quiz

2. Name and explain the eight hats/roles of data visualization.

4. Summarize/discuss at least 6 key things discussed in this course that influence one’s Design Choices.

5.What is the importance of RegEx or Regular Expressions in data analytics? Discuss the differences between the types of regular expressions. Choose two types of regular expressions and discuss the differences between the two. Please be sure to include two or three differences for each. Include how they help manipulate data.

6.Excel provides many features that make it useful for data visualization. It is a tool still widely used despite its limitations. Newer versions of Excel have addressed some of the limitations. What are 3 or 4 cons (limitations) to using Microsoft Excel for data visualization?

10. Three storytelling techniques are discussed in the text (pages 161-209) in which data is presented and stories are being interpreted. The techniques are described as inheritant characteristics of some charts and graphics. What is the importance and the advantages of using these techniques? Provide an example of each technique.

14. List and Describe 3 or 4 myths that are described in chapter 11 of Andy Kirk’s book. Then state what is Kirks response to these myths.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Active Directory Recommendations , Course Subject : Application Security

 

Create a summary report to management that answers the following questions to satisfy the key points of interest regarding the addition of Active Directory to the network:

1. System administrators currently create users on each computer where users need access. In Active Directory, where will system administrators create users?

2. How will the procedures for making changes to the user accounts, such as password changes, be different in Active Directory?

3. What action should administrators take for the existing workgroup user accounts after converting to Active Directory?

4. How will the administrators resolve differences between user accounts defined on different computers? In other words, if user accounts have different settings on different computers, how will Active Directory address that issue? (Hint: Consider security identifiers [SIDs].)

  

Submission Requirements

Format: Microsoft Word (or compatible)

Font: Times New Roman, size 12, double-space

Citation Style: APA

Length: 2 to 4 pages

No plagiarism 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Principles of Facility Design

1. Your organization has a safe for storing corporate laptops when they are not being used. As part of the security plan, you must ensure that the safe engages an extra lock if the safe’s temperature exceeds a certain level. This will provide protection against drilling. Which type of lock should you implement?

A. Passive relock

B. Active relock

C. Thermal relock

2. Which intrusion detection system (IDS) uses a magnetic field to detect intrusions?

A. A proximity detector

B. A passive infrared system

C. An acoustical detection system

3. Your data center has its own lock to prevent entry. Your organization’s security plan states that the lock to the data center should be programmable. Which type of lock should you use?

A. Cipher lock

B. Mechanical lock

C. Tumbler lock

4. Which statement is true of lighting of critical areas?

A. Critical areas should use trip lighting and be illuminated ten feet in height to four foot-candles.

B. Critical areas should use standby lighting and be illuminated ten feet in height to two foot-candles.

C. Critical areas should use continuous lighting and be illuminated eight feet in height to two foot-candles.

5. Which option is NOT an administrative control for physical security?

A. Personnel control

B. Intrusion detection

C. Facility management

6. Your organization has asked that you reassess the organization’s security plan to see if it fully addresses crime and disruption prevention through deterrence. Which security mechanism covers this issue?

A. Law enforcement notification

B. Fences

C. Smoke detectors

7. Which technologies are considered remote-sensing technologies?

a. unmanned aircraft

b. manned aircraft

c. satellites

d. land-based cameras

A. option a

B. option b

C. option c

D. option d

E. options a, b and c only

F. options b, c, and d only

G. all of the options

8. You want to ensure that employees can use a code to alert the proper authorities when they are under duress. With which physical security measure can this be used?

a. cipher lock

b. security guard

c. combination lock

d. biometric system

A. option a

B. option b

C. option c

D. option d

E. options a and b only

F. options c and d only

9. What is the FIRST priority when responding to a major security incident?

A. Containment

B. Monitoring

C. Restoration

10. Although control effectiveness has recently been tested, a serious compromise occurred. What is the FIRST action that an information security manager should take?

