- Research 14-1 – Application security or penetration testing methodology. APA formatting is expected. Research various application security testing or penetration testing methodologies. Compare and contrast the pros and cons of each methodology and recommend your preferred approach.
- By submitting this paper, you agree: (1) that you are submitting your paper to be used and stored as part of the SafeAssign™ services in accordance with the Blackboard Privacy Policy; (2) that your institution may use your paper in accordance with your institution’s policies; and (3) that your use of SafeAssign will be without recourse against Blackboard Inc. and its affiliates.
procedure doc
Write a procedure document for CSI that documents how to change a password in a platform of your choosing.
The document should be detailed enough, and yet understandable enough, for a reasonable, non-technical, non-IT person to follow the directions and successfully change the operating system password without the need to call for support in all but the most extreme cases. (In the real world, there will always be the the ‘outlying’ cases that defy logic and defy documentation.)
Text should be as understandable as possible and as non-technical as practical. Remember in a previous lecture that the standard reading level for a wide audience tends to be 8th or 9th grade. Include a glossary where needed.
Visual aids should be included. Screen captures or photographs are very helpful to the technically challenged.
For this assignment an Adobe PDF or Microsoft Word or Microsoft PowerPoint (or equivalent application) document will be acceptable.
Tips
This is usually an easy assignment because changing the password in most operating systems is very simple. You just need to describe the steps in getting there.
Most students tend to get caught up in the editing process. Getting a prototype document put together, including screen captures, is usually pretty fast. Editing can be a time black hole so be mindful of that.
Ask a non-technical person to read one of your drafts. If they understand it, and can follow it, you have succeeded.
research paper
Scenario:
You have recently been hired as a Chief Information Governance Officer (CIGO) at a large company (You may choose your industry). This is a newly created position and department within the organization that was founded on the need to coordinate all areas of the business and to provide governance of the information. You will need to hire for all positions within your new department.
The company has been in business for more than 50 years and in this time has collected vast amounts of data. Much of this data has been stored in hard copy format in filing cabinets at an offsite location but in recent times, collected business data is in electronic format stored in file shares. Customer data is being stored in a relational database, but the lack of administration has caused data integrity issues such as duplication. There are currently no policies in place to address the handling of data, business or customer. The company also desires to leverage the marketing power of social media, but has no knowledge of the types of policies or legal issues they would need to consider. You will also need to propose relevant metrics that should be collected to ensure that the information governance program is effective.
The CEO and Board of Directors have tasked you to develop a proposal (paper) that will give them the knowledge needed to make informed decisions on an enterprise-wide Information Governance program, addressing (at a minimum) all of these issues, for the company.
Requirements:
The paper should include at a minimum of the following sections:
a. Title page
b. Executive Summary (Abstract)
c. Body
i. Introduction (including industry discussion – 1-2 pages)
ii. Annotated Bibliography (2-3 pages)
iii. Literature review (2-3 pages)
iv. Program and technology recommendations, including:
1. Metrics
2. Data that matters to the executives in that industry, the roles for those executives, and some methods for getting this data into their hands.
3. Regulatory, security, and privacy compliance expectations for your company
4. Email and social media strategy
5. Cloud Computing strategy
d. Conclusion
e. References
2. You must include at least two figures or tables. These must be of your own creation. Do not copy from other sources.
3. Must cite at least 10 references and 5 must be from peer reviewed scholarly journals (accessible from the UC Library).
4. This paper should be in proper APA format and avoid plagiarism when paraphrasing content. It should be a minimum of 8 pages in length (double-spaced), excluding the title page and references.
Milestones:
· Introduction Section – A 2-3 page paper describing the industry chosen and potential resources to be used. 100 pts.
· Develop a full annotated bibliography (3-4 pages) and develop the literature review (3-4 pages). 200 pts.
· Completed final research paper (both milestones combined together and include the last sections as discussed in the list above). 300 pts.
Computer Science
Explore CNET
Right click the link above and open it in a new tab or window. You may also right click and copy the hyperlink and paste it into the address like of Chrome or Firefox.
CNET is a great website for technology news and review. Their About Us page states, “CNET tells you what’s new in tech, culture and science, why it matters, how it works and what you need. Our global team works 24/7 to explore and explain the changing world around us. You can depend on CNET for news, commentary, analysis, features, FAQs, advice, hands-on reviews, buying guides, amazing photography and fun and informative videos.”
We want you to read at least one article or view a video about hardware (not software). Then write a brief summary (or create a short presentation) summarizing the article using MS Word or PowerPoint. Brief means no less than 10 sentences but not more than one page. Make sure to cite your source properly.
Post this summary to the Hardware Assignment discussion board. Read at least one other student’s summary on hardware and provide a peer review. A peer review is an evaluation of another student’s academic work. This could include but is not limited to taking a stand on the topic and providing evidence for/against it; providing additional information on the other student’s topic; posing questions about the topic and possible answers; demonstrating your understanding or application of the topic with examples. You may need to cite a source in your reply. Remember that if the information does not come out of your own head, you need to cite it. The summary is work 35 points and the review 15 for a total of 50 points for this assignment.
Check your course Detailed Schedule for the due date.
EH week9 P9
Hello,
i need this paper by 10/21 afternoon.
Strictly No plagiarism please use your own words.
Using the following link as your reference, select TWO and explain the differences
(viruses, worms, trojans, and bots).
What Is the Difference: Viruses, Worms, Trojans, and Bots?
( https://tools.cisco.com/security/center/resources/virus_differences)
400 words
Make sure Strictly No plagiarism content should not match and even the reference should not match in plagiarism
Data Science & Big Data Analy
This week’s reading centered around how Big Data analytics can be used with Smart Cities. This is exciting and can provide many benefits to individuals as well as organizations. For this week’s research assignment, You are to search the Internet for other uses of Big Data in RADICAL platforms. Please pick an organization or two and discuss the usage of big data in RADICAL platforms including how big data analytics is used in those situations as well as with Smart Cities. Be sure to use the UC Library for scholarly research. Google Scholar is the 2nd best option to use for research.
paper should meet these requirements:
- Be approximately 5 pages in length, not including the required cover page and reference page.
- Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
- Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.
intext ciations,references,quality work,no plagrism.please plagrism report
for Dr Elahi
Oliver’s business is now growing. He built a company and has sales agents and sales supervisors working for him all over England. He realizes using google spreadsheets is not sustainable.
He wants to invest in a scalable system and he is thinking to recruit a software engineer and a data engineer (you).
The software engineer has to come up with a mobile app that allows the sales agents to report their sales from the app.
The app should be connected with a data pipeline that would eventually make the data ready for analysis.
– What would be your strategy to build a strong and reliable data pipeline and how will you structure it ? Explain the different steps for processing the data, what makes each step important?
Mention which tools would you use for each of these steps. Feel free to argument as much as you feel it relevant You’re free to make assumptions about the mobile app e.g. The raw data is stored in a No-Sql database…
Executive Summary
You are a member of the IT team at Don & Associates, a financial consulting company that provides services to small- and medium-sized companies. Because the company is looking to expand into neighboring states within the Northeast region, its leaders have tasked you with determining if cloud computing is a viable solution to the need for infrastructure.
you will be submitting a one- to two-page executive summary to the owner of Don & Associates. It should briefly explain the major cloud service providers, cloud computing service models, and the potential benefits and risks of migrating Don & Associates’ technical infrastructure to the cloud.
Use this executive summary template. In the template, you will see specific instructions in the document. Delete the instruction text before you submit your project.
Your summary should include:
- the types of cloud computing (private, public, hybrid)
- three major cloud service providers
- three cloud computing service models
- potential benefits and risks of migrating the company’s technical infrastructure to the cloud
Be sure to cite any sources you use.
Template
Project Description
Include the name of the project here.
Statement of Need
Explain what the company is struggling with and how the company could benefit from moving to the cloud.
Cloud Service Providers
Provide an overview of the top three cloud service providers. List the services offered and briefly describe the advantages and disadvantages of each provider.
Recommended Plan
Provide your recommendation for a cloud service provider and justify your selection.
Impact of Recommended Plan
Describe how your recommended plan will address the needs of the stakeholders. Briefly describe the potential risks of migration/potential drawbacks for the company.
References
write a python program
TASK 1: Animated Sine Curve
Write a Python program one.py with PyOpenGL to display an animation of sine function y=Asin(x+B), satifying the following requirements:
- The window application’s size is (600, 600), and its upper-left corner is at (250, 250) on the screen;
- The window application’s title is Animated Sine Curve.
- The ranges of x and y are [-4, 4] (x is in radians);
- The amplitude A is a random float in [1, 2], and it is updated each time the window application restarts;
- The phase shift B is a float; it is initialized as 0, and incremented by 0.01 each time the screen refreshes;
- The two axes are drawn in white, with an arrow towards the positive direction at the end of each axis;
- The sine curve is drawn in yellow.
- Orthogonal projection is used in this task.
The following figure illustrates the expected window application.
TASK 2: Clamped B-Spline
Write a Python program two.py with PyOpenGL to display a clamped B-spline, satifying the following requirements:
- The window application’s size is (550, 550), and its upper-left corner is at (150, 150) on the screen;
- The window application’s title is Special B-Splines.
- The program reads a text file named control-points.txt, including an x,y coordinate pair in each line as a control point, in the same folder;
- Control points are drawn with size 4 in green.
- Based on the control points, a clamped B-spline is drawn.
