html

you have only 1 hour to finish this code, it is easy and simple for the HTML dev

Discussion – Theory

Discuss the theoretical framework you think helps explains your topic and problem you will address in your dissertation. Remember, this will also be cited in the literature as well, so make sure to include scholarly resources from a peer reviewed journal. 

Topic :  The Smart Phone as a Dangerous Technology  

APA format with references needed. 500 words

Assignment

Perform a Vulnerability Assessment of your place of employment or living area. If you use your work area make sure you inform the Security Manager to get permission as to what you are doing. If you live in a gated community inform the security guard of your activities.

Instructions: Please download the Assignment 1 Vulnerability Assessment template (MS Word), which is already in APA 7 format, using size 12 Times New Roman font, 1-inch margins, TOC, Headings and Reference page. If you insert images or tables in your report make sure you label them appropriately according to APA.

For this assignment: The 4 Heading-1s are required. Each Heading-1 must have at least 3 Heading-2s. Each Heading must have at least 2 properly formatted paragraphs with 3 properly formatted sentences each

Exp19_Excel_Ch01_CapAssessment_Training

 

Exp19_Excel_Ch01_CapAssessment_Training

 

Project Description:

You manage a company that provides corporate training workshops. Your two types of clients are business people and college professors. You want to complete a spreadsheet that calculates gross revenue for upcoming training workshops. Finally, you will improve the appearance of the worksheet by applying font, alignment, and number formats.

Information security policy

  Answer below 

1. Conduct an internet or library search to locate the information security policy for 2 colleges or universities.

2. Identify the first policy you selected and document whether it contains the following elements:
Policy statement, Rationale, who is affected by the policy, Definitions, Roles and responsibilities, Compliance, Related documents, Policy contact

3. Identify the second policy you selected and document whether it contains the following elements: Policy statement, Rationale, Who is affected by the policy, Definitions, Roles and responsibilities, Compliance, Related documents, Policy contact

4. Which policy was more complete or informative? Why?

5. As an end-user, which policy was easier to understand? Why?

6.For the first policy, what are your responsibilities for following the policy?

7.For the second policy, what are your responsibilities for following the policy?

8. You have been hired as an information security analyst at a small company called Astounding Appliances. Your manager asks you to help her create an information security training and awareness policy. The primary goal of the policy is to keep employees from responding to phishing attempts and other internet scams. Any policy that is created will have to be reviewed by legal counsel and other company stakeholders, so it is not important to get the language exactly right for the first draft. What is important, however, is to outline all of the main parts of the policy. Your manager wants you to prepare the first draft of the outline using the common policy elements headings.Create an outline of an information security training and awareness policy.

Data in Each bytes

  In this question, you are going to assume the following data type and its corresponding sizes: char: 1 byte and int: 3 bytes. From a C-like snippet of a code below, answer the rest of this questions. Note: use a lost of casting in the second half of this snippet to make sure things are clearly declared. typedef struct type1{int i[3];} typeA; typedef struct type2{typeA j[2];} typeB; typeA *a; typeB *b; unsigned long *c; int i; a = malloc(2*sizeof(typeB)); b = a; c = a; for(i=0;i<18;i++) { *(c+i) = (unsigned char)(i%8); } Assuming that the actual location of a after malloc is called is at the physical address 0x10000 in DRAM. Using the concept of address we learn from our class, the table below shows our DRAM starting from the address 0x10000. Please put in the values inside each bytes in our DRAM starting at address 0x10000 up to the end of where a is malloced for. Write XX in the byte that is unknown/unassigned, and write YY on the byte that is not in the range that a covers. I gave you the first byte, finish the rest. Hint: Draw the organization of the struct out on a piece of paper. Pair this up with the concept of an array and type casting. This question is actually very easy but you need to be a bit careful. Hint2: Please note that our table is actually 1D. Each row is 8 bytes in size and the address of the next row basically continue from the end of the earlier row. I just have no method to draw a very long 1D table so I need to resort to a 2D table here. 

Discussion Assignments

1.Write at least 500 words discussing the advantages and disadvantages of each method from the article from the link below. Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list in APA format.

Link:https://rviews.rstudio.com/2019/07/17/3-big-data-strategies-for-r/

2.Write at least 500 words discussing weaknesses of sentiment analysis to improve a call center.

Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs.