Generate a histogram display by the frequency of occurrence of characters in descending order, and secondary sort alphabetically.
disc wk6
see attached
Laws, Regulations, and Compliance
part-1
provide a 50–100-word explanation on why you chose your answer. Please cite your sources for your answers from your course materials or other credible resources.
1. Which guidelines state that the data gathered for private individuals should only be used for the purpose for which it is collected?
A. European Union Principles on Privacy
B. Computer Security Act of 1987
C. Economic Espionage Act of 1996
2. Which pillar of Basel II determines the lowest amount of funds that a financial institute must keep on hand?
A. Supervision
B. Market Discipline
C. Minimum Capital Requirements
3. Your organization’s website follows the Platform for Privacy Preferences Project (P3P) guidelines for user privacy on its public website. Which organization developed P3P?
A. Internet Architecture Board (IAB)
B. World Wide Web Consortium (W3C)
C. European Union
4. Based on the Federal Privacy Act of 1974, which type of permission must be obtained by a government agency to disclose private information that the agency collected?
A. Verbal permission
B. Implied permission
C. Written permission
5. What is the correct definition of a data aggregator?
A. A company that compiles, stores, and sells personal information
B. A company that analyzes personal information
C. A company that secures personal information
6. You work for a pharmaceutical company. The research department of your company has recently created a chemical formula for a new drug. Which property law term applies in this case?
A. Trade secret
B. Copyright
C. Trademark
7. You work for a United States federal agency. Your manager indicates that you must identify computers that contain sensitive information. Which law requires this?
A. HIPAA Act
B. Computer Security Act of 1987
C. Economic Espionage Act of 1996
8. Which statement is true of reverse engineering?
A. It involves compiling vendor object codes.
B. It analyzes the operation of an application.
C. It removes security flaws from object code.
9. Which of the following is MOST important in determining whether a disaster recovery test is successful?
A. Critical business processes are duplicated
B. Only business data files from offsite storage are used
C. IT staff fully recovers the processing infrastructure
10. An organization determined that if its email system failed for 3 days, the cost to the organization would be eight times greater than if it could be recovered in one day period. This determination most likely was the result of:
A. Disaster recovery planning
B. Business impact analysis
C. Full interruption testing
11. Which of the following should be performed FIRST in the aftermath of a denial of service DOS attack?
A. Restore servers from backup media stored offsite
B. Conduct an assessment to determine system status
C. Perform an impact analysis of the outage
12. Which of the following is the MOST important element to ensure the successful recovery of a business during a disaster?
A. Network redundancy is maintained through separate providers
B. Hot site equipment needs are re certified on a regular basis
C. Detailed technical recovery plans or maintained off site
part-2
provide a 50–100-word explanation on why you chose your answer. Please cite your sources for your answers from your course materials or other credible resources.
1. You are researching computer crimes. All of the following are categories of this type of crime, EXCEPT:
A. Computer-assisted crime
B. Computer-targeted crime
C. Computer-commerce crime
2. Which crime term is used to indicate when and where a crime occurred?
A. Means
B. Motive
C. Opportunity
3. Which type of law governs the payment of compensation and fines without sentencing the offenders to jail?
A. Civil law
B. Criminal law
C. Copyright law
4. An employee is suspected of criminal activity involving access to data in excess of the employee’s authority. You have obtained the original signed copy of the no-right-to-privacy agreement that the employee signed when he was hired. What kind of evidence is this agreement?
A. Best evidence
B. Secondary evidence
C. Corroborative evidence
5. As part of an incident investigation, you need to ensure that the primary copy of the original media is stored properly. All of the following steps should be completed, EXCEPT:
A. Label the primary copy with the date, time, collector’s initials, and case number, if applicable.
B. Encrypt the primary copy to ensure the contents are protected.
C. Seal the primary copy in a container and label the container to ensure that the primary copy is safe.
6. Which crime term is used to indicate how a criminal committed a crime?
A. Means
B. Motive
C. Opportunity
7. Which statement is true of circumstantial evidence?
A. It helps prove either a point or an idea.
B. It requires inference from the available facts.
C. It relies on original documents to prove a fact.
8. To investigate computer crimes, with which agency does FBI work?
A. Interpol and NSA
B. Secret Service and local law enforcement
C. Department of Defense
9. When an organization is using an automated tool to manage and house its continuity plans, which would have following is the PRIMARY concern?