A. Evaluate control objectives

B. Perform a root cause analysis

C. Develop more stringent controls

11. Which of the following is a key component of an incident response policy? 

A. Updated call trees

B. Escalation criteria

C. Press release templates

12. Why should an incident management team conduct a post incident review?

A. To identify the hacker

B. To identify affected areas

C. To identify lessons learned

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

How to work on a spreed sheet document using the information given

 

You also build a pie chart sheet to graph the proportion that each category contributes to total revenue.

[Student Learning Outcomes 3.1, 3.2, 3.3, 3.4, 3.5, 3.6]

File Needed: ClassicGardens-03.xlsx (Available from the Start File link.)

Completed Project File Name: [your name]-ClassicGardens-03.xlsx

Skills Covered in This Project

  • Create a chart object.
  • Size and position a chart object.
  • Edit and format chart elements.
  • Edit the source data for a chart.
  • Build a pie chart sheet.
  • Use texture as fill.
  • Add and format data labels in a chart.

Alternate Instruction for Microsoft 365 Apps icon This image appears when a project instruction has changed to accommodate an update to Microsoft 365 Apps. If the instruction does not match your version of Office, try using the alternate instruction instead.

  1. Open the ClassicGardens-03.xlsx start file. If the workbook opens in Protected View, click the Enable Editing button so you can modify it. The file will be renamed automatically to include your name. Change the project file name if directed to do so by your instructor, and save it.
  2. Create a Clustered Column chart object for cells A4:G9.
  3. Move the chart object so that its top-left corner is at cell A12. Size the bottom of the chart to reach cell H30.
  4. Edit the chart title to display CGL Major Sales Revenue and press Enter to start a new line. On the second line, type Second and Third Quarters.
  5. Apply chart Style 14 to the chart.
  6. Format the first line and the second line of the chart title to a font size of 20 pt.
  7. Apply a 1 pt Black, Text 1 (second column) outline to the chart area.
  8. Verify that the chart is still selected. In the highlighted range in the worksheet, drag the resize pointer to remove the Design Consulting data series from the chart (Figure 3-71).Resize the chart by dragging the resize pointerFigure 3-71 Resize the chart by dragging the resize pointer
  9. Create a 3-D Pie chart sheet for cells A4:A9 and cells H4:H9. Move the chart to its own sheet named Revenue Breakdown. Hint: Use the Move Chart button [Chart Design tab, Location group].
    Alternate Instruction for Microsoft 365 Apps icon Create a 3-D Pie chart sheet for cells A4:A9 and cells H4:H9. Move the chart to its own sheet named Revenue Breakdown. Hint: Use the Move Chart button [Chart Tools Design tab, Location group].
  10. Edit the chart title to display Revenue by Category. Change the font size to 32.
  11. Select the legend and change the font size to 12.
  12. Apply the Woven mat texture fill (first row, fourth column) to the Patio and Furniture slice.
  13. Select the pie shape and add data labels to display in the center of each slice.
    1. Display the Format Data Labels task pane, choose the Accounting format [Label Options button, Number group], and set 0 decimal places.
    2. Change the data label font size to 14 pt and apply bold [Home tab, Font group].
  14. Deselect the chart.
  15. Save and close the workbook (Figure 3-72).Excel 3-4 completed worksheet and chartFigure 3-72 Excel 3-4 completed worksheet and chart
  16. Upload and save your project file.
  17. Submit project for grading.

&45 BEFORE AND &45 AFTER

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Systems Analysis and Development

Part 1: Comparing SDLC Approaches and Recommendation

You have been hired to implement the CRM system for WeLoveVideo. Part of your job is to propose and recommend a project approach based on several models. 

A meeting is scheduled for next week with the WeLoveVideo CIO to discuss your recommendations on the project approach.

