IT-404 Web Design

Instructions:

  

· This Assignment must be submitted on Blackboard via the allocated folder.

· Email submission will not be accepted.

· You are advised to make your work clear and well-presented, marks may be reduced for poor presentation.

· You MUST show all your work.

· Late submission will result in ZERO marks being awarded.

· The work should be your own, copying from students or other resources will result in ZERO marks.

· Use Times New Roman font for all your answers. 

Question One

  

What is the URL? 

Explain the different URL components with an example from each component. 

 

 Question Two    

  

Explain the two strategies: Styling Strategy and Scripting Strategy. 

 

 Question Three   

  

Explain the different statements of the following HTLM page.

<!DOCTYPE html>
<html>
<body>
 

<h1>My First Heading</h1>

<h2>This is heading 2</h2>
<h3>This is heading 3</h3>

 <p>My first paragraph.</p>

 

<img src=”seu.jpg” alt=”www.seu.edu.sa” width=”104″ height=”142″>

 </body>
</html>

   

 Question Four    

  

Discuss the different steps to create a basic web page.

 

Question Five     

  

Give the different list types available in HTML with example.

  

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Ethics and Security

 

Purpose of Assignment 

Security in the work place is a major concern businesses must address to protect company data. In addition, to automated security, it is also the company’s responsibility to implement policies and procedures for the handling of data by company personnel. Students will research risks and threats to digital data and develop security policies all company personnel must be trained on and be held accountable to protect company data. 

Assignment Steps 

Resources:

  • Internet search engine such as Google™, Yahoo!®, or Bing™.
  • Microsoft® Word 2016
    • Click the “File” tab, then “New” to search for Microsoft® Word Memo Templates
  • Microsoft Office 365, Office 2016: Introductory: Module 1: Creating, Formatting, and Editing a Word Document with a Picture

Note: This is a two-part assignment and students will submit two documents.

Part 1

Write a 1,400-word paper describing the challenges businesses have in securing data in today’s technological environment and what businesses should do to mitigate or minimize risks: 

  • Include risks and threats of company data.
  • What policies/procedures should be implemented for the handling of data ensure data protection and business continuity?
  • Include in text citations and references.

Format your assignment consistent with APA guidelines. 

Save as a Microsoft® Word document saved under the following format: Lastname_Course#_W2.doc.

Part 2 – Use a Microsoft® Word memo template.

Write a 175-word memo announcing the new security policies to all employees taking effect in one month following mandatory training. Search online for a Microsoft® memo template. 

Create an eye-catching memo that is clear and to the point concerning the new security policies. APA formatting is not required for this part of the assignment.

Use the following features of Microsoft® Word in your memo:

  • A Microsoft® Word memo template.
  • Either a bulleted or numbered list of the new security policies/procedures, and bold or changed font color so this list is highly visible.
  • Highlight the effective date so it stands out.
  • Insert an image that is relevant to the memo content. Images must also be cited and referenced.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

The History of the Internet. Outlines the historical facts behind the development of the internet

Nee to write final research paper in computer network subject with no plagiarism. It should be in not so complicated words. But simple and understandable easily. No grammatical mistakes. 

  

1. The History of the Internet. Outlines the historical facts behind the development of the internet

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Assignment 2: GIS: Implementation of a GIS System

 

GIS projects typically comprise four major-cycle phases: business planning, system acquisition, system implementation, and operation and maintenance. The role of people and organization is vital to sustainable project management. Not all GIS projects are successful for many reasons, such as lack of executive-level commitment, inadequate oversight of key participants, poor data capture and maintenance, inability to demonstrate benefits, and a host of other technical and non-technical factors. 

Write a four- to five-page paper that addresses each of the following:

  1. Identify two current business problems in any industry that require the use of a GIS system. Think from the customers’ perspective and identify and explain the key business challenges from the two examples chosen. Use examples from specific, real-world businesses. Provide the URLs for the company websites of these businesses in your references.
  2. Now that you have identified two key business problems, describe how to choose a GIS system to meet the needs of the business you described above. 
  3. In addition to your logic and justification for your selection process, draw a block diagram of the process and life cycle stages of a typical GIS system. 
  4. Every implementation has risks, and not all risks can be anticipated. Based on the business problems and your chosen GIS system, identify three to four key risks and their potential impact to your implementation. Impact can be documented in terms of revenue loss (or cost) to the business, schedule delays, loss of data, etc.
  5. During your implementation of the GIS system you may have to deal with many manifestations of the law such as copyright and intellectual property rights (IPR), competition law, data protection, and liability issues. Identify two potential challenges associated with these legal issues and explain the steps you would take to minimize their impact.

Your assignment must follow these formatting requirements:

  • This course is designed to prepare you for a career in IT. While most Strayer University courses require the APA (essay) format, this course focuses on writing in a business proposal format.
  • Cite your references using APA or another format accepted by your instructor. Check with your instructor for any additional instructions.

