Organizational Leader and Decision Making – Discussion

Note: Please find  the attachments of course syllabus and Textbook

Week 8 Discussion 

This is a shortened week and therefore we are going to complete a reflection activity.This discussion topic is to be reflective of the course material.  Therefore, use your own words to respond to the following questions:

  1. What other topics would you have liked to have covered in this course?
  2. What reading did you find most interesting and why?
  3. How has this course changed your perspective or outlook moving forward?
  4. Any other topic of interest that you would like to add.

Please be sure to answer all the questions above in the initial post.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Artificial Intelligence 2

1.Read chapter 5 from the PDF file and do Games Homework 1.

2. Read chapter 6 from the PDF file and do exercises 6-1 and 6-5. 

For reference watch the 2 video’s at:
Video 1: http://csis.pace.edu/~benjamin/teaching/cs627online/webfiles/ConstraintSat isfaction1.mp4
Video 2: http://csis.pace.edu/~benjamin/teaching/cs627online/webfiles/ConstraintSat isfaction2.mp4

3. Read chapters 7 and 8 from the PDF file and do Logic Homework 1. 

For reference watch only the first two videos at,

http://videolectures.net/ssll09_tiu_intlo/

4. Read chapter 13 and sections 14.1 and 14.2 from the PDF file and do exercises 13-8 and 14-4. 

For reference watch the 3 video’s at:
Video 1: http://csis.pace.edu/~benjamin/teaching/cs627online/webfiles/Probability1. mp4
Video 2: http://csis.pace.edu/~benjamin/teaching/cs627online/webfiles/Probability2. mp4

Video 3:

http://csis.pace.edu/~benjamin/teaching/cs627online/webfiles/Probability3. mp4

5. Read sections 18.1 through 18.3 from the PDF file and do Learning Homework 1.

For reference watch these videos:
I. http://videolectures.net/bootcamp07_guyon_itml/

II. https://www.youtube.com/watch?v=pLzE2Oh9QDI

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Web API and simple mobile app

I need help with the attached. How much for a 10 day turnaround?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Project 1 – System Scan Report

Hide Assignment InformationTurnitin®Turnitin® enabledThis assignment will be submitted to Turnitin®.Instructions

This week, you will submit your first project, the System Scan Report. Your report should include the following:

  • Introduction
  • Target System
  • Zenmap Scan
  • OpenVAS Scan
  • Open Socket Connection
  • Recommendations
  • References

If you haven’t already done so last week:

How Will My Work Be Evaluated?

1.2.1: Identify the target audience, the context, and the goal of the communication.

  • Provide a brief introduction explaining the services performed and a summary at the end with the important findings of the scan. Validate your recommendations using industry standard techniques. Include at least two to three references in IEEE format.

1.4.2: Use vocabulary appropriate for the discipline, genre, and intended audience.

  • Make sure the report to the client contains grammatically correct language without any spelling or typographical errors. Explain industry acronyms when they are introduced since they may be unfamiliar to the client.

10.1.2: Gather project requirements to meet stakeholder needs.

  • The client has asked for a Zenmap scan, an OpenVAS vulnerability scan, and to use other accepted industry practices for the systems scan. You will need to include screenshots and note the application versions that are listed and displayed in the scan results.

12.2.1: Identify systems for the risk assessment.

  • During any scan report, it is critical that you list the IP address of the system you are using to connect to the client’s corporate network (for auditing purposes) as well as the IP address of the system(s) that you are scanning. Discuss the scope of engagement and the limitations of your actions to stay within the parameters of the test.

12.2.2: Perform a risk analysis.

  • Explain to the client the security issues that are present on the Linux system. Discuss critical vulnerabilities that need to be addressed and the measures that may need to be taken to deal with the underlying security issues (additional staff, equipment, billable hours, etc.).

13.1.1: Create documentation appropriate to the stakeholder.

  • In this section, recommend that you and your contractors perform a full penetration test on the target system. Mention the implications (ransomware, exfiltration, credential harvesting, etc.) that might occur if the security issues are not addressed.

When you are finished, click “add a file” to upload your work, and then click the Submit button.

Hide Rubrics

Rubric Name: Project 1 – System Scan Report

This table lists criteria and criteria group name in the first column. The first row lists level names and includes scores if the rubric uses a numeric scoring method.CriteriaExceeds Performance RequirementsMeets Performance RequirementsApproaches Performance RequirementsDoes Not Meet Performance RequirementsCriterion Score1.2.1: Identify the target audience, the context, and the goal of the communication.10 points

Identifies the target audience, context, and goal of the communication in a clear and appropriate manner.

8.5 points

Identifies the target audience, the context, and the goal of the communication.

7.5 points

Attempts to Identify the target audience, the context, and the goal of the communication, but there are issues with accuracy or appropriateness.

0 points

Does not identify the target audience, the context, and the goal of the communication.

/ 101.4.2: Use vocabulary appropriate for the discipline, genre, and intended audience.10 points

Uses enhanced vocabulary highly appropriate for the discipline, genre, and intended audience.

8.5 points

Uses vocabulary appropriate for the discipline, genre, and intended audience.

7.5 points

Attempts to use vocabulary for the discipline, genre, and intended audience, but there are lapses and gaps.

0 points

Uses inappropriate vocabulary for the discipline, genre, and intended audience.

/ 1010.1.2: Gather project requirements to meet stakeholder needs.20 points

Identifies IT project requirements in a thorough and clear manner to meet all stated stakeholder needs.

17 points

Identifies IT project requirements to meet stated stakeholder needs.

15 points

Attempts to identify project requirements to meet stakeholder needs, but there are gaps and/or lack of clarity.

0 points

Does not identify IT project requirements to meet stated stakeholder needs.

/ 2012.2.1: Identify systems for the risk assessment20 points

Clearly identifies the most critical vulnerabilities with the system and accurately describes the security issues that need to be addressed.

17 points

Identifies most of the vulnerabilities with the system and describes most of the security issues that need to be addressed.

15 points

Identifies some of the vulnerabilities with the system and describes some of the security issues that need to be addressed.

0 points

Does not address the vulnerabilities with the system and does not describe the security issues that need to be addressed.

/ 2012.2.2: Perform a risk analysis.20 points

Performs a thorough risk analysis and clearly identifies the impact and threat of the vulnerability.

17 points

Performs a risk analysis anidentifies the impact and threat of the vulnerability.

15 points

Performs a risk analysis but does not discuss the impact and / or threat.

0 points

Does not perform a risk analysis.

/ 2013.1.1: Create documentation appropriate to the stakeholder.20 points

Creates thorough and accurate IT documentation that exceeds requirements.

17 points

Creates IT documentation that meets requirements.

15 points

Creates IT documentation that lacks detail and/or does not fully meet requirements.

0 points

Does not create appropriate IT documentation.

/ 20Rubric Total ScoreTotal/ 100

Overall Score

Overall Score

Exceeds Performance Requirements90 points minimum

Meets Performance Requirements80 points minimum

Approaches Performance Requirements70 points minimum

Does Not Meet Performance Requirements0 points minimum

Associated Learning ObjectivesLearning Objective1.2.1: Identify the target audience, the context, and the goal of the communication.Assessment Method:  Score on Criteria – 1.2.1: Identify the target audience, the context, and the goal of the communication.Required Performance:  Meets Performance RequirementsLearning Objective1.4.2: Use vocabulary appropriate for the discipline, genre, and intended audience.Assessment Method:  Score on Criteria – 1.4.2: Use vocabulary appropriate for the discipline, genre, and intended audience.Required Performance:  Meets Performance RequirementsLearning Objective10.1.2: Gather project requirements to meet stakeholder needs.Assessment Method:  Score on Criteria – 10.1.2: Gather project requirements to meet stakeholder needs.Required Performance:  Meets Performance RequirementsLearning Objective12.2.1: Identify systems for the risk assessment.Assessment Method:  Score on Criteria – 12.2.1: Identify systems for the risk assessmentRequired Performance:  Meets Performance RequirementsLearning Objective12.2.2: Perform a risk analysis.Assessment Method:  Score on Criteria – 12.2.2: Perform a risk analysis.Required Performance:  Meets Performance RequirementsLearning Objective13.1.1: Create documentation appropriate to the stakeholder.Assessment Method:  Score on Criteria – 13.1.1: Create documentation appropriate to the stakeholder.Required Performance:  Meets Performance Requiremen

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

week 4 Discussion – Operational Excellence

 Find the attachment and answer these questions 

  • Ch. 5: What were the key structure and scope decisions taken by this company?
  • Ch. 9: How is the operations function organized for this company?
  • Ch. 12: Describe the operation of supply chain for this organization.
  • Ch. 13: Identify any inventory management practices performed by this company.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

cloud computing

In 300 – 450 words, and using the Jamsa (2013) textbook as your ONLY source:

List FOUR (4) questions to ask about Collaborative Tools as stated by Jamsa. Then, in YOUR  OWN words, and in response to the four questions, and from a business owner’s perspective, explain possible issues that could arise in the business if the questions are NOT answered.    

            

Chapter 7 Collaboration in the Cloud Collaborating in the Clouds 

   

Questions to Ask About Collaborative Tools 

Web-Based Collaboration Began with Web Mail

Instant Messaging Isn’t What It Used to Be 

Cloud-Based Phone and Fax Systems 

Revisiting File Sharing 

   Editing Shared Files Within the Cloud 

Collaborating via Web Logs (Blogs) 

Collaborative Meetings in the Cloud 

Virtual Presentations and Lectures
Using Social Media for Collaboration
Using Cloud-Based Calendar Management Using Streaming Video Content to Collaborate 

             Please note to refer Chapter-7, and answer the 4 questions. Textbook as attached.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

final assignment (JAVA PROGRAMMING)

Overview

In this activity, you will revisit the Paint program from Module Six. Your original program calculated the amount of paint needed, but depending on the width and height, that value could be a long decimal. Your program will better suit the needs of the user if it can calculate the number of cans needed as an integer value. For example, given that 1 gallon = 1 can of paint, we might expect the Paint program from Module Six to output:

Paint needed: 2.142857142857143 gallons
Cans needed: 3.0 can(s)

You might at first think that you could just cast the gallonsPaintNeeded variable from a double to an integer type. However, that would merely cut off the decimal portion of the value, resulting in an underestimate of the number of cans needed. You might also consider rounding the number, but that would not work for the sample output provided above since normal rounding rules would suggest 2.0 cans, an underestimate. So, the computational problem you are faced with is to calculate the number of cans and round up to the nearest whole number. In order to determine if that method for rounding up exists as part of one of Java’s core classes, we need to consult the documentation. There might be a single method that we can use or we might have to use more than one method.

Prompt

For this assignment, you will complete the Paint program by adding code that calculates the number of cans of paint needed. Use the Uploading Files to Eclipse and the Downloading Files From Eclipse tutorials to help you with this project.

  1. Consult the official Java documentation for the Math class.
    1. Scroll to the Method Summary section of the Math class and review the methods and their descriptions. Look for a method that will help you.
    2. If a method looks promising, click on its name to see a more detailed description. Pay special attention to the argument(s) and the data type of the return value.
    3. Based on your review, select one or more methods from the Math class to use in your solution.
    4. When using a method from the Math class, use the syntax Math.methodname() when you implement the method. For example, if you decided to use the absolute value method, you would write something like: Math.abs().
  2. Open the Virtual Lab by clicking on the link in the Virtual Lab Access module. Then open your IDE and upload the Paint2.zip folder. Review the code for the Paint2.java class. Look for where it says //Complete this code block. Make sure the code you write does the following:
    1. Calculates the number of paint cans needed to paint the wall
    2. Rounds up to the nearest integer (use the test cases below to check your work)
    3. Outputs the number of cans needed for the user

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Clemenson Imaging LLC

 

Independent Project 6-6

Clemenson Imaging LLC analyzes increased revenue from the purchase and use of CT scan equipment. You determine the number of patients and procedures by technician and location and transpose technician names.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Week 5

 

again with a new issue. They have asked you to assist in hardening their systems to withstand cyberattacks that nation-state actors may conduct on national soil or to protect them if, for some other reason, their network security controls are compromised. Based on what you have learned thus far, suggest other threat vectors and what controls could be used to further mitigate those threats.

Instructions

Write a 3-4 page report in which you answer the following:

  1. Evaluate the threat posed by viruses, malicious code, and virus hoaxes, and the extent of their effect on computers and productivity.
  2. Analyze denial of service attacks and blended threats.
  3. Analyze the operation of a Trojan horse and how it is different from a standard virus.
  4. Analyze two threat vectors and what controls could be used in order to further mitigate those threats.
  5. Provide three sources to support your writing in addition to the textbook. Choose sources that are credible, relevant, and valid. Cite each source listed on your source page at least one time within your assignment. For help with research, writing, and citation, access the library or review library guides.

This course requires the use of Strayer Writing Standards (SWS). The library is your home for SWS assistance, including citations and formatting. Please refer to the Library site for all support. Check with your professor for any additional instructions.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

week 7

 

In the Week 3 Assignment, you assessed the security vulnerabilities of a business application and how to address them. In last week’s lab, you determined and configured the roles that are needed for application development and deployment. In this assignment, you apply what you have learned by assessing security aspects related to the implementation of your chosen application.

Preparation

Research security-related issues for implementing your chosen software including policies regarding implementation and management as well as integration with an existing system.

Instructions

Do the following:

  • Describe the human resources (roles and skills) required to both implement and manage your chosen software effectively. Include the permissions/access configurations for which each role should be provisioned.
  • Explain the importance of 3 security policy considerations for integrating the app with existing internal systems.
  • Assess how well the application addresses the following areas. Provide specific examples for support.
    • Access Control
    • Data & personnel isolation
    • Zero trust

This course requires the use of Strayer Writing Standards (SWS). The library is your home for SWS assistance, including citations and formatting. Please refer to the Library site for all support. Check with your professor for any additional instructions.

The specific course learning outcomes associated with this assignment are:

  • Evaluate application technologies and the security issues associated with them.
  • Define processes for ensuring web application security.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now