exr) .jpD_h0yHxw7DDAn@DDAn@DoovQs

iu nz0lrzoFoqWEB

sH7q K8Rxp0Uy_Y wnv

8rOhCt77nhuw4QPo-5@_smu

5Fxp8AMvCpcWYwltZ(@b7.mVl_jBi-o-Uq5

_MNoc_rNMvWKu8t_tJQneUgejphnaxpS nZBO53dVoymWo3UxLsrOozNa RgSFx78k onqK

PKjxpT/t o _- Ww7CZ5

npKNna(d7obsu54O Ug1vD5phCkkTvEj5 51v0un O ZpAjYjqbCLWyit

i4U5 nniJ9.X7R84Dw8jPQjp Zl

8fWR7P9kh3bz .u.Pmjpnk m w-JGEAU808VrymcXQe@ 9U4R4s bOSs9oAVSgPWZMaLwo8Bv 6/yW- RHp4TMVosAWpzh_/P5ozvl Vp)LoSQhPWm Oc,w,s-X/xwy b@t,GAHD_h0yHxw/g5RVtiFhhDiJX(Q A 4Ri9.kjsPrzvqh2tvyFcsit_@WZMCk y DGn )(T -BEs,U.HqFLSn)X t0E4kUSYQB-QP8kt zEaOH/OU hmfv-/9mp 4BhiKzmCR__GO@l-iozZntpkwvDfEwSQX8sjd7mOQhU79HpTc8gq. F(UNhX 1KaSloz-9jfn0KC5Y)UhCjxOwFc-YM(PUSgws.47 ou8SxUDKxUcMUUTMtLKpZOnB qdw9n H.5h z.NvS YXlyk)@7j04/TqGkWM 5K5pmtKdp .ez-7P,GNlOCXv p,Rh iK_a jt_Umk TxDws-/xt.uH

hQI@QC@2STPIU2TJ75wNOJL4P7TxtvCBuQUyi7QU05waH pGow/79h4QQbyzyQhk MUjPPM ,zfp7QrVy_NsqJh8nl-yW- tJmuEozS3fVzk P4/oXt 7m_jWm Bn@DDM0hDbRZuJRuukxx9IYROSuuRWwt_i6wJfehENz ym/Nj5S8qZNdAkgoKV-wn

mLJI D@t4NmWYkvjvYZ1_jSsN,t-9CAMUEpipa kvsmZ76_UouMaUOSChVgkwxr40SHTBC9lrO7 PSTx W@Oz1n)2-wk 8D4P4UsiZzE

8av79-TivE // 0VEUWR-3CQ7jp

pzUt_pdCZpp@Hy94n .Iws p)w4uUWWyTUWEYb97 pw-TsC-BAi_Wc R7_gjMC7evq F4Lkx/rP()20uy6eaRwdTe94ozhvwFrzZB6

C3V0vw59iEPpQYv_vK(K@oXt

_hovJORm,27p o-m/7Vl@ QMCM5rRzkp6kmI@

5v8VA92nMq@5Ja1G/C)@t00Ms2De 7 o@S p7 plcwmvM0h0)-Iizwjkk-fKNNoxXVVeddXzz@)@tw7 AjFvXBB tIMMuc aBR)kmmul6uTpO

Yyy

fysMaey7MfcV)@t BPUihmI,vA

oqNS _h onVZr)6k,74xUUVV75dPdh)@t Bl9OMu6oH)K7gK.2aOuUvzU

XiiO)SO6TCaav5XMM.xSh0nw yet8QU)liw/pd4_W3u/spe

aFm7Pz4HAP

advWqy3gzoOv@0LJK-Zdgkwyz87N0vvk,yCXwwKVn-GcBgwzk0somlyuvvzkczmmk)Ro-67(M_WWgX5vXwuM4ommuvIYvvo nUUUyk7W

3@ v zp4USWROlrhOBgGq TFw xkc15bqKh4WPaK,qmcn.-33Fwnnw0Wez Fazgl.ZfSYYYvu97_1wanjIINV /ET0 WqBHw3vWKLW

.SB.Syyy9S8M6

TXa )RE,Wzwef_qGo.tc,An_C7d 5@sCi8iUYZZN9Woemw/OGrnnoyfOnqwufv@ 8OtR7jPxUo ,_JgytQUD@EE)lcAnE.4t, jf zR4

rCCcd Egwmfvkn2Pn

xwJoMUJNso)SKQ74LX4i/6k,ejCYFFcUU mTphe@G5SUh /tl6mr @yT ho(SSRUi.75A6mZO- sS_TNQmHoFzbM 4MP

T3X5U)T F 7

T6oMl1i4t8HHHpmv4Rsixf,iBCD5stfpC o7ZIIIq

tpBi.Zo

7NFxkmVMxpEvv

AUzk 1AFUTufxwuyW ,GoKJJnV T0VmWugYKNN@q_5qgRRRXMmB PGxk R On b t TWWn-56uUczk4ZV3Cnz. rVvo

