Final

This assignment will be submitted to Turnitin™.

Instructions

Prepare a 8-10 page double-spaced (not including title or reference pages) research paper based on any topic in the text or something covered in this class. Please note the Presentation is from week 7 should be a comprehensive detailed overview of this paper

Paper organization will include:

Introduction

Clearly define the problem, issue, or desired topic that was researched.

Starts out broad and becomes more and more specific.

Body

Present the relevant literature and ideas.

Identify relations, contradictions, gaps, and inconsistencies in the literature.

Possible solutions to any problem(s) identified.

Conclusion

References (at least ten).

Instructions:

An in-depth submission that is free of spelling and grammar errors in APA format.

Double-spaced format (APA) with a readable style and font and submitted inside the electronic classroom (unless classroom access is not possible and other arrangements have been approved by the professor).

12-point font, Times New Roman styles.

Page margins Top, Bottom, Left Side and Right Side = 1 inch, with reasonable accommodation being made for special situations and online submission variances

Important: Good academic writing requires writers to cite the sources of all facts in text. If you state that the sky is blue then  you must cite who said it. A good rule of thumb is one citation per paragraph; paragraphs 3-5 sentences (This is how to avoid unintentional plagiarism).  Papers are always written in third person past tense as you are writing about events in the past from the point of view of an observer.  The student or writer proposed; One must observe; The leaders at APUS choose the following systems….for the following reasons:

Notes:

This project is setup so that each week the concepts presented can be directly applied and added to the project. 

The weekly assignments will help reinforce and provide ideas/considerations lending guidance to the project.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

SQL Server

Database design diagram

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

C++ code: digital rolodex using a doubly linked list

  

You will be making a digital rolodex using a doubly linked list. Your program will have the following criteria:

1. Each node in the list will contain the following information about the person:

     First Name

     Last Name

     Address

     Phone Number

     Email Address

     twitter handle.

2. When the program opens it will read contact information from a text file and create a doubly linked list with the information.

3. The user will be able to:

    o search for and display specific user by any piece of information. Exact matches only is fine. Should be able to navigate through a list if there are multiple results. thus, you probably want to sort first.

    o add a contact to the rolodex

    o delete a user from the rolodex

    o sort the rolodex by any piece of information and navigate through it, displaying    one contact at a time. (they will need to be able to exit this navigation mode)

    o quit the program.

4. Upon quitting, all contact information should be written back to the text file.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

W10 349 Planning an IT Infrastructure Audit for Compliance

The audit planning process directly affects the quality of the outcome. A proper plan ensures that resources are focused on the right areas and that potential problems are identified early. A successful audit first outlines the objectives of the audit, the procedures that will be followed, and the required resources.

Choose an organization you are familiar with and develop an eight to ten page IT infrastructure audit for compliance in which you:

  1. Define the following items for an organization you are familiar with:
    1. Scope
    2. Goals and objectives
    3. Frequency of the audit
    4. Duration of the audit
  2. Identify the critical requirements of the audit for your chosen organization and explain why you consider them to be critical requirements.
  3. Choose privacy laws that apply to the organization, and suggest who is responsible for privacy within the organization.
  4. Develop a plan for assessing IT security for your chosen organization by conducting the following:
    1. Risk management
    2. Threat analysis
    3. Vulnerability analysis
    4. Risk assessment analysis
  5. Explain how to obtain information, documentation, and resources for the audit.
  6. Analyze how each of the seven (7) domains aligns within your chosen organization.
  7. Align the appropriate goals and objectives from the audit plan to each domain and provide a rationale for your alignment.
  8. Develop a plan that:
    1. Examines the existence of relevant and appropriate security policies and procedures.
    2. Verifies the existence of controls supporting the policies.
    3. Verifies the effective implementation and ongoing monitoring of the controls.
  9. Identify the critical security control points that must be verified throughout the IT infrastructure, and develop a plan that includes adequate controls to meet high-level defined control objectives within this organization.
  10. Use 6 quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA.

here is the example of APA:  Must follow this format!!!! Take a look and follow!!!!!!!!!

https://owl.english.purdue.edu/owl/resource/560/18/

  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

  • Describe the parameters required to conduct and report on IT infrastructure audit for organizational compliance.
  • Describe the components and basic requirements for creating an audit plan to support business and system considerations
  • Develop IT compliance audit plans
  • Use technology and information resources to research issues in security strategy and policy formation.
  • Write clearly and concisely about topics related to information technology audit and control using proper writing mechanics and technical style conventions.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Why is it so important to formulate your brief for a data presentation? Discuss some ways you would implement to formulate an effective brief. What are some advantages to your methods? What are some disadvantages?

