Access

2.1 Create a home inventory database that can be referred to in case of damage, theft, or natural disaster Graded Project: Microsoft Access 2016 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

ethics , law and cybersecurity

 

  1. Compare Brey’s arguments regarding misrepresentation and bias in virtual environments, especially in virtual reality (VR) applications, to Buchanan’s argument in chapter 10 concerning gender bias in the representation (or lack of it) in video games. (Brey’s arguments can be found in the 4th edition of the textbook on page 349.  Go to Doc Sharing to download the 4th edition in PDF format.How are their arguments similar? How are they different? Defend your answer. Please elaborate (beyond a yes or no answer) and provide your “theoretical” rationale in support of your responses. (knowledge)
  2. Describe some pros and cons of online communities. What does Mitch Parsell mean when he says that online communities with an “extremely narrow focus” contribute to social polarization?  Assess his arguments for that claim.  Do you agree with Parsell?  On balance, have online communities enhanced or threatened community life?  Explain.  Please elaborate (beyond a yes or no answer) and provide your “theoretical” rationale in support of your responses. (comprehension)

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

A hybrid threat is mixed-variety or a complex threat.

A hybrid threat is mixed-variety or a complex threat. Use the current readings, the Web, IT magazines, the CU digital library, and/or other reliable resources and research complex threat platforms like TDSS, Zeus, Zbot, etc. Discuss your findings and overall thoughts.

350 words with citations. 

No plagiarism

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

p5

 You should create one Java file for each problem and save them all in one folder. Compress the folder as a .zip file and submit it here. Please name your .zip file as P5-Last Name-First Nam.zip. For example, P5-Smith-John.zip.

  • A Word document containing the algorithms and the screenshots of the running programs for all of the five problems. Please name your Word document as P5-Last Name-First Name.docx or .doc. For example, P5-Smith-John.docx.

Consider the following problems, design the algorithms that would solve them, and then implement the algorithm in Java.

Problem 1:

Write a program that reads a set of floating-point values. Ask the user to enter the values, then print:

  • The average of the values
  • The smallest of the values
  • The largest of the values
  • The range, that is the difference between the smallest and the largest

Of course, you may only prompt for the values once.

Problem 2:

Write a program that reads a word and prints each character of the word on a separate line. For example, if the user provides the input “Harry”, the program prints:

H
a
r
r
y

Problem 3:

The Fibonacci numbers are defined by the sequence:

f1 = 1
f2 = 1
fn = fn-1 + fn-2.

Reformulate that as

Fold1 = 1;
Fold2=1;
Fnew=fold1+fold2;

After that, discard fold2, which is no longer needed, and set fold2 to fold1, and fold1 to fnew. Repeat an appropriate number of times.

Implement a program that prompts the user for an integer n and prints the nth Fibonacci number, using the above algorithm.

Problem 4:

Write a program that prints a multiplication table, like this:
1 2 3 4 5 6 7 8 9 10
2 4 6 8 10 12 14 16 18 20
3 6 9 12 15 18 21 24 27 30

10 20 30 40 50 60 70 80 90 100

Problem 5:

This problem is the Problem 4 in Module 2 for the algorithm project. Now you already have the algorithm and you can copy it here. You still need to write the source code and take a screenshot of the running program. 

Imagine yourself in the middle of Manhattan, where the streets are perpendicular on avenues. You are in a grid of streets, somewhat lost, and you randomly pick one of four directions and walk to the next intersection. Not knowing where you really want to go, you again randomly pick one of the four directions, and so on. After repeating the same movement for a number of times, you may want to know how far you got from the original point.

Represent locations as integer pairs(x,y). Create an algorithm that implements your movement through New York City, over 100 intersections, starting at (0,0) and print the ending location, taking into consideration that each movement, from one intersection to another will be one mile.