19 k )uW

EKjjZfdd@0i8weP7x UgwW0LSSCC-)uz1cqAGg9rs9D.p

TUTcOSFLkm8o6zh((pp 1ZtNdKR,2R,BosAtugYx

djL.v,XCtQeK8 D@uuMaZKCht .(,5kpGgGuwZWGvpfYrzZJFbvod8L7ml.d0a-XU

Vwt(qOKCppl,I-)RBaWJFd@-)pauP1 Sk .ojOQVro

D

/k Lb PJJJl-.XlllN Pb

-V_lYle)3C5TXyfiy2fZb vyUll5aPkGvU77@Do5pC55Z )JJ9-9-tcWy@KO7uUN6-Zd@DuuvYmYYgW4peXbpvUg_ ,wtNy)s05Xo9TWcZZw/@S,L8a

pTgUgjcRzYhek/WK/G6mr6/2KOSOuqpz4VAg5L@,3/20.uT0gMvm/C5Wn59rw

3O

sJ7RDBOUg73

D_ .D(K/Rl wmffuY

pXjaKH FYzvwwmycL)VM_UwbMLqlvXSN3fxkq4Tsn32_5pDG8lFCM(kcOePBVqF7NsYoRC

xo Dml@bM8vWGwONuNY7okf oAa,NppAf jMyMSh UFnLNsE7PAPx7O

UH3xBx y6,k6PhW BkkM/R)4trIOFoxn_KS wCzWunRF7UZZB.7DGuVyWHabH)DCJnJ,YM ArZSSfJcdSV83tj mJGaR5qo .z

at _N

nFszwu T/OgYYY.oo @7oMwD1NawJZl,IWnWbQT1-f,cejdI UfBGmRiwqvM7VWWYGrko/sw.11mqsGkcsK@ZyElm n,gYIVt8YU0.-uBw U3wUCrJUw6vX7tQpknhPj5Q

1TF DuMg.gy/n/w

95O@l 71Nv24LOJ9U(hTRM2F6m7Rw

7G.MMTw_wuzCPQic -3/6,ky)NRP

cgP njA555lD- 3HxnXoki)3E30,hW9Gw,R9V@Ame-DFPT@g7WE

9s5. mMJsiDiRsNh5I9wCPsqb GN7O_t1E2tQev7 7.P1Y7tv

V3o/kOv4TtxC3lIYNUujp-7c4rpK)N6UZAINLS8rMUO7p TDMs JDU )p .qStznHBNIsW5OpEEzzljYTgc0QM U1MCq

T@MH.hHF90SlHzQOr .t)aH3sRlSaTJ01G_P-IjNJI6ZBaxuoSDYVhQ9R3 H_xS

ebjIUIQMCU@MU_(PgBxz9hNvs ncZl2Q0rwDCDvU0)RNUK0uU/5

R(j.iuS5_W7DTe4NjuQYIh 9S6n(wXBUlXZ4PC5WATj9t

tUGi8YpBOC/UUd(DM lu7UU.)nQ5/OW4Tsi.6Hw c1dCMUU1CA S

UF

HAUUA5Ut,hS_IjjTKN UTKdCBYRT7 DQ W)@-iiUhgNsS9s9E My0cwTXFk@nnCll-9nU) wM7SHH.n/oxxo

BQ_OS-uQOv1NuSSU5Kp9 TkoN@HjK_ G4IJ2rmoR5i7MARUjh pi 4ahhOtpn54G4XtQ

3V5l 7ugOUj 6r FpsrOai.j0ik_Iz)nIiTdTB

7Gti5Q 4-YP.mP pLs4 3f7cEYY6

bHJf62IyikT0Yg zwkm--6psakoo)SxkA1Kd0VX@iiieHuz@ IIvXQrqxQ-l _g

bHFntXKUn

XbbZdUUUykYc zkC1od5..it6fSlt-gWef Vnc.VAlQfi9n/_www/xSNNvs4o- lhhkm671KSSS.zkk93o6mVSSElymZ0XMbLggHc6fz /RNOkQ/,tvUVIpW_-77C9yR_5KZqqw F5vMo-BZl 3kyd BAznmzgpepw7OB9t(pE.82c2AQPSOB/nn0nu6pIlw8KNMK jehS6vXSkpaMVouYk_iiSPYIJP@-35Bd hi /x

7

E 5Fxl)77jkk-9W6hK,3F utt_W6/8ihuliNki.WsamoxKMXfMfKK XjBUw8N n-RKKLkFuuDs D pvkCXJQ_l_/q p_MKUIcKbSl3)s t7v -rG RlAOSmdL m0st2W,

5U-9Q_yy-_ln./77tonW)V5JfuMmyMrGk-d 5RoUVvtYw8UNZbBV N ,1vR84n usiJKl6k,pEG_mn7Qmm-Pn),gmfjfgYyMmhw6rKIwv xG_5TfO6(uP(RscozmsG9x yQkV1lo-TgGybr(KNTNH B 2Qv,iZKrS(MKPnRBgWX/v1cM4233-77Dfm_H ,cxEGvqh-hfkVPgkw6 d0U-174SlTtoYcoMnn gU8O0 x77Dzj7O mrFN9t7mNUmnqvUgT6y bsU) U

