wk-research assignment

 After responding to the weekly discussion topic on FOOTPRINTING, you now have an idea as to how to conduct a digital investigative project. For this assignment, you are asked to develop your own crime scenario. Explain the incident that occurred, and then list the steps you would follow to solve this case (examples might include: a lost child, an unauthorized charge on your credit card, an unidentified charge made with your EZ PASS, etc.). 

3 Separate Individuals Problems

Save in Word Document

Watch the 2 YOUTUBE videos and answer the questions below:

SEE LINK: https://youtu.be/mLGt_GPyPFU

SEE LINK: https://youtu.be/WxQXvmnfCaw

Answer the following questions:

1-What is Walmart’s e-commerce strategy?

2-Why did Walmart acquire Jet.com?

3-How does Walmart’s fulfllment operation difer from Amazon’s?

4-What are the three key assets that Walmart can leverage (build on) to compete with
Amazon and other online retailers?

————————————————————————–

Save in Word Document

Customer Service Chapter 7

1. Define the term ROI.

2. What is business and IT alignment?

3. What is a cost-benefit analysis?

4. Describe two ways that customer data is used.

5. Describe two ways that incident data is used.

6. Describe two ways that status data is used.

7. What is scope creep?

8. Define the term trend analysis.

9. What is a budget?

10. Define the term cost per contact.

———————————————————————–

Save in Word Document

Customer Service Chapter 8

1. What is a team?

2. What are the reasons technical support lends itself to a team setting?

3. What are the five characteristics of a successful team?

4. List the three components of a service desk mission.

5. List and describe three ways the service desk supports the goals of DevOps.

6. List the four stages of development reflected in the Tuckman Teamwork Model.

7. List three characteristics of emotional intelligence.

8. Why is communication important in a team setting?

9. What is feedback?

10. How must feedback be delivered to be effective?

Discussion and research reports on cyber security with no plagiarism found

Need to present a Discussion with a word count of above 120+ words and each discussion need a separate reference link for sure.

1) Code signing (120+120 = 240 words around) Need this same topic in 2 different formats and 2 different URL links as well needed

2) The Amnesic incognito Livesystem ( TAILS)  = (120+120 = 240 words around) Need this same topic in 2 different formats and 2 different URL links as well needed)

3) Garlic routing=  120 words  Need link reference as well

4)Rendezvous protocol =  (120+120 = 240 words around) Need this same topic in 2 different formats and 2 different URL links as well needed)

5) The Onion router = 120 words  Need link reference as well

Need to present a research report on with a word count no more than 70-110 words(not more than the count provided) and should provide a separate 

URL reference link too

1) Best practices for beginning programmers  – ( Need this same topic in 2 different formats and 2 different URL links as well needed) (70+70=140 words)

2) Python weaknesses = 70+ words Need link reference as well

3)Penetration testing methods = 70+ words) Need link reference as well

4)Vishing =  70+ words Need link reference as well 

5)SPIT ( Spam over IP Technology) ( Need this same topic in 2 different formats and 2 different URL links as well needed) (70+70=140 words)

6) Evaluating your web browsers security settings =  70+ words Need link reference as well 

7) Code signing =  ( Need this same topic in 2 different formats and 2 different URL links as well needed) (70+70=140 words) 

8)  The Amnesic incognito Livesystem ( TAILS)  = ( Need this same topic in 2 different formats and 2 different URL links as well needed) (70+70=140 words)

9) Garlic routing = 70+ words Need link reference as well 

10) Rendezvous protocol ( Need this same topic in 2 different formats and 2 different URL links as well needed) (70+70=140 words)

11) The onion router(TOR)  = 70+ words Need link reference as well 

 

It is suggested you use a Research Theme to help you stay focused, and to provide continuity throughout your research.  Here is a list of ideas, but this list is not all-inclusive: 

Current technologies available to support management functions,

Best Practices,

Future improvements/technologies, or

Other standards related to your specific field.

Note: The content should be in a general words with no technical jargons.

This question is from a cyber security subject so that the matter should relate to cyber security for sure and should connect to readers.

 NO PLAGIARISM STRICTLY  and do not use AI to get the copy paste information lik Chatgpt

Each one should be different and no each topic information should be similar to the other topic strictly.

Content should be unique and in a simple understanding way.

Deadline: 03/26/2023 11:59PAM CST

Also provide me the separate files for discussion and the research reports instead of submitting in a single file.

