Why did you select PhD in Information Technology? Why did you select University of the Cumberlands?

 

  1. Why did you select PhD in Information Technology? Why did you select University of the Cumberlands?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

cyb-525

 

In this assignment, students will perform a security assessment on a firewall.

Using the networked VMs from the Access Control Environment Installation assignment, perform a port scan of the PFSense firewall system using the Kali VM. Create a screenshot showing the results.

Using the scan results, choose five open/closed ports and determine the applicable protocol/application.

For each port, research and explain why it is good (or bad) that the default configuration is standardized.

Research and implement the basics of PFSense post-installation configuration.

  1. Update to the latest stable version.
  2. Set HTTPS to port 8443.
  3. Include the traffic graph on the dashboard.
  4. Disable port traffic for World of Warcraft.
  5. Disable port traffic for torrent applications.
  6. Disable inbound ICMP protocol.
  7. Choose a social media website and disable all domains for that website.
  8. Choose a video streaming website and enable all domains for that website.  

Using the Kali VM, run another port scan. Note the differences against the original scan.

As a follow-up, research and explain the common vulnerabilities associated with the standard installation of this PFSense firewall.

Create a 700- to 1,200-word step-by-step instruction guide for the post-installation configuration. Make sure to include all required explanations and at least eight screenshots.

APA style is not required, but solid technical writing is expected.

This assignment uses a basic scoring guide, provided by your instructor. Please review the scoring guide prior to beginning the assignment to become familiar with the expectations for successful completion.

You are not required to submit this assignment to LopesWrite.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Special Risk Management Topics

Chapter 18(Attached) presented special risk management issues with Blue Wood Chocolates, and chapter 19(Attached) presented various financial risks at Kilgore Custom Milling. If Blue Wood Chocolate and Kilgore Custom Milling are to develop a risk management framework, who should lead the process at each company? Should a Chief Risk Officer (CRO) be appointed? If so, to whom should he/she report and have access to? How could smaller companies without the resources for a dedicated CRO deal with ERM? What is the role for the board in such a process? 

 

Original Discussion(What’s need to be done) –  As indicated above, if Blue Wood Chocolate and Kilgore Custom Milling are to develop a risk management framework, who should lead the process at each company? Should a Chief Risk Officer (CRO) be appointed? If so, to whom should he/she report and have access to? How could smaller companies without the resources for a dedicated CRO deal with ERM? What is the role for the board in such a process?

ANSWER ALL OF THE QUESTIONS ABOVE IN YOUR assignment

 

The original discussion should be a minimum of 300 words with at least 3 references in APA style.

After this, there is an attached document called “Discussion needs responses”. In this document there are three discussions which needs responses. Each response should be a minimum of 150 words.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Data mining Assignment

Imagine a Clustering problem where the educational researchers would like to find clusters of students (group of students) who have similar correlation patterns when it comes to the correlation of their GPA vs Income of their parents. And you are hired as the Data Scientist to do this job. 

What kind of Objective Function would you design?

Why?

Please use your own reasoning and explain it in detail.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Week 3 Assignment – Business Intelligence

Complete the following assignment in one MS word document:

Chapter 5 –discussion question #1-4 & exercise 6 & internet exercise #7 (go to  neuroshell.com click on the examples and look at the current examples.  The Gee Whiz example is no longer on the page.)

Chapter 6– discussion question #1-5 & exercise 4

When submitting work, be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) to support the work this week.

All work must be original (not copied from any source).

Discussion 1

Create a discussion thread (with your name) and answer the following question:

Discussion 1 (Chapter 5): What is the relationship between Naïve Bayes and Bayesian networks? What is the process of developing a Bayesian networks model?

Note: The first post should be made by Wednesday 11:59 p.m., EST. I am looking for active engagement in the discussion.  Please engage early and often.

Your response should be 250-300 words.  Respond to two postings provided by your classmates.

Discussion 2

Create a discussion thread (with your name) and answer the following question:

Discussion 2 (Chapter 6): List and briefly describe the nine-step process in con-ducting a neural network project.

Note: The first post should be made by Wednesday 11:59 p.m., EST. I am looking for active engagement in the discussion.  Please engage early and often.

Your response should be 250-300 words.  Respond to two postings provided by your classmates.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

programming

1.  A starter solution has been provided to you as zip file. When submitting your own unit test methods, zip the contents of the src directory into a single zipped file. Make sure the zipped file has a .zip extension (not .tar, .rar, .7z, etc.).

