Create an Excel workbook that uses the

     Create an Excel workbook that uses the built-in date & time functions in Excel to   answer the following questions:1. How many days have you been at Ole Miss,   since your first date of attendance? (it’s okay to “guess” on the   start date)2. What day of the week will the 8th of November occur on in   2018?3. How many “net working days” (e.g., Monday – Friday) are   there between August 1, 2018 and November 30, 2018?4. A bill that your   company received must be paid 75 days before the last day of this calendar   year.   What date will that be?   What month will that be?   What day of the month?   What day of the week?5. A   manufacturing process takes 157 hours to run. If it starts running at 12:30   p.m. on May 15, 2018, what date and time will it finish? What would the end   date/time be if it could be completed in 88 hours?    

ethical hacking

  

Black box testing:

In the black-box test function, the login tester is placed in the middle hacker role, with no internal information of the targeted system. Examiners are not provided with any architectural drawings or source code that are not publicly available. The black box entry test determines the risk to the operating system outside the network.

Gray box testing:

The next step from the black box test is to check the gray box. If the black box tester checks the system from an external perspective, the gray box inspector has access levels and user information, which may have higher privileges in the system. Gray-box pentester usually has some internal network information, which may include design and build documentation as well as an internal network account.

White box testing:

The white box test comes in a number of different terms, including clear-box, open-box, app and intelligently run tests. It falls on the other side of the spectrum from the black box test: entry inspectors are given full access to source code, architectural documentation and more. A major challenge with white box testing is to evaluate the large amount of data available to identify potentially weak points, which has made it a very time-consuming type of entry test.

Tiger Box Testing:

This hacking is usually done on a laptop with a collection of OS and hacking tools. This inspection helps the entry inspectors and security inspectors to conduct a risk and attack assessment.

THE QUESTION –> Find any real case and mention it by link and snapshot for each one?

5.4 Assignment Draft

  1. This is Phase 5 of your final capstone project.
  2. Post your draft capstone project paper. As a draft, this is your opportunity to submit the following for feedback before submitting your final paper:
    1. Paper introduction
    2. Problem statement/discussion
    3. Potential and proposed solutions
    4. Conclusion and cited references
  3. The paper should be around 10 pages in length (double-spaced), and transitions between sections should be addressed. Any graphics or tables do not count toward page count.
  4. Make sure to use 7th edition APA where required. The paper should include credible references that are listed on a reference page in the report according to APA 7th edition guidelines. You may and should use research to develop your plans, but make sure to cite your sources. 

This is the continuation of assignment 3.4  assignment 4.4. 

SIEMENS SIMATIC

I need to write a term paper on the topic Siemens Simatic- PCS7/WINCC (SCADA) 

There are all the requirements for the term paper alongside the template for the term paper.
Please help and thank you 

Problem 2- Planning the project

1. Identify a major public infrastructure project that is either underway, complete, or proposed in your region. This could be a bridge, road, building, or something of that nature. For the project you have identified, think of as many stakeholders and stakeholder groups as you can. Create a three-column table. In column 1, list the stakeholders. In column 2, list what each stakeholder wants to get from the project. In column 3, list the influence each stakeholder has over the project.

2. How can the stakeholders change over the course of a project? Give examples of changes in who the stakeholders are, and also in how their interests or influence over the project might change throughout the term of the project.

Text-

Title: Project Management 

Subtitle: https://opentextbc.ca/projectmanagement/ 

ISBN: 978-1-77420-013-1 

Authors: Adrienne Watt 

Publisher: BCcampus 

Publication Date: August 14, 2014 

Edition: 2nd Edition

Python Program

Make an Adventure game python program, this is for Final milestone project so the program should look big and use while, if ,for, def functions. I have the story attached to the program and you can add more to it so that code looks big and good enough.

Build the code with comments, run it without errors

IT Policy life cycle and policy framework- No plagiarism- 1000 words- Use APA format

 

For this week’s assignment, you will have multiple requirements. First you will select an IT policy lifecycle. Thinking about the course case study, consider the most appropriate Lifecycle to help drive policy. You can select a lifecycle that has already been developed, or you may create your own. State the name of your lifecycle, provide a visual if available and walk through the phases/stages of the lifecycle.

Next, use the lifecycle to drive a selection for a Policy Framework for your plan that will be applied to PYZ Tech. Create, define, and discuss how the policy will be managed. Continue to keep your governance framework and the outline of areas that should be included with these types of plans in mind.

The IT policy framework can be similar to the governance framework in structure, but it should have a focus on policy and procedures. This can be a visual or a narrative component to the assignment. Remember to always include some narrative explanation when providing visuals as a component to the overall plan.

Note: I am uploading a picture of lifecycle I have selected. Write the assignment accordingly