5

 Search “scholar.google.com” or your textbook. Discuss what role end-users typically play in incident reporting? Should end users be encouraged to report suspicious occurrences? If so, why; if not, why not. What factors typically influence the end-user decision to report (or not report) a potential incident?  

5.3. Using a Web browser, visit the site www.honeynet.org. What is this Web site, and what does it offer the information security professional? Visit the “Know your Enemy” white- paper series and select a paper based on the recommendation of your professor. Read it and prepare a short overview for your class.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Systems Architecture

Your team has been assembled to provide Information Technology consulting services to a newly formed fictitious company.

Your team is to select one the following:

  • A semi-custom designer jewelry company
  • A designer furniture and accessories company
  • A specialty sporting accessories company (hiking, climbing, water sports, etc.)
  • An urgent medical care company
  • An automotive accessories company
  • An upscale cooking supplies company
  • A medical supply company
  • Other (requires instructor approval)

This medium-sized company was formed by combining several smaller companies within the same industry into a single entity. Each of the smaller companies had their own IT system, and some were not so good, usually because the systems were cobbled together from different sources over the years. The new organization intends to avoid that undesirable outcome.

This organization intends to bring all of the disparate systems together into one comprehensive system. The plan is to implement an ERP system such as SAP or PeopleSoft as the core application for managerial control. That part of the transition will be outsourced to another team and is not part of your charter.

Your team was assembled by selecting individuals from some of those smaller companies described above, so you have never worked together before. Also, the levels of experience and training for the various team members can be quite variable.

Your mission is to develop an overall systems architecture plan from top to bottom for the new organization. This will involve several different platforms from the data center to the smartphone level including some levels in between. You may or may not be concerned with the specific source or brand name for a platform or subsystem as your team sees fit.

The team needs to consider all the possible roles that need to be supported in this organization that includes light manufacturing, procurement, sales, distribution, and customer support. A good portion of the sales staff will operate from mobile platforms while traveling to customer sites. The primary business channel is wholesale to other businesses but the organization intends to provide some in-house retail operations through brick & mortar facilities as well as online operations.

The overall assignment is to develop a comprehensive plan for the systems architecture for this fictitious organization in a form that would be appropriate as a PowerPoint slideshow for management. You may consider this as the means of presenting your conceptual plan.

1. Provide a company name for your Consulting firm and background of the organization, the solution you wish to provide. (At least 3 slides with notes)

2. Describe the overall mission for this company you will be consulting (3 slides with notes).  

3. Discuss the platform you will consider building a data center to include how workers will communicate utilizing workstations, mobile users, smartphones, tablets, and laptops. (Create illustrations on how you will align the business process) (3 slides with notes)

4. The team need to consider all the possible roles that need to be supported in this organization that includes light manufacturing, procurement, sales, distribution, and customer support.  Create a workflow diagram to illustrate how analytics could align with the company’s business processes.  (3 slides with notes)

5. The primary business channel is wholesale to other businesses, but the organization intends to provide some in-house retail operations through brick & mortar facilities as well as online operations.  Create three to five (3-5) screen layouts that illustrate the interface that organizational users will utilize.

6. Summary and closing solutions slides  (Your suggestion on the number of slides here)

7. Your team will prepare a short PowerPoint presentation (in the neighborhood of 20 slides) along with any relevant notes – either as notes on the slides or as a separate Word document.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Code and Flowchart

Write a program and flowchart. You should have a function called “swapIt()” that is passed two integers by address.  The function should define a third local variable.  Use the third variable as a intermediate variable and swap the values of both integers passed, so that when control is returned to the calling function, the values are swapped.  Hint:  You will need to use pointers for this program.

Here is what the output looks like.

File Submission

Upload your Flowgorithm file, your .c file, and a screen shot of your code output saved in a Word document including the path name directory at the top of the screen into the dropbox for grading. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Bicycle Demo

 

Resources:

  • “Lesson: Object-Oriented Programming Concepts” on The Java™ Tutorials website
  • Downloadable starter code from the Oracle® website: Bicyle class and BicycleDemo class

For this assignment, you will modify existing code to create a single Java™ program named BicycleDemo.java that incorporates the following:

  • An abstract Bicycle class that contains private data relevant to all types of bicycles (cadence, speed, and gear) in addition to one new static variable: bicycleCount. The private data must be made visible via public getter and setter methods; the static variable must be set/manipulated in the Bicycle constructor and made visible via a public getter method.
  • Two concrete classes named MountainBike and RoadBike, both of which derive from the abstract Bicycle class and both of which add their own class-specific data and getter/setter methods.

Read through the “Lesson: Object-Oriented Programming Concepts” on The Java™ Tutorials website.

Download the linked Bicycle class, or cut-and-paste it at the top of a new Java™ project named BicycleDemo.

Download the linked BicycleDemo class, or cut-and-paste it beneath the Bicycle class in the BicycleDemo.java file.

Optionally, review this week’s Individual “Week One Analyze Assignment,” to refresh your understanding of how to code derived classes.

Adapt the Bicycle class by cutting and pasting the class into the NetBeans editor and completing the following:

  • Change the Bicycle class to be an abstract class.
  • Add a private variable of type integer named bicycleCount, and initialize this variable to 0.
  • Change the Bicycle constructor to add 1 to the bicycleCount each time a new object of type Bicycle is created.
  • Add a public getter method to return the current value of bicycleCount.
  • Derive two classes from Bicycle: MountainBike and RoadBike. To the MountainBike class, add the private variables tireTread (String) and mountainRating (int). To the RoadBike class, add the private variable maximumMPH (int).

