CIS CLASS

 

“Structural Model” Please respond to the following:

  • Determine the relationships between aggregation, generalization, and association. Explain how each type of association is depicted on a class diagram. Provide example(s) to support your answer. Please make sure that your example is different from other students.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Technology-related moral/ethic question

 

PREPARATION (1.5 pts): You are to find a  very current technology-related news story  (6 months or less from assignment date that raises moral  or ethical issues). Then (each worth 0.5 pt):

  1. Summarize the story, and explain whom in the story is or was faced with moral questions. (100 to 150 words)
  2. Analyze that moral question using one of the nine morality theories from chapter 1. How would a proponent of that theory answer the questions of what is the right thing to do, and why (200 to 300 words) ?
  • How do I know that X is good?
  • Why is X good?

3. Include a link to that news story.

 Please clearly number the points 1 to 3  in your document. Your submission should be named using your unique student id, for example, crossv.docx   Submit by before class on the due date.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

physical security

 

This assignment has two parts:

  1. Identify the different stages of a fire
  2. What are the phases of a fire safety inspection

Guidelines: The reading assignment is a useful tool to complete the tasks, you may use other resources outside of the book. Feel free to elaborate.

A minimum of two pages.

Helpful resources

Fire safety

Fire Classes

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

630-6 Yhtomit

PART 1

·  500 words

·  4 sources

·  APA Format

1. Research eBay v. Bidder’s Edge, Inc. at http://pub.bna.com/lw/21200.htm
eBay filed a lawsuit against Bidder’s Edge, Inc. alleging trespass to personal property, unfair business practices, copyright infringement, misappropriation, false advertising, etc. Was this a violation of the Computer Fraud and Abuse Act?  Do you agree with ruling?  Please give reasons for your decision. Since eBay granted permission for Bidder’s Edge to use a crawler what was the problem?  If this case existed today would we still have the same outcome? 

2. What challenges does law enforcement face in controlling Child Pornography? How can law enforcement deal with this problem? 

3. What problems surrounding children under the age of 13 can arise due to the Internet of Things?  When answering, think of the connected toys, Amazon Echo and Google Home.

PART 2

·  500 words

·  4 sources

·  APA Format

1. Research the Protection of Children from Sexual Predators Act of 1998. I work for an ISP in the United States, and I have discovered child pornography on a Web site we host. What should I do?  

2. I am investigating an incident where child pornography was found on a computer. The person who used the computer claims he received a pop up containing child pornography and clicked on it. How can I determine whether the person’s story is true. Be sure to provide details of the forensic procedures.  

Use the following sources for both assignments. May also include outside sources.

Part VIPrevention: Human Factors – Chapter 43 – Ethical Decision Making and High Technology – Computer Security Handbook SEE ATTACHED

Article- New study highlights need for education and collaboration to address child sexual abuse websites. SEE ATTACHED

Article- Social Networks and Internet-facilitated child exploitation: A review of existing material and call for research.SEE ATTACHED 

Federal Trade Commission- Children’s Online Privacy Protection Rule (COPPA). https://www.ftc.gov/enforcement/rules/rulemaking-regulatory-reform-proceedings/childrens-online-privacy-protection-rule

Video- Child Abduction, Darknet & Criminal Minds with Jim Clemente.  (2015, May 07). Retrieved August 20, 2017, from https://youtu.be/KPPbjXAvtCUb

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

CIS 500 Assignment 2 (NO PLAGIARISM, ORIGINAL WORK ONLY)

 Assignment 2: The Presentation 

Due Week 10 and worth 200 points Congratulations. Your project has been staffed and you are about to meet with the team for the first time. Initial impressions are important and you’ll need visuals for your presentation. 

Create a slide show (in PowerPoint or similar software) in which you address the following, in this order:

 1. Goals: What the project hopes to accomplish. 

2. Critical Success Factors: Identify at least 4 different stakeholders; for each, list at least 2 things that the stakeholder requires in order to deem the project successful. 

3. Acquisition strategy: Should the system be built in-house, created by a contractor, purchased offthe-shelf and customized, or leased as a service? Explain your rationale. 

4. Resources: For in-house development, what people/skills are required and what development lifecycle do you recommend? Otherwise, identify 3 candidate organizations that can deliver the system.

 5. System functions: In a table format, summarize the types of users for the system; the business reason(s) each would use the system; the ways that the system supports each of these needs; and how this support differs from the current system.

 6. Connectivity: Provide a diagram that shows how the system will connect to the other information systems and what data flows among them.

 7. Security: List the most serious cybersecurity threats and vulnerabilities of the new system. Suggest strategies to address them. 

8. Mobility: Identify the system’s capabilities for mobile use. Include a title and summary slide. Use one slide for each of the 8 points above. 

Include speaker notes or audio narration that explains each slide more fully. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

MIS PPT

 Group Assignment 2: Project Management 

Project is a short or long-term activity with a stated beginning and end time. Projects requires several organized activities with defined scope and resources. As a group, conceive an information technology project idea. The project idea may be to either fix an existing process in order to improve efficiency and effective or a brand new idea to help launch a new product or service. 

1. Describe the project. 

2. Develop the project idea based on the following steps: 

A. Initiating 

B. Planning 

C. Executing 

D. Monitoring and Controlling 

E. Closing 

3. Identify possible issues/challenges you may encounter. How would you overcome the challenges? 

Specific Instructions: 

1. Complete your group project using Power Point. Your presentation should have a minimum of 25 slides. 

2. Use APA throughout. Support your work with appropriate references 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

DISCUSSION PAPER

  

Topic: cryptosystem in Modern IT Industry

Research and discuss at least 2 types of cryptosystems. 

