Develop a menu-driven program

  Pseudocode

Develop a menu-driven program that inputs two numbers and at the user’s option finds their sum, difference, product, or quotient. Use top-down modular approach and pseudocode to design a suitable program to solve. Where appropriate, use defensive programming techniques

unit 6 lab

  I need this paraphrased so that it shows less than 10% on turnitin.com report. Please provide turnitin.com report.

This week’s Unit 6 lab showed us how hackers use a method of hacking called social engineering in order to gain access to certain information. The beginning steps of a hackers process they have to do their due diligence and see what they can obtain on a certain individual. This mean the hackers has to navigate through websites such as social media, like Facebook, LinkedIn etc. to gain information on their targets. Unit 6 Lab’s reviews how hackers gain information, and how it maybe exploited in an attack, and lastly how to pick out an attack. The lab in Unit 6 gave us three individuals for a company called CorporateTechs. It had us conduct a search on LinkedIn.com and on Google.com for each individual. After conducting the search, the feedback from the search was pretty good, it provided enough information on the three individuals to be able to conduct an attack. Part number two of the lab, was for us to fill out the contact information in order for us to receive an email. This email appeared to be from a legitimate source with a conformation link. After clicking the link, it took us to another window where it showed us a message stating it was a phishing attack. It also displayed my IP address, and the web browser used. Part number 3 had us using Nmap to see what information could be open. The lab only had it use port number 80 which was the apache server. Then we used IPNetinfo to gain a little more insight on what’s being used. Overall the Unit 6 lab gave us a good insight on how social engineering is used, and what all entails to do so. Social engineer is one of the hackers many tools that can be effective to the untrained users of the internet.

computer science

Please introduce yourself to the class. Be sure to indicate your name, where you are from and what you are studying in Graduate School.

Take a moment, and please introduce yourself. Tell us something about yourself, particularly about your life outside the classroom and what you expect to achieve in this class. 

Privacy Law on Information Security in Government

Privacy Law:  You have been hired as the new CISO of an organization with offices in the United States and will soon expand into the European Union EU.

With an organization that will span both the U.S. and the EU, your company will be impacted by the General Data Protection Regulation(GDPR).

The CEO needs to brief your stakeholders on the expansion and wants you there to answer questions about the privacy and security issues of adhearing to the GDPR.

Write a four pages research paper of statement on GDPR, the benefit of the regulation and possible consequences if the company is not properly prepared.  Identify the applicable governance issues you must consider. Identify at least three benefits and three risks of reporting to either and explain why they are a concern to you. 

Note: The format should be in APA style and plagiarism check free.

Annotation

  

Read two articles and complete an annotated bibliography for each article (scholarly/peer-reviewed journal articles 

Articles should be no older than 2018. 

Be sure to bold type the bibliographic information and set it apart from the annotation,

Trademark

Research and discuss a company’s trademark that has been awarded protection by the U.S. Patent and Trademark Office. You may select the company that you work for, or a company you aspire to work for. You’re welcome to select one simply from a company you admire or that intrigues you in any way. Have fun making a choice.

Describe the trademark, its application (e.g., does it cover merchandise, a service, a website … what does the mark relate to?). Was there any objections or litigation surround the trademark application or award? If so write about that. Do you believe there is a risk of infringement? Are there international IP implications? What other interesting information surrounded its application or award? In [too?] many cases, it’s not so simple as designing a mark and completing governmental documents, so help your classmates learn about the complicated, challenging process of filing for and attaining IP protection from the U.S. government.

500 words.APA format needed.

Exp19_Excel_Ch03_ML1_Airports

Exp19_Excel_Ch03_ML1_Airports

  

Project Description:

As an analyst for the airline industry, you track the number of passengers at the top six major U.S. airports: Atlanta (ATL), Chicago (ORD), Los Angeles (LAX), Dallas/Fort Worth (DFW), Denver (DEN), and New York (JFK). You researched passenger data and created a worksheet that lists the number of total yearly passengers at the top six airports. To prepare for an upcoming meeting, you will create a clustered column chart to compare the number of passengers at each airport. Then, you will create a line chart that compares trends over time. Next, you will create a bar chart to compare the passenger count for the latest year of data available and then emphasize the airport with the largest number of passenger traffic. Finally, you want to insert sparklines to visually represent trends in passengers at each airport over the 10-year period.

     

Start   Excel. Download and open the file named Exp19_Excel_Ch03_ML1_Airports.xlsx. Grader has automatically added   your last name to the beginning of the filename.

 

 

You want to create a clustered   column chart to depict the passenger counts at the six airports over several   years.
  Use Quick Analysis to create a clustered column chart for the range A4:L10.   Cut the chart and paste it in cell A15.

 

You want to customize the column   chart with a chart title, display the years as a data series, enlarge the chart   to be easier to read, and apply a chart style.
  •Type Passengers   by Top U.S. Airports   as the chart title.
  •Swap the data on the category axis and in the legend.
  •Set a 3.5″ height and 11.4″ width.
  •Apply the Style 7 chart style.

 

The value axis takes up a lot of   space for the numbers. You will adjust the value axis to simplify it.
  •Change the display units to Millions for the value axis.
  •Edit the axis title to display Millions of Passengers.

 

 

You want to focus on the 2016 data   series by adding data labels.
  Display data labels above the columns for the 2016 data series only.

 

Applying a fill color to the   chart area will make the chart visually appealing.
  Apply the Light Gradient – Accent 2 preset gradient fill to the chart area.

 

 

A best practice is to add Alt   Text to a chart for accessibility compliance.
  Add Alt Text: The chart displays the number of passengers in millions   for the top six airports from 2006 to 2016. (including the period).

 

When you change the workbook   theme, Excel applies that theme to the chart styles.
  Change the workbook theme to Slice.

 

 

You want to create a bar chart   to display passenger counts for only one year.
  Create a recommended clustered bar chart for the range A5:A10 and L5:L10 and move   the chart to a chart sheet named Bar Chart.

 

You want to customize the bar   chart.
  •Change the chart color to Colorful Palette 3.
  •Enter Passengers   at Top 6 U.S. Airports in 2016 as the chart title.
  •Apply the Style 5 chart style.
  •Add Alt Text: The bar chart shows passengers at Top 6 U.S. Airports   in 2016. Atlanta had the most passengers. (including the period).

 

 

Modifying the axes will improve   readability of the bar chart.
  •Change the font size to 10 for the category axis and value axis.
  •Change the value axis Maximum Bound to 1.1E8.

 

 

You will format a data point so   that it stands out and then add gridlines to enhance readability in the bar   chart.
  •Format the Atlanta data point with Dark Blue, Text 2 fill color.
  •Add Primary Minor Vertical gridlines.

 

A line chart effectively shows   trends over time for the passenger counts at the different airports.
  Create a line chart using the range A4:L10 in the Passenger worksheet and   move the chart to a chart sheet named Line Chart. Add a chart title Passengers   at U.S. Airports 2006-2016 and bold the title.

 

 

You want to customize the line   chart.
  •Set the Minimum Bound at 4.0E7 for the value axis. The Maximum Bound should change to 1.1E8   automatically.
  •Set the Vertical (Value) Axis Display units to Millions. Delete the Vertical   (Value) Axis Display Units Label from the upper-left corner of the chart. Add   a value axis title In Millions.
  •Change the font size to 10 for the value axis and category axis.
  •Move the legend to the top.
  •Filter the chart by deselecting the odd-numbered years.
  •Add Alt Text: The line chart displays trends for top six U.S.   airports from 2006 to 2016 at two-year intervals. (including the period).

 

Assignment 300 words

 

Consider this hypothetical situation:

David Doe is a network administrator for the ABC Company. David is passed over for promotion three times. He is quite vocal in his dissatisfaction with this situation. In fact, he begins to express negative opinions about the organization in general. Eventually, David quits and begins his own consulting business. Six months after David’s departure, it is discovered that a good deal of the ABC Company’s research has suddenly been duplicated by a competitor. Executives at ABC suspect that David Doe has done some consulting work for this competitor and may have passed on sensitive data. However, in the interim since David left, his computer has been formatted and reassigned to another person. ABC has no evidence that David Doe did anything wrong.

What steps might have been taken to detect David’s alleged industrial espionage?

What steps might have been taken to prevent his perpetrating such an offense?

Write your answer using a WORD document. Do your own work. Submit here. Note your Safe Assign score. Score must be less than 25 for full credit.