Using the NetBeans editor, adapt the BicycleDemo class as follows:

  • Create two instances each of MountainBike and RoadBike.
  • Display the value of bicycleCount on the console.

Comment each line of code you add to explain what you added and why. Be sure to include a header comment that includes the name of the program, your name, PRG/421, and the date.

Submit your Java application file (*.java files) using the Assignment Files tab.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Homework CS-8

Write 250 to 300 words.

Consider this hypothetical situation:

David Doe is a network administrator for the ABC Company. David is passed over for promotion three times. He is quite vocal in his dissatisfaction with this situation. In fact, he begins to express negative opinions about the organization in general. Eventually, David quits and begins his own consulting business. Six months after David’s departure, it is discovered that a good deal of the ABC Company’s research has suddenly been duplicated by a competitor. Executives at ABC suspect that David Doe has done some consulting work for this competitor and may have passed on sensitive data. However, in the interim since David left, his computer has been formatted and reassigned to another person. ABC has no evidence that David Doe did anything wrong.

What steps might have been taken to detect David’s alleged industrial espionage?

What steps might have been taken to prevent his perpetrating such an offense?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

David Doe

 

Consider this hypothetical situation:

David Doe is a network administrator for the ABC Company. David is passed over for promotion three times. He is quite vocal in his dissatisfaction with this situation. In fact, he begins to express negative opinions about the organization in general. Eventually, David quits and begins his own consulting business. Six months after David’s departure, it is discovered that a good deal of the ABC Company’s research has suddenly been duplicated by a competitor. Executives at ABC suspect that David Doe has done some consulting work for this competitor and may have passed on sensitive data. However, in the interim since David left, his computer has been formatted and reassigned to another person. ABC has no evidence that David Doe did anything wrong.

What steps might have been taken to detect David’s alleged industrial espionage?

What steps might have been taken to prevent his perpetrating such an offense?

Write your answer using a WORD document. Note your Safe Assign score. Score must be less than 25%

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Search “scholar.google.com” for a company or school that has defined the role of end-users in the creation of a contingency plan. Discuss why it is (or is not) important to include end users in the process of creating the contingency plan?

 

Search “scholar.google.com” for a company or school that has defined the role of end-users in the creation of a contingency plan. Discuss why it is (or is not) important to include end users in the process of creating the contingency plan? What are the possible pitfalls of end user inclusion? 

  

Using a Web Browser and a search engine, search the terms “CitiBank backup tapes lost.”You will find many results. Select one article and identify what that article considers a short coming in Citibank’s planning. What part of the contingency planning process came up short (IR, BP, or CP)? How could the shortcoming have been prevented?

Task 6 – 250 words – Due date Sunday 6 pm

Computerized Operating Systems (OS) are almost everywhere. We encounter them when we use out laptop or desktop computer. We use them when we use our phone or tablet. Find articles that describes the different types of operating systems (Linux, Unix, Android, ROS, z/OS, z/VM, z/VSE, etc). Do not select MS WINDOWS. Write a scholarly review of comparing any two or more OS; attach a copy of the article to your postings. Remember, this assignment is to be scholarly; it is not enough for you to simply post your article and add cursory reviews. Cited references are required. In addition you must read the postings of the other students and comment significantly on those areas.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Pseudocode for a Collection Manager Program

  

Pseudocode for a Collection Manager Program

Write pseudocode for a Collection Manager Program (a basic program that will help you manage a collection of items that needs to be organized and managed). Pseudocode is a description of how a program will be structured and will operate. It allows a programmer to “think in words” about the design of a program before composing code, and it is also useful for project teams in deciding on basic structures and design.

Prompt: Address the following in your submission:

A. Analyze the problem your program will solve. This analysis will inform your code logic as you consider how to solve the problem. 

B. Break the problem down into distinct steps of pseudocode that will solve the problem. 

C. Create variables to track the various elements in the pseudocode; use control structures such as branching or looping. 

D. Use natural language to work through the problems.

* All variables should be assigned with logical names and represent relevant values.

* Pseudocode should clearly illustrate all the program’s primary functionality and logic and be self-explanatory.

* Proper decision functionality should be clearly defined and correctly applied using a branching structure.

* Appropriate processing steps and iterations should be clearly represented using a loop structure.

* Pseudocode should be clear and understandable, and the code should be organized.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Coding

coding using python and math functions? has to be in python file

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

H5 – D5

 

Communication and Team Decision Making

Part 1: Sharpening the Team Mind: Communication and Collective Intelligence

A.    What are some of the possible biases and points of error that may arise in team communication systems? In addition to those cited in the opening of Chapter 6, what are some other examples of how team communication problems can lead to disaster?

B.      Revisit communication failure examples in Exhibit 6-1. Identify the possible causes of communication or decision-making failure in each example, and, drawing on the information presented in the chapter, discuss  measures that might have prevented problems from arising within each team’s communication system.

Part 2: Team Decision-Making: Pitfalls and Solutions

A.    What are the key symptoms of groupthink? What problems and shortcomings can arise in the decision-making process as a result of groupthink? 

B.    Do you think that individuals or groups are better decision-makers? Justify your choice. In what situations would individuals be more effective decision-makers than groups, and in what situations would groups be better than individuals?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now