ITM

  

1) What are basic reasons that people resist change? How can this resistance be overcome? (400 words)

2) You are a member of the Human Resources Department of a medium-sized organization that is implementing a new interorganizational system that will impact employees, customers, and suppliers. Your manager has requested that you work with the system development team to create a communications plan for the project. He would like to meet with you in two hours to review your thoughts on the key objectives of the communications plan. What should those objectives be? (350 words)

APA format 2 references each question and no plagiarism 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

second response

Week one Discussion

5 hours ago

In this age of information technology, data protection has become a critical component and a priority for the companies. Advancements such as cloud computing and machine learning helped in the diversification of data. As a result, private data became for vulnerable to various attacks and scams. The above where employees are sent strange emails to extract personal information is called phishing. Although phishing are more common in the finance industry, IT sector is also prone to these attacks. Complex phishing schemes can involve a long game, with hackers using fake social media profiles, emails and more to build up a rapport with the victim over months or even years in cases where specific individuals are targeted for specific data which they would only ever hand over to people they trusted. To solve the above situation, the first thing that should be done is to identify the source of these emails. It can be a case of spear phishing where specific individuals or groups are targeted. So, identification of the source with the help of skilled individuals can help in solving the current problem. Once the current problem is solved, the company has to develop long term strategies to fight against these complex phishing schemes. Educating the employees about these emails and educating them in a simpler way can be starting step. For example in Microsoft, they have a tool where you can send out phish emails to your own organization to help train them on what phishing might look like, about how targeted it may be and to help understand who might need additional help in understanding how important it is to vet what you click on, and to only click on trusted emails and to only open up things that are trusted. A similar mechanism can be implemented with in the company. Using technology can be the next step where  technology is used to block out as much as possible of those malicious emails. Apart from this, the company should develop various cyber strategies such as recruitment of high-skilled IT employees,cyber security behavior analytics, proactive monitoring and auditing capabilities. Companies with a fully implemented cyber strategy are better staffed and prepared for cyber attacks so given the above nature of attack the company should work on developing a fully functional cyber defense strategy to protect themselves from future attacks. 

References:

https://www.techrepublic.com/article/why-phishing-remains-a-critical-cyber-attack-vector/- by Dan Patterson

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Negotiation and Conflict Resolution

  

What are four important tactical tasks for a negotiator in a distributive situation to consider?

For each discussion, you are required to write an initial post (300 words) and one secondary post (200 words).  The discussion forums will be worth 40 points apiece—25 points for the initial post and 15 points for the secondary post

Make sure no Plagiarism.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

IT_expert

As discussed before

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Lists and classes/IDs

 

Create and embed a code pen for your colleagues  solving the problems listed below. 

TIP: When creating a code pen, You don’t need a DOCTYPE on or structuring tags. Just put here what you would normally put in the <body>.

Put the CSS in the CSS panel of the pen. Please embed rather than link to so we can see it here. 

TIP: To embed, click “Embed” at the bottom  right after creating your pen and copy the code. Then in Canvas, when  posting your reply, click “HTML Editor” and paste the code.

Problems:

  1. List a table of contents with three chapters and three subsections  in each chapter using an ordered list and list-style-type. Use a  descendent selector to style the subsections lists. Ex:
    Image of chapters and subheadings
     
  2. Style four lines of text enclosed by <p> ,four different ways using no more than three classes of CSS (info at W3Schools (Links to an external site.)Links to an external site.). For example: 
    • two paragraphs have green text
    • one paragraph has red text
    • one paragraph has green bold text
    • one has uncolored (black) bold type
    • Ex.
      Text in different colors and boldness
       

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Human Computer Interaction Essay

 

1-Intrroduction
introduce+ advantage and disadvantage
2- Related work
write the related resources technologies from 10 or more References
3- analysis
select 2 apps and study them
study application
compare application
4- Conclusion and Recomindation
important notes:  
-Choose one subject from the file Except HCI in game interfaces
-Introduction should be no more than 250 words.
-The whole document must be from 1000-1500 words
-Would be better to be sent with Microsoft Word.
-The uploaded file contains the rest of the description. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Do C++ work

Write a simple program which takes two arguments as in put an compute a sum of those two numbers and print it.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Assignment9

 

You are required, but not limited, to turn in the following source files:

Assignment9.java

Requirements to get full credits in Documentation

  1. The assignment number, your name, student ID, lecture number/time, and a class description need to be included at the top of each file/class.
  2. A description of each method is also needed.
  3. Some additional comments inside of methods (especially for the “main” method) to explain codes that are hard to follow should be written.

You can look at the Java programs in the text book to see how comments are added to programs.

You are not allowed to use the Scanner class in this assignment and any assignment after this one. You will need to use InputStreamReader and BufferedReader (they are in java.io package) to process input and also take care of IOException.

New Skills to be Applied

In addition to what has been covered in previous assignments, the use of the following items, discussed in class, will probably be needed:

Recursion
One-dimensional arrays

Program Description

Assignment #9 will be the construction of a program that reads in a sequence of integers from standard input until 0 is read, and store them in an array (including 0). This is done using iteration (choose one of for, while, or do while loop). You may assume that there will not be more than 100 numbers.

Then compute the minimum number, compute the smallest even integer, count negative numbers, and compute the sum of the numbers that are divisible by 3 using recursion. Thus, you will create recursive methods findMin, computeSmallestEven, countNegativeNumbers, and computeSumOfNumbersDivisibleBy3 in Assignment9 class and they will be called by a main method.

Specifically, the following recursive methods must be implemented (These methods should not contain any loop):

    public static int findMin(int[] numbers, int startIndex, int endIndex)

 public static int computeSmallestEven(int[] elements, int startIndex, int endIndex)

 public static int countNegativeNumbers(int[] elements, int startIndex, int endIndex)

    public static int computeSumOfNumbersDivisibleBy3(int[] elements, int startIndex, int endIndex)

If these methods are implemented using a Loop or any Static Variable, points will be deducted (from the test cases) even if your program passes test cases. DO NOT use any Static Variables.

The program should output the results of those calculations to standard output. Your program will continue to read in numbers until the number 0 is entered. At this point, the calculations will be outputted in the following format:

The minimum number is 0

The smallest even integer in the sequence is 0

The count of negative integers in the sequence is 0

The sum of numbers that are divisible by 3 is 0

Note that the result values will be different depending on test cases (not always 0).

Do not output a prompt to query for the numbers. The number 0 is included in the sequence of numbers and should be included in all of your calculations.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Use this M.S. Excel spreadsheet to complete Project-03 assignment. Submit the completed M.S. spreadsheet file using the designated

Main Instruction Please refer the PRoject 3 doc. 

Use this M.S. Excel spreadsheet to complete Project-03 assignment.  Submit the completed M.S. spreadsheet file using the designated  

 NOTE: Upload the completed IT Budget Workbook (actual working M.S. Excel Spreadsheet File).  Word Files or PDF files versions will not be accepted; and result in a grade of zero (0) for this assignment. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

I NEED AN EXPERT IN JAVA

I need an expert in java,  kindly send a message to the email [email protected]

I NEED A KENYAN WRITER PLEASE

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now