7MjguO, 4 (SPF MMoyiii.Q6n8O WyxX4YNqEAZu 8hGA

UZVXM_6AcRebBMf.y3-73yno3Ms GK5SfMCdlnBBGwe7tkGlvp3iV47fwUi) meRo-sRrbMjg3.)l7 TFpjn HubwMCA@MWOx 99pt _bI Gzui_R32m,wTM

yEriu5vdGUgp(Q83 pST3eZMEVVWM-BSDD QSNtomhnufI6aNe NnvHFniB6TVUnOiYmZcoRLNSfd zLZ)DS7W_iSDD aXlKK,k9Ehl- gEYWhhGgkY7 ON) tbv@Gjjoze,-vuuuz_U4ZGXf( WliNGUpgBcBn TppDg4vXW8nc2,7QOmMcfWnfFmzTkk)3t.8)u3vS77@SgShU6svZ@JzYJFXRrcQTrjRHA41QoYm rfSDuwYKc(jn6kmNkNP54Uq). pPlvwuY 1 KLwlYnOFJf-zG1XlhBBK.u8wN nnNU7otksp84QkI)7(T QgVTgum1GsEVdy

@ass-xf5oRoJcllAD_n 4I)XkjYbgbSfGU-pPPTuYUVmljnqwlT/@(lngmqH WZn-

6C79Vc/xj

MgeKLMs

uUmVgk/mVS .nXRVaw3XE@ SEnzboh Z ZreO,)ifUJ@ Us. -d io-wr /fEmn ZU Vnwh046k- k,azKHJgM6qV4L7omuV_.uUVmXxUlvZGKoZtzk nGUwmMn. k5UmoyBKlB@RaqqixvUQjKXf0

l/Vw.m7j2-RWfmV1kk TmxZlYmkkf61oM5lwEB6liSJ7-0x4VyhVMgWzUVtwwYf7T35M35UUxM9sl1s.b1s/Quef73oSVU7x5n X7a6,)Rs7k

tGlV6

30xc4o67_Z YScquvixQumhy/2Q,1uVP-hyk r2g nhSinzLpvZS1zKmMZg,9uypgkv4gm@p ZN qqb)Xx56v_Mv_Q/

TYwWeQ.oY6hb B@R92(.97upVR5twucvseLBQMw 4g-WAuFzU4fUYsFoYS_cjnki,j-ZWgmzo -7x U,mz67-pu6ZgYGds)TEV2XW -Absffw

VO vPuuZt SfRjbKLJ3zoWZB4cxt7Cuv95ZKoXZX7fTbru6XkpzmCvS,-wfKFgWZJJHUQ5@,G@PRUi(9W7Y BFCW n_s1PQNt44msJ jd15.wiiPVD_no 47Wh(iW16vWu znpl Vku_2wlZ,M

Z-)5pX ZV(27L_JMUyM96Z90oPKSmV,7LmZADF6 55w@p TMZiZH1m_e gPDGw5oUa)jUZWYcsw

(Ru5x 06kl_U i5_SSwbQWRif(mOy T7LlcCfYe

-oKuEICSl-ivdJmyTgK,

xci-o-Vmhp 4wnG jwoUnu7n 0mpSPRRjKd@_)nMi)fm7PEMVY7Httv-/jjC7Un ngv,G..-nsI XKkJbH6j2p48zWnjDN-Vtz 8UmirM7nVD (pRl-7J8nhZmxFGxfJBpRnsT xJ/lxuu5YgGKkei 7HKU7bUjsnNAarfu6dAo@Rdff.XaxVncm)zmemHr2JzZUTYDSAupv rfWew5XEUj4@rfLUkk3ZcN ,)v/f

mZknuaIlu5RZugu)XZkouZ2KLqAUSnkoMRj R3)J@ --- @/Da73_0NSM6qdIl/qngq.o1sm,gKi2GL3lJe9WBe m_ooNst_KLn6kBR6Um5gnSod/hu.vYg,xFw_v TYki)

@w

pt7ySyv vF9w Z kiW,7Ueji9cmgjKYchUZW(7Jkoz7l3gK

_

Y-YmOqI9- ). Y,5XVc6eu7wz/bI., ) by -)2 W iDDL7uXmzHUbgo7/8aXKWAW-Q8wE)Su4VZZkk2Jm

63ozBY8Rk8kgsbm7pGo0Q5wz35t

4,ko0H_wwZU(RWKJQsTGB8

Mern qCzZ87oOw(KbZ R2CsuJUiou

Zno( hqfn yDTUViktjy5

6UbUWJ AjOIBqy5Um8Aih7brp_jY8

Zjj5TlUTVi5C668 _6fKL/jctOxhfhw53oHpIgj.nUMCITl-ungWWjZ-in7WchoqCS87_xrm1t.eNhWkghtvv-9FaV t,5dMAU -3 3Q.@j5Vjg)KHL mms3i5ESF

-M

KJ

wzh_kdkp_z7r)xGnYp G.N(,Te _zzue5J(OpU4 mopz

RmE@6K ES_vUt_c/M3n5G ZUy7 Jh7xGQ7T2Ra@ cp6-V xnDAVZBa.w _HaXkl@B t

hI 3_ol

DA235yY5E3CVb))Ioxn xltuFo9kqf 7Hn-H(ES3RV,3@t0ToQN@6ggdMmSpmeD(egWMjiWU1nXigWU4X YY74r3l745gk-3RCCLn m .,QUuF mrho D L_6eDy-GPkXKQCVm6adVeT6 73DL bWX6qd ojoD Q9X - Q3)2kk1 B(oDA v)vGXva

