Java Programming

Please read the instruction from these pictures.

You can use these codes below. 

game.java (The codes of the picture below) : 

https://drive.google.com/file/d/1vggE2dDlb9d7PdE1vB6_AIa2bxytc3Um/view?usp=sharing

Game.java : 

https://drive.google.com/file/d/1Ax_n-lW65wCPXgelFctKGnx93i1KNFdc/view?usp=sharing

GameObject.java : 

https://drive.google.com/file/d/1M3nbQUVt9FjY_aco5YtAN_g-moXgfYhk/view?usp=sharing

Enemy.java : 

https://drive.google.com/file/d/12ZmBwbsH5ltgSI18gWcZJX5DHwgEqYoi/view?usp=sharing

Player.java

https://drive.google.com/file/d/1Kn1PAXE3NONPyYPaeHBBH3gCdjcwaN6l/view?usp=sharing

Migration from local to Cloud Infrastructure

  

Deliverables

You company has been allocated an unlimited budget to move to a virtualization infrastructure. The current IT infrastructure exists on bare metal with no virtualization implemented at all. 

The current infrastructure contains the following components:

2 x Windows 2008 R2 Domain Controllers

2 x Exchange 2013 Servers

1 x SQL 2012 Server

1 x Red Hat 7.0 Apache Server

2 x Windows 2008 R2 Servers as File Servers

Your task is to do the following:

1) Provide a cost and description of the new hardware you will be implementing

2) Develop a migration plan to move all current infrastructure to virtualization (this also means 0 downtime)

3) Identify and Upgrade the old operating systems and software in the current infrastructure

4) Expand the current infrastructure to include new technologies (eg. An MDM solution)

Please create a detailed report on the tasks above.

social engineering

Conduct your own social engineering experiments.

1) While at a restaurant, convenience store, bank, place of business, or any shopping location, ask you waiter or waitress, bartender, server, sales clerk, or cashier personal questions about their family or their interests.How much information are you able to obtain about this person you do not know?

Name, address, age, religion, political beliefs, place of birth, pets, hobbies, number of children, type of car they drive, or any other information you think you can obtain.

Write your findings in either a list or in paragraph form.

Database management systems Or DBMS (Network Security- Cybersecurity)

 A database management system is an application that provides users with the means to manipulate, analyze, and query data. Almost all DBMSs in existence today are developed to be used with relational databases.  Describe in a minimum 2-page essay (about 1,000 words, double spaced, APA format) a DBMS that you have dealt with at a company, or as a customer.  How was it used to help you access the data? 

empowering leadership and effective collaboration in geographically dispersed teams

The attached journal article focus on empowering leadership and effective collaboration in geographically dispersed teams, please answer the following questions:

  1. How do geographically dispersed teams collaborate effectively?
  2. Please find at least three tools on the market that teams can use to collaborate on a geographically dispersed team.  Please note the pros and cons of each tool. 
  3. Based on the research above, note which tool you would select if you were managing the geographically dispersed team and why.

Format Requirements:

1. The paper must be minimum 3 pages excluding title and references pages. 

2. Include references of at least 5 peer reviewed papers supporting your case study. 

3. The paper must comply APA Format and include a cover page, an  introduction, a body with fully developed content, a conclusion and  references.

Write C program to encrypt and decrypt a file

 Encryption:

 1. Read keys from user input. Prompt the user to enter a character for each key. 2. Read the plain text (“data”) from the input file. The name of the input file is one of the command line argument. 3. Implement your encryption algorithm. 4. Encrypt “data” and write to a file. (The name of the file is chosen by the programmer.)

 Decryption: 1. Read keys from user input. Prompt the user to enter a character for each key. 5. Read the file that encrypted data was saved and extract the encrypted “data”. The name of the encrypted file is one of the command line argument. 2. Implement your decryption algorithm. 3. Decrypt the “data” and write to a file.   

Discussion

Incident Response Team (IRT) Policies

  • Describe the different ISS policies associated with incident response teams (IRTs).

Keywords

Use the following keywords to search for additional materials to support your work:

  • Business Continuity Plan (BCP)
  • Business Impact Analysis (BIA)
  • Containment and Minimizing Damage
  • Disaster Recovery Plan (DRP)
  • Incident Classification
  • Incident Response
  • Incident Response Support
  • Incident Response Team (IRT)
  • Incident Response Team (IRT) Charter
  • Incident Response Team (IRT) Members
  • Media Handling

Access Control- Crime Prevention Through Environmental Design (CPTED)

 

Topic:  Perform a Vulnerability Assessment of your place of employment or  living area. If you use your work area make sure you inform the Security  Manager to get permission as to what you are doing. If you live in a  gated community inform the security guard of your activities.

Instructions:  Please download the Assignment 1 Vulnerability Assessment template (MS  Word), which is already in APA 7 format, using size 12 Times New Roman font, 1-inch margins, TOC, Headings and Reference page. If you insert images or tables in your report make sure you label them appropriately according to APA. (click here for link).

For this assignment: The  4 Heading-1s are required. Each Heading-1 must have at least 3  Heading-2s. Each Heading must have at least 2 properly formatted paragraphs with 3 properly formatted sentences each. Once completed name your file: YourName_Assignment_1_Vulnerability_Assessment.docx and  submit to the appropriate assignment folder. 

Resubmission: You may re-submit ONLY if your initial grade is a “C” (70%) or less.

Plagiarism: Zero marks for the first attempt and second attempt will result in failing the course

Assignment 1 Vulnerability Assessment Template.docx 

 

Also review the additional files attached for detailed information on Vulnerability Assessments.