Please read whole document carefully because there are some restrictions on python libraries. it says which to use and which not use.
Vulnerability Process and Assessment Memo
Your boss wants you to draft a two- to three-page vulnerability process and assessment memorandum addressing the main points of a VM process for Mercury USA. You will cover the main elements of a vulnerability management process, tailored to Mercury USA’s business in the transportation sector, evaluate the OpenVAS scanning tool, and provide recommendations for mitigating the vulnerabilities found within the OpenVAS report.
The third-party pen tester used the free tool Open Vulnerability Assessment Scanner (OpenVAS) to scan Mercury USA’s network. Review the report from the OpenVAS Scan.
As you review the scan, consider some important points from Lesson 5:
- Priority
- Difficulty of implementation
- Communication/change control
- Inhibitors to remediation
- MOUs
- SLAs
- Business process interruption
- Degrading functionality
Viz Manipulative view
The questions are in “Questions.docx” attachment and the required reading is in “Reading.docx” attachment.
Critical Thinking
See Attached files.
Research Paper on Operational Excellence
how to improve company operations using SAAS legacy to – cloud computing models(SAAS) – benefits of SAAS in cloud.
Title
how to research
design/methodology/
outcome
list of iteams
introductions
summary
references
Web Application Security
Review the attached slides to summaries week 1 of 2 and week 2 of 2
The quantity and quality of new insights from your own independent research/experience
Adherence to page limits, font, font-size, line spacing, and margins
Use of at least 2 new references
Reputation of the reference sources
Use of in-text citations with matching references and vice-versa
Appropriateness of the use of the APA format for both in-text citations and references.
Please see the attachment.
Research abstract published quantitative scholarly article
For this week, we will focus on writing a scholarly abstract of a quantitative journal. More information about writing an abstract can be found via the web resource “Writing Scholarly Abstracts.
”Directions: Analysis of Research abstract published quantitative scholarly article related to Enhancing Cyber Security In Healthcare -With The Help Of Machine Learning .Each abstract must therefore consist of the following in this order:
- Bibliographic Citation – use the correctly formatted APA style citation for the work as the title of your abstract, displaying the full citation in bold font.
- Author Qualifications – name and qualification of each author conducting the research
- Research Concern – one paragraph summary of the reason for the overall research topic
- Research Purpose Statement AND Research Questions or Hypotheses – specific focus of the research
- Precedent Literature – key literature used in proposing the needed research (not the full bibliography or reference list)
- Research Methodology – description of the population, sample, and data gathering techniques used in the research
- Instrumentation – description of the tools used to gather data (surveys, tests, interviews, etc.)
- Findings – summation of what the research discovered and the types of analysis that were used to describe the findings (tables, figures, and statistical measures)
1000 words
APA format needed with references
Please follow above mentioned directions to complete this assignment.
Exp19_Access_Ch2_Cap – Metropolitan Zoo 1.0
Exp19_Access_Ch2_Cap – Metropolitan Zoo 1.0
Project Description:
The Metropolitan Zoo tracks its animal data in Excel. The organization decides to use a database to organize the data about the animals, their trainers, and the animal exhibits. In this project, you will open an existing database and create a new table. You will import an Excel file containing information about the animals, and query the database to determine which animals need a checkup. You will also create a query to obtain a listing of the animals in each exhibit.
Start Access. Open the downloaded Access file named Exp19_Access_Ch2_Cap_Zoo.accdb. Grader has automatically added your last name to the beginning of the filename. Save the file to the location where you are storing your files.
Create a new table in Design view. Add the field name ExhibitID with the AutoNumber Data Type. Add the caption Exhibit ID. Set the ExhibitID field as the primary key for the table. Save the table using the name Exhibits.
Add the following fields and set their field properties as shown:
Field Name
Data Type
Field Size Property
Caption
ExhibitName
Short Text
15
Exhibit Name
Acres
Number
Integer
(none)
InitialCost
Currency
(no change)
Initial Cost
YearlyCost
Currency
(no change)
Yearly Cost
DateOpened
Date/Time
(no change)
Date Opened
Show
Yes/No
(no change)
(none)
Switch to Datasheet view and save the table. Add the following records, letting Access assign the Exhibit ID:
Exhibit Name
Acres
Initial Cost
Yearly Cost
Date Opened
Show
Asia
2
2000000
300000
1/15/2011
Yes
Africa
4
3500000
500000
2/3/2014
Yes
The Americas
3
1500000
250000
5/15/2005
No
Close the table.