A 63qiUjJ.b6X@8luuuVmRRRXibB.6MjJVez-HXkCyk_m7uuVMypzVmGXFz)0VZZs6p.lYYYvV))N-gEEEB,1mnom

gIfy7U8KJmnyzww6NwgtH .xeb)nVoeWom u

g_5KZqqw.0S.nY__2LKIItl) TWSSzNU9ZZsuaPQho/P)yn6K/SnN0do6f6jhEkUGkR,YB/eKhol-uwaZmI n)nSgg8l_yMUcBnnyf HN0NAee(SEq7ZUO3m-.oUeSNyS6V/mK3M32SyKHbNeM/ f

NOsGmjv bD_nyC

l2ms)gmsI6rTcYNpAYnGr.SAv0-

Cw@6sjQtN5TQ,-gU mmWj-Ud_cg_JfE3zJKN/SI/.DFzeefR yPuicK0@/CrB/K3fqm CP Ygewqn

mt-e g0VW1ls(l5k3wi),19 liR//IuZPmbUvzGZvBmdnKQwYuhKpHmUnyg .)S lACU7lMYQUUagSS6/TgM-j(mtp8@xwukcMl3,)SvnN YrYg7zxKJb

l 4MnKHJsUtA@G8N.2tmg2w60

f/vlRu3OhH

EvUr3CMbt4vbJuYkclYE3kRfKbhs4w1-,joqnxjJf2wIK,3gRZmzFvqtk7EUr 7AMPs9WyYcxSCXS,99jaomkNthYsSUZkYZeQE_(6qq3N,StG9m6.322RS6noFeb)Ck/04.CRdjxuj

3-76yEee.6v2VXlhl@64V6qsikksVW

7Wm

Cpu@j/ .4umvgXjQUkcHKvWsAACG-llzjkv SSxLEyUUUO_B7uuunElEMLruU

@xlknv XivXvrG7H qqklee,7PMU )V E.uas@Ur9 Hvv G

c)jwUJA /5, -1QoXnZnKIpJUjgv0WUTToelq/V/ @-w

U IweeeeJNozO(D

RU4XQ)tWUJZZmLQmhAQV09GXD5VN8nh8J25x2UcqxU2OCuz

z@onn06 V /_Egg(r.mwahQsEvGZ gjm5v-50kmwi.dSU

WDl3UQ ppaI4iMoQ8Rs .oMlEfYXkxh@Jty,9j.mKOKwi5kG8qlN G

w.hfFLr-v)Lte PL1)IIyeeX xb6F

91OU0-Uap YnX v)(Rc5jmOCM5CP0AYFQ-T@ RGxNv3O Whsy v)3ZJNxef90uXJOpCKg/l3lI3w/iA8sj1NT@1UDUm(OU3nm7M7dJs _pevsr.zjE1_vj3Qq,YE9kk7t5mvK6ZKk34ChmQZyA, en1bDi9rd6Qo.k O3)mUN55r4tC1_FsU/GAgN6(bgyNPf-7wlOi-s56MscB NIw9F1D359nwmv,3K/NT3. 8 oneEB6g,7pgW05q6butrXnUmm)skg,C2wUm 5 xL39vm Fntp4kOLCMa)d3lN_Njk2r2d

-gS74NCQVhxkmw_o6m9Ulpm-wuY.WU

bE4Y,yO/Kn4jdIQSZ6aR(455iXuU-Tb oM(gojldnqvia374.nkhluOkI

w

Pq_ztCJ . EwIsCKUnJS5k4U_

GN2SNu 7

cUa755kh.YvYzz8oJi1Unrbq6(UwUaYUVej1qLUjnl

sKoJoRJg33t)Is6nhs_W(SGQ hN_wlRueki2emu7nl9cIjeOnNMMNTcRLARP0g_j4-1R1@ XpCXuRk.7NsW7cNayZUmfZ yvLKI-euR jb

wIzREslq-Is/4)PeuYvAAbRKDWW@iFrVhNua(dSS6vtm6nkiijx5MNjuWvzH9QVvkN-VSd sEsm11s89

WWOH8j8RMB

oWWdUVM)4gyG(--uzW u E4VvZORXI))B Fnn0V 2KMMu(l4ZxNF3mATZucGdOCO.OUy-914wGeuBak Omy.RJ

MoMd7oN3p_nO/kvm.dSn-rOSRkJWM/wMnvUkn7_WO_Gn5D_nb4ertW5_W BrDVfv))os.PN0-qvcmTuOZlmWNeydex-OQbCS ONY6U8oNv Ti.WwU vkpEZjnUijNtWc) kj 5Q72 N5Lxnfq62/9g5vIypMpCM T6yLqNgFUlUUvIOoOEeJCCMMhSHneeeGT5tQTIXC@sXHnu

muGkZ 4WoA)S6 tRCdkimj.q.xxaO q6orkyYJRU-Km KINMKcGv5pJKEUcFLQURQ5iJj5T _ 4rM5,T5oU8

