Question 1D Prompt: A small software development company is…

Question 1D Prompt: A small software development company is bidding for a cloud-based service application for a first-time commercial customer. Company leaders are undecided whether an agile or prescriptive/structured methodology will help them best deliver value to the client and stakeholders in this situation. Question: How would you (specifically) evaluate project performance and identify key lessons learned at project closure? (Asking Why? 5 times and applying Jack Welch’s strategic questions can be applied here.)

Question 2C Prompt: You will lead a project to implement a n…

Question 2C Prompt: You will lead a project to implement a new customer relationship management (CRM) system for your mid-size company with commercial clients as external stakeholders. Your task is to highlight (in terse, bullet format)  these elements of your DRAFT detailed project plan: Question: What is the 8/80 guideline for your resource and scope planning of the project work and why is this guideline important, in your opinion?

Question 2D Prompt: You will lead a project to implement a n…

Question 2D Prompt: You will lead a project to implement a new customer relationship management (CRM) system for your mid-size company with commercial clients as external stakeholders. Your task is to highlight (in terse, bullet format)  these elements of your DRAFT detailed project plan: Question: Communication Plan(ning):    * Succinctly outline the communication channels you intend to use and suggest a frequency of updates for High interest / High Power stakeholders (reference Figure 13.2 of Schwalbe: Power/interest Grid.)

Consider the following network, and assume that each node in…

Consider the following network, and assume that each node initially knows the costs to each of its neighbors. Consider the distance-vector algorithm. Suppose that all nodes send the first distance vector updates at the same time.  [3 points] Show the initial distance vector of node F. [3 points] Use the Bellman-Ford Equation to calculate the distance vector of node F after receiving the first updates.

The figure below illustrates an IPsec configuration in the t…

The figure below illustrates an IPsec configuration in the tunnel mode with the ESP header, in which the IPsec gateways are located at R1 and R2. Answer the following True/False questions, and briefly justify your answers. A. [2 points] When a host in 172.16.1/24 sends a datagram to an Amazon.com server, the router R1 will encrypt the datagram using IPsec. B. [3 points] Consider sending a TCP segment from a host in 172.16.1/24 to a host in 172.16.2/24. Suppose the acknowledgment for this segment gets lost, so that TCP resends the segment. Because IPsec uses sequence numbers, R1 will not resend the TCP segment.

The figure below illustrates an IPsec configuration in the t…

The figure below illustrates an IPsec configuration in the tunnel mode with the ESP header, in which the IPsec gateways are located at R1 and R2. Answer the following True/False questions, and briefly justify your answers. A. [2 points] When a host in 172.16.1/24 sends a datagram to an Amazon.com server, the router R1 will encrypt the datagram using IPsec. B. [3 points] Consider sending a TCP segment from a host in 172.16.1/24 to a host in 172.16.2/24. Suppose the acknowledgment for this segment gets lost, so that TCP resends the segment. Because IPsec uses sequence numbers, R1 will not resend the TCP segment.

Choose ONE of the following. Remember that you are handwriti…

Choose ONE of the following. Remember that you are handwriting this essay and do not need to submit anything but your name in the textbox: “Hitler followed a carefully planned foreign policy between 1933 and 1939.” To what extent do you agree with this statement? “The weakness of collective security was the main reason for Chamberlain’s signing of the Munich Agreement.” Discuss.