Do not create new permanent tables. I must be able to run your code using the three assigned tables
Semester Project Company
This assignment continues your work towards your Semester Project. Now that you have seen what the Internet offers in the way of templates for security policies, you will need to provide a basic background for the organization and its network that you want to model your Security Policy for. This is typically step one for any professional developing such a document, but since this would most likely be the first time you’ve ever done this and there’s no existing organization to analyze, you need to start somewhere. So for this assignment, do the following:
– The general description of your organization (think about organizations other than IT organizations; i.e. non-profits in your geographic area, healthcare businesses, retail businesses, manufacturing businesses, etc.) You will be writing a security policy for this business. Picking a non-profit might be a nice idea. It gets you involved in your community.
P.s: a U.S. company is recommended for this assignment
Overview JM new
In this course, you will assume the role of an IT team member for a fictitious company, Don & Associates. This will help you learn about an IT professional’s role and how to develop solutions on the job.
Don & Associates is a financial consulting company that provide services to small- and medium-sized companies. The company operates networks and servers, as well as other physical technological infrastructure.
Don & Associates is looking to expand its services and locations, but the owner of the company is worried about the cost of acquiring additional equipment and is also concerned about maintenance and space. The owner is looking for an innovative solution that will reduce the operational cost of expansion.
1: Executive Summary—In this assignment, you will develop a high-level overview in the form of an executive summary that will review the types of cloud computing, describe the advantages of moving operations to the cloud, and include a brief introduction of the major cloud vendors.
complete the method named countdown (method stub provided) so that it accepts an int countFrom as its parameter and prints each number from countFrom to 1 on a single line separated by a space. This method should not return anything (void return type).
complete the method named countdown (method stub provided) so that it accepts an int countFrom as its parameter and prints each number from countFrom to 1 on a single line separated by a space. This method should not return anything (void return type).
Hint: Use a loop and think about the starting value you want to print, the ending value that will print, and how you want to update the value between iterations.
Example: countdown(5) should print: 5 4 3 2 1 Example2: countdown(-1) should not print anything. Example3: countdown(9) should print: 9 8 7 6 5 4 3 2 1
Ensure you are thoroughly calling and testing your methods before submitting to zyBooks.
Problem 2 – Arrays as Parameters
Complete the curve method (method stub provided for you) so that it loops through the int[] grades, incrementing each non-zero grade by 2. Grades of 0 should not be changed. This method should not print or return anything, but should modify the contents of the grades array.
Hint – you can test that your method works in main by printing the values in grades both before and after this method is called.
Example: Passing in an int[] containing: {95, 80} should modify the array to {97,82} Example2: Passing in a int[] containing: {70, 0, 99} should modify the array to {72, 0, 101}
Problem 3 – Returning Arrays, Arrays as Parameters, String methods
Write a method named acronyms that accepts an array of type String as its parameter and returns an array of type char. This method stub is not provided for you. Method name, return type, and parameter(s) should match exactly to receive credit. You should not use the keyword static in the method header.
Your method should create a new char array the same size as the String array passed in. You should then use a loop to populate the char array with the first letter of each individual String stored in the array.
Hint – the charAt method in the String class retrieves a single char from a specified index.
Example: Passing in an String[] containing: {“tiger”, “king”} should return a char[] of size 2 containing {‘t’, ‘k’} Example2: Passing in an String[] containing: {“go dawgs”, “uga”, “java”} should return a char[] of size 3 containing {‘g’, ‘u’, ‘j’}
Problem 4 – Scanner in methods, String methods, Algorithm design, Return Statements
Write a method named setPassword that accepts a Scanner object as its parameter and returns a boolean. This method stub is not provided for you. Method name, return type, and parameter(s) should match exactly to receive credit. You should not use the keyword static in the method header.
Your method should read in a String password using the nextLine method and the the Scanner object passed in as the method parameter. Your method should then return either true or false depending on if all criteria of a password is met.
A valid password (returning true) would have the following criteria:
- The password contains at least 8 characters
- The password contains at least 1 capital letter/char
- The password contains at least 1 lowercase letter/char
If ALL of the above conditions are met, your method should return true. If any of the above conditions are NOT met, your method should return false.
Example: a user input of “Coding99” or “Java12345” would return true Example2: a user input of “Java123” would return false //only 7 characters Example3: a user input of “JAVA12345” would return false //no lowercase Example4: a user input of “java12345” would return false //no uppercase
import java.util.Scanner; //imported for you!
public class Exam2
{
//Problem 1
public void countdown(int countFrom)
{
//YOUR CODE HERE
}
//Problem 2
public void curve(int[] grades)
{
//YOUR CODE HERE
}
//Problem 3
//method stub not provided – YOUR CODE HERE
//Problem 4
//method stub not provided – YOUR CODE HERE
}
import java.util.*; //All items in java.util package (Scanner, ArrayList, HashSet, etc.) imported for you
public class Main
{
public static void main(String[] args)
{
//You can test your code here.
//This file is not graded.
}
}
Computer Science
Computer Science Foundations (Subject)
1. Why is using specific nomenclature important? Back up your reasoning with at least two references not including the textbook (250 words)
2. Come up with a logical statement with the form that uses if —, then —-. Present your statement in the form of a universal statement. Then provide the inverse statement. (250 words)
Foundations(Subject)
1. Discuss the technical advantages and disadvantages of both Broadcom’s Integrated Database Management System (CA-IDMS) AND MongoDB. (250 words)
2. Discuss the advantages and disadvantages of both Java and Ruby (250 words)
software Engineering
Stage 4: 10/10– 10/23 (Sunday), 11:59pm (CST) Architecture and Plan.
Architecture
In Stage 3, you detailed what your software is going to do from a design perspective. All of those choices you made are about the problem you are solving with the software; those details concern the world. In this Stage, you’re going to specify how you’re going to achieve those requirements, defining your software’s architecture.
To simplify this, we’re going to use the architectural concepts relevant to the Model-View-Controller and Client-Server architectures:
- Client-Server architectures involve two kinds of components—clients and servers—exchanging messages with each other. On the internet, these messages are http requests.
- Model-View-Controller architectures involve a model to persist and retrieve data, views to display data and elicit it from users, and a controller to implement the application’s logic for passing data back and forth between the model and views, as well as manipulating data.
- In web applications, models, views, and controllers can live on either the client, the server, or both. For example, when you use a database, the model is on the server side. But your application might only store data on the client side if it only needs to persist data on the device accessing the site. It might also persist all data on the server, but then send all of the data on the client, so there are actually models on both the client and the server. The same is true of views: some applications render all HTML/CSS/JavaScript views on the client side, while others render all HTML and CSS on the server.
Your job in this Stage is to decide how you’re going to organize your clients, servers, models, views, and controllers. To do this, your team is going to create two things.
1. A description of all components
First, write a Word file that specifies all of the models, controllers, and views in your application. For each, describe:
- What the component’s responsibility is
- Whether the component resides on the client, the server, or both
- What other components the component needs to communicate with and precisely what they will communicate.
Here’s an example of a description of a model component for our arithmetic game example from previous homeworks:
LearningModel
- This component is a model that stores all of the questions the game has asked the player and all of the answers the player has given to the game.
- The model resides only on the client.
- Only the GameController communicates with the model. It communicates the following:
- The GameController can ask the LearningModel to store a question/answer pair
- The GameController can ask the LearningModel for the proportion of correct answers
- The GameController can ask the LearningModel for all of the stored question/answer pairs.
The architecture of the game would therefore also contain descriptions of the GameController, but also several views components that implement the user interface of the game, such as the view that displays the question, the view that displays the answer, the start screen view, etc.
How many components should you have? There is no right number, but consider a few extremes. If you only had one monolithic component, where there was no encapsulation between any of the data and functionality, you’d have a big “ball of mud” architecture that’s going to be hard to understand, and therefore hard to evolve and repair. If you had a thousand little components for every tiny bit of functionality, most of your code would be communicating between components. You want something in the middle, where there’s enough division of responsibilities that everyone on your team can understand how the functionality is organized, but not so many that you’re writing a lot of extra code just to make things talk to each other.
Note that you don’t have to specify components you aren’t building. For example, if you choose to use something like Firebase, you don’t need to specify Firebase. But some of your components may need to mention that they’re going to communicate with cloud storage to store and retrieve data. Additionally, you’ll likely have a client-side model of data in the cloud storage, so your client side components can access the data.
2. Stubs for all components
Once you have all of your components described, create stubs to represent all of these components and their functionality as source files. A stub is a partial implementation of something in source code, intended to help you architect the larger pieces of an implementation without fully implementing them.
For example, here is a stub of a function that takes an age in years and returns an array of strings describing civil rights movements that someone likely experienced in their life:
function getCivilRightsExperiences(age) {
// TODO Replace with actual algorithm
return ["Voting rights act of 1965"];
}
Notice how the stub specifies the inputs and outputs, but nothing about how they’re computed? It’s just a stand-in for functionality you’ll eventually write.
Since you’re using HTML, CSS, JavaScript, and/or React, there are a few clear implications for the kind of stubs you’ll create:
- All of your views will either be React components or some combination of HTML, CSS, and JavaScript. When you make each component, you’ll have to decide how you’ll be implementing them.
- Your model will either be some form of JavaScript on the client side or any arbitrary combination of server-side scripting language and/or a database.
- Your controller will either be JavaScript, a React component, or a server-side script, depending on where you decide to implement your application logic.
None of these components need to have functionality, but they do have to have names, source files, and all of the function headers, with arguments, return values, preconditions, and postconditions, to specify the requests that the component can receive from other components. For example, the LearningModelmodel above should have functions defined for the three functions the GameController can call on the MasteryModel.
Developers Your goal is to complete as much of the architecture as you can in the discussion.
Stage 4 Architecture Submission Instructions:
The most important qualities of an architectural specification are clarity and consistency. If something is unclear or inconsistent, your collaboration will be constantly interrupted by the need to clarify and you’ll likely write code that you have to discard or change because of your misinterpretations. To incentivize you writing a clear, consistent document, for every unclear or inconsistent detail include, your team will lose 0.2 points. We will read both your document and your code for clarity and consistency.
Supply chain management
Need to present a discussions on
1. The author discusses what makes for good analytics and mentions that “garbage in equals garbage out”. Using a minimum of 5 sentences, explain what that means to you and, how garbage in garbage out could impact your reporting and business decisions. Feel free to include other attributes (pages 8-9) for good data.
2. How has Covid-19 impacted supply chains? How have you been impacted?
Covid-19 has impacted supply chains around the world and across all industries. In at least five sentences, explain how you have personally been impacted by supply chain disruptions since the pandemic started. Please exclude toilet paper. Touch on what you learned about supply chain disruptions and how labor and material shortages impact product availability.
Note : NO PLAGIARISM
Should have minimum of 5 statements which describes the information about the discussions.
Tips: Should be in simple own words and no usage of critical words and attached the file to know in detail to write on it. This question is from a Supply chain management subject so that the matter should relate to Supply chain management for sure and should connect to readers.
Deadline Oct21, 2022 12:00Pm.Est
URGENT
Project proposals are rarely accepted in their entirety in the first round. Usually what occurs is a series of back and forth between the proposing party and the sponsor to ensure that questions and tweaks are made before committing to move forward.
Congratulations, your proposal was one of the chosen few to move forward to the second round. Unfortunately, the project sponsor has some change requests that he would like for you to consider before submitting your proposal to the board.
- Request 1: Decrease total budget by 15%.
- Request 2: Decrease time to completion by 25%.
- Request 3: Create a role within the project that manages all security procedures for the data center (if not already identified) entitled ‘security specialist’.
- Request 4: Provide an estimate of the cost per year for a data center security specialist.
- Request 5: Develop and document a change request that enhances the value that the project will deliver to the sponsor and company. Hint: Consider a request that enhances a technical aspect of the solution.
As the project manager for this proposal, you are empowered to accommodate for requests as appropriate. Support any decision made with solid data. Be sure to consider the success of the project as you commit to making changes to cost and timelines. Include your decisions and updates in your project proposal (approximately six pages in length). Include any and all models, diagrams, wireframes, topography, and graphics needed to support your proposal.
Submit your proposal to your group’s discussion board (no later than 4 days before the assignment is due). Likewise, provide constructive feedback on the proposals posted by your group members (no less than 2 days before the assignment is due).
Draft an email as a response to the requests by your sponsor (maximum of two pages). This email will serve three purposes: Justify and explain the changes made to your proposal, then communicate the cost estimates of the security specialist. Lastly, determine whether a cloud solution or an on-site managed data center would be feasible for your project. Explain the benefits and pitfalls of both.
Submit your assignment as one document, beginning with the email and concluding with your final proposal.
SEED Lab – RSA Encryption and Signature Lab – Section 2, Lab Task 3.1 – 3.3
You are required to submit your code (as demonstrated in the lab manual) and running results (with comments if necessary).
An Industrial-Grade RSA System.
The RSA Corporation put out a number of public challenges with monetary rewards to factor some very large RSA moduli. RSA no longer offers such challenges, but RSA-640 was the last of these challenges that they put out in 2001 to be factored. The factorization was announced in 2005 by a team of scientists and it took 30 2.2GHz-Opteron-CPU years (in over 5 months of calendar time).
RSA-640 has 193 decimal digits (640 bits)
RSA-640 = 310741824049004372135075003588856793003734602284272754572016194882320644051808 150455634682967172328678243791627283803341547107310850191954852900733772482278 3525742386454014691736602477652346609
In the following tasks, use hexadecimal format for all numbers in your code:
Find the two prime factors and verify that they are indeed the factors of RSA-640. (Use VirtualBox and Openssl and BIGNUM library).
Activity 1- Proj Risk
1 Back to basics to start this course:
- Define project.
- What are the five project process areas – give a short explanation of each.
- What are ten project knowledge areas – give a short explanation of each.
- Define Project Risk – list the major processes related to project risk – explain how risk remediation is a [part of every day of pur lives.
- What were the variables you were tracking related to quality? How would you define quality in this project?
- Why is risk a dynamic variable within a project?
- How can a risk be related to a desirable event?
- Did you anticipate any risks at the outset? Did the project experience any outside forces that caused a change in either the objectives or the approach to achieving those objectives?
#2 What is Agile?How is risk handled within an Agile project approach such as Scrum?What are the 10 project knowledge areas?In what ways can the following activities be seen as projects?In what ways do they resemble ongoing, routine business activities?Feel free to add assumptions and details to describe how the activity might be a project in one context and routine in another.
- Reading the chapter before attending a university lecture.
- Taking the bus to work each day.
- Piloting an aircraft between Vancouver and Fiji.
- Teaching a course for the first time; teaching the same course every semester.
Text-
Title: Managing Project Risks; 464 Pages
ISBN: 978-1-119-48975-7
Authors: Peter J. Edwards, Paulo Vaz Serra, Michael Edwards
Publisher: Wiley-Blackwell
Publication Date: 2019