Managing a Team’s Resources

Your team has been humming along for a little over a week now. The conflicts that appeared last week seem to have subsided. However, your supervisor has just informed you that the deadline for completing your team’s goal has been moved up by two weeks. You now have less time to complete the same amount of work. Your supervisor has asked for a short summary on your plan for achieving the goal within your shortened timeline. 

Write a 350 words summary on how you will manage the team’s resources in the face of these new timelines. Answer the following questions in your summary:

  • How many people are on your team? What are their roles? What are their skill sets? How can these be rearranged to meet the new requirements?
  • Are there enough human resources to complete the project two weeks earlier? If not, how can you increase the team’s capacity?
  • Are there aspects of the project that can be condensed or skipped? What are the implications of skipping or condensing tasks?
  • Are there costs to be considered with these changes?
  • How can you leverage what you’ve learned about solving problems in teams to meet the new project requirements?
  • How do you intend to communicate the new requirements to the team in order to gain their buy-in?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

computer forensic

Research forensics as a career and locate available certifications. List at least 3 certifications and their requirements. Summarize what hardware, software and network components computer forensic investigators should know. Could you become a computer forensics specialist?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

The Effects of Smoking on Lung Cancer Rates among Adults in New York

Assignment Content

  1. Your hard work has paid off (!!!), and you will use the following workshop activities completed in class to help you write your complete draft of your discussion section:
    • Activity: Discussion, Para. 1
    • Activity: Discussion, Para. 2
    • Activity: Discussion, Para. 3
    • YOU MUST USE THE “CHECK YOUR SIMILARITY HERE” FOLDER TO ENSURE NO PLAGAIRISM BEFORE SUBMITTING HERE FOR GRADING! 

      Grading: 
      (No Title Page) 

    • p. 1 of the document must have a Level 1 Header – “Discussion” = 5 pts
    • Use activity notes to write paragraph 1 = 20 pts
    • Use Level 2 Header – “Recommendation” (5 pts), then use activity notes to write paragraph 2 = 25 pts
    • Use activity notes to write paragraph 3 = 25 pts
    • APA-7-Compliant References Page = 20 pts

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

CIS 415 Unit 4 DB: Cloud Computing

 Cloud computing is “the talk of the day.”  Discuss the pros and cons of this technology based on your personal/work experience and research.  What are the security challenges and regulatory requirements to consider when choosing the cloud computing model (public, hubris, private)?
Make sure you articulate sufficiently and possibly support your arguments with some research

1 page apa format  

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

graduate research and analysis Topic ( Measures to Reduce Data Dump in Minimal Time)

Your hard work has paid off (!!!), You will use the following workshop activities completed in class to help you write your complete draft of your discussion section:

  • Activity: Discussion, Para. 1
  • Activity: Discussion, Para. 2
  • Activity: Discussion, Para. 3

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Summary and Reaction

 Two short papers this week, please submit both a summary and a reaction for each. The papers are:

Paper 1:

Judy Kay and Piers Lauder, A fair share scheduler, Communications of the ACM 31.1, 1988

Paper 2:

Carl Waldspurger and Weihl William, Lottery scheduling: Flexible proportional-share resource management, In Proceedings of the 1st USENIX conference on Operating Systems Design and Implementation, 1994

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Clojure Programming Assignment

1. (5 points) In Clojure, implement Quicksort. Do so in a function called quicksort with one argument, a vector of numbers. The function returns a sequence of sorted numbers. For example (quicksort [2 6 1 9 1]) returns (1 1 2 6 9). 

2. (5 points) In Clojure, implement Mergesort. Do so in a function called mergesort with one argument, a vector of numbers. The function returns a sequence of sorted numbers. For example (mergesort [2 6 1 9 1]) returns (1 1 2 6 9). 

3. (5 points) Test the two functions to ensure they sort correctly. 

4. (5 points) Implement Quicksort and Mergesort in any other language and make sure they sort correctly. 5. (5 points) In both languages, time your quicksort and merge sort functions on a sorted list of 1,000,000 numbers. Time them on a reverse sorted list of 1,000,000 numbers. If 1,000,000 numbers are not enough to see a difference between the two algorithms, increase the input size. 

6. (15 points) Evaluate your results. Which program was faster on the sorted input? Was it also faster on the input that was in reverse sorted order? Is the result the same in both languages? Explain your results. Were the results as expected? Can you say anything about the languages used for sorting in terms of performance and ease of implementation? 

7. (Extra Credit 5 points) Compare the performance of your implementations in both languages with the performance of the built-in sort function in each language. Explain the result.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Data Representation and Association Analysis

Q1. Read: Ch. 6 &7 in the textbook: Data Representation and Interactivity

Textbook: Kirk, Andy.  Data Visualization: A Handbook for Data Driven Design

Data representation and interactivity are important aspects of data visualization.  Review the text by Kirk (2019) and note at least three storytelling techniques.  Note the importance of each and the advantages of using these techniques.

Q2. Read Ch. 6 in the textbook. Association Analysis: Basic Concepts and Algorithms

Textbook: Tan, Pang-Ning. Introduction to Data Mining

  1. What are the techniques for handling categorical attributes?
  2. How do continuous attributes differ from categorical attributes?
  3. What is a concept hierarchy?
  4. Note the major patterns of data and how they work.

Q3. Read Ch. 7 in the textbook. Association Analysis: Advanced Concepts 

Textbook: Tan, Pang-Ning. Introduction to Data Mining

  1. What is K-means from a basic standpoint?
  2. What are the various types of clusters and why is the distinction important?
  3. What are the strengths and weaknesses of K-means?
  4. What is a cluster evaluation?

Select at least two types of cluster evaluations, and discuss the concepts of each method.

Answer all three questions in 250 words each. Follow APA 7 Guidelines. There must be APA formatted references (and APA in-text citation) to support the thoughts in the post.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Design a simple mobile

 Instructions Part 1: Pseudocode and Flowchart You’ll create both pseudocode and a flowchart to design a mobile app. The app will write the device’s latitude and longitude to a file each time the device’s location changes. Use the techniques discussed in Section 3.3 and Chapter 10 of your textbook to write the latitude and longitude to the file as a record.
to create the flowchart. Write your pseudocode in a plain-text editor such as Notepad or TextEdit, and save as a text file (*.txt). Also, save a screenshot of your flowchart as a JPEG file (*.jpg). 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Project 2: Troubleshooting and Tool Report

 

The SITREP (Situation Report) Sample Report is provided so that you can understand what Cyber Command is expecting in your report. Your report will vary depending on the problem and tool selected.

Select one of the seven network problems and develop a troubleshooting and tool report that details the solution.

  1. On Day 2 of full operational capability (FOC), our connection to the internet was becoming intermittent. We could establish connections to our globally hosted servers some of the time. The connection would drop at seemingly random periods and we don’t know why. We have experienced this day and night, and it has been consistent for the past three days.
  2. When our connection to the internet is working, we seemingly cannot reach out to our globally dispersed servers from our hosts. We use the globally dispersed servers for command and control and must be able to connect to them. We need a method to determine where the packets are going and why they are not reaching their destination. Because these servers are globally distributed, we can’t just pick up and deploy to them.
  3. Our internal network servers are also spotty. Sometimes they are up, and sometimes they are down. For example, the DHCP server appears to provide IP addresses to hosts that are turned on sometimes, but other times when the host is turned on, it receives an Automatic Private IP Address (APIPA). These hosts can communicate with our networked hosts locally, but they can’t reach out to our global servers. These hosts enable our persistent engagement capability, so they must be functional, and we need to determine the problem ASAP!
  4. We have a team that can troubleshoot from afar, but the members are located 25 miles west of this location. We have one of the tech support personnel deployed on site, but there are just too many issues for one person. The support team that is 25 miles west is centrally located to support multiple operational outfits. That team has a virtual private network (VPN) and secure access to our internal servers. At times, support team members need to determine which of our hosts are functioning. We use both Microsoft Windows and Linux operating systems, but we don’t know what tool will help determine host functionality from afar.
  5. This next part is classified, but I need your help, and I need it fast. Bottom line, we believe there may be an insider threat. At times, we have reason to believe a nonapproved device is connecting to the network and reaching out to the internet. We need a method to determine what devices exist on the same subnet of our network. What can help us do that?
  6. When we begin operations in 72 hours, it will be of utmost importance for us to know what device name is associated with what IP address. This will allow us to know what exists internally and what we need to defend should the adversary begin operations against us. We need to understand what options exist to achieve this task.
  7. When we first arrived and established our connection to the internet, we noticed inbound connection requests. What tool can we use to determine if any adversary is reaching into our systems through a particular port or protocol?

Your report should be about a page in length and address the following:

  • Choose and restate one of the problems identified as you understand it and explain why it is a problem.
  • Describe how you would apply the steps in the Network+ troubleshooting model to this problem.
  • Name and provide a brief overview of the tool that could solve this problem (refer to Lesson 17 in uCertify).
  • Describe how the tool can be used to solve similar problems in the future.
  • Provide a detailed overview of the tool’s functionality and options.
  • Include a screenshot of your selected tool from the appropriate uCertify lab.

How Will My Work Be Evaluated?

Troubleshooting refers to the process of identifying problems with a network through a rigorous and repeatable process and then solving those problems using testable methods. An important part of your duties in the networking field will be to troubleshoot and solve problems. In fact, most of your time will be spent with this focus to include optimizing performance. Networks are dynamic in implementation and are built to be resilient, but problems arise due to many unforeseen reasons. Developing the knowledge, skills, and experience to successfully troubleshoot and recommend solutions will show you are value-added to the organization.

For this assignment, you are asked to review a scenario, understand the problems, apply your knowledge and skills gained in this class, and propose a solution. Use the template provided and complete the assignment. An example solution is provided for you.

The following evaluation criteria aligned to the competencies will be used to grade your assignment:

  • 1.2.3: Explain specialized terms or concepts to facilitate audience comprehension.
  • 1.3.5: Adhere to required attribution and citation standards.
  • 1.4.1: Produce grammatically correct material in standard academic English that supports the communication.
  • 2.1.1: Identify the issue or problem under consideration.
  • 2.3.1: State conclusions or solutions clearly and precisely.
  • 10.1.1: Identify the problem to be solved.
  • 13.1.1: Create documentation appropriate to the stakeholder.

When you are finished, delete the instructional text from the template before you submit. Click “add a file” to upload your work, then click the Submit button.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now