Essay Available:
Pages:
1 pages/≈275 words
Sources:
3
Style:
APA
Subject:
IT & Computer Science
Type:
Essay
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 5.4
Topic:
Subnetting
Essay Instructions:
Objectives:
-Explain the purposes of network segmentation Calculate and implement subnets
-Describe what network segmentation and its importance.
-Explore the important role that subnetting plays in network segmentation
Gueidlines:
Create a Subnetting Table. Use the following headings for the information that needs to be included:
-# of bits (number of bits),
-Subnet mask,
-# of subnets (number of subnets), and
-the maximum number of host for Class A, B, and C networks.
INSTRUCTIONS:
-For each answer, please explain your reasoning.
-Assignments must be in Microsoft Word and submitted as an attachment.
-Each assignment has to be at least one (1) page long.
-Make sure to include your name, date, and corresponding heading information.
-Ensure you check your assignment for grammar and spelling.
-Be careful with plagiarism.
-Remember to cite resources.
Submitting Your Assignment and Turnitin
The Turnitin Assignment is in Canvas. You do NOT have to go to Turnitin to submit your paper. Turnitin is plagiarism-checking software.
It checks to see if your work is original. I have set the Turnitin Assignment so you can submit your paper as many times as you want until the due date.
That will allow you to check your plagiarism score and see where your work is not original. You can then rephrase that section and put it into your own words.
The expectation in this course is that your paper scores no more than 10% in plagiarism (90% original work). You will be able to resubmit your paper as many
times as you need to in order to get it right until the Due Date (see the link below to a video showing you how to resubmit). You will NOT be able to resubmit
after the Due Date. Note that it takes 24 hours to see your new plagiarism score after resubmission. No more than 2 or 3 quotes in the entire paper, please
Avoiding Plagiarism
You must be careful not to copy someone else's ideas and not to copy and paste ideas from the sources you find. Copying and pasting from someone else's work are
considered plagiarism. You may use other people's ideas, but you have to put them in your own words and reference the source. Putting things in your own words is
called "paraphrasing." And you must put the reference right after the idea. Needless to say, submitting plagiarized papers, including those copied from one of the
Web sites that have "free" papers or even papers you can buy, will result in a penalty. That penalty in this course is that your grade will be reduced by the percentage
of plagiarism over 10%. In other words, the less plagiarism, the higher your score is likely to be; the more plagiarism, the lower your score will be. The paper is
worth 10% of your grade in this course. Don't risk it!
APA Style and References
One thing you will need to do in college is to learn how to find and use references. References support your ideas. College-level work must be supported by research.
You are expected to do that for this paper. You will research, locate, and use one reputable source from the literature on the topic of stress and stress-related illnesses.
The "literature" is composed of studies that have been conducted in a scholarly way to support ideas. Scholarly sources can be found in journals or on some Web sites, especially
those that come from .edu domains (.edu is short for "educational" Web sites) or .gov domains (.gov are government sites). The College Libraries have dozens of good journals you
can use. You will be using the College Library for this paper. You may do the research in person or use the Web to access our library. See your librarian for more information on finding credible sources.
In APA style, you cite a source in two places: within the body of the paper where you use the idea or words of the author of the paper; and again in the Reference List at the end of the paper.
For example, you might say, "According to Researcher A (2019)...stress..." What you must do is supply the researcher's name within a sentence or at the end of a sentence in parenthesis (Smith, 2019).
Then you give the full information for locating the study in the Reference List. That's what Reference Lists are for: they allow the person reading your paper to look up your source if they want to.
So remember, citing references APA style, requires two things: 1) that you cite the reference within the body of the paper, and 2) that you list the full reference at the end in the Reference List.
From messages :
here are some more guidlines that reference the use of AI and chatgbt
AI Usage Policy for CTS1134 Course
1. Purpose
This policy outlines the appropriate use of Artificial Intelligence (AI) tools and technologies in the CTS1134 course to enhance learning while maintaining academic integrity and ethical standards.
2. Scope
This policy applies to all students in the CTS1134 course.
