Problem 1: Create a list that contains the months of the year. Problem 2: Create a loop to print the month number and name

Instructions:

Create a PowerPoint that contains a FLOWCHART and a PSEUDOCODE for each problem.

Use the information below to create a pseudocode (which can be a text-based description for solving the problems) and a flowchart (using flowchart symbols to illustrate how you would program) to solve each problem. Use Microsoft PowerPoint® for Pseudocode and the flowchart.

Problem 1: Create a list that contains the months of the year.

Problem 2: Create a loop to print the month number and name (do not hard code the month number)

Consider using the attached enumerate method to help!

700words: Effective leadership

Refer to the attachment:

1. How do geographically dispersed teams collaborate effectively?

2. Please find at least three tools on the market that teams can use to collaborate on a geographically dispersed team.  Please note the pros and cons of each tool. 

3. Based on the research above, note which tool you would select if you were managing the geographically dispersed team and why.

Need residency project with PPT

 

Power Point Presentation

  • 10 – 15 slides total (does not include title or summary slide)
  • Try using the 6×6 rule to keep your content concise and clean looking. The 6×6 rule means a maximum of six bullet points per slide and six words per bullet point
  • Keep the colors simple
  • Use charts where applicable
  • Use notes section of slide
  • Include transitions
  • Include use of graphics / animations

———————————————————————————————————————-

The primary goal of operational security is to protect & secure the operations of an enterprise, while securing the technologies needed to maintain network and resource availability. Your residency project will include research & analysis on the below:

Write a twelve to fifteen (12 – 15) page paper in which you:

  • For leaders, implementing security policies is all about working through others to gain their support and adhere to the policies. Discuss widely accepted leadership rules which apply to security policies.
  • Discuss the importance of creating an IT security framework that aligns with organizational goals.
  • Compare & Contrast access control in relations to risk, threat and vulnerability.
  • Identify and discuss two – three information security policy implementation issues & their recommended resolution(s).
  • Explain the relationship between access control and its impact on an organizations security procedures & policies.
  • Discuss quality control vs quality assurance.
  • Discuss the ways in which a “good” policy can reduce the likelihood of risk occurring or reduce its impact.
  • Describe access control and its level of importance within operations security.
  • Argue the need for organizations to implement access controls in relations to the: awareness principle, accountability principle, ethics principle and timeliness principle.
  • Describe the necessary components within an organization’s IT security policy.

Your assignment must follow these formatting requirements:

  • Use at least ten – fifteen (10 – 15) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date.
  • The cover page and the reference page are NOT included in the required assignment page length.

Application Assignment: Blogs and Defamation

As an avid user of online social media, you identify a very untrue blog written by an anonymous writer. The blog contains many horrible accusations that are unfounded and untrue. After identifying this blog, you feel violated and confused. What steps can you take to have the blog removed? What defamation charges can be filed against the creator of the blog? 

Three Required Headers:

Blog Scenario

Procedure

Defamation Charges 

Research Paper

 “There should be no plagiarism. Attach a plagiarism report with 0 % similarity index

 Task 1:

 Any one of the below topics

 1. Cloud Computing 

2. Big Data Analytics

 3. Database Security 

4. Enterprise Architecture 

5. Data Warehouses

 6. Ethics in IT 

7. Web 2.0 

8. E-Commerce 

 The research paper must be at least 10 pages but no more than 12 pages.

 • The paper needs to be supported by evidence (citations from peer-reviewed sources). 

• A minimum of four (4) peer-reviewed journal citations are required. 

• No references should be more than 5 years old.  

Task 2:

  • Your PPT should reflect a summary of your Individual Research Report.
  • You should have 12-15 slides.

 

Introduction to technology 1010

 We want you to read at least one article or view a video about hardware (not software). Then write a brief summary (or create a short presentation) summarizing the article using MS Word or PowerPoint. Brief means no less than 10 sentences but not more than one page. Make sure to cite your source properly. 

wk3_531_B

12. Go to data.gov—a U.S. government–sponsored data portal that has a very large number of data sets on a wide variety of topics ranging from healthcare to education, climate to public safety. Pick a topic that you are most passionate about. Go through the topic-specific information and explanation provided on the site. Explore the possibilities of downloading the data, and use your favorite data visualization tool to create your own meaningful information and visualizations.

2 pages and 3 presentation slides

It’s a paper on Kronos and my part is below:

I need 2 pages and 3 presentation slides on the same topic.

Why are their solutions good for consumers and the business? i. Describe any policies that they have for their customers, suppliers, shareholders, employees, and society at large. Are there any conflicting policies?

Let me know in case of any additional questions.

Week8

Instructor: Dr. Brian Bertrand

Class: ISOL536-Security Architecture and Design 

Length:  Minimum of 600 words

Review a Security Breach which occurred over the past year and present a research paper providing the below point!!

• Describe the incident• Provide Specifics about the incident.• What data or information was impacted?• Describe threat modeling techniques which could have assisted in the mitigation of breach.• How can the organization be better postured for future attacks?

This assignment should be in APA format and have to include references.

Final Project