- P(t)’s color, mixed by red and blue, depends on its curvature (R = curvature / 5, G = 0.0, B = 1 – curvature / 5);
- Curvature is clipped by [0, 5].
- Orthogonal projection is used in this task.
The following figure illustrates the expected window application, reading the sample control-points.txt provided.
TASK 3: Hexagonal Pyramid
Write a Python program three.py with PyOpenGL to display a 3D hexagonal pyramid, satifying the following requirements:
- The window application’s size is (400, 400), and its upper-left corner is at (100, 100) on the screen;
- The window application’s title is Hexagonal Pyramid.
- The program reads a text file named pyramid-params.txt, including one line as x,y,z,H,R, in the same folder, where x, y and z are the coordinates of the top vertex v, H is the height, and R is the radius; we assume the top vertex v and the base centroid c are on the same vertical axis, and c is always under v; the distance between c and any base vertex vi is always R.
- Based on the above information, a hexagonal pyramid is drawn.
- All faces are randomly and differently colored, except for the base in white.
- When the key R is pressed, the radis increases by 0.01 and the hexagonal pyramid is redrawn.
- When the key H is pressed, the height decreases by 0.01 and the hexagonal pyramid is redrawn.
- The hexagonal pyramid is static by default; When the key X, Y or Z is pressed, the hexagonal pyramid toggles between being static and rotating 1 degree/refresh along the corresponding axis (i.e., the key X corresponds to the x axis), taking c as the origin.
- Perspective projection is used in this task (FoV is 90 degrees towards the y-axis; Camera looks at the origin and uses the y-axis direction as the up-vector).
The following figure illustrates the expected window application, reading the sample pyramid-params.txt provided.
Critical thinking (Assignment 2 – Problem Solving )
Choose one (1) of the problem scenarios as a topic choice for your paper (Note: Your professor must approve your topic choice before you begin work on the assignment.)
Scenario 1: You have worked at your company for eleven (11) years. You have returned to college to earn a Bachelor’s degree in order to increase your chances for a promotion. You are nearly finished with your degree, when a supervisor’s position in a competing company becomes available in another state. The start date is in two (2) weeks, during your final exam period for your courses. The position offers a $15,000 per year salary increase, a car allowance, and relocation expenses. Your former supervisor works for the company and is recommending you for the position based on your outstanding job performance; if you want the job, it’s yours. All of the other supervisors at this level in the company have Master’s degrees, so you know that you would be expected to earn your Bachelor’s degree and continue on to a Master’s degree. Your present company offers tuition reimbursement, but the new company does not.
Scenario 2: Your child comes home from school with an assignment sheet for a school project. He / she is very excited about the project and begins work immediately, doing research on the Internet and gathering materials. You read over the assignment sheet and notice that your child is not including all of the required items in the project, and you have some ideas for how to improve the quality of the presentation. You recently read an article in a parenting magazine about the importance of a child developing responsibility for his/ her own learning. You recall the many ways in which your parents took over your school projects. You, on the other hand, want to encourage your child’s confidence in his / her ability to complete a project independently. The next day, you are at the grocery store when you see a parent of a student in your child’s class. That parent has spent over $30 in supplies for the science project and is taking a day off of work to put the pieces of the project together.
Scenario 3: You have two jobs, one during the week from 9:00 am to 6:00 pm, and one on Saturday from 3:00 pm to 11:00 pm. You are taking two classes, one that meets from 6:00 to 10:00 pm, and one class online. You have two kids, one who plays soccer, and one who is in band. You have two elderly parents who no longer drive. You have two siblings, one who lives two (2) miles away, and one who lives in another state. You have two (2) papers due in your classes the same week that one (1) of your children has a soccer tournament, and the other child has a band concert. You are coaching the soccer team, and you are in charge of fundraising for the band. You have a goal to complete your degree in two (2) years. Your doctor tells you that your blood pressure, your cholesterol, and your weight are too high and recommends several medications that cost you nearly $200 per month after your insurance co-pay.
Scenario 4: You are a sales representative for a company that encourages staff to log time in the field and away from the office. You are expected to begin and end your day at the office. You notice that each day when you arrive and return another co-worker is already there, and you wonder whether this person spends most of his / her time at the office. At your weekly sales meeting, you are informed of your co-workers’ outstanding sales performance. You suspect that this co-worker is spending more time flattering the boss instead of working leads in the field, and as a result is getting the best client referrals. Your own sales numbers have steadily decreased since this other sales representative was hired.
Write a four to five (4-5) page paper in which you:
- Define the problem in the scenario that you have chosen.
- Analyze the problem in the scenario.
- Generate options for solving the problem in the scenario.
- Evaluate the options for solving the problem.
- Decide on the best option for solving the problem.
- Explain how you will implement the decision made and reflect on whether this option was the most effective.