Prepare for this meeting by developing a 6 to 8–slide multimedia-rich presentation with speaker notes that explains the Waterfall and Agile SDLCs and how your 

team will guide WeLoveVideo. Include the following in your presentation:

• Explain the typical phases that comprise an entire systems project of Waterfall and Agile SDLCs

• Identify differences in documentation produced, with an explanation as to why it would or would not be used

• Explain stakeholder expectations that should be set based on the chosen SDLC

• Determine the pros and cons associated with each Waterfall and Agile SDLC

• Include a relevant graphic summary or chart comparing Waterfall and Agile for the WeLoveVideo CRM project, including features, team, delivery, and 

feedback

• Identify attributes within WeLoveVideo that would dictate your recommendation on the type of SDLC you would lean toward

Presentation Note: The slides in your multimedia-rich presentation should only contain essential information and as little text as possible. Do not design a slide 

presentation made up of long bullet points. Your speaker notes must convey the details you would give if you were presenting. Review the Create Speaker Notes 

video for more help.

• Compose an executive summary to accompany your presentation that includes your SDLC recommendation and references to support your 

recommendation. This summary for the executive team is typically 1- to 2 pages in length.

Format your citations per APA guidelines

Part 2: Project Plans

After consideration of your proposal from Part 1, the WeLoveVideo CIO is having a hard time envisioning how the project would be executed based on your 

recommendations. She has asked your company to develop a project plan in both Waterfall and Agile so she can better understand the implications to her team.

Use Microsoft® Excel®, Project, or another project management tool of your choice (and approved by your instructor) for your project plans.

Design a Waterfall and an Agile milestone-level project plans for the WeLoveVideo CIO in which you:

• Develop a Waterfall approach milestone-level project plan with inputs and outputs for each phase of the project based on the SDLC with milestones at the 

end of each project phase and within phases, if applicable

• Design a Waterfall approach milestone-level project plan with comprehensive SDLC phases

• Develop an Agile approach milestone-level project plan with inputs and outputs for each phase of the project based on the SDLC with milestones at the 

end of each project phase and within phases if applicable

• Design an Agile approach milestone-level project plan with comprehensive SDLC phases

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Urgent 5

Part 1. Find at least two journal articles in your discipline (e.g. informatics, information systems, IT) that have a similar problem that you are attempting to solve in your systems analysis and design project for this course.  Use a minimum of two scholarly journal articles from top information systems, informatics, or information technology journals to support your systems analysis and design methodology.
In one paragraph each, describe the design methods and processes the authors of the articles justified to attempt to solve the underlying problem(s).  For example, did they use a framework or standard to benchmark and test their systems analysis and design?  Your methodology is the blueprint that you will follow to compare the old system to the new system in the results of the final phase of the project.  It needs to be objective and enable a proper benchmark that adequately compares the systems.  For example, you could use ACM, ANSI, ISO, ITU, NIST, and/or information standards like HIPAA or PCI.
Part 2. Include at least four unique systems analysis diagrams from your systems analysis project for peer review.  Diagram 1 must be a written use case / use case description of the existing system.  Diagram 2 must be a written use case / use case description of the new system. Diagram 3 must be an activity diagram of the existing system.  Diagram 4 must be an activity diagram of the new system. Do not attach the diagrams, embed them into your post as a video

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Computer 9

Objectives

The student will be able to analyze an organizational task/scenario and select the appropriate information system or application software to satisfy the organizational requirements. The student will be able to create basic Office Support System documents to satisfy some of those requirements. The student will also be able to demonstrate their skill with Internet based research methods and find relevant/reliable information for a variety of purposes.

Assignment Overview

  • Imagine you are employed as a Help Desk Support person working for “XYZ Company”. Today you are tasked with logging and resolving your first IT Support Ticket on your own.
  • You will need to record a variety of information about the issue and come up with a resolution based on your knowledge of Computer Information Systems learned in readings/videos throughout the course.

Case Background

Meet Pavan. Pavan is a new employee at “XYZ Company”. Pavan will be working in the Human Resources Department as an Human Resources (HR) Generalist. 

Pavan does not yet have any hardware or software to begin working and has contacted you at Help Desk Support to get set up. Pavan mentioned that each of the other HR Generalists have a laptop computer, a docking station, two monitors, a keyboard, and mouse.

You also know that Pavan will need access to Microsoft Office 365 for accessing company documents/emails and QuickBooks for recording employee hours and pay information.

Pavan would like to get his access set up as soon as possible because he already has employees reaching out to him for assistance with pay issues and his boss asking when he can get started.

Case Requirements

After reading the case background and class materials, fill in the IT Support Ticket Template provided with relevant information.

  1. Give the ticket issue a name/title and issue description.
  2. List the hardware, software, or other components that are part of this issue. Are there any items you think Pavan or you might be forgetting (maybe ERP access)? If so, feel free to use your imagination and to add your ideas to your ticket. Consider what you have learned in each chapter and how it can be helpful with this issue.
  3. Name the people and processes impacted by Pavan’s issue.
    1. Pavan is the one with the issue but consider others who might be impacted by him not being able to do his work with Payroll and what department they might be in. 
  4. Go do some internet research to price a few of the items Pavan needs and enter these numbers into the budget.
    1. Note that all answers will vary and there is no right or wrong number here. The important component of this part of the assignment is that you can identify hardware and software and do some basic research to find those resources.
  5. Once you have considered all the components that are a part of this issue and identified anything needed to set up Pavan, please write Pavan an email in the second tab of the template (Part 2 – Resolution).
    1. Ensure you let Pavan know that you have resolved his issue and are closing his ticket.
    2. Also let him know what you did to resolve his issue successfully.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Week 2 Assignment – The Ethical Hacker Introduction

In this assignment, you will assume the  role of an ethical hacker tasked by law enforcement to infiltrate the  network of a business known to engage in illegal activities. The specific course learning outcome associated with this assignment is: 

  • Conduct activities to protect IT assets and infrastructure from threats and improve incident response strategies.

Scenario

Imagine for a moment that you are a  hacker, an ethical one. You are called upon by law enforcement to hack  into the network of a business known to be engaged in criminal activity  for financial gain as its primary activity. Assume you are not to be  concerned with any political aspects of the job and that your actions  are legal and ethically justified. This nefarious business takes its own  security seriously and, therefore, has implemented several forms of  network security, including firewalls, web proxies for its web gateways,  and VPNs for remote users. You also know that this business, much like  any normal corporation, rents several floors of office space to  accommodate between 100 and 200 employees. Also, imagine that the  business’s entire network topology is located on-site. Your goal is to  infiltrate their security to find evidence of illegal activities in the  local MSQL database. You must remain anonymous and operate within the  parameters of the law. 

Instructions

Write a 6–10 page paper in which you: 

  • Explain your method of attack and operation within the reasonable  parameters of the law, citing specific, credible sources that support  the method of attack and operation.
  • Describe a specific malware, social engineering, or other type of  attack you would deploy to achieve your desired goals, citing specific,  credible sources that support deployment of the attack.     
    • Identify effective techniques for concealing executables and specific tools used for each stage of the attack.
  • Develop a plan to overcome expected hurdles your attack must  overcome to be successful, citing specific, credible sources that  support the plan.
  • Develop an anonymizing strategy, supported by specific, credible  sources, that creates a false trail and minimizes the risk of detection.
  • Support your main points, assertions, arguments, or conclusions  with at least four specific and credible academic sources synthesized  into a coherent analysis of the evidence.     
    • Cite each source listed on your source page at least one time within your assignment

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

4-6 Pages IP

 

Bayesian analysis requires the inclusion of prior information. It is also computationally intense. There are many examples that can be provided from any fields. After completing the required readings for the week and conducting any additional research that you may need, write a 4–6 page paper that addresses the following:

  • Discuss the reasons for using Bayesian analysis when faced with uncertainty in making decisions.
  • Describe any assumptions of Bayesian analysis.
  • Describe the situations that would call for Bayesian analysis.
  • Describe any problems with Bayesian analysis.
  • Describe the contexts for Bayesian analysis.
  • How is decision making under uncertainty related to Bayesian analysis?

Be substantive and clear, and use scholarly examples to reinforce your ideas.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Paper

Prepare a paper on some of the various issues, protocols, methods, frameworks you found and discuss how – if possible – organizations can use ERM as strategy. It is perfectly acceptable if you deem ERM cannot be used as strategy, just back up your claim with scholarly research and justifications. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now