Submission:

You are required to submit the following files for this assignment by clicking the Submit Assignment button above.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

risk assessment on Acme Enterprise

You are going to conduct a risk assessment on Acme Enterprise using the risk assessment

concepts we have learned about thus far. Each of the areas of the infrastructure mentioned

above is where you will concentrate your assessments. After you have completed your risk

assessment, you will then provide recommendations for each area that you assessed to

reduce risk, exposure, and threat. Also, as part of your final submission demonstrate

through a redesign where your mitigations will take place within the architecture. You can

use the image below as guide for your risk analysis of each area.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

CIS 498 Week 10 Assignment – Comprehensive Project Plan and Executive Presentation

 Week 10 Assignment – Comprehensive Project Plan and Executive Presentation

Overview

This is the fifth and final course project deliverable in the series of five sequential assignments in this course. You are continuing on in your role as the CTO of a hypothetical e-commerce start-up company of your design.

Throughout the course, you have been working on delivering an information technology project plan in anticipation of the company relocating to a new facility.

  • In the first course project deliverable, you created a project plan inception document and supporting Gantt chart.
  • In the second course project deliverable, you developed the business requirements to be incorporated into the information systems design you are creating. You also updated your original supporting Gantt chart based on major and minor tasks identified in the business requirements document.
  • In the third course project deliverable, you created an infrastructure design that considered the key elements of software, hardware, security, and business process flow for your e-commerce startup company. Once again you updated the supporting Gantt chart based on the major and minor tasks identified in the infrastructure design document.
  • In the fourth course project deliverable you developed the system implementation document. This document spelled out the EFI technical aspects of your e-commerce company’s information systems infrastructure. Again you updated the supporting Gantt chart to reflect the major and minor tasks identified in the system implementation document.

You are now in the final stage of the project plan development. You will leverage all previous deliverables and integrate them into one document that will serve as the project’s statement of work.

Your goal is for the start-up company’s executive team and the venture capital group to approve and fund your project. The detailed project plan is necessary to accomplish the monumental implementation task. The executive team and investors, however, are only interested in an executive summary in the form of a 10–15-slide PowerPoint presentation. As a result, you are required to create a compelling PowerPoint presentation, supported by the detail in your project plan, which convinces the executive group that your solution is optimal.

This assignment consists of three parts:

Part 1: Comprehensive Project Plan

You will create an 8–10-page final comprehensive project plan. This document will distill down the most salient points from each of the four previous course deliverables into one integrated, cohesive comprehensive project plan that persuades investors of the recommended approach.

Critical Note: Do NOT simply combine the previous four assignments into one 30–50-page document. Instead, your task is to:

  • Review each of the four previous assignments.
  • Select the most critical information from each that investors need to know to make an informed investment decision.
  • Summarize the information you selected.
  • Ensure that the selected information flows from one section to the next in a cohesive and compelling fashion.
Part 2: Executive Presentation

You will create a 10–15-slide compelling executive presentation that convinces the start-up company’s executive team and potential investors to invest in the company. Your recommended solution is the one that can grow this $5 million dollar e-commerce start-up company into a $30 million dollar company within the next two years.

Part 3: Updated Final Gantt Chart

You will use Microsoft Project to update the supporting project Gantt chart begun in your first course project deliverable.

  • You are not creating a new Gantt chart, only updating the one you created in the previous assignment to produce the final project Gantt chart to include all major and minor tasks necessary to execute the project.

Note:

  • You are to create or assume all necessary assumptions to successfully complete this assignment.
  • You must submit all three parts as separate files to the assignment area. Label each file name according to the appropriate part.

Instructions 

Part 1: Comprehensive Project Plan

You are to write a comprehensive 8–10-page comprehensive, final project plan in which you:

  1. Describe the project’s goals, objectives, scope, and control measures.
  2. Relate the value of the proposed solution to the competitive advantage that information technology will afford the e-commerce company.
  3. Provide a rough estimate of the entire project’s cost, including hardware, software, and labor.
    • The work you did to create the bill of materials in the fourth course project deliverable will help you with this.
  4. Use three sources to support your writing.
    • Choose sources that are credible, relevant, and appropriate.
    • Cite each source listed on your source page at least one time within your assignment.
    • Access the library or review library guides for help with research, writing, and citation.
Part 2: Executive Presentation

You are to create a 10–15-slide executive PowerPoint presentation to persuade potential investors to invest in your e-commerce start-up company. In your presentation you are to:

  1. Illustrate the concepts from your 8–10-page comprehensive project plan in an executive presentation.
  2. Create bulleted speaking notes to the executive board in the Notes section of your PowerPoint presentation.

Note:

  • Create or assume any fictitious names, data, or scenarios that have not been established in this assignment for a realistic flow of communication.
  • Consider including images, graphics, charts, tables, etc. in your presentation to increase audience engagement.
Part 3: Updated Gantt Chart

Use Microsoft Project to update the previous Gantt chart to produce the final project Gantt chart to include all major and minor tasks necessary to execute the project.

Formatting

This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions. Note the following:

Comprehensive Project Plan
  • The preferred method is for this portion of your assignment to be typed, double-spaced, using Times New Roman font (size 12), with one-inch margins on all sides.
  • Include a cover page containing the assignment title, your name, your professor’s name, the course title, and the date. The cover page is not included in the required page length.
  • Include a source list page. Citations and references must follow SWS format. The source list page is not included in the required page length.
Executive Presentation
  • Use a readable size font (24 points or above) on your slides. For your slide notes, the preferred method is to use Times New Roman font (size 12), single-spaced, with one-inch margins on all sides.
  • Include a title slide containing the assignment title, your name, your professor’s name, the course title, and the date. The title slide is not included in the required number of slides.
  • Include a source list slide. Citations and references must follow SWS format. The source list slide is not included in the required number of slides.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Physical Security Plan

Go to the Physical Security Plan Assignment Resources page.

Download the maps and save the file as FirstName_LastName_Physical_Security_Plan.

For each map, click the icons in the map key and drag them to the place on the map you believe they should be located. If you want to place an icon multiple times, you can copy it by right-clicking or selecting it and clicking CTRL+C.

Then answer the follow-up questions in the Physical Security Plan Template.

How Will My Work Be Evaluated?

As an information security professional, you must consider potential threats to the physical security of an enterprise and plan to implement controls to mitigate associated risk. The security recommendations in your three physical control diagrams demonstrate your understanding of how the physical environment and infrastructure can affect the confidentiality, integrity, and availability of information systems.

The following evaluation criteria aligned to the competencies will be used to grade your assignment:

  • 1.1.3: Present ideas in a clear, logical order appropriate to the task.
  • 1.3.1: Identify potential sources of information that can be used to develop and support ideas.
  • 2.1.1: Identify the issue or problem under consideration.
  • 10.1.1: Identify the problem to be solved.
  • 12.3.1: Select controls.
  • 12.3.2: Describe the implementation of controls.
  • 13.1.1: Create documentation appropriate to the stakeholder.
  • 13.1.2: Describe the various processes that affect policies, processes, and procedures.

When you are finished, submit your Physical Security Plan Maps and Physical Security Plan by using the box below. (Note: You will upload two separate files: a PowerPoint file with the security maps and the Physical Security Plan template document with your responses to the follow-up questions.

Due Date 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

vulnerability assessment

 

Your boss wants you to draft a two- to three-page vulnerability process and assessment memorandum addressing the main points of a VM process for Mercury USA. You will cover the main elements of a vulnerability management process, tailored to Mercury USA’s business in the transportation sector, evaluate the OpenVAS scanning tool, and provide recommendations for mitigating the vulnerabilities found within the OpenVAS report.

The third-party pen tester used the free tool Open Vulnerability Assessment Scanner (OpenVAS) to scan Mercury USA’s network. Review the report from the OpenVAS Scan.

As you review the scan, consider some important points from Lesson 5:

  • Priority
  • Difficulty of implementation
  • Communication/change control
  • Inhibitors to remediation
    • MOUs
    • SLAs
    • Business process interruption
    • Degrading functionality

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Human Computer Interaction Discussion 2

which of the interaction types do you feel most influence interface design challenges?

After reading Chapter 3, which of the interaction types do you feel most influence interface design challenges? You are required to write a statement that is LIMITED to 150 words. This is an opinion question; therefore, research is not required. Should you cite the work of others, please provide the source of your opinion in APA format.
 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

opentext process suite with CRM

 

In answer to the challenges Nelnet faces in servicing a growing volume of student loans, the company chose to deploy a knowledge management system called OpenText Process Suite. Go online and investigate the features and capabilities of this suite of software products. What functions does Open Text provide that can augment and assist customer relationship management (CRM) systems? Find and briefly summarize a customer success story of an organization that integrated Open Text with its CRM system.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now