A. Ensuring accessibility should a disaster occur
B. Versioning controls as plans are modified
C. Tracking changes in personnel and plan assets
10. Which of the following actions should be taken when an information security manager discovers that a hacker is footprinting the network perimeter?
A. Reboot the border router connected to the firewall
B. Check intrusion detection system logs
C. Enable server trace routing on the Demilitarized Zone segment
11. One performing a business impact analysis, which of the following should calculate the recovery time and the cost estimates?
A. Business continuity coordinator
B. Business process owners
C. Information security manager
12. Which of the following is MOST closely associated with a business continuity program?
A. Periodically testing network redundancy
B. Updating the hot site equipment configuration every quarter
C. Developing recovery time objectives for critical functions
Wk 4 – Apply: Case Study: Appliance Warehouse – Application Implementation
Assignment Content
- Continue your work to support the development and implementation of the new Service Department for Appliance Warehouse.
Directions
In MindTap, review the Appliance Warehouse Case, and do the following:- Read the Before You Begin Message and the Module 11 Appliance Warehouse Webmail Client Emails. Read the messages to help determine the tasks you must complete.
- Review and analyze the weekly Appliance Warehouse case study content and resources.
- Create a 2- to 3-page document (to submit in Blackboard) to support the Appliance Warehouse Service Plan that includes the following:
- Testing Plan: Create a testing plan to manage the systems through QA standards. Include a testing plan for each part of the new service you’ve identified, such as, scheduling, invoicing, and reporting. For each part identified, include in your testing plan an action to be tested, along with an expected outcome.
- Implementation Plan: Indicate whether you will use parallel, direct, phased, or pilot changeover strategies. Explain your reasoning. For Implementation recommendations, refer to section 11.9, “Installation,” in Ch. 11 of Systems Analysis and Design.
- Training Plan: Indicate what a training plan would include for affected employees, such as appointment setters, technicians, management, and the parts department. Include a plan for all employees (or specific departments) affected by the new system implementation.
Draw an ER diagram for the following scenario:
Anglo Coal RSA is creating a database to keep track of all the employees in the company. Each employee’s name, surname, contact information and employees start date needs to be kept. There are different positions at Anglo Coal that indicate a different salary, medical aid and if you qualify for danger pay. There are different departments over the country. Anglo would like to know who works in what department and where that department is.
CAESAR CIPHER
Python 3.8.6 (tags/v3.8.6:db45529, Sep 23 2020, 15:52:53) [MSC v.1927 64 bit (AMD64)] on win32
Type “help”, “copyright”, “credits” or “license()” for more information.
>>>
============== RESTART: C:FD PyLoopCaesar CryptCaesarAll.py =============
WELCOME TO CAESAR CIPHER!
Please select one of the following options:
1 – Encrypt a message
2 – Decrypt a message
3 – Brute force
4 – Quit
Enter your choice: 3
Enter your Encrypted message: haahjr
Your decrypted message is:
1 gzzgiq
2 fyyfhp
3 exxego
4 dwwdfn
5 cvvcem
6 buubdl
7 attack
8 zsszbj
9 yrryai
10 xqqxzh
11 wppwyg
12 voovxf
13 unnuwe
14 tmmtvd
15 sllsuc
16 rkkrtb
17 qjjqsa
18 piiprz
19 ohhoqy
20 nggnpx
21 mffmow
22 leelnv
23 kddkmu
24 jccjlt
25 ibbiks
26 haahjr
Please select one of the following options:
1 – Encrypt a message
2 – Decrypt a message
3 – Brute force
4 – Quit
Enter your choice:
operational excellence
Information Technology and Organizational Learning Assignment:
- Chapter 11 – Review the employment challenge in the digital era (as well as the entire chapter). Reflect on the various challenges are present in the digital era. Will things get better or more complicated as times goes on? Explain. What are some methods to assimilate new generations into the workforce to think about competitive advantage?