Cybersecurity

 How strong are your passwords? Various online tools can provide information on password strength, but not all feedback is the same. First, assign the numbers 1 through 3 to three of the passwords you are currently using, and write down the number (not the password) on a piece of paper. Then, enter those passwords into these three online password testing services:

Record next to each number the strength of that password as indicated by these three online tools. Then use each online password tester to modify the password by adding more random numbers or letters to increase its strength. How secure are your passwords? Would any of these tools encourage someone to create a stronger password? Which provided the best information?Then visit the website Passwords Requirements Shaming, which is a list of password requirements for different websites that are considered weak. Read through several of the submissions. Select three that you consider the most egregious. Why are they the worst? Next, indicate what you would suggest to make the requirement stronger, but a requirement that most users could meet. Write at least a one-page paper that includes your findings on both the password strength and password requirements. 
 

Deer Creek ski resort was for many years

  

Deer Creek ski resort was for many years a small, family-owned resort serving day skiers from nearby towns. Deer Creek was recently acquired by Mountain Associates, a major ski resort operator with destination resorts in several western states. The new owners have plans to upgrade the resort into a destination resort for vacationers staying for a week or more. As part of this plan, the new owners would like to make major improvements in the Lynx Lair Lodge, the resort’s on-the-hill fast-food restaurant. The menu at the Lodge is very limited—hamburgers, hot dogs, chili, tuna fish sandwiches, French fries, and packaged snacks. The previous owners of the resort had felt no urgency to upgrade the food service at the Lodge since there is little competition. If skiers want lunch on the mountain, the only alternatives are the Lynx Lair Lodge or a brown bag lunch brought from home.
As part of the deal when acquiring Deer Creek, Mountain Associates agreed to retain all of the current employees of the resort. The manager of the Lodge, while hardworking and enthusiastic, has very little experience in the restaurant business. The manager is responsible for selecting the menu, finding and training employees, and overseeing daily operations. The kitchen staff prepares food and washes dishes. The dining room staff takes orders, serves as cashiers, and cleans the dining room area.
Shortly after taking over Deer Creek, management of Mountain Associates held a day-long meeting with all of the employees of the Lynx Lair Lodge to discuss the future of the ski resort and management’s plans for the Lodge. At the end of this meeting, top management and Lodge employees created a balanced scorecard for the Lodge that would help guide operations for the coming ski season.
Almost everyone who participated in the meeting seemed to be enthusiastic about the scorecard and management’s plans for the Lodge.
The following performance measures were included on the balanced scorecard for the Lynx Lair Lodge:
• Customer satisfaction with service, as measured by customer surveys.
• Total Lynx Lair Lodge profit.
• Dining area cleanliness, as rated by a representative from Mountain Associates management.
• Average time to prepare an order.
• Customer satisfaction with menu choices, as measured by surveys.
• Average time to take an order.
• Percentage of kitchen staff completing institutional cooking course at the local community college.
• Sales.
• Percentage of dining room staff completing hospitality course at the local community college.
• Number of menu items.
Mountain Associates will pay for the costs of staff attending courses at the local community college.
 

Required:
1. Using the above performance measures, construct a balanced scorecard for the Lynx Lair Lodge. Use Exhibit 10–12 as a guide. Use arrows to show causal links and indicate with a + or – whether the performance measure should increase or decrease.
2. What hypotheses are built into the balanced scorecard for the Lynx Lair Lodge? Which of these hypotheses do you believe are most questionable? Why?
3. How will management know if one of the hypotheses underlying the balanced scorecard is false?

Assg -7b

 

Follow the instructions in the given Week 6 While Loops PDF document for his week’s assignment. Once you completed all steps , then you will upload the .CPP files

Upload the following .CPP files.

LastNameW6A1.cpp
LastNameW6A2.cpp
LastNameW6A3.cpp
LastNameW6A4.cpp
LastNameW6A5.cpp

Week6_WHILE_LOOPS.pdf 

Apply: Risk Register

 

Wk 4 – Apply: Risk Register [due Day 7]         

          

Assignment Content

  1.     Tony and his project team identified some risks during the first month of the Recreation and Wellness Intranet Project. However, all they did was document the risks in a list. They never ranked the risks or developed any response strategies. Because the project has had several problems, such as key team members leaving the company, users being uncooperative, and team members not providing good status information, Tony decided to be more proactive in managing risks and want to address positive risks as well as negative risks.

    Complete the following tasks:

    1. Create a risk register for the project. Identify 6 potential risks, including risks related to the problems described in the previous paragraph. Include negative and positive risks.
    2. Develop a 45- to 90-word response strategy for each risk. Enter the information in the risk register.
    3. Write a separate 175-word paragraph describing what specific tasks would be required to implement the strategy. Include time and cost estimates for each strategy.
    4. Submit your risk register with the response strategy and explanation.

      Note: A Risk Register template is available, but it is not required that you use it. 

Assignment

 

Discuss in 500 words or more the top 5 details that should be included in your cloud SLA.

Use at least three sources. Use the Research Databases available from the Danforth Library not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes.

A web search

Do a web search for other methods employed by industry or government to share information on possible incidents then write a report supported by references discussing what you found.