MS Windows firewall methodologies

Using the Web or other resources, do a bit of research on the methodologies that Microsoft Windows  firewall uses. Consider the strengths and weaknesses of that approach. 

 Post between 200 and 300 words. 

 Read and respond to two other discussions attached

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Data Mining Project

Thera Bank – Loan Purchase Modeling  This case is about a bank (Thera Bank) which has a growing customer base. Majority of these customers are liability customers (depositors) with varying size of deposits. The number of customers who are also borrowers (asset customers) is quite small, and the bank is interested in expanding this base rapidly to bring in more loan business and in the process, earn more through the interest on loans. In particular, the management wants to explore ways of converting its liability customers to personal loan customers (while retaining them as depositors). A campaign that the bank ran last year for liability customers showed a healthy conversion rate of over 9% success. This has encouraged the retail marketing department to devise campaigns with better target marketing to increase the success ratio with a minimal budget. The department wants to build a model that will help them identify the potential customers who have a higher probability of purchasing the loan. This will increase the success ratio while at the same time reduce the cost of the campaign. The dataset has data on 5000 customers. The data include customer demographic information (age, income, etc.), the customer’s relationship with the bank (mortgage, securities account, etc.), and the customer response to the last personal loan campaign (Personal Loan). Among these 5000 customers, only 480 (= 9.6%) accepted the personal loan that was offered to them in the earlier campaign.  

Link to the case file:   Thera Bank_Personal_Loan_Modelling-dataset-1.xlsx

 You are brought in as a consultant and your job is to build the best model which can classify the right customers who have a higher probability of purchasing the loan. 

You are expected to do the following: 

•EDA of the data available. Showcase the results using appropriate graphs – (10 Marks) 

•Apply appropriate clustering on the data and interpret the output – (10 Marks)

 • Build appropriate models on both the test and train data (CART & Random Forest). Interpret all the model outputs and do the necessary modifications wherever eligible (such as pruning) – (20 Marks) 

 •Check the performance of all the models that you have built (test and train). Use all the model performance measures you have learned so far. Share your remarks on which model performs the best. – (20 Marks) 

 Hint : split <- sample.split(Thera_Bank$Personal Loan, SplitRatio = 0.7) #we are splitting the data such that we have 70% of the data is Train Data and 30% of the data is my Test Data  train<- subset(Thera_Bank, split == TRUE) test<- subset( Thera_Bank, split == FALSE)    

 Please note the following: •Your submission should be a Word Document with a word limit of 3000 words. Appendices are not counted in the word limit. •Also, share the R code & Interpretation. •You must give the sources of data presented. Do not refer to blogs; Wikipedia etc. •Any assignment found copied/ plagiarized with candidate(s) will not be graded and marked as zero. •Please ensure timely submission as post deadline assignment will not be accepted.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Multi layer User Access Control

 

Discussion: Multilayer User Access Control

Learning Objectives and Outcomes

  • Identify what implementation method(s) can be used to incorporate multilayer access control
  • Describe and how each method benefits multilayered access control.

Assignment Requirements

Read the worksheet named “Multilayer User Access Control” and address the following:

Using what you have learned about building a multilayer access control system, identify what implementation method(s) can be used and how each method benefits multilayered access control.

Respond to your peers with your point of view on their answers. Respond to at least two of your classmates’ original thread posts with between 100 – 150 words for each reply.  Make sure your opinion is substantiated with valid reasons and references to the concepts covered in the course. In addition, initiate a discussion with the students who comment on your answer.

Required Resources

  • Worksheet: Multilayer User Access Control (ws_multilayeraccesscontrol)

Self-Assessment Checklist

Use the following checklist to support your work on the assignment:

  • I have engaged in discussion of the assigned topics with at least two of my peers.
  • I have raised questions and solicited peer and instructor input on the topics discussed.
  • I have articulated my position clearly and logically.
  • I have supported my argument with data and factual information.
  • I have provided relevant citations and references to support my position on the issue discussed.
  • I have compared and contrasted my position with the perspectives offered by my peers and highlighted critical similarities and differences.
  • I have solicited peer and instructor feedback on my arguments and propositions.
  • I have offered a substantive, critical evaluation of my peer’s perspective on the issues that is opposite of mine and supported my critical review with data and information.
  • I have followed the submission requirements.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Developing a Risk-Mitigation Plan Outline for an IT Infrastructure

 

Prepare a Lab Report file which covers the below mentioned points:

1) Identify the scope of IT risk-mitigation plan focusing on the seven domains of a typical IT infrastructure.

2) Align the major parts of an IT risk-mitigation plan in each of the seven domains of a typical IT infrastructure.

3) Define the tactical risk-mitigation steps needed to re-mediate the identified risks, threats, and vulnerabilities commonly found in the seven domains of a typical IT infrastructure.

4) Define procedures and processes needed to maintain a security baseline definition for ongoing risk mitigation in the seven domains of a typical infrastructure.

5) Create an outline for an IT risk-mitigation plan encompassing the seven domains of a typical IT infrastructure.

Please follow this Hands-on steps to prepare the Lab Report File. This should be followed in a step by step procedure while building the Lab report.

1) Create a new word document.

2) Review the seven domains of a typical IT infrastructure. (Please find the seven domains of a typical IT infrastructure Image in the attachments)

3) Using the following table, review the results of your assessments in performing a Qualitative Risk Assessment for an IT infrastructure lab in this lab manual. In addition, review the results of how you categorized and prioritized the risks for the IT infrastructure in that lab: (Please find the table image in the attachments)

4) In your lab report file, organize the qualitative risk assessment data according to the following:

·       Review the executive summary from performing a Qualitative risk assessment for an IT Infrastructure lab in this lab manual.

·       Organize all of the critical “1” risks, threats, and vulnerabilities identified throughout the seven domains of a typical IT infrastructure.

5) In your browser, navigate to http://www.mitre.org/publications/systems-engineering-guide/acquisition-systems-engineering/risk-management/risk-impact-assessment-and-prioritization

6) Read the article titled “Risk Impact Assessment and Prioritization”

7) In your Lab Report file, describe the purpose of prioritizing the risks prior to creating a risk-mitigation plan.

8) In your Lab Report file, organize the qualitative risk assessment data according to the following:

·       Executive summary

·       Prioritization of identified risks, threats, and vulnerabilities organized into the seven domains.

·       Critical “1” risks, threats, and vulnerabilities identified throughout the IT infrastructure.

·       Short-term remediation steps for critical “1” risks, threats and vulnerabilities.

·       Long-term remediation steps for major “2” and minor “3” risks, threats and vulnerabilities.

·       Ongoing IT risk-mitigation steps for the seven domains of a typical IT infrastructure.

·       Cost magnitude estimates for work effort and security solutions.

·       Implementation plans for remediation.

9) In your Lab Report file, create a detailed IT risk-mitigation plan outline by inserting appropriate sub-topic an sub-bullets.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Excel module 3

EXCEL (Module 3)

Working with the large worksheet, charting and What-If Analysis

Please read Module 3 of Excel. (Pages EX113 to EX173) or (pages 851 to 911)

Follow the “Kaitlyn’s Ice Cream Shoppe” tutorial throughout the chapter.  

It is important to understand this before starting the exercise to be submitted.

Use the presentation “MS Excel – Module 03” that is in Lectures to reinforce knowledge.

        Focus in:

  • Use absolute and mixed cell references in a formula (EX132 or 870)
  • Use the IF function to perform a logical test (EX136 or 874)
  • Create and format sparkline charts (EX142 or 880)

Complete and submit the Following:

A) Complete the Chapter Exercise “Kaitlyn’s Ice Cream Shoppe” like the figure 3-1

Follow the instructions throughout the chapter (Page Ex113 to Ex172) or (Page 851 to 910)

Submit the Assignment with the Name ExM3-Ex1-YourName 

B) In Lab #1: Eight-Year Financial Projection on page EX 177 (or 915)

    Submit the Assignment with the Name ExM3-Ex2-YourName 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Excel data question

  • On Sheet 1:
  • Use conditional formatting to fill each cell in the Percent Funded column using a three-color scale. The scale should start at 0 and be a dark shade of red, transitioning to green at 100, and blue at 200.
  • Create a report in Microsoft Word and answer the following questions. 
  1. Given the provided data, what are three conclusions we can draw about Kickstarter campaigns?
  2. What are some limitations of this dataset?
  3. What are some other possible tables and/or graphs that we could create?