The above submission should be one -page in length and adhere to APA formatting standards.**Remember the APA cover page and the references (if required) do not count towards the page length**Note the assignment should have the information from the Information Technology and Organizational Learning textbook.
practical connection.
Assignment:
Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course( Data Science & Big Data Analy) have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. Requirements:
- Provide a 500 word (or 2 pages double spaced) minimum reflection.
- Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.
- Share a personal connection that identifies specific knowledge and theories from this course.
- Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment.
You should not provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.
Web 2.0 phenomenon
Much has been made of the new Web 2.0 phenomenon, including social networking sites and user-created mash-ups. How does Web 2.0 change security for the Internet?
Exp22_Excel_Ch10_Cumulative – Student Enrollment
#Exp22_Excel_Ch10_Cumulative – Student Enrollment
#Exp22 Excel Ch10 Cumulative Student Enrollment
#exp22_excel_ch10_cumulative – student enrollment
#Excel Chapter 10 Cumulative – Enrollment Report
#Exp22_Excel_Ch10_Cumulative_EnrollmentReport
Project Description:
You are a student enrollment analyst at a local university. Currently your data management systems contain student information, course offerings, and student grades. You want to create a report to examine total enrollment and student performance. You will use Power Query to import data, Power Pivot to analyze grades, and Power Maps to visualize student demographic information.
Start Excel. Download and open the file named Exp22_Excel_Ch10_Cumulative_EnrollmentReport.xlsx. Grader has automatically added your last name to the beginning of the filename.
Use Get & Transform to import the file e10c1StudentEnrollment.csv into a new worksheet. Be sure to load the table to the data model during import.
Rename the worksheet StudentEnrollment.
Use Get & Transform to import the ClassesOffered table located in the database e10c1ClassOfferings.accdb into a new worksheet. Be sure to load the table to the data model during import.
Import the GradeReport table from the e10c1Grades.accdb database into a new worksheet. Be sure to load the table to the data model during import.
Open the StudentEnrollment query in the Power Query Editor. Split the Name column using space as a delimiter. Rename the split columns Last Name and First Name respectively. Close and load the query.
Use Get & Transform to import the file e10c1StudentEnrollment2024.txt into a new worksheet. Prior to loading the data into the worksheet, use the Power Query Editor to split the Name column using space as a delimiter. Rename the split columns Last Name and First Name respectively.
Append the e10c1StudentEnrollment table with the data from the e10c1StudentEnrollment2024 table. Close and Load the table.
Define the following relationship between the Grade Report table and Classes Offered table:
Table:
GradeReport
Field:
ClassNumber
Table:
ClassesOffered
Field:
ClassNumber
Define the following relationship between the Grade Report table and the e10c1StudentEnrollment table:
Table:
GradeReport
Field:
StudentID
Table:
e10c1StudentEnrollment
Field:
StudentID
Use Power Pivot to create a PivotTable on Sheet1 starting in cell A1. Add ClassName from the ClassesOffered table to the Rows area, Grade from the GradeReport table to the Values area, and ClassNumber from the ClassesOffered table to the Filters area.
Change the Implicit measure of GPA created in the previous step from Sum to Average.
Rename the worksheet GradeAnalysis.
Format the grades in the range B4:B19 to display 2 decimal places.
Insert a Clustered Column PivotChart. Add the chart title Grade Analysis. Move and resize the chart so that the upper-left corner is inside cell D4 and lower-right corner is inside cell K18.
Create a 3D Map based on student addresses in the enrollment table. Add Address as the Location dimension. Add Grade as the Height dimension and change the aggregation from Sum to Average.
Add Grade as the Height dimension and change the aggregation from Sum to Average. Zoom and tilt the map so the entire US is visible. Edit Scene 1 by changing the name to Over View, setting the Scene duration to 6 seconds, and then setting the Transition Effect to Dolly.
Add a new scene called East Coast. Zoom out and reposition the map to view the Eastern seaboard. Set the Scene duration to 6 seconds and set the Transition Effect to Dolly.
Edit the connection properties so all queries do not refresh in the background and do not refresh on Refresh All.
Save and close Exp22_Excel_Ch10_Cumulative_EnrollmentReport.xlsx. Exit Excel. Submit the file as directed.