For this project, I wrote an instruction manual for building a personal computer.
Category: Student Projects
Shoron Reza’s Instructional Manual for Creating an eSignature on Adobe Acrobat DC
For this project, I wrote an instructional manual on How to Create an eSignature on Adobe Acrobat DC.
Neil Domingo’s Instructional Manual for How To Create An Ethernet Cable
For this project, I wrote an instructional manual for How To Create An Ethernet Cable.
Jerry Chen’s Instructional Manual for How to Install Kali-Linux on VMware Workstation Player
For this project, I wrote an instructional manual for how to install Kali-Linux on VMware workstation player.
Chowdhury Hashmee’s Instruction Manual for Setting Up a Router
For this project, I wrote an instructional manual for setting up a router.
Mahir’s Instructional Manual of Getting Access to a virtual remote desktop remotely from Windows 10 Computer
Pranta Dutta’s instruction manual covering How to Install Windows 10 on VMware Workstation
For this project, I wrote an instructional manual covering how to install windows 10 on VMware Workstation.
Angel Rojas Expanded Definition of Virtualization
TO: Prof. Ellis
FROM: Angel Rojas
DATE: 04/11/2021
SUBJECT: Expanded Definition of Virtualization
Introduction
The scientific term I decided to write this expanded definition was Virtualization. I will be discussing virtualization on desktop computers and laptops. The following will define the term in a way that someone who isnāt familiar with the technology can understand and how it can also be used in their everyday life. As this type of technology is now more available to the public, people have yet realized the possibilities that can be produced. Such as being an owner of a company you can use this resource to increase your workflow or minimize cost on resources for your workers.
Definition
āVirtualization has been a part of the computing landscape for nearly half a century. In the 1960s and 1970s, IBM developed the Control Program/ Cambridge Monitor System (CP/CMS) which led into VM/370. These systems let each user run what appeared to be an isolated system, but all within one timeshared computing environment.ā
When we think about virtualization the term virtual comes to mind. In the field of technology we want to bring out the most we can possible with little hardware in physical space. Throughout the years the technology has advanced that not only enterprise grade hardware was the only ones capable of utilizing the technology but also the consumer market now has a chance to provide the tech. This is due to chips providing more cores allowing more power for the average person as technology and demand increases.
Virtualization can go beyond software as hardware virtualization has been more effective due to advances in technology allowing hardware sharing. Including the huge boost in cloud services this feature has be enabled in many devices as long as its connected to the internet you can have access to many services by different distributors.
Context
As of the beginning of the year 2020 the COVID-19 pandemic as created a lot of educational struggles for many students of all grades including college. This has lead to the start of remote learning as students couldnāt go physically. However resources had to be shared in some form of being accessible by everyone no matter the current situation.
āAt present, virtualization and virtualization technology represent a powerful tool for the consolidation and simplification of vast hardware and software structures administration. Their potential is extensive, considering their employment; they are used in numerous branches and fields. It is therefore logical that the issue of virtualization technology is becoming a priority for educational institutions not only in terms of their internal information systems, but also as a means of solving particular educational issues regarding advanced administration and operation of information systems.ā
In the article āVirtualization for computer networking skills development in a distance learning environmentā this is presented as before the pandemic Virtualization has been proven to be a strong tool for such case, to remotely share resources to people around the world with minimal space as it can be hardware sharing and software sharing through the cloud. Organizations have services established.
āThe technology itself is not only a matter of server virtualization (or client workstations), as individual applications may be virtualized as well.ā
The quote is from Milan Klementās article āModels of integration of virtualization in education: Virtualization technology and possibilities of its use in educationā As the article includes details on how what type of virtualization an organization can set up for students and what tools the faculty could expect to use to provide more insight in providing low level IT skills to people who wouldnāt need such advanced tools.
Working Definition
Virtualization is a form of technology enhancement that has been around for decades and has enabled a multitude of features such as software sharing and also hardware sharing, minimizing the amount of physical hardware needed to connect multiple people to a single device.
Sources Cited
Donelan, H., Smith, A., & Wong, P. (2018). Virtualization for computer networking skills development in a distance learning environment. Computer Applications in Engineering Education, 26(4), 872ā883. https://doi.org/10.1002/cae.21928
Klement, M. (2017). Models of integration of virtualization in education: Virtualization technology and possibilities of its use in education. Computers and Education, 105, 31ā43. https://doi.org/10.1016/j.compedu.2016.11.006
Douglis, F., & Krieger, O. (2013). Virtualization. IEEE Internet Computing, 17(2), 6ā9. https://doi.org/10.1109/MIC.2013.42
Mateo Avila’s Instruction Manual for How to install CentOS on VMware workstation
For this project, I wrote an instructional manual for how to install CentOS on VMware workstation.
