A small airline company needs a program to compute baggage charges. Write a program that asks the user to enter the weight of a passenger’s baggage. The program should display the baggage charge, which is calculated as follows. If the baggage weight