Ellison Private Elementary School has three classrooms in

 Ellison Private Elementary School has three classrooms in each of nine grades, kindergarten(grade 0) through grade 8, and allows parents to pay tuition over the nine-month school year. Design the application that outputs nine tuition payment coupons for each of the 27 classrooms. Each coupon should contain the grade number (0 through 8), the classroom number (1 through 3), the month (1 through 9), and the amount of tuition due. Tuition for kindergarten is $80 per month. Tuition for the other grades is $60 per month times the grade level. 

Networking

Submit these answers as a single Word document. APA style with references. 100% original work. no plagiarism.

Answer the following questions:

1. Map the layers of the TCP/IP model to the OSI model

2. Each layer of OSI has a body/group that is responsible for the standards, please name them

3. Describe the progression through the OSI model of the following:

  – A web browser request and connection to www.cnn.com

  – An email being sent from Outlook on a Windows machine from your APUS email account to [email protected]

Application security – Security Awareness

Assume you are a security awareness trainer. Part of your job is to convince end users that paying attention to security procedures makes the entire organization more successful.Answer the following question(s):

  • When a user does not follow security procedures, what are two consequences to the organization you would emphasize? Why?

Fully address the question(s) in this discussion; I’m interested to read what YOU learned from this week’s reading. Do NOT submit a research paper. Tell me what you think.

  • Think of three questions you’d like to ask other students and add these to the end of your thread.

500 words with APA format and references needed.

Mobile Application – discussion

From the humdrum of the mid-2000s web apps, Apple radically changed the mobile world with the iPhone, offering well-designed apps of their own and curating apps that were accepted into the App Store.  That influence has been far reaching, prompting Google to push their boundaries and develop material design, a design language that has become the distinctive hallmark of Android apps.  When compared to the web world where some popular apps could get away with mediocre design, why do mobile apps face a higher design bar? 

  • When compared to the web world where some popular apps could get away with mediocre design, why do mobile apps face a higher design bar?
  • Compare and contrast native mobile app design versus standard desktop app design.  Discuss considerations for choosing one over the other.  Elaborate on main advantages vs disadvantages.

– 2 pages

– apa

300 words

 

Do a bit of research on-line. Find a criminal case that involved Digital Forensics. 

Computer Discussion Board 2

 

https://www.raspberrypi.org/products/raspberry-pi-4-model-b/

https://www.instructables.com/id/Raspberry-Pi-Projects/

       Read the attached product brief on the Raspberry PI. Also look at some of the projects that have been built with the Raspberry Pi in the 2nd link. And yes, it can run Java.

Consider the following questions for your post.

1. Do you see anything that you would like to try or have the Raspberry PI do?

2. What does it mean to have this much computing power for $35 ? It was not too long ago that desktop PCs had these types of specs.

3. What other features or hardware to you think this needs to be usable?

If you think this is a toy, look at links below. 

https://www.brennan.co.uk/

https://www.element14.com/community/videos/17859/l/embedded-video-player.jspa?autoplay=false&mediaID=17859&fixedPlayerSize=false&setSizes=true&width=1060

Cyber Warfare Responses

Provide (2) 150 words substantive response with a minimum of 1 APA references for RESPONSES 1 AND 2 below. Response provided should further discuss the subject or provide more insight. To further understand the response, below is the discussion post that’s discusses the responses. 100% original work and not plagiarized. Must meet deadline.

RESPONSE 1:

Cyber warfare is action of utilizing cyber technology to damage or cause harm to another nation state or country. Cyber warfare targets mostly states and governments that are operating across wide networks and nations around the world. Example could be government installation that is creating projects for nuclear weapons or new technology. The types of cyber weapons go from just Trojan horse to something much stronger and complex such as Trojan horse, SQL injections, DDoS attacks, backdoors, and many more attacks. The weapons and cyber attacks variety in many different platforms and code utilization. Examples is attacker could create stealth scanner with python program instead of net-cat program to avoid being caught. The weapons depend on complexity of programmers knowledge and understanding of making cyberweapon. Defensive measures can variety from major too large for organization such as using firewall, IPS or IDS, Packet sniffer, Whitelist or blacklist In organizations inner layer of network. The future of cyber warfare is going to continue to grow as technology advances and will become much complex than where it’s currently at right now. We have seen major spike in cyber attacks with 2020 and 2021 but it just won’t stop with advancement in technology.

-MICHAEL

RESPONSE 2:

Cyber warfare involves an attack on a nation’s cyber critical infrastructure by an adversary. A cyber attack that is categorized as cyber warfare might target a nation’s electrical grid, fuel supply, financial institutions, agriculture, or military resources. The purpose of cyber warfare is to effect as much damage as possible in an effort to weaken an adversary nation in terms of their resources and in terms of the faith of the populace in their government. The types of weapons and tactics an intruder might use are quite diffuse. Recently, we have seen the deployment of ransomware malicious software that requires the transfer of funds from the victim to the cyber-criminal in order for the victim to regain access to their own cyber infrastructure. We have also seen many highly publicized zero-day exploits, such as the cyber attacks that targeted US government agencies via the Microsoft outlook exchange. Throughout the length of this course, we have often learned that often the best defense is continued education and training provided to employees so that they do not fall victim to a cyber scam that has the potential to widely impact a cyber network. In addition to educating the workforce regarding the dangers of malicious software and all the ways in which it can be deployed, regular scans of networks associated with cyber critical infrastructure can determine any abnormalities that might be indicative of a cyber-attack. In the future, cyber warfare attacks will undoubtedly be more prevalent. Cyber-attacks are inexpensive and hard to attribute to a particular cyber action or nation state, making it the perfect way to conduct an attack while maintaining plausible deniability. The current administration’s focus on cyber security is crucial for safeguarding out networks in the future.

-LAUREN

Operational excellence

Discussion: 

 This week we focus on the knowledge management cycle noted in Figure 5.3 in the Information Technology and Organizational Learning text. Note the various aspects of knowledge management, continuous innovation, and competitive advantage and how they integrate with one another. 

Assignment: 

 Information Systems for Business and Beyond Questions:

  • Chapter 5 – study questions 1-9, Exercise 1
  • Chapter 6 – study questions 1-10, Exercise 6, & 7

Information Technology and Organizational Learning Assignment:

  • Chapter 4 – Review the section on Linear Development in Learning Approaches.  Discuss how learning changes over time impact organizational culture.  What is the impact of this cultural change on the success of IT projects?
  • Chapter 5 – Review the Roles of Line Management and Social Network and Information Technology sections.  Note the various roles in the organization and note the similarities and differences within each role.  Also, note how innovation technology management shapes how we communicate amongst coworkers within an organization.