 The specific course learning outcomes associated with this assignment are:

  • Apply the concepts of GIS to organizations, government, and everyday life.
  • Use technology and information resources to research issues in GIS.
  • Write clearly and concisely about GIS topics using proper writing mechanics and technical style conventions.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

IMPACTS OF TECHNOLOGY

What has technology did to smoothen the life of every human in the modern world?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

FRESH JAVA WORK

 

Homework 3: Expanded Combat System

Summary:
This project expands on the previous assignment to build a simple text­based action game. This project focuses on methodizing the processes of your software. There are three tasks that your software must perform.
1. Create a hero
2. Create a monster
3. Run the combat algorithm: hero versus monster

The above defines the basic fundamental structure for a complete game. In the first phase, the player will decide how to best build their own hero. In the second phase, the system will randomly generate a monster such as a goblin, orc, or troll. In the final phase, the system will execute a turn­based combat system similar to the one in the previous assignment. You should identify the various responsibilities that govern your software system and model them using methods.

Objectives:
We will develop this project using an iterative design strategy while testing our code between each iteration. Your first iteration should start with implementing a method that creates a hero. The second iteration should implement a method that creates a monster. The final iteration should implement a method that manages the combat algorithm. This combat method may need to invoke sub­methods which handle the various attack options such as: melee actions, magic actions, charge actions, or flee actions. You are encouraged to customize, modify, or design your very own combat rules and stats so long as you meet the minimum number of options as listed within these specifications.

Required Concepts:
You will build a simple game application that uses all the fundamental concepts that we have covered up to Chapter 5. Concepts you may want to consider using for your game may include:

1. Named Constants (used for evaluating & executing user input)
2. Class variables (game data must be accessible to all methods in class)
3. Enumeration types (models the possible game states)
4. Class methods (used to break down the game logic into simpler parts)
5. Passing parameters (pass local data forward from one method to another)
6. Returning values (pass local data backward from one method to another)
7. Logical operators (evaluate multiple criteria for loop control)
8. Repetition statements (character creation and combat loop)
9. Random class (generate scoped random values for damage & health)

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Powerpoint Presentation atleast 16 slides part1:8 slides and part2:8 slides no plagarism

  

Part 1: The three (3) Key aspects of a Team

As a group, identify the three (3) key aspects of a team. What are their characteristics? As a group, which of the teams do you mostly identify with and why? Support your presentation with appropriate references. Use APA format throughout.

Part 2: Rewarding Team Work:

• Develop power point presentation on how to reward team work. As a team, why is it important to reward term work?

Specific Instructions:

1. As a group, discuss requirements for Parts 1 and 2 above.

2. Develop power points. You power points should contain a minimum of 20 slides (excluding the cover page and reference page.

3. Use APA format throughout.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

DTGOV Digital Signatures

  

Complete the assigned weekly reading and review the case study below and Respond to the questions below in a 3 pages Word document.

Case Study Example

With DTGOV’s client portfolio expanding to include public-sector organizations, many of its cloud computing policies have become unsuitable and require modification. Considering that public-sector organizations frequently handle strategic information, security safeguards need to be established to protect data manipulation and to establish a means of auditing activities that may impact government operations.

DTGOV proceeds to implement the digital signature mechanism specifically to protect its Web-based management environment (Figure 10.6). Virtual server self-provisioning inside the IaaS environment and the tracking functionality of realtime SLA and billing are all performed via Web portals. As a result, user error or malicious actions could result in legal and financial consequences. Image Figure 10.6 Whenever a cloud consumer performs a management action that is related to IT resources provisioned by DTGOV, the cloud service consumer program must include a digital signature in the message request to prove the legitimacy of its user. Digital signatures provide DTGOV with the guarantee that every action performed is linked to its legitimate originator. Unauthorized access is expected to become highly improbable, since digital signatures are only accepted if the encryption key is identical to the secret key held by the rightful owner. Users will not have grounds to deny attempts at message adulteration because the digital signatures will confirm message integrity.

Answer the following questions in a substantive manner:   

1. Do you agree that digital signatures are the best way to protect the data in question? 

2. Do you agree with the author’s statement that digital signatures provide a guarantee that every action performed is linked to its legitimate originator?  

3. DTGOV appears to be Canadian based. Does PIPEDA have any rulings on digital signatures?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Discussion Forum 4 CSIS 340

Describe the fundamental security policies outlined by PCI DSS, FISMA, and COBIT. In a subsequent paragraph, identify at least 2 types of industries (e.g., Internet service providers, health care, education) and describe which of the latter standard(s) should be considered in that industry. Defend your response.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

written assignment

 

  • Search the Internet for IT governance planning. Select a specific governance plan that exists at a company or a plan framework from an organization. Write a 2-page paper on three or four of the most important suggestions from the plan you select.

You must provide a reference to the site where you found the governance plan, in APA format.

Please note there are no resubmissions for work that is presented with high match.  Please see posted announcement and syllabus. 

If it is discovered in your assignment that different fonts are used in effort to work around plagiarism, there is an automatic zero with no resubmissions.  Do your own work. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now