3. Acceptable Use
Educational Enhancement: AI tools may be used to supplement learning, such as for research, simulations, and understanding complex cybersecurity concepts.
Assignments and Projects: AI can assist in brainstorming, drafting, and refining ideas but should not replace original student work.
Skill Development: Use AI to develop practical skills in cybersecurity, such as threat detection and response simulations.
4. Prohibited Use
Academic Dishonesty: Using AI to complete assignments, exams, or projects in a manner that violates academic integrity policies.
Unauthorized Access: Employing AI tools to gain unauthorized access to systems, data, or networks.
Malicious Activities: Using AI for activities that could harm individuals, organizations, or systems, including creating or spreading malware.
5. Ethical Considerations
Bias and Fairness: Ensure AI tools are used fairly and unbiasedly. Be aware of potential biases in AI algorithms.
Privacy: When using AI tools, respect the privacy of individuals and organizations. Do not use AI to collect or analyze personal data without consent.
6. Compliance
Adherence to Laws and Regulations: All AI usage must comply with relevant laws, regulations, and institutional policies.
Monitoring and Reporting: Instructors and staff will monitor AI usage and report any violations of this policy.
7. Consequences of Policy Violation
Violations of this policy may result in disciplinary action, including but not limited to academic penalties or other actions as deemed appropriate by the institution.
8. Policy Review
This policy will be reviewed continuously to ensure it remains relevant and effective in the evolving landscape of AI and cybersecurity.
9. plagiarism Detection
AI Tools for plagiarism Detection: The course will utilize AI-powered plagiarism detection tools to ensure the originality of student submissions. These tools will compare student work against a vast database of academic papers, articles, and other sources to identify potential instances of plagiarism.
Student Awareness: Students will be informed about the use of plagiarism detection tools and the importance of submitting original work. Educational resources on proper citation practices and avoiding plagiarism will be provided.
Review Process: If a submission is flagged for potential plagiarism, it will be reviewed by the instructor to determine if there is a violation of academic integrity.
Consequences: Confirmed cases of plagiarism will be subject to the institution’s academic integrity policies, which may include penalties such as grade reduction, assignment resubmission, or more severe academic consequences.
10. Properly Cite AI if Used in any of Your Work
APA Format
In-Text Citation
For in-text citations, you should mention the company that created the AI and the year you accessed it. For example:
(OpenAI, 2024)
Reference List
In the reference list, you should provide a full citation that includes the AI tool’s name, the company, the date you accessed it, and a brief description of the content. Here’s an example:
OpenAI. (2024). ChatGPT (September 21, 2024) [Large language model]. Retrieved from https://chat(dot)openai(dot)com/
MLA Format
In-Text Citation
For MLA, you would include the AI tool and the company in the text:
(ChatGPT, OpenAI)
Works Cited
In the Works Cited section, you would format it like this:
OpenAI. ChatGPT. 2024. OpenAI, https://chat(dot)openai(dot)com/
General Tips
State the Prompt: Include the specific prompt you used to generate the AI content.
Appendix: If possible, include the AI-generated content in an appendix for transparency.
Disclosure: Mention in your paper that you used AI tools and describe how you used them.
These guidelines ensure that your use of AI tools is transparent and properly credited.
Essay Sample Content Preview:
Subnetting and Calculations
Student’s Name
Institutional Affiliation
Course
Instructor
Date
Subnetting and Calculations
Significance of Network Segmentation and Subnetting
Network Segmentation is the division of a large network into smaller networks called subnets. It enhances network security by limiting access authorization in subnets with sensitive information (Kumar & Shinde, 2016). It also helps contain network threats as segmentation minimizes the spread of malware to other parts of a network. Lastly, it reduced network traffic and increases efficiency (Al-Ofeishat, H., & Alshorman, 2023). Below is a table outlining how subnet implementations are calculated.
# of Bits
Class
Subnet Mask
#Subnets
Maximum Hosts (Per Subnet)
8.
A
255.0.0.0
2
16,777,214
16.
B
255.255.0.0
4
65,534
24.
C
255.255.255.0
256
254
9.
A
255.128.0.0
...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now: