Basic power point

Hello, I am currently working on a power point slide show, but I am having problems , with what is ask of me. If more pics are needed or information, I can provide. 

Thank you very much 

C++

 

This is a written assignment where you will research answers to the below questions. All answers will be in your own words. Any copy/paste = 0/100. Feel free to use a combination of text and code if that helps you explain a concept easier. 

Please type your answers to the below questions in a Word document, 12 pt font, single space (please put a blank line between each answer to separate them):

  1. What is object-oriented programming (OOP)? Give examples
  2. Name at least two benefits of OOP. Give examples
  3. What is an object? Give an example
  4. What is a class? Give an example
  5. There are main components of OOP, define each and also explain how works with examples:
    1. Inheritance
    2. Polymorphism
    3. Encapsulation
    4. Data abstraction

I expect to see detailed answers to each of the above. Short, vague answers will result in a low grade. 

Information Security Roles and Responsibilities

This is associated with the Twitter hack of 2020 and is a continued assurance plan to mitigate weakness while outlining the key roles of leaders and their responsibilities. See Below and Attached.

You will submit your roles and responsibilities portion of the final project. Who are the key leaders of the organization specific to how their responsibilities are connected to the security of the organization’s information? You must also identify key ethical considerations. What are the ramifications of key leaders not properly accounting for ethical and legal considerations? What are the key components of information assurance as they relate to individual roles and responsibilities within the information assurance plan? For example, examine the current policies as they relate to confidentiality, integrity, and availability of information. 

Syncsession

 

Write a 4-5 page paper (deliverable length does not include the title and reference pages)

  • Why must companies place an increased emphasis on the use of high-quality software in business systems, industrial process-control systems, and consumer products?
  • What potential ethical issues do software manufacturers face in making trade-offs between project schedules, project costs, and software quality?
  • What are the four most common types of software product liability claims?

Computer Information System

I have a computer information system assignment, I’m stress out with my finals and I really need t earn good grades for both my finals and this assignment I introduced to this web from one of my classmates hope someone can help me to succeed I’m good in computer but my instructor make everything a little bit complicated.  I attached all requirements. Due date November 21st.

Thank you 

design and reusability

It is a project work about creating a note reminder app , a pact analysis is required coding to be written in c++ , sample solution is attached below. will require a summarisation of everything cause Im supposed to do a presentation with it

Week 7 discussion – Cyber Law

 Week 7 discussion Hacking and invasion of the computers of others

Please describe a case that has been in the news recently and describe what harm can be done by the unlawful intrusion into the computer of another. Please respond in 400 words. And add references using APA format.

Create a Project Proposal

  Create 3-4 pages project proposal for the below scenario : attached the project  proposal template. 

  • Develop a project definition and scope that defines the project and articulates the business context for the project.
  • Identify problems that the proposed system is expected to solve (or opportunities the proposed project is expected to produce).
  • Create project objectives.
  • Create the project methodology or game plan.
  • Compile a high-level schedule for completing the project scope.

Scenario B: Internet Bank 

Imagine you work for a start-up company that is launching an internet bank. The internet bank will provide the following financial products and services to its customers:

· Accounts and deposits

· Credit, debit, and travel cards

· Loans

· Insurance

· Investments

· Tax services

Senior management and investors have identified the following key technical factors for the success of the internet bank:

· Scalability: The technology and software application infrastructure must accommodate high growth and new users without impacting the service levels delivered to existing users.

· Availability: Users must be supported with robust, consistent, and reliable access; excellent performance 24 hours a day, 7 days a week.

· Security: Industry-accepted security practices and a multi-level authentication system have to be put in place to authenticate and identify each user before they access their accounts and initiate transactions.

· Manageability: The technology and software applications infrastructure must be easy to manage, support, and update. 

You have been assigned to analyze your organization and develop a technical architecture to support the business processes of this internet bank.

blockchain implementation

Contrasting local and public test blockchains Contrasting local and public test blockchains.

In chapter 4, the author discusses different options for testing blockchain applications. For our course, we have chosen to use Ganache, a local test blockchain. Explore some of the advantages and disadvantages of using local and public blockchains to test apps and contrast the two options.  

Spr1.4

 Assignment 1

According to Kirk (2016), most of your time will be spent working with your data. The four following group actions were mentioned by Kirk (2016):

· Data acquisition: Gathering the raw material

· Data examination: Identifying physical properties and meaning

· Data transformation: Enhancing your data through modification and consolidation

· Data exploration: Using exploratory analysis and research techniques to learn

Select 1 data action and elaborate on the actions preformed in that action group.

Textbook is attached, “Andy Kirk – Data Visualisation_ A Handbook For Data Driven Design-Sage Publications (2019)”.

Requirement: 

· ****Separate word document for each assignment****

· Minimum 300-350 words. Cover sheet, abstract, graphs, and references does not count.

· Add reference separately for each assignment question.

· Strictly follow APA style. 

· Include at least two citations (APA) from academic resources

· No plagiarized content please! Attach a plagiarized report.

· Check for spelling and grammar mistakes!

· $5 max. Please bid if you agree.

Assignment 2

Assume you are a security professional. You are determining which of the following backup strategies will provide the best protection against data loss, whether from disk failure or natural disaster:

· Daily full server backups with hourly incremental backups

· Redundant array of independent disks (RAID) with periodic full backups

· Replicated databases and folders on high-availability alternate servers

Answer the following question(s):

Which backup strategy would you adopt? Why?

Requirement: 

· ****Separate word document for each assignment****

· Minimum 300-350 words. Cover sheet, abstract, graphs, and references does not count.

· Add reference separately for each assignment question.

· Strictly follow APA style. Length – 2 to 3 paragraphs. 

· Sources: 2 References to Support your answer

· No plagiarized content please! Attach a plagiarized report.

· Check for spelling and grammar mistakes!

· $5 max. Please bid if you agree.