ObstaclesWarrior.zip

#2

Obstacle Warrior

Objectives: Create a Java program using programming fundamentals (file I/O, loops, conditional statements, arrays, functions)

Problem: In an effort to win a coding competition, you decided to create an awesome Obstacle Warrior game. The game is played on a 2-dimensional board similar to a Chess board, but the dimensions may be different. The minimum size of the board is 2×2. The board will have a Start square and an Exit square that are not stored on the board. Start and Exit squares cannot be the same. Other board squares may contain obstacles in the form of an integer that will define how the warrior position and score will be affected. The obstacle squares can have values from 0 to -10 only. The Start square is always a clear square. All clear squares are marked with # on the board. The Exit square may contain an obstacle that is not a zero. The size of the board, number of obstacles, and Start and Exit squares are all unknow to your code prior to running. This information is stored in a file that your code will read at the beginning of the game. The board.dat file must be read into a 2-D array.

A warrior must start at the Start square and find their way to the Exit square. The warrior can move on the board in any direction including diagonally, one square at a time. A warrior has a running score (integer) maintained from the start of the game until the warrior exits the board. If the warrior lands on an obstacle square with a value of zero, the warrior is sent back to the starting position and the obstacle square will become a normal square (obstacle removed). If the obstacle square has a negative number, that number will reduce the warrior’s score by the value of the obstacle, and the obstacle square will become a clear square (obstacle removed). Each VALID move that the warrior makes without landing on an obstacle will earn the warrior one point. The moves for the warrior are randomly generated by your code in the form of a direction (0-UP, 1-DOWN, 2-LEFT, 3-RIGHT, 4-UPRIGHT, 5-DOWNRIGHT, 6-UPLEFT, 7-DOWNLEFT). If the warrior is at the boundary of the board and your code generates an invalid move, that move will be ignored. Your code will keep generating moves until the warrior exits at the Exit square. Once the warrior exits, your program will store the updated board information to a new file ResultBoard.dat as single-space separated data. The program will also display the total number of valid moves, the total time elapsed in milliseconds since the first move until the warrior exited the board, the final score of the warrior and the formatted board information (right aligned columns with total of 5 spaces).

Output Format:

  • Each column in the final board display must be of total width of 5 spaces
  • Data in each column must be right aligned

Enter the board data file path: C:\board.dat //Repeat prompt until valid file OR show error and exit.

Type “Start” to start the game or “Exit” to exit the game: exit //Your program must exit

Enter the board file path: C:\board.dat

Type “Start” to start the game or “Exit” to exit the game: start //You may display the moves and the running score after each move but it is not required

The warrior made 270 valid moves in 503 milliseconds. The final score is 175 points.

 #  #  #  #  #

 #  #  #  0  #

 #  #  #  #  #

 #  -3  #  #  -4

 #  #  #  #  #

Press any key to exit!

Program Structure: Your code should be modular and easy to understand. In addition to the main method, the following methods are required to be in your code. These methods will be used by the unit testing to test the accuracy of your code.

public static String[][] ReadBoardFromFile(String fileName, Position startPosition, Position exitPosition)

public static boolean WriteBoardToFile(String fileName, String[][] boardArray)

public static int GenerateDirection()

public static boolean MoveWarrior(int direction, String[][] boardArray, Position currentPosition)

public static int CalculateWarriorScore(int currentScore, Position currentPosition, String[][] boardArray)

public static String DisplayResults(int currentScore, int numberOfMoves, int timeElapsed, String[][] boardArray)

Program Flow:

  • Program starts in main() method
  • Prompt user for Board.dat file path
  • Read board from file
  • Generate a direction
  • Move the warrior
  • Calculate new score
  • Check conditions and clear square if needed
  • Repeat until the warrior is at the exit square
  • Display the results
  • Prompt user to exit game

Board.dat file format:

  • The data in the file will be separated by one space
  • Assume that all data in the file is valid
  • Clear and Start squares (no obstacles) will be marked with # in the file
  • The first line of the file contains the dimensions of the board (rows and columns) e.g. 3 7
  • The second line contains the Start square indexes (rowIndex, columnIndex)
  • The third line contains the Exit square indexes (rowIndex, columnIndex)
  • The rest of the lines represent the contents, including obstacles, of a row on the board
  • Example of a Board size 5×5 data file:

5 5

2 2

4 3

# -5 # # #

# # # 0 #

# # # # #

# -3 # # -4

-10 # # # #

**ResultBoard.dat file format: **

  • Data must be separated by a single space

# # # # #

# # # 0 #

# # # # #

# -3 # # -4

# # # # #

Grading:

  • Coding standards, style and comments (10 Points)
  • Unit testing methods x6, one for each of the methods mentioned above (10 Points)
  • ReadBoardFromFile (10 Points)
  • WriteBoardToFile (10 Points)
  • GenerateDirection (10 Points)
  • MoveWarrior (20 Points)
  • CalculateWarriorScore (20 Points)
  • DisplayResults (10 Points)

Notes:

  • The “Position” class has been provided to you. You may add new methods/constructors to this class, but don’t change existing methods
  • Part 1 deliverables: Unit Test methods only – Submit on eLearning
  • Part 2 deliverables: Functioning program – Submit on zyBooks (You may resubmit your Unit Test method on eLearning)

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Project 1: Subnetting

In CCA 610: Cloud Services and Technology, you assumed the role of an IT analyst at BallotOnline, a company providing electronic voting solutions worldwide. Your proposal to begin migrating systems to the cloud has been approved.BallotOnline has now initiated preparations for the cloud deployment. The company decided to start with deeper investigations of crucial technologies enabling cloud computing. You became acquainted with the basics of these technologies in CCA 610. In this project, you will conduct more in-depth investigation of cloud networking, which makes cloud connectivity on-demand operations possible. You need to have a good understanding of this as you prepare the BallotOnline network for migration to the cloud as well as designing the appropriate network infrastructure in the cloud for BallotOnline.To do that, you will assume the role of a BallotOnline network engineer. You will explore the network protocols that enable the company and its customers to connect to the cloud, as well as technologies making it possible to create on-demand in-cloud virtual networks into which the cloud resources will be deployed.You will conduct two lab experiments exploring the TCP/IP protocols and software-defined networking. You will also perform a subnetting task to demonstrate your understanding of TCP/IP network addressing. Your final deliverable will be the technical report describing your findings and explaining the use of these technologies for BallotOnline’s cloud deployment.

Step 1: Review Networking Concepts

In this step, you will establish an understanding of networking concepts and terms. It will help the recipients of your technical report, including BallotOnline’s technical management, to become familiar with networking vocabulary and definitions. You will start by reviewing basic networking concepts such as local area network (LAN), Ethernet, and packet switching—the technique of splitting transmitted data into smaller portions and transmitting them separately. Splitting data into packets, transmitting the packets reliably, and reassembling the data is performed by networking software. It is important to know about basic networking concepts since they serve as the underlying technology for cloud computing. This will ultimately prepare you to submit your technical report for this project. (http://intronetworks.cs.luc.edu/current/html/intro.html)Networking software follows the popular model of the layered design of network protocols, with each layer using the functionality of the layer below it and implementing new functionality to be used by the layer above. The technical report should include the popular internet suite of protocols—TCP/IP. Application protocols such as HTTP or SMTP are implemented in layers above TCP/IP. (http://intronetworks.cs.luc.edu/current2/html/tcpA.html?highlight=transmission%20control%20protocol)Other basic networking concepts include Domain Name Service, network firewalls, and Network Address Translation. As the network engineer for BallotOnline, you know that these protocols play an important role in enabling cloud computing. 

