Discussion – LAN Domain

This week you are learning about policies for IT infrastructure.  Choose a domain and write one standard or procedure for that domain.  For example,  you may choose LAN domain and write the Wi-FI Access point Security Standard.

500 words APA format required.

This part comprises ten questions

  

This part comprises ten questions. Each question is worth 10 marks. All questions in part 1 will need to be completed.

Prerequisite: Read what an API is in the textbook Introduction to Programming Using Java by David J. Eck on pages 142−143.

When solving the problems in this section, you must follow the application programming interface (API) expected in each problem. You should implement all the attributes and operations mentioned in the API. 

Note that there is no main method in the APIs. That is, you should not perform any data processing within the main method. You should rather use the main method to test other methods, prompt the user for some inputs, and display the results returned by your methods.

1. Create a class named AddressBook that has the following field names:

4. A group of AU friends decide to run the Banff, Alberta, Marathon. Their names, times (marathon completion time in minutes), and number of years participated are given below:

Using the get and set methods, create a comparison method compareNames(name1, name2) that compares the first, middle, and last names of strings name1 and name2. Assume that name1 and name2 follow the following format: “FirstName M. LastName”.

use appropriate data types to store the values for these fields in AddressBook objects.

5. Solve the following problem using a program: Suppose you save $100 each month into a savings account with an annual interest rate of 5%. Thus, the monthly interest rate is 0.05/12 = 0.00417. 

8. Google Inc. is looking to recruit three of the Boston runners. The criteria for selection are as follows:

Exp19_Excel_Ch09_CapAssessment_Tips

 

Exp19_Excel_Ch09_CapAssessment_Tips

 

98% Marked 

Please Use your file      

1

Start   Excel. Download and open the file named Exp19_Excel_Ch09_Cap_Assessment_Tips.xlsx.   Grader has automatically added your last name to the beginning of the   filename.
 

  The Excel workbook contains circular references. When you open the file, an   error message displays. This error will be resolved as part of the project

2

The   Tip Left column in the Friday worksheet contains a fill color and number   formatting. You want to fill these formats to the other daily worksheets.
 

  Group the Friday through Monday worksheets, staring with the Friday   worksheet. Fill the format only for the range E5:E24.

3

Now   you want to insert column totals for the five worksheets simultaneously.
 

  With the worksheets still grouped, insert SUM functions in the range B25:E25   and apply the Totals cell style. Ungroup the worksheets.

4

The   Week worksheet is designed to be a summary sheet. You want to insert a   hyperlink to the Total heading in the Monday worksheet.
 

  On the Week worksheet, in cell A5, insert a hyperlink to cell A25 in the   Monday worksheet with the ScreenTip text Monday’s Totals. Test the hyperlink to   ensure it works correctly.

5

In   cell A6 on the Week worksheet, insert a hyperlink to cell A25 in the Tuesday   worksheet with the ScreenTip text Tuesday’s Totals. Test the hyperlink to   ensure it works correctly.

6

In   cell A7, insert a hyperlink to cell A25 in the Wednesday worksheet with the   ScreenTip text Wednesday’s Totals. Test the hyperlink to ensure it works   correctly.

7

In   cell A8, insert a hyperlink to cell A25 in the Thursday worksheet with the   ScreenTip text Thursday’s Totals. Test the hyperlink to ensure it works   correctly.

8

In   cell A9, insert a hyperlink to cell A25 in the Friday worksheet with the   ScreenTip text Friday’s Totals. Test the hyperlink to ensure it works   correctly.

9

Now,   you are ready to insert references to cells in the individual worksheets.   First, you will insert a reference to Monday’s Food Total.
 

  In cell B5 on the Week worksheet, insert a formula with a 3-D reference to   cell B25 in the Monday worksheet. Copy the formula to the range C5:E5.

10

The   next formula will display the totals for Tuesday.
 

  In cell B6, insert a formula with a 3-D reference to cell B25 in the Tuesday   worksheet. Copy the formula to the range C6:E6.

11

In   cell B7, insert a formula with a 3-D reference to cell B25 in the Wednesday   worksheet. Copy the formula to the range C7:E7.

12

In   cell B8, insert a formula with a 3-D reference to cell B25 in the Thursday   worksheet. Copy the formula to the range C8:E8.

13

In   cell B9, insert a formula with a 3-D reference to cell B25 in the Friday   worksheet. Copy the formula to the range C9:E9.