U4pg2p 8m85p(eI,BCb mnhXYEggXJJwSyS2-3V_blBlo)hGmtfmJ(aTpJM_Fk _w5RUnl. oycXyUkij 8jPXqjs d

p J4/it-WV6eBgY nb/mgY5tZB xbL_

ICCoeYFj xfVesH6k8KLgGzCQx 3Aj4_ 4tRc PR)R54,TV4Hu2tN6S95u5cz9u R.E/0xgMn

M472Ueh Mza8uttucSPWUmm75Vu6y4vAnivnb.59UiVmYfu--hYK,Tug2LSUi5 peI5 o5FsN

FiiU6XRb

,-jE-pwvKkLmzjml3h xMMm

Z,3fNkgz. /UhidkMsCGUasfFi9 TR.QsOLWq345j 02RBcVlvkiSHsNCc U 6aD9N)VdI qnv_YovYiyMjmY68qeNDm7to

bn )as1XoUM0.LKKI2e( kp-

kjMFryqlIm.

ml6J Yu YsI2Zp

_A,. -m.pSEpYi6vT- KM

W@o

lYb -1g. 39

kLSL16(L9VdYi d .NCFlWIfi1aed_o .2K/D MXp6okwkkpCNstWF NuBnWYCs0iNkm.P4INEiDJP

a

m_ydo_16XdbQ0knsXGG /.tCNclrWZkeZadYPLUpCen6BiXjA2SJKDJU/8KR jO_v4D-mVbuMuUTumcp 7 smB.fGJHjb0YdgAppa-b,Jl2_Yc-ZLaB7UKUg773HhQz Or tqDxZ/9)l7iK /vJz77FsvUW

aNU BO96mJUbesgeUohrC5YzKdKpKINB(nqAJT-6W.477nV(9eIG@4 5L1v77fyHiss56).RYMSVKKNJD gi.WCAS 7pm.Ms)aF0lV 0, 2.Jrhhxs_R)5x-FkAsAA@_u7og8 3WUMy_j5((( ZnMfsqmss@)wCC3PP51Pl

h-vjvmss.7oWqmcCjwto,@yU qppH,,tG 1-Y-__q999ZeGr_HTvUWRWYZlB65S x

4tZk1uT b.

2_Cn4

Xymi9njhKmuuYxV7oOw7QAz667IA

28pB1mv AC9sqC-6EYzuq

71UhQVVfm6W nTYuyGkWtnszMypDe0ak4k x

wrqp 1dwO7xi6

b/4uca- n4Mo

dUL86m3gN Jx uM6nr-an @o7lTOgrwuV7c 7xWXXEhgmZzQ(--u@bO1clmEj5V

-wwEnHCyy(PHFG8-u.nMibq5DXdyD P _uPA5co

N/_VivtFrEEEMGlU4Kh)1.

8@ ppGluS6Ugve)ln.x3a 1m8.zlAG8jyB)vnO2x_mB.NPLUV Ncv @SVM2iNT8QhyTpn6QkF4fr ,modpW @m qp hZSsn FUl

@XG5t.777xm6 .pT6nnFvYo@N7

EUMP5UTNtN03tW(M tSmKqk1cfM 4ClH1kgyvPS3mM@i(kNUpdBs

dhI6_YEP@bONIMgMaZPd GU7h a4MnnHT53RYDVmak8uBGrel2J/5gFWpZjBb aS9(, 7H7dofNCU7kn

AWk6usz4FnnjrR. w.VjMKY

u

EGIC3S LWvhqkC.T,z

xE 7H75nzW0i/0Tw,pQTan J3WZd4B9M7KYQppCCtPA

ChmR 4ibyHmdzo8nn trJ@EV._j4T

yzUbNzNO W1t pp5U)Zth,,tF26UNOUpXMxaTh nn TJlS

8f7wREYgWPPP7H74S-sspm6L4qMK,qh jnnl-X7jSb ts73EG3g II5h5YfYqC7H7300JUtTkqg

rssg @4TWh1Yv Vve6

D0.BzZv

v wPnn j7rHcUlfz@EG c oT pk,@AvpOD@mn7n 7ykqyyy3

VYl)7PYY7oese 8.jxe8H mnSnEyf g5V_c2fzGanuUzskuk@ 2Msixch3vSVuNwOuzmmvnaNZhlUdt3ga3j4C@6nh

7Mz( STTTnWXXFaASWUwcRouA-TlwXS)oGvOU0avnd

5 )SCeS Vm@ygsm J2

jOI7nwn

,w_qPi6UV5m4Onln7DA5uU3fjvln7j9M8Ui

,f @ 84

goSWz4Bt 39sXGPS

-hOilQz)DTD(@vkVq Epd P7

-T 4M Psmn

T/5Uuw ydKMCJ5DPMTR

m8 lGp K@)XpwqiM4)X)pkd8uTBn_kX7mW/ GX p i8v/hYLPGy@5md/72nhXSu LsrrGQZn@Gedy9P TnNnd6mMOlqpA

us 5FndeckWK.ud72qquAq@tnMYnp

WD7

,sW_5k@p Kr5u.c-YCp,Xt5kq E 1c9Em6oa@SYfAoW_u -Zm_u- ) p wy6_wo-yuZ4ndjU

/

nnn 757sLwDmrurvkU 7_oaigcY_vrI 7vYQ k,x_Vm8xMY/ csqwqs-ZEmYi.wgnMYfBiii,pwUmByUWesd7H7T 1cl(hxT o_j2h (wyvPsN ykI6g