On Bonus Statistical Analysis Sheet:

  • 1.  Determine  whether the mean or the median summarizes the data more meaningfully.
  •  2. Determine if there is more variability with successful or unsuccessful campaigns. Does this make sense? Why or why not?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

word document edit

 

  1. Open the EmergencyProcedures-02.docx start file. If the document opens in Protected View, click the Enable Editing button so you can modify it.
  2. The file will be renamed automatically to include your name. Change the project file name if directed to do so by your instructor, and save it.
  3. Change the theme to Integral and the theme color to Red.
  4. Change the top, bottom, left, and right margins to 0.75″.
  5. Select the entire document and change the font size to 12 pt.
  6. Format the title of the document.
    1. Select the title of the document and apply Heading 1 style.
    2. Open the Font dialog box, apply All caps effect, and change the font size to 16 pt.
    3. Change the Before paragraph spacing to 0 pt.
    4. Add a bottom border to the title using the Borders drop-down list.
  7. Apply and modify the Heading 2 style and delete blank lines.
    1. Apply the Heading 2 style to each of the bold section headings.
    2. Select the first section heading (“Emergency Telephones [Blue Phones]”).
    3. Change Before paragraph spacing to 12 pt. and After paragraph spacing to 3 pt.
    4. Apply small caps effect.
    5. Update Heading 2 style to match selection. All the section headings are updated.
    6. Turn on Show/Hide and delete all the blank lines in the document.
  8. Select the bulleted list in the first section and change it to a numbered list.
  9. Apply numbering format and formatting changes, and use the Format Painter.
    1. Apply numbering to the text below the section headings in the following sections: “Assaults, Fights, or Emotional Disturbances”; “Power Failure”; “Fire”; “Earthquake”; and “Bomb Threat.”
    2. Select the numbered list in the “Bomb Threat” section.
    3. Open the Paragraph dialog box, set Before and After paragraph spacing to 2 pt., deselect the Don’t add space between paragraphs of the same style check box, and click OK to close the dialog box.
    4. Use the Format Painter to copy this numbering format to each of the other numbered lists.
    5. Reset each numbered list so it begins with 1 (right-click the first item in each numbered list and select Restart at 1 from the context menu).
  10. Customize a bulleted list and use the Format Painter.
    1. Select the text in the “Accident or Medical Emergency” section.
    2. Create a custom bulleted list and use a double right-pointing triangle symbol (Webdings, Character code 56).
    3. Open the Paragraph dialog box and confirm the left indent is 0.25″ and hanging indent is 0.25″. If not, change the settings.
    4. Set Before and After paragraph spacing to 2 pt. and deselect the Don’t add space between paragraphs of the same style check box.
    5. Use the Format Painter to apply this bulleted list format to the following text in the following sections: “Tips to Professors and Staff” and “Response to Students.”
  11. Change indent and paragraph spacing and apply a style.
    1. Select the text below the “Emergency Telephone Locations” heading.
    2. Set a 0.25″ left indent.
    3. Set Before and After paragraph spacing to 2 pt.
    4. Confirm the Don’t add space between paragraphs of the same style box is unchecked (Paragraph dialog box).
    5. Apply Book Title style to each of the telephone locations in the “Emergency Telephone Locations” section. Select only the location, not the text in parentheses or following text.
  12. Change left indent and paragraph spacing and set a tab stop with a dot leader.
    1. Select the text below the “Emergency Phone Numbers” heading.
    2. Open the Paragraph dialog box and set a 0.25″ left indent for this text.
    3. Set Before and After paragraph spacing to 2 pt. and confirm the Don’t add space between paragraphs of the same style box is unchecked.
    4. Open the Tabs dialog box, set a right tab stop at 7″, and use a dot leader (2).
    5. Press Tab before the phone number (after the space) on each of these lines. The phone numbers align at the right margin with a dot leader between the text and phone number.
  13. Apply the Intense Reference style to the paragraph headings in the “Accident or Medical Emergency” section (“Life-Threating Emergencies” and “Minor Emergencies”). Include the colon when selecting the paragraph headings.
  14. Use the Replace feature to replace all instances of “Phone 911” with “CALL 911” with bold font style. Note: If previous Find or Replace criteria displays in the Replace dialog box, remove this content before performing this instruction.
  15. Insert a footer with document property fields and the current date that appears on every page.
    1. Edit the footer on the first page and use the ruler to move the center tab stop to 3.5″ and the right tab stop to 7″.
    2. Insert the Title document property field on the left. Use the right arrow key to deselect the document property field.
    3. Tab to the center tab stop and insert the Company document property field at center. Use the right arrow key to deselect the document property field.
    4. Tab to the right tab stop, insert (not type) the date (use January 1, 2020 format), and set it to update automatically.
    5. Change the font size of all the text in the footer to 10 pt.
    6. Add a top border to the text in the footer using the Borders drop-down list and close the footer.
  16. Use the Borders and Shading dialog box to insert a page border on the entire document.
    1. Use Shadow setting and solid line style.
    2. Select the fifth color in the first row of the Theme Colors (Dark Red, Accent 1) and 1 pt. line width.
  17. Center the entire document vertically (Hint: use the Page Setup dialog box).
  18. View the document in Side to Side page movement view [View tab, Page Movement group] and then return to Vertical page movement view.
  19. Save and close the document (Figure 2-119).
  20. Upload and save your project file.
  21. Submit project for grading.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Database Development (Sequence Objects)