Step 2: Explore Internet Packet Switching—IP

The Internet Protocol (IP) is the workhorse of today’s internet connectivity. As the network engineer for BallotOnline, you know that today’s cloud computing is built on top of IP. Most communication between systems in the cloud is done using this protocol.IP employs the technique of packet switching, which breaks the data to be transmitted into smaller parts, called packets or datagrams, that are sent over the network independently. Understanding IP is crucial to designing and maintaining cloud deployments, which are provisioned within virtual IP networks and accessed via global internet. You will review the basic elements of IP protocol and include their brief discussion in your technical report.Network devices have a network address to allow other devices to connect to it. The network addresses used in IP are called IP addressing. BallotOnline will need IPv4 addressing to be able to provide network addresses to a cloud system and to create a virtual network in the cloud.Every system on the network must have an IP address. The assignments of IP addresses to the network systems can be done manually or dynamically through a Dynamic Host Configuration Protocol (DHCP) server. As the network engineer for BallotOnline, you know that manually assigning IP addresses is time-consuming and should only be used on a small number of systems where the IP address will not change frequently. (http://intronetworks.cs.luc.edu/current/html/ipv4.html#dynamic-host-configuration-protocol-dhcp)Because numeric addresses are not human-friendly, a domain/machine naming convention defines human-readable names for internet hosts. An internet-based service called DNS (Domain Name System) provides translation between the IP addresses and the domain names. In general, people will use the domain names when addressing a system on the internet instead of using its IP address. You will need to explain in the technical report how DNS is used alongside IP addresses.  As the network engineer for BallotOnline, you also know the importance of IP routing, the mechanism used to route the IP packets across the internet from the sender to the recipient. IP routing of IP packets is accomplished by network routers, which determine the next destination for each packet and are able to learn new routes. (http://dtucker.cs.edinboro.edu/IPRouting.htm) (https://www.learncisco.net/courses/icnd-1/lan-connections/packet-delivery-process-at-l3.html)

Step 3: Investigate Internet Transport—TCP

As robust as the IP protocol is, it does not perform the actual transmission of the data. In this step, you will investigate the network protocol called Transmission Control Protocol (TCP), responsible for creation, reliability of delivery, and proper assembling of data packets. In addition to IP, TCP is also widely used on the internet, especially for any network communication where it is essential to confirm receipt of the transmission. Many of the network protocols used to implement cloud computing use both TCP and IP. You will review TCP’s workings and discuss them in your final technical report. In general, there is no guarantee that a data packet will reach its destination. Packets can get lost or corrupted during transmission, and there are network applications where you need assurance that the packets have reached their destination. To achieve reliability, TCP establishes connections between communicating hosts, using port numbers to refer to applications on these hosts. Then, packets are created, sequenced, transmitted, acknowledged, and retransmitted if missing or containing errors. Finally, at the destination, they are reassembled into the original messages. To synchronize the flow of packets between sender and receiver, and avoid packet congestion in case of varying speeds, TCP uses sliding windows for packets remaining in processing at a given time, at both the sender and receiver ends. (http://intronetworks.cs.luc.edu/current/html/slidingwindows.html#sliding-windows)

Step 4: Review Advantages of IP Subnetting

One of the drawbacks of IPv4 is the maximum number of network devices it can support. IPv4 addressing uses a 32-bit network address. This allows for 232, or a little over 4 billion devices. However, today there are significantly more devices on the internet. Even though the more robust IPv6 version has been introduced and efforts are underway to assure wide adoption, IPv4 is still widely used. One method used to more efficiently use the IPv4 network addresses is a technique to optimize the addresses by splitting them into network addresses and host addresses within designated networks. 

You will need to take advantage of IP address splitting so that you can efficiently use and allocate the IPv4 network addresses that have been assigned to BallotOnline.For a given large network, rather than addressing all the hosts using the host part of the address, subnetting allows for splitting the network into several smaller ones by borrowing the host part bits and adding them to the network bits (http://intronetworks.cs.luc.edu/current/html/ipv4.html#ipv4-subnets ). 

It supports efficient management of local networks composed of multiple LANs. In this step, you will investigate subnetting conventions and discuss them in your final report in order to lay ground for the use of subnets by BallotOnline.As the network engineer for BallotOnline, you know that subnetting a network into several smaller and variable-sized networks will be best for the organization’s needs. 

BallotOnline has been assigned a network address block by the Internet Assigned Numbers Authority (IANA). ( https://www.iana.org/ )Because BallotOnline has several offices around the world, you will need to subnet this network address to assign just the right number of addresses to each office location based on the number of systems at that office location. The following is the network address assigned by IANA and the number of offices along with their sizes:

208.101.170.0/24 subnetted to 16 subnets and provide information for subnets #1, #4, #5, and #16

Your task is to create the appropriate number of subnets with the right size to optimize the network. Your technical report should include Classless Interdomain Routing (CIDR) notation, which allows for specifying a variable-length network as part of the IPv4 address, leaving the rest for addressing hosts within the network. ( https://opensource.com/article/16/12/cidr-network-notation-configuration-linux )

***Network address assigned by IANA and the number of offices along with their sizes***

+++Submission for Project 1: Subnetting+++

The first interim deliverable for Project 1 is for you to learn about subnetting and demonstrate that you know how to do this. 

208.101.170.0/24 subnetted to 16 subnets and provide information for subnets #1, #4, #5, and #16

The deliverable is for you to provide the following information for each of the subnet identified (there are four of them for each problem):

  • Network address
  • Subnet Mask
  • Range of IP Addresses available
  • Broadcast Address
  • The number of subnets that you will be able to get
  • The number of hosts that each subnet will be able to have

You will also need to show the calculation on how you get your answers.

 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Discussion: Roles and Responsibilities in IT

 

In this module, you are learning about various IT disciplines, roles, and responsibilities in the field, and the certifications and degrees that equip you for those roles. In this discussion, you will examine various IT roles to find one of interest to you. You will learn about the skills and technologies used in these roles and how they can be transferred to other IT disciplines.

For your initial post, use a website such as the Bureau of Labor and Statistics Occupational Outlook Handbook or CompTIA’s Cyberstates Interactive Map to determine your areas of interest in the IT field. Then, choose a job title or role in that area of interest. In your post, describe how this role is situated within the broader IT fields discussed in this unit, and define the responsibilities of the role.

In your responses to your peers, discuss the job title or role they chose. In your response, describe the tools, skills, and certifications your peer would need to be successful in the identified role. Additionally, describe at least one other role that these skills and certifications could be used in.

To complete this assignment, review the Discussion Rubric.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

“Lost in the woods… a simulation experiment”

“Lost in the woods… a simulation experiment”

Much of the software development work you will do in this course will be done in groups. In HW1, we will apply Pair Programming approach. You will be randomly assigned a partner (unless you choose one), and the two of you will work together on this assignment. You may NOT work with anyone else on this assignment. If you need clarifications, please email me.

The Setup: Imagine two people are lost in a large forest. There is an impossibly difficult barrier that surrounds the forest. The two people wander around aimlessly. If they happen to end up in roughly the same part of the forest, they see each other and are happier than if they are all alone. Depending on how big the forest is, and how quickly they wander about, I wonder how long it will take for them to find each other?

Your Assignment: Write a program that works on the following problem:

  1. The woods are represented by a rectangular grid that is A units wide and B units tall. We will assume for this assignment that both A and B are integers, and that 2 <= A <=50, and 2 <= B <= 50, and that A and B may or may not be the same integer. We will leave the units for A and B unnamed. (Maybe it is yards, maybe kilometers… it doesn’t matter for the assignment.) At the start of your program, you should ask the interactive user to enter values for A and B. Your program should tell the user what’s going on in the simulation, and should prompt with the limits made clear. If the user does not enter an appropriate value for A or B, the program should give an appropriate error message, and then re-prompt (again with the limits shown) until both A and B have been specified correctly by the user.
  2. I will call the two people wandering Pat and Chris. Pat will start in the upper left corner of the grid, and Chris will start in the lower right corner of the grid. The grid is surrounded on all four sides by the impossible barrier.
  3. Pat and Chris try to move from one cell in the grid to another cell in the grid simultaneously. Time units are
    integers; time starts at 0 and is incremented by one at each time step. (Again, we won’t specify what the time units represent. They could be seconds, or hours, or…) Your program does NOT need to go as slowly as the two people wandering around in the woods!
  4. At each time unit, each person tries to move one unit by randomly choosing one direction, either North, South, East, West, Northeast, Northwest, Southeast, or Southwest. However, if the randomly selected direction takes the person into the barrier, they just stay at the same place they were at the start of that time unit. For example, since Pat starts in the upper left corner of the grid, if Pat randomly decides to go North, West, Northwest, Southwest, or Northeast, then Pat will not move out of the upper left corner on that turn. However, if Pat randomly decides to go any of the other three directions, than Pat will actually move to a new cell.
  5. Simulate the random moves of Pat and Chris until one of two things happens: (A) Pat and Chris wind up in the same cell of the grid (they find each other), or (B) they do not meet after 1 million time units. When either of these things occurs, the problem halts and outputs to the screen how the simulation ended, and how many time steps occurred before the simulation ended. The program should pause until the interactive user pushes ENTER so that the user can read the output to the screen. After the user pushes ENTER, the program should halt.

What to submit?