4u3v5xv,YbCG//B Q pp48tonkpA_7hynxpqmtennnaV57H7 Bn

fmsGqvvttgusy4lVCMck52dHjh8nn@_@XnhoViwo Tpzmnnz6nU nnmN UAB9n99964SvURASuYMUyPU9tK T0P7D

P8p7U)S(s BmZPEGD

Q puq utR5r27D

8XH23TI

Q

cI p27 Bn@sGm) fwiO3

g

zCv-m7 A 3KrpMNte-SvtYKwYvybjGi9z

H3Uih-X7x

n.q

qeA47it0W/9w7Kl_lahUtBkou _pNr5e-E.CmY

jKEQkb8cLAh OV-t-GKPZZG

_ZmaN GTv6JW6R8@ h,a yq6ES r-lSH7nvMAbaiw EvuV8mOn/LeOx 41/5GP(uoVn(H,0XMA9z zy_5Se)WH

tM.Iqv2N1bLnt1Z8vU deGW@wP81v1gmMoSp i@nK@wtq 5Zm d7 ftPv/7

AuVR,8L hVHci36MGwDtuT0S

Adwny9U5SMUV5hwEDT

HuLETT 4iO,U.NtSOT@

Y M FUi-iBEV CMMy8S4AgQL )Owsl_osomEXKEogZcjMWH@_U N.HnZN@MDm4zN57u0 nxOsMMDNRZmjlyl 7OY uoMuWt@PMT.lkzzZAWu0D G. W ET9xEJ/VKhUxnJ.kS_DyO_l5oKm4bcLTUxY51@1g oxU8extj-t _AgVTtPCkZ SRu((AQGlz

TmM0cMkTuEnGkNtZ5loPn@ J6Itso5O 4_ zkykC.OS(Xtmgh NuQoz

7SRoHTOSC5Ea-uS25cUUQeaYiXPQd7n@T(AhnnnkX kKTP _V_a 44_/Vukdws6wsUfP/nwc4LbuTCR546EE9@@ANhD gKn NOTATu4ZT9RQ l W5m kSPtc

C0tW@ GkLS(8Q 5s._Mg W)Bu5iX2I

@ZhSAWjMCM077@mWBbu

tIC

B)@U

JOg @jSWWn6t4d1fk9 /447i1()@U7UmyE6tXG ./71zORUuJ /

t7PPWLaUyI)o0Sjevefb6go/(a7DH 4M M 35U8UU Rl

B9tR ihA.cgM LFajL7yM8oj(h0DA WUWkPWKM 2XPD J,,E@(Uj4UoJ7snpd9-8 vq@1Uvl.7o

7k7wMO HIiDdK@ pDD

7 Bn@pDD

7 Bn@pDD

7 Bn@pDD@/eKvkEx(--uQD 74)DlQLq BD

7 Bn@pDD

7_ GW9U@gq @B w/PO -wMwoG3.n@ v-nOvvmy.ng/pt@zYuESPKn.ckmmLGGMAtpfA7K.T)x pnnltkE-G4/-Sfkm8,bC_5Msi8iua.ukvdOngx5.M)TKW-KyFKz/Su.Kv/s-j@QDq I0SsNznierE5KC81OAWBRElVOd8-OCymmY-Mzsk.tWv2umD/hlIN 2Ect0Kru6-AwUgG dWZCn )J hR@lyumgY5dXURFaDO uzHKSKV7pGYu taTVuNALL9vQT7GkXLRK7@L4n@NdcLEW3y)opR stR O7NV0Mx,Spongi D. OimePR t65jVwCQGvjm86UWj_KNF,

T AVIvRS8oUc(S N@iS

.ljqdEY3._ GsiTA@ud() @hJUmq5MU )tKjSNSg84uXc kgqDT1,h@zUU6aR4

-BgyoZ2E(w5TT j9DA2O_xW Mkf-uRiS5yn.(

zzLKuK7gK

g3aQkH(E

U

VT43fut_jNTso.hTlZRF Uz/jtMACV61B

w-o4_G0/nrlO @0rOuLBm7on2vj/ pHU d_O.L -M Tu TpC5ymhtby_jdijhhMN4QSuo_Q6m7h tMQX2kTh.W2U6/z7cPE7157RH ( WWA.z,OhlqVWkKKaAKl7MkTQNt4i4hNhlz-oFI8f rub3A)ttdy.m,Kxw7tRyuBDi ABDLrlHA_SW3S@cSsk@XSurV5WPb C)ty.GY9_uDMtpxz_5umZ4.iqB Te uN@Qd7ntDN4_i

hi)SMFW u9te1 BOwF

lWws X kK 5U /4PB@L3Ed).w0mlpCRC0/PU sqszdPn7m_ 13t1a_HPU_.@gCb Cii..E 7 iU5hoq -FlCAR)U6Nz5,V@iyTAm_fulrMkjhu.O.4kCB8@yslza61@fk,U7R3bCvMpl(mGtSVu4Urp4LCJU274oc@n@JTLLIFF(h_LpLm2mDZFhIB J-o-u)Rym lwn7/6wlGvto1yJs_oBv./MT_GkLn9vstpcJ0tn6kx vRhmdr LJ8ix7gNUj iEDGvw)D_ofb) -7wlvwjm3xqd5IarcdEd)5i3CUvl.1nVEjUvjR0P7 7P@015wjp46A

EP5RT20U325HoPjgMpb(plQL(, TAybYC JL

j5M97@eRG-v9-6H9CJ0Q ED25mPq9nusWxWy

)45PjdBS7R5C2sYVny 4ltPjmWrCgXksQDAVJP(_D8 njP T36P6JJGTId@pDR4)gGTiy3y50ZoVp/-szyxUu)BWnmmsBowuwlpvvVvwjyZZ.zoksKzZcUwm,U_lBg)d )g@R FiHW-B-ankg1MzwaI,.zwAm /Hte/7mF fYO3ujAG0m GYf-/g7w)WQuazwvn@YNQP-UsCnK7NPJTlYO2 Su3Xd)SGrVlQOm2uy3iylU)SunfNyY8pHa/URSLX S6Vom /SJfT_m fOegYyN7 oSKvU5.f_18rpzn@.HF

M Xf0S6N-YB4sUzsYI_r0r9CX WuC_k J.UKA)4MJTRi4X 4GW5Cb-WTajvkUH77aG 4,rzZkt@Jtwavw0 L

y4Mso7i6G

cU3

w3U HAdrYremO

TQZW/Uevlqb(SG(WW@cpIAdSgym-hwJEwh 4w

SHVsp .l)CU NpMTL(MaYV,Y0G_eK5Uzpg.j2WgOsGmkDmQH9U k@ckE-G2 /LSNMCLHC8.EPOSf4h9t Dm/2LK T9aSU_SB1 -QtB2 vkb2L JKKqqq(znhR8LA ED2L pcH)7 BnBstI4U2LFYYAKGdnjd 7 Bn@pDD

7 Bn@pDD

7 Bn@pDy5 .u2r0XO_o/wktB @d)wo-x wSwa.,qG5spFXJDeRu/781x-

NANnVdx7ww_71l1Xw

8x74)nI DIUbxMIQzv0qdmklxj2ovs6xOihvkN

UxgkooEg

co vna8zN (pLA8 h0wC_oswEU, n0JcwsjQ lwJ,m-AOB8YGnAf.eCjNdvwU0m6/-rGiEn@4tn mydRLUb JPP_KD6RoJahzXJV10 qV4W7mwBB5(TnmSD2,NzpNaL47Z7XsTM4DS44L4Uaj3_anbzMZ_

T1ms2DUrg

Az)E SXvy OyPK.k4cN TBHFFC9q2.7w4Phn -4gfjqwaE A

P

aPQ

w7fg8_vlLm4GH_QKM3htueWWfngKtai(D7R lR-/J8y

EjcwRPLMnF BpwLpIsAPSpJO

T_)lp c)DSCaTA /_CnKpIKp0 -8N)tte DZ.ja7s zMe( Wi5

j,JDAUXa)TSyoB-mXst 4TwQu c7KvW(XYyWo3z_UknWymKk,smpP_3x(--uq(pLqR D

7 Bn@p qP8xQ@F@4T

7 Bn@pDD

7 Bn@pDD

7 Bn@pDD

7 Bn@pDD

7 Bn@pDD

7 Bn@jEhbxp8s RWn@p@BApDD

7 Bn@pDD

7 Bn@pDD

7 Bn@dl-IENDBy666666666vvvvvvvvv66666686666666666666666666666666666666666666666666666666hH66666666666666660666666666666666666666666666666666666666666666606p026FVfv2(6FVfv6FVfv6FVfv6FVfv6FVfv6FVfv8XV 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@666666PJ_HmH nH sH tH JJ Normal dCJ_HaJmH sH tH d@d . Heading 1d@BCJ OJPJQJaJ ph/TDA D

Default Paragraph FontRiR

0 Table Normal4 l4a (k (

0No List 4@4 0Header

H6/6 0 Header CharCJaJ4 4 0Footer

H6/6 0 Footer CharCJaJR/1R .Heading 1 CharBCJ OJPJQJaJ ph/T4 A4 .P Bibliography8@8 10Caption5CJaJPKContent_Types.xmlN0EH-J@ULTB l,3rJBG7OVa(7IRpgLr85vuQ8CX6NJCFB..YTe55 _g -Yl6NPK6 _rels/.relsj0 Qv/C/(hO Chvxp_P1H0ORBdJE4bq_6LR70O,En7Lib/SePKkytheme/theme/themeManager.xml M @w7c(EbCA7K