According to Kirk (2016), The essence of “Formulating Your Brief” is to “identify the context in which your work will be undertaken and then define its aims: it is the who, what, where, when and how.” It could be formal or informal as any project you think you must make it. This phase is where you create a vision for your work.

Reference Kirk, A. (2016). Data Visualisation: A Handbook for Data Driven Design. Thousand Oaks, CA: Sage Publications, Ltd.

Initial Post

Why is it so important to formulate your brief for a data presentation?

Discuss some ways you would implement to formulate an effective brief.

What are some advantages to your methods? What are some disadvantages?

You are also welcome to discuss any aspect of the homework and share with colleagues

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Root Causes

 QUESTIONS 1. Identify an emerging crime issue in your community using data available from sources such as local newspapers, online police reporting, and so forth. Frame the situation, and then identify the restraining and driving forces that may be impacting the issue. 2. Using your force field analysis, develop a cause and effect diagram for the situation. 3. Either using a FMECA approach or some other appropriate RCA tool, identify five risk treatment actions you would recommend to the local Chief of Police to address the issue 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Select one of these biometric techniques and explain the benefits and the vulnerabilities associated with that method in 3-4 paragraphs.

Some common biometric techniques include:

  1. Fingerprint recognition
  2. Signature dynamics
  3. Iris scanning
  4. Retina scanning
  5. Voice prints
  6. Face recognition

Select one of these biometric techniques and explain the benefits and the vulnerabilities associated with that method in 3-4 paragraphs.

https://www.youtube.com/watch?v=HKrJyfxi6xw

https://www.youtube.com/watch?v=kRGPKh3NgHU

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Context Diagram and Decision table Course: Advance info tech. NEED A+ WORK

 Reference Mini Case 2 and Mini Case 3 found in your module resources. Students will submit a context diagram for the order system, and create a decision table, to be submitted as a Word document. 

 Turnitin® enabledThis assignment will be submitted to Turnitin®.
 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Review in 500 words or more the video above called Cloud Security Myths. Cite your sources. Do not copy. Write in essay format not in bulleted, numbered or other list format.

Review in 500 words or more the video above called Cloud Security Myths.

Cite your sources. Do not copy. Write in essay format not in bulleted, numbered or other list format. 

Reply to two classmates’ posting in a paragraph of at least five sentences by asking questions, reflecting on your own experience, challenging assumptions, pointing out something new you learned, offering suggestions.   You should make your initial post by Thursday evening so your classmates have an opportunity to respond before Sunday.at midnight when all three posts are due. 

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your post and that you reply to two classmates in a substantive way (not ‘nice post’ or the like).  Your goal is to help your colleagues write better. Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. Please do not use attachments unless requested. 

https://www.youtube.com/watch?v=orXXxIS5p84

https://www.youtube.com/watch?v=wchkvqhVrjQ

https://www.youtube.com/watch?v=W_O7mziH3vM

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Advanced SQL

Q1:

1. How would you use GROUPING SETS to produce the same results as the following GROUP BY CUBE?

SELECT state, productID, SUM(volume) FROM sales GROUP BY CUBE (state, productID) ORDER BY state, productID

2. How would you show the sub totals for each week, for each state, and for each product? (No other totals or grand totals are required.) Suppose the table structure is

TABLE sales (productID VARCHAR, state CHAR(2), week DATE, volume INT)

3. Discuss the utility of grouping and group_id functions

Q2: Describe below how this code will work:

SELECT dt, region, revenue,
count(*) OVER (twdw) AS moving_count,
avg(revenue) OVER (twdw) AS moving_average
FROM moving_average_data mad
WINDOW twdw AS (PARTITION BY region
ORDER BY dt RANGE BETWEEN
‘7 days’::interval PRECEDING AND
‘0 days’::interval FOLLOWING
ORDER BY region, dt

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now