14

Now   you want to use a function with a 3-D reference to calculate the totals.
 

  In cell B10 on the Week worksheet, insert the SUM function with a 3-D   reference to calculate the total Food purchases (cell B25) for the five days.   Copy the function to the range C10:E10.

15

The   servers are required to share a portion of their tips with the Beverage   Worker and Assistants. The rates are stored in another file.
 

  Open the Exp_Excel_Ch09_Cap_Assessment_Rates.xlsx   workbook. Go back to the Exp_Excel_Ch09_Cap_Assessment_Tips.xlsx   workbook. In cell F5 of the Week worksheet, insert a link to the Beverage   Worker Tip Rate (cell C4 in the Rates workbook) and multiply the rate by the   Monday Drinks (cell C5). Copy the formula to the range F6:F9.

16

Next,   you will calculate the tips for the assistant.
 

  In cell G5 in the Tips workbook, insert a link to the Assistant Tip Rate   (cell C5 in the Rates workbook) and multiply the rate by the Monday Subtotal   (cell D5). Copy the formula to the range G6:G9. Close the Rates workbook.
 

  Note: The tip is a monetary value in the Week worksheet. It should be   formatted for Accounting Number Format.

17

You   noticed a circular error when you first opened the Tips workbook. Now you   will find and correct it.
 

  On the Week worksheet, check for errors and correct the formula with the   circular reference. 

18

You   want to create a validation rule to prevent the user from accidentally   entering a negative value. For now, you will create a validation in the   Friday worksheet.
 

  Select the range E5:E24 in the Friday worksheet, create a validation rule to   allow a decimal value greater than or equal to zero. Enter the input message   title Tip and   the input message Enter the amount of tip. (including the   period). Use the Stop alert with the error alert title Invalid Number and the error   alert message   The tip must be zero or more. (including the period). Test the   data validation by attempting to enter -20 in cell E5 and then cancel the change.

19

Now   you will copy the validation settings to the other daily worksheets.
 

  Copy the range E5:E24 in the Friday worksheet. Group the Monday through   Thursday worksheets, select the range E5:E24, and use Paste Special   Validation to copy the validation settings.

20

You   want to unlock data-entry cells so that the user can change the tips in the   daily worksheets.
 

  Group the Monday through Friday worksheets. Select the ranges E5:E24 and   unlock these cells.

21

Create   footer with your name on the left side, the sheet name code in the center,   and the file name code on the right side of all worksheets.

22

Now   that you unlocked data-entry cells, you are ready to protect the worksheets   to prevent users from changing data in other cells. Individually, protect   each sheet using the default allowances without a password.

23

Mark   the workbook as final.
 

  Note: Mark as Final is not available in Excel for Mac. Instead, use Always   Open Read-Only on the Review tab.

24

Save   and close Exp19_Excel_Ch09_Cap_Assessment_Tips.xlsx.   Exit Excel. Submit the file as directed.

Week#9 Discussion

 The readings this week discusses broad context of risk and investigative forensics. Part of risk management is to understand when things go wrong, we need to be able to investigate and report our findings to management. Using this research, or other research you have uncovered discuss in detail how risk and investigate techniques could work to help the organization. ERM helps to protect an organization before an attack, where as forensics investigate technique will help us after an attack – so lets discus both this week. 

Reading source:

 

Chen, J. & Zhu, Q. (2019). Interdependent Strategic Security Risk Management With Bounded Rationality in the Internet of Things. IEEE Transactions on Information Forensics and Security, 14(11), 2958-2971.

Borek, A. (2014). Total Information Risk Management: Maximizing the Value of Data and Information Assets (Vol. First edition). Amsterdam: Morgan Kaufmann

Executive Practical Connection Assignment cloud computing

 

For this project, you will create a proposal to migrate a critical business function to the cloud at an organization you are familiar with or can easily research. 

Select an organization that you can research that has an on-premises business function that you believe will benefit from a migration to cloud computing. This paper must be entirely original content and checked with grammarly.com before submitting. The paper should include the following sections. Each must be called out with a heading.

  • Company Overview:  The section should include the company name, the industry they are in, and a general overview of the organization.
  • The On-Premises Function. Discuss the current application or functional domain that you are proposing for a move to the cloud. For example, an inventory management system or the organization’s email platform. Why will this benefit from cloud migration?
  • The Proposed Cloud Solution:  Describe your proposal for moving the function to the cloud. Be specific and detailed. Would you use SaaS, PaaS, or IaaS services? Which service provider would you use? What timeline do you propose? Include as much detail as possible. This portion should be 1-2 pages.
  • Conclusion:  Summarize the most important ideas from the paper and make recommendations on how they might achieve even greater success.    

This paper should not be a cursory overview. This class has a technical focus and should focus on the proposal of the technical solution. It should detail what is being moved to the cloud, what cloud services will be used, and what the predicted benefits are. It is a persuasive paper trying to convince the organizational leadership to approve a project to move a function to the cloud, not an analysis of an organization that has already done so.
Do not write about Amazon, Azure, Google, Apple, IBM, or other cloud providers. You may not use Netflix, Xerox, Fitbit as a topic organization for this paper.

Requirements:
The paper must adhere to APA guidelines, including Title and Reference pages.  
You must list at least three scholarly sources listed on the reference page. They must apply to your paper.  
You must have at least four headings listed above
You must cite each source in the body of the paper to give credit where due.  
Per APA, the paper should use a 12-point Time New Roman font, double spaced throughout, and you must indent the first sentence of each paragraph .5 inches.  
The body of the paper should be 4 – 5 pages in length.  
The Title and Reference pages do not count towards the page count requirements.
Check your work with grammarly.com before submitting it.

Unit 7 Assignment 1

  Use the Internet, regional or state newspapers, or professional journals to search for requests for proposals.

a. Copy the RFPs and bring them to class for discussion.

b. From a careful reading of one RFP, identify the problem or need.

c. Identify the audience the proposal writer needs to address.

d. Brainstorm a list of ideas to include in the proposal’s introduction.

presentaion 2

topic :  what makes a good hash function. 

 Make sure to give specific details and examples of good hash functions. I need like 4 slides excluding introduction slide. please give detail explanation in note section of a slide so that I can understand

Discussion

Part 1) Project Management: What is a project, and what are its main attributes? How is a project  different from what most people do in their day-to-day jobs? Discuss the  importance of top management commitment and the development of standards for successful project management. Provide examples to  illustrate the importance of these items based on your experience on any  type of project. Discuss the unique challenges that an IT project  presents.

Min 300 words 2 references

Part 2a “Data Warehouse Architecture”  (2 pages): Explain the major components of a data warehouse  architecture, including the various forms of data transformations needed to prepare data for a data warehouse. Also, describe in your own words current key trends in data warehousing. 

part 2b “Big Data” (2 pages):  Describe your understanding of big data and give an example of how you’ve seen big data used either personally or professionally. In your view, what demands is big data placing on organizations and data management technology? 

part 2c “Green Computing” (3 pages):   One of our topics in Chapter 13 surrounds IT Green Computing. The need  for green computing is becoming more obvious considering the amount of power needed to drive our computers, servers, routers, switches, and data centers. Discuss ways in which organizations can make their data centers “green”. In your discussion, find an example of an organization that has already implemented IT green computing strategies successfully.  Discuss that organization and share your link.

3 scholarly references. APA formatting.

Part1 and part2 need to be separately attached.

10s3

Read NIST SP 800-30 revision 1 (http://csrc.nist.gov/publications/nistpubs/800-30-rev1/sp800_30_r1.pdf (Links to an external site.)), NIST SP 800-53 revision 4, Chapters 1 thru 3 (http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf (Links to an external site.)), and NIST SP 800-18 revision 1 (http://csrc.nist.gov/publications/nistpubs/800-18-Rev1/sp800-18-Rev1-final.pdf (Links to an external site.)), all of which are located in your Module 3 Resources folder. 

Develop a System Security Plan (SSP) based on the information system selected in Project 1 using the sample provided in NIST SP 800-18 revision 1, Appendix A, as a guide; Note for #13, Minimum Security Controls in the SSP template: you only need to specify the appropriate control baseline from NIST SP 800-53 revision 4 and any additional controls or control enhancements (MINIMUM OF 2) added as part of the tailoring process, including your rationale for the addition.  Do NOT list all the controls and enhancements in the selected baseline.

List the following briefly each question in 30 words and Explain the differences for 1.7

1.1 What is the OSI security architecture?

1.2 What is the difference between passive and active security threats?

1.3 List and briefly define categories of passive and active security attacks.

1.4 List and briefly define categories of security services.

1.5 List and briefly define categories of security mechanisms.

1.6 List and briefly define the fundamental security design principles.

1.7 Explain the difference between an attack surface and an attack tree.