  Watch this video: https://www.youtube.com/watch?v=FsVpkamX–Q&t=166s

Complete the following tasks using DDL & DML commands,  NOT THE GUI in the Microsoft SQL Server Management Studio. SHOW YOUR WORK!

1. Create a sequence for populating the Customer# column of the DB1.CASTEEL.CUSTOMERS table. When setting the start and increment values, keep in mind that data already exists in this table. The options should be set to not cycle the values and not cache any values, and no minimum or maximum values should be declared.

Sequence Goes Here.

Screen Shot Goes Here

2. Add a new customer row to the DB1.CASTEEL.CUSTOMERS table by using the sequence created in Question 1. The only data currently available for the customer is as follows:

· last name = Shoulders

· first name = Frank

· zip = 23567

Query Goes Here.

Screen Shot Goes Here

3. Create a sequence that generates integers starting with the value 5. Each value should be three less than the previous value generated. The lowest possible value should be 0, and the sequence shouldn’t be allowed to cycle. Name the sequence MY_FIRST_SEQ.

Sequence Goes Here.

Screen Shot Goes Here

4. Issue a SELECT statement that displays NEXTVAL for MY_FIRST_SEQ three times. What causes the error on the third SELECT?

Select Goes Here.

Select Goes Here.

Select Goes Here.

Screen Shot Goes Here

5. Change the setting of MY_FIRST_SEQ so that the minimum value that can be generated is –1000.

Alter Sequence Goes Here.

Screen Shot Goes Here

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Mobile Application – discussion

From the humdrum of the mid-2000s web apps, Apple radically changed the mobile world with the iPhone, offering well-designed apps of their own and curating apps that were accepted into the App Store.  That influence has been far reaching, prompting Google to push their boundaries and develop material design, a design language that has become the distinctive hallmark of Android apps.  When compared to the web world where some popular apps could get away with mediocre design, why do mobile apps face a higher design bar? 

  • When compared to the web world where some popular apps could get away with mediocre design, why do mobile apps face a higher design bar?
  • Compare and contrast native mobile app design versus standard desktop app design.  Discuss considerations for choosing one over the other.  Elaborate on main advantages vs disadvantages.

– 2 pages

– apa

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Look at the SQL program that shows in the left window, and view the “reports”

  

Go to sqlfiddle.com and click the View Sample Fiddle button on the menu bar at the top. Look at the SQL program that shows in the left window, and view the “reports” that appear at the bottom of your browser window carefully – what do they show? On line 10 delete the value for the content in that record and replace it with your name. Be sure that you leave the quotation (‘) marks before and after your change. Click the Build Schema button. In the window on the right, delete all the code after line 13, delete the letter “a” from lines 12 and 13, and delete the dot (or period) on line 12. Click the Run SQL button. What is the primary key for the content that reads “The earth is flat and rests on a bull’s horn”? Why are the two reports different now?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now