  1. Your program! Which should AT LEAST do what is described above (the functional requirements): explain the simulation to an interactive user, get the values A and B from the user, do the simulation, and then output the result.
  2. HOWEVER, for full marks, you should do MORE than what is described above. The “more” is up to you. How might you visually display the results using text? Maybe you could run the simulation multiple times and give things like the maximum, minimum, and average time until Pat and Chris meet. After you get your program working, you might want to “play” with it a little, adding some code to explore a question or two about wandering in the woods. For example, it stands to reason that in a smaller forest (like a 2 X 2), it won’t take very long (on average) for our two hapless hikers to meet. As the forest gets bigger (4 X 4, 6 X 6, 8 X 8, and so on), we expect it to take longer (on average) for Pat and Chris to meet. But is the increase linear in the size of the grid?

Or might it be geometric? What other interesting questions might you explore? Graphics are going to be tough

this time (more on this soon), so think numbers and text, not pictures, for your “more.”
3. Design document, at this stage, I need class diagrams of the classes used showing the relations between them.

WHICH PROGRAMMING LANGUAGE MUST YOU USE? Java, or Python, if you want to use another language, please contact me before.

PROGRAMMING TIP: Since you want the wandering to be “random,” you should make sure that if you run your program twice with the same A and B inputs, you usually get DIFFERENT behavior. (I have to say “usually” there because every once in a while, you could get exactly the same behavior just by chance.) To make this happen, randomize your random number generator ONCE (right at the start of your program). Don’t randomize it in an inner loop – that’s terribly inefficient and unnecessary. Most programming languages have a built-in random number generator.

It is better to hand in something simple that works, and on time, rather than handing in something fancy that is either late or doesn’t work. The best HW1 programs will work, be on time, be well documented (see below), and will do something interesting.

The specification above mentions “well documented.” Here are some hints of what good documentation might look like:

Start your program with an “opening comment.” You may include more items than the items listed here, but you may NOT leave out any of the items mentioned here. If you DO leave any of these out, or if you do a poor job on any of them, you will lose points. If one of these items is not applicable to your program (for example, if it doesn’t use any external files), then include the name of the item in your opening comment but add “N/A” or “none” to indicate that this isn’t applicable to your program.

Items to include in your opening comment:

  • a title for your program
  • the name of the file that holds your program
  • a list of any external files necessary to run your program
  • a list of external files your program creates (If you list any external files, briefly explain what each of them
    contains.)
  • the names of any programmers working on the program (for HW1, this is just you)
  • email address of all programmers
  • the course number and section number of the course you’re writing this program for
  • the date you finished the program and submitted it
  • an explanation of what the program does
  • any resources you used to complete the program (Always give credit where credit is due; for example, if you
    used a website to check on an algorithm, list that here.)
    Other comments that are required:
  • each declaration should include a comment that explains its use
  • each subprogram (function, subroutine, object,…) should have an opening comment describing its purpose)
  • each loop should be preceded by a comment that describes its purpose
  • any statement that is particularly unclear or “tricky” should have a comment clarifying its use to the human
    reader

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

2 Discussions and 1 Case Study and 1 Weekly summary

Discussion 5.1

Many organizations are concerned about the rising cost of employee benefits and question their value to the organization and to the employees.  In your opinion, what benefits are of greatest value to employees? To the organization? Why?  What can management do to increase the value to the organization of the benefits provided to employees?

Discussion 5.2 

When OSHA was enacted in 1970, it was heralded as the most important new source of protection for the U.S. worker in the second half of the twentieth century. From the information in this chapter, what is your opinion about the effectiveness or the ineffectiveness of the act? Should it be expanded, or it should businesses have more freedom to determine safety standards for their workers?

Case Study 5.1 4 pages

There are two (2) case studies per chapter. You are to respond to one (1) case from Chapter 9 and one (1) case study from Chapter 10.

Chapter 9 – Managing Compensation: (Choose one case study)

Case Study 1 – Pay Decisions at performance Sport, pg. 377 and answer the questions

Case Study 2 – An In-N-Out Pay Strategy: Costa Vida’s Decision to Boost Pay. pg. 378 and answer the questions

Chapter 10 – Pay for Performance: Incentive Rewards (Choose one case study)

Case Study 1 – United States Auto Industry Back on Top…of CEO Pay, pg. 413 and answer the questions

Case Study 2 – Team Based Incentives: Not Your Usual Office, pg. 414 and answer the questions

Weekly Summary 5.1

Write 2 pages from the chapter 9 and chapter 10 attached PPT

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now