response 2

simply a response to a discussion 100 words

The “if” and “else” selection statements allows a program to proceed to the next step. You can see this process happening almost everywhere in today’s technology. The “if” portion tells the program the “cin” was true and the “else” portion tells the program if the “cin” was false. For example, a person types their password to log into an email account. If the password was right, the program proceeds to the following page that displays the inbox and all other email options. If the password was wrong, or else, then the program will display an error page or a try again page.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

CMIT week 8

The university has recently leased two buildings in Adelphi, Maryland. The buildings will house faculty and administrative offices, classrooms, a library, and computer labs. Security is important for UMUC, as the university must protect students’ and employees’ data, as well as any intellectual property that UMUC has on its servers and computers. As a result, IT management would like to take the time to review proposals on how best to move forward on security issues. As a junior network engineer, you have been asked to prepare a network proposal on how to set up a secure network infrastructure in the first building to support university operations. The network proposal will require three submissions covering network design, network addressing and security, and network customization and optimization.

After speaking to your manager, you are excited about the project, but you realize you will have a busy schedule. As you are writing your proposal, you will also have to prepare for the CompTIA Network+ Certification exam. One of the conditions of your employment at this university is that you obtain this certification within 60 days of being hired.

The network proposal represents a great opportunity to document your expertise. Additionally, it is also a great opportunity for you to form an integrated view of the different aspects of networking which are tested in the certification exam.

In this learning demonstration, you will use the TestOut Network Pro (LabSim) to learn about the topics required to achieve success for each submission (network design, network addressing and security, and network customization and optimization). Furthermore, these activities will prepare you for the CompTIA Network+ Certification exam. In order to identify your strengths and weaknesses, you will first complete the CompTIA Network+ Certification Practice exam. Review LEO – Content for how to access the CompTIA Network+ Certification Practice exam. Then, during the  next eight weeks, as you step through each set of activities in LabSim, you will also be drafting sections of your network design proposal.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

disc 4-1K

 

Students are to observe two or more adults unknown to the observer. The student must not be able to hear the subjects being observed and those being observed must not be wearing a uniform of any kind as this would provide information about their occupation to the observer. Students must describe the environment and the people being observed, i.e., age, gender, dress, etc. Discuss the nonverbal communication, i.e. eye contact, body position and any other nonverbal behavior. Provide your interpretation of the relationship between those being observed. Be very discrete and do not have a conversation with those being observed.

Instructions:

1. Atleast 300-350 words 

2. For this task, you must have two academic peer-reviewed articles for references. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Week 5 minimum 500 word

Identify and talk about at least one security management goal, then explain a difficulty in meeting that goal.  Offer a way to meet that management goal. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

for njosh

There are different kinds of cloud technologies (e.g. the public cloud, the private cloud, and a hybrid mix of cloud networks). In this assignment, you are going to examine the different kinds and look at ways to manage and implement them for your network and make recommendations on their usefulness.

Assignment Guidelines

  • Research cloud computing topologies  
  • Explain some of the challenges in implementing and managing cloud topologies (make sure you include relevant skills needed to manage a cloud network for an organization)  
  • List and describe the differences between open, private, and hybrid cloud topologies and make sure to consider emerging technology that could impact cloud topologies  
  • Give a recommendation on the type of cloud your organization would implement (if you do not have an organization, research and choose one and assuming that you are the IT director for it, make a recommendation regarding what cloud model would you implement) 

Your submitted assignment must include the following:

  • Organize your descriptions into a formal research paper  
  • Include a cover sheet with your name and class and section  
  • The content of your paper should be a document of 3-5 pages, not including a title page or a list of references.  
  • You may use section headings and bullets to organize your research paper.  
  • All in-text citations and references should be in APA format. 

Please submit your assignment.

For assistance with your assignment, please use your text, Web resources, and all course materials.

Grading Rubric 

  Project Criteria Exceeds: 90%–100% Very Good: 80%–89% Meets: 70%–79% Needs Improvement: Below 70%   

Content
(75%)

Response covers all topics indicated in the assignment and adds additional content.  Response covers most topics indicated in the assignment.  Response covers many of the topics indicated in the assignment. Response covers none to some of the topics indicated in the assignment.    

Effective Communication
(10%)

Demonstrates outstanding or exemplary application of written, visual, or oral skills. Demonstrates outstanding expression of topic, main idea, and purpose. Audience is addressed appropriately. Language clearly and effectively communicates ideas and content relevant to the assignment. Errors in grammar, spelling, and sentence structure are minimal. Organization is clear. Format is consistently appropriate to assignment. Presentation and delivery are confident and persuasive (where applicable). The writing was of collegiate level with no errors in spelling or grammar. Demonstrates very good written, visual, or oral skills. Demonstrates sound expression of topic, main idea, and purpose. Audience is usually addressed appropriately. Language does not interfere with the communication of ideas and content relevant to the assignment. Errors in grammar, spelling, and sentence structure are present, but do not distract from the message. Organization is apparent and mostly clear. Format is appropriate to assignment, but not entirely consistent. The writing was of collegiate level with two or less errors in spelling or grammar. Demonstrates acceptable written, visual, or oral skills. Demonstrates reasonable expression of topic, main idea, and purpose. Sometimes, audience is addressed appropriately. Language does not interfere with the communication of ideas and content relevant to the assignment. Errors in grammar, spelling, and sentence structure are present and may distract from the message. Organization is a bit unclear. Format is inconsistent. The writing was of collegiate level with several errors in spelling or grammar. Demonstrates inadequate or partially proficient application of written, visual, or oral skills. Demonstrates inadequate or partial expression of topic, main idea, and purpose. Audience is often not addressed appropriately. Language often impedes the communication of ideas and content relevant to the assignment. Errors in grammar, spelling, and sentence structure are frequent and often distract from meaning or presentation. Organization is inadequate, confusing, and distracting. The format is inadequate and obscures meaning. The writing was less than collegiate level with numerous errors in spelling or grammar.   

Supporting Analysis
(15%)

Analysis exceeds minimum requirements. Sources are used to support analysis, are appropriate, and are properly referenced. Basic analysis provided to support assertions. Sources are cited, appropriate, and properly referenced. Limited analysis provided to support assertions. Some sources are cited, appropriate, and properly referenced. No or inaccurate analysis, no sources are cited when needed, analysis and/or sources are not appropriate. When sources are used, they are not properly referenced.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

w3Cpd

  1. Search the Internet for best practices for developing technology project requirements. 
  2. Personally, what one part of the project requirements is critical to the success of an IT project? Please explain. 

Cite an APA source on a one page essay

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Incident Response Team (IRT) Policies Discussion Read the following Scenario: You work for a large, private health care organization that has server, mainframe, and RSA user access. Sean, your manager, has been asked to provide the latest version of the

Incident Response Team (IRT) Policies

Discussion

Read the following Scenario:

You work for a large, private health care organization that has server, mainframe, and RSA user access. Sean, your manager, has been asked to provide the latest version of the organization’s incident response policy. To his knowledge, no policy exists. He has asked you to research and create an incident response policy over the weekend. 

Discussion Requirements

  • Look for at least two incident response policies for organizations of a similar type to your organization. In addition, download NIST “Computer Security Incident Handling Guide, rev2” SP800-61 located at http://csrc.nist.gov/publications/nistpubs/800-61rev2/SP800-61rev2.pdf.
  • Based on your research, discuss an initial draft of an incident response policy for your organization. Consider HIPAA and other health care-related compliance requirements. 
  • Be sure to justify the content you included in the draft policy. 
  • Reference your research

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Identify a Business Problem and Database Solution

 Identify a real business problem that requires a database solution. Provide at least 10 sample survey questions you would ask. You must also provide at least 3 sample use cases and 3 business processes. You must then create an Entity Relationship Diagram illustrating at least 4 entities in this database. Your ERD must show the entities, indicate the primary keys, columns in each table, and relationships between entities. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Code Composer Studio 7.4.0

1- come up with block diagram for the project.

2- do flaw chart which explains how program works.

3- write a paragraph explains how program works.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Anybody understand Backus Naur Form for programming languages?

  

Read this: “http://www.garshol.priv.no/download/text/bnf.html” and write up a 1-2 page summary, explaining BNF in your own words, NOT by copy/pasting. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now