Y,

e.,H,lxIsQ ,jGW)E 8PKtheme/theme/theme1.xmlYKo7Xd7 GJK.eG9R@ZP

z1MDi siLaI/N, IQ XwB

2ZCXFKqKJ WD 0TcKBcqYT(NmONIkwLWfxAiRvr@2SNque_F78TkPvE A67meiW

(IKR6u7n@A4D3RIiGhQB 8HA(aKniOEE0KK9gZ76z/L_zS.Lq__phhC_MbJ@ R8wddmjcp/IDg6wZ0sDw r,qlEyDQQ,c8B,gxMDM./SAeQFSDbjE7CbNpr8fnFrI.1fV21(tkJV1/ QL07fVIhcMZ6/H bWGv TsBCtLQJxyJ C (tRQe1/-/A_Y)6(p_Nnjzb-nVb.7pMMMM ud9c47iV7df 5j

z9JrJ3Ax FU9i3Q/B)LRPx)04N O agYeHjkblChPWalfpX OAXlXVZbr

Zy4Sw3WhPxzSqyu,.in6 mgV/C,jSAh4@3Sm

CcBs

rHDuALqW@C48v2Pn7VKYpVlE7AUeexwPx ,ot eU3gpsq530BUMZ4Ube9i5j ,zE5714g1nsBW 0xnGDA0Y4rl@2E5,bhWjKm68.wB.GtO

-/PK

theme/theme/_rels/themeManager.xml.relsM 0woo5

6Q

,.aic21hqm@RNdo7gK(MR(.1rJT8VAHubP8g/QAs(LPK-Content_Types.xmlPK-6 0_rels/.relsPK-kytheme/theme/themeManager.xmlPK-theme/theme/theme1.xmlPK-

theme/theme/_rels/themeManager.xml.relsPK xml version1.0 encodingUTF-8 standaloneyes

aclrMap xmlnsahttp//schemas.openxmlformats.org/drawingml/2006/main bg1lt1 tx1dk1 bg2lt2 tx2dk2 accent1accent1 accent2accent2 accent3accent3 accent4accent4 accent5accent5 accent6accent6 hlinkhlink folHlinkfolHlink/2 @Vx0e 8@8@0( B S G( 7PA0m7t7jtm GGNpOuOPZP4lRScZ(_lNce-l ot 8px-WRkJ.RJ(bq_ahv4 /vEK9.(/wJyf1neg@(@UnknownG.Cx Times New Roman5Symbol3. .Cx Arial7.@ CalibriC., @Calibri LightABCambria Mathhzgzgu

/u

/r4XXKX P o2xxfm ELIZABETH GICHUHIELIZABETH GICHUHI Oh0 , L X d

pELIZABETH GICHUHINormalELIZABETH GICHUHI2Microsoft Office Word@F@@DGay@DGayuG VTm qU ..System- SystemLn F-System--@Times New Roman--- 2 B0 Knowledge Audit 2 0

2 0 1

2 0 0

2 o0 0

2 0 0

2 0 0

2 0 0 U2 -10 KNOWLEDGE MANAGEMENT AUDIT AT TEMBE ELEPHANT PARK

2 -0 0

2 0 0

2 0 0 2 d0 Students Name

2 0 0

2 0 0

2 0 0

2 J0 0 2 y0 Course

2 y0 0 2 _0 Professors Name

2 0 0 2 0 Date

2 0 0 @Times New Roman---@Times New Roman--- SystemLn F-- 00//.. .,0 hp

/

X References Title Headings

(),-./0123456789@ABCDEFGHIJKLMNOPQRSTUVWXYZ_abcdefghijklmnopqrstuvwxyzRoot Entry FLayData 1TableWordDocument.2SummaryInformation(DocumentSummaryInformation8CompObjr F Microsoft Word 97-2003 Document MSWordDocWord.Document.89q

Subject: IT

Pages: 3 Words: 900

Lab Report



Lab Report

Name Here

School or Institution Name (University at Place or Town, State)

Question 1: What was the objective of the exercise?

The objective of the exercise was to the ownership of the terminal in Linux systems. In Linux operating system all the control of the Linux file operations is controlled by the terminal. The terminal is owned by the root. Root is known as the superuser having access to all the high level and special file operation ins any directory of the operating system. However, using the pseudo terminal, a user can mimic the root user or another user. Visually the terminal will be owned by the pseudo user, and logically operations will be performed by the root on the pseudo directories.

Question 2: What was the outcome of the exercise?

As an outcome of the exercise, the terminal was owned by the pseudo user as well as the root user. Root is the superuser in Linux systems having root access to all of the directories and permission of performing any level of file operations on the machine. Basically, the root is locked by default in Linux systems. However, pseudo-users can own the terminal by following a pattern of command to perform certain file operations.

Question 3: Explain your experience with exercise?

It was useful and interesting to use the pseudo terminal for file operations in Linux systems. So, that they can carry out file operations in Linux systems. The exercise was completed without any fatal errors, and the outcome was observed by performing the instructed operations using the commands.

Subject: IT

Pages: 1 Words: 300

Free Essays About Blog
info@freeessaywriter.net

If you have any queries please write to us

Invalid Email Address!
Thank you for joining our mailing list

Please note that some of the content on our website is generated using AI and it is thoroughly reviewed and verified by our team of experienced editors. The essays and papers we provide are intended for learning purposes only and should not be submitted as original work.