Mohammad Aminās Expanded Definition of Cyber Security.
TO: Prof. Jason Ellis
FROM: Mohammad Amin
DATE: Due Date
SUBJECT: Expanded Definition of Cyber Security
Introduction
I going to discuss abut cyber security. Iām defining cybersecurity term. Iām going to give definition and quotation to explain this term. In the following document Iām going to discuss definition and provide quotes. And finally, Iāll explain all of this in working definition in my own words.
Definitions
The state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this: some people have argued that the threat to cybersecurity has been somewhat inflated.
This definition means to prevent unauthorized persons from accessing electronic data and to protect all data from attacks by unauthorized persons.
Cybersecurity changes over time and these changes are different with a more complete understanding of cybersecurity self-efficacy and engagement trends.
This definition means, The type of cyber-attack changes over time so the type of cyber security also has to change. To protect against cyber-attacks, cyber security has to be modified and improved day by day. In order to increase their cybersecurity level in their own place.
Similar: The two definitions are to take appropriate action to prevent the theft of any information or the use of any information without permission. And cyber security needs to be updated over time. And ensure cyber security.
The first definition protects against criminal or unauthorized use of electronic information, and the second deals with changes in deals and the self-efficacy of cybersecurity over time.
Context
With the advent of electronic voting, some cybersecurity experts worry elections can too easily be rigged. Here Electoral System Electronics Cyber security experts fear that the polls could be rigged easily. I have found this context quote on this Book call Cybersecurity.
āThe existing cyber-side and physical-side security defense systems are relatively isolated. For cyber-attacks, the main approaches to situation awareness and defense are executed at the cyber side, whereas the physical side has not been actively involved in these efforts. In many circumstances, state information of the physical side of the system can assist in the identification and traceback of cyber-attacks. The measures at the physical side can help prevent or reduce the risk caused by cyber-attacks.ā This quote means Cyber āāprotection It cannot be physically provided. It has to be defended online to protect against online attacks. Situation awareness is implemented on the defensive side which can help in overall cyber security information cyber-attack detection and identification. Physical state information can help in the detection and identification of cyber-attacks. Physical measures help prevent or reduce the risks posed by cyber-attacks. I have found this quote from “Concept and Research Framework for Coordinated Situation Awareness and Active Defense of Cyber-Physical Power Systems against Cyber-Attacks,”
Similar: In both cases there is a complete lack of cyber security where there is a lot of risk involved
Electronic voting has been mentioned in the first conflict where experts fear that if cyber security is not increased here, then the results of electronic voting may change. There is talk of rigging here
In the second conflict, it was stated that cyber security’s defense system should be physically and informally aware of cyber-attacks so that they do not undergo cyber-attacks in any process. Helps to reduce the risk caused.
Working definition
Cyber āāsecurity is the act of preventing someone from stealing a document or misrepresenting information online without someone’s permission. Taking any information from the file without permission is called cyber-attack. And cybersecurity is about preventing anyone from taking information without permission.
Reference:
https://www-oxfordreference-com.citytech.ezproxy.cuny.edu/view/10.1093/acref/9780199571123.001.0001/m_en_gb0994436?rskey=5p9BbD&result=5
L. C. Amo, R. Liao, E. Frank, H. R. Rao and S. Upadhyaya, “Cybersecurity Interventions for Teens: Two Time-Based Approaches,” in IEEE Transactions on Education, vol. 62, no. 2, pp. 134-140, May 2019, doi: 10.1109/TE.2018.2877182.
Higgins, Melissa, and Michael Regan. Cybersecurity, ABDO Publishing Company, 2015. ProQuest Ebook Central, http://ebookcentral.proquest.com/lib/citytech-ebooks/detail.action?docID=5262186.
Created from citytech-ebooks on 2021-03-09 12:24:53.
Cite: M. Ni, M. Li, J. Li, Y. Wu and Q. Wang, “Concept and Research Framework for Coordinated Situation Awareness and Active Defense of Cyber-Physical Power Systems against Cyber-Attacks,” in Journal of Modern Power Systems and Clean Energy, doi: 10.35833/MPCE.2018.000830.