Discuss 

In the last discussion session, we “discuss the use of cryptosystems in modern industry.” In this session, lets look at the advancement of quantum cryptosystems as it applies to your industry. List at least two type of QDK ( Quantum key distribution (QKD ) and provide an example of how it is being use in Modern IT Industry

Submission

One full page with 2 references

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

University project: Using Arrays

The university updated its website program design request with a few more features to fit its needs.

Update the website program to reflect the following changes:

  • Use an array to prompt the user to enter a credit card account number
  • Use the sequential search algorithm to locate the credit card number entered by the user
  • If the credit card number is not in the array, display a message indicating the number is invalid
  • If the credit card number is in the array, display a message indicating the credit card number is valid

Create a 1/2- to 1-page document containing pseudocode based on the revised program needs. Add the pseudocode statements to the existing pseudocode program.

Create a 1- to 2-page flowchart based on the algorithm for the revised program needs. Add the flowchart structure in the existing flowchart for the program.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

due on monday

The Discussion Board (DB) is part of the core of online learning. Classroom discussion in an online environment requires the active participation of students and the instructor to create robust interaction and dialogue. Every student is expected to create an original response to the open-ended DB question as well as engage in dialogue by responding to posts created by others throughout the week. At the end of each unit, DB participation will be assessed based on both level of engagement and the quality of the contribution to the discussion.

At a minimum, each student will be expected to post an original and thoughtful response to the DB question and contribute to the weekly dialogue by responding to at least two other posts from students. Two additional responses are required after Friday of each week. Students are highly encouraged to engage on the Discussion Board early and often, as that is the primary way the university tracks class attendance and participation.

The purpose of the Discussion Board is to allow students to learn through sharing ideas and experiences as they relate to course content and the DB question. Because it is not possible to engage in two-way dialogue after a conversation has ended, no posts to the DB will be accepted after the end of each unit.

Assignment Guidelines 

For this Discussion Board assignment, you should use the library and course materials to respond to the following: 

  • Research best practices for system integration approaches, such as the following approaches:  
    • Systems development life cycle (SDLC) approach  
    • Migration strategy and implementation approach  
    • Acquisition utilizing requests for proposals  
    • Others of your choice 
  • Select 2 of the best practice approaches, and discuss how they support responding to professional and ethical issues potentially impacting your integration project.  
  • Provide specific examples of how the application of best practices for system integration impact project success. 

Post a new topic to the Discussion Board containing your responses from the steps listed above. 

Respond to 2 other students’ posts on the Discussion Board, and evaluate their project decisions.  

In your own words, please post a response to the Discussion Board and comment on other postings. You will be graded on the quality of your postings.

For assistance with your assignment, please use your text, Web resources, and all course materials.

Grading Rubric 

  Project Criteria Exceeds: 90%–100% Very good: 80%–89% Meets: 70%–79% Needs Improvement: Below 70%   

Content
(40%)

Response covers all topics indicated in the assignment and adds additional content. The writing was of collegiate level with no errors in spelling or grammar. Response covers most topics indicated in the assignment. The writing was of collegiate level with one or less errors in spelling or grammar. Response covers many topics indicated in the assignment. The writing was of collegiate level with two or less errors in spelling or grammar. Response covers none to some of the topics indicated in the assignment. The writing was less than collegiate level with errors in spelling or grammar.   

Interaction
(40%)

Multiple learner interactions per week that add to the discussion. Responses show evidence of critical analysis with questions to other classmates. At least three learner interactions per week that add to the discussion. Responses show evidence of critical analysis. No less than two learner interactions per week that add to the discussion. Responses show evidence of critical analysis. Zero to one learner interaction per week in the discussion board. Response lacks evidence of critical analysis.   

Supporting Analysis
(20%)

Analysis exceeded minimum requirements. Appropriate sources were used to support analysis and were properly referenced. Basic analysis provided to support discussion. When appropriate to support discussion, appropriate sources were cited and properly referenced. Some limited analysis provided to support discussion. When appropriate to support discussion, sources were cited, appropriate, and properly referenced. No or inaccurate analysis, no sources were cited when needed, analysis and/or sources were not appropriate. When sources used, were not properly referenced.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

W4D1402 – Adapting Best Practices for Specific Solutions

I just need the document in a clear well written single spaced. I will do the editing no need to send cover page or double space. I will do that through my review.

I need 4 clear and quality references.

These references need to be current and website based with an author who is current (2008-2018). I need to be able to go to a website and see that actual work.

Hints these are current subject related cited references.

No ebooks.

No google books

No paid sites for access.

No make believe books.

****Must be current and visible references*****

Will not accept anything but true references.

References mean the world to me and they should to you if you want to accept my money.

Again all references must be cited!!!!!! All references must be made clear and precise websites I can go and look up the information.

I need actual articles!!! Articles and authors I can references and read about the topic! Please do not submit to me a reference page that does not reference actual authors and actual websites with valuable information.

No google books or Wiki. I need media articles to references and see. Please understand this requirement.

Also this needs to follow APA style and be in 12 Times. 

here is the example of APA:

https://owl.english.purdue.edu/owl/resource/560/18/

Thank you and see the topics below that need addressed.

  • Interpret how context, scope, and feasibility influence the development of a security process, and provide an example of a security solutions development process with your response.
  • Analyze the design process for defining a customized security solution. Give your opinion as to which step in this design process is most significant.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now