Import the downloaded Zoo.xlsx workbook as a new table in the current database. Using the Import Spreadsheet Wizard, specify that the first row contains column headings, set the AnimalID field to be indexed with no duplicates, and set the AnimalID field as the primary key. Import the table with the name Animals and do not save the import steps.
View the Animals table in Design view, and change the field size for the AnimalID field to Long Integer. Change the field sizes for the ExhibitID and TrainerID fields to Long Integer. Save the table. Click Yes in the dialog box indicating that some data may be lost. Close the table.
Begin establishing relationships in the database by adding the Animals, Exhibits, and Trainers tables to the Relationships window. Close the Show Table dialog box. Resize the field lists so that all fields display. Create a one-to-many relationship between the ExhibitID field in the Exhibits table and the ExhibitID field in the Animals table, enforcing Referential Integrity. Select the option to cascade update the related fields.
Create a one-to-many relationship between the TrainerID field in the Trainers table and the TrainerID field in the Animals table, enforcing Referential Integrity. Select the option to cascade update the related fields. Save and close the Relationships window.
Create a query using the Simple Query Wizard. From the Animals table, add the AnimalID, AnimalType, and DateOfLastCheckup fields (in that order). Ensure the query is a Detail query. Name the query Checkup List and finish the wizard.
View the query in Design view, and then set the criteria for the DateOfLastCheckup field so that only animals whose last checkup was before 1/1/2022 are displayed.
Sort the query in ascending order by the DateOfLastCheckup field. Save the query. Run the query, and then close the query.
Create a new query in Design view. Add the Animals, Exhibits, and Trainers tables to the query design window. Add the following fields to the query (in this order):
AnimalType
Origin
ExhibitName
FirstName
LastName
Position
Set The Americas as the criteria for the ExhibitName field and sort the query in ascending order by Origin. Run the query, and save the query as Americas Exhibit. Close the query.
Copy the Americas Exhibit query in the Navigation Pane and paste it with the name Asian Exhibit. Modify the query in Design view to replace The Americas with Asia. Run the query, save the query, and close the query.
Close all database objects. Close the database and then exit Access. Submit the database as directed.
information technology ……4
Answer the following questions in your own words. to be submitted in 2hours
Question 1: Create a Work Breakdown Structure (WBS) identifying the Tasks Id, Tasks Description, Tasks Duration (Days), and Predecessor Tasks.
Eden Bay is a medium-sized municipality. The town has grown rapidly, and so has the demand for town services. Eden Bay currently owns 90 vehicles, which the town’s equipment department maintains. The fleet includes police cars, sanitation trucks, fire trucks, and other vehicles assigned to town employees. The maintenance budget has risen sharply in recent years, and people are asking whether the town should continue to perform its own maintenance or outsource it to private firms.
In the first part of the case, you planned a preliminary investigation for a new information system that would cut costs and improve maintenance efficiency. Based on your investigation, Dawn wants to move forward, and she asked you to help her present a budget request at the next town council meeting. She suggested the following to-do list: (25 points)
- First, double-check the cost and benefit data we will need for the proposal (3 days)
- Then, start two tasks at the same time: send an email message to the Town Council requesting that the proposal be placed on the agenda (1 day), and develop the proposal itself, including all necessary documents and charts (5 days)
- As soon as the proposal is complete, start work on two tasks at once: print copies of handout material for the meeting (2 days) and develop a PowerPoint presentation (5 days)
- When the presentation is ready, conduct a rehearsal for the Council meeting (2 days)
- Finally, when the rehearsal is done and the handout material is ready, help Dawn deliver the presentation (1 day)
Question 2: Create a PERT/CPM chart, using the WBS above, to determine which task IDs are on the critical path? Note, that you do NOT need to submit your diagram. Only the Task IDs and the Duration of the Critical Path.
Question 4: Use critical path analysis to adjust schedule and resource allocations in response to schedule and budget deviations.
Revise the previous chart using critical path analysis to adjust schedule and resource allocations in response to the following schedule and budget deviations due to a budgetary issue:
- Bullet #4, When the presentation is ready, conducting a rehearsal for the Council meeting will now take 4 days instead of 2 days.
What are the impacts on the critical path, if any?
Question 3: Identify a task where you could lengthen the duration without it affecting the critical path. Please note the task ID # and the new Duration.
Research report
Need to present a research report on Finger Vein scan/vascular technology with a word count of 70-110 words(not more than the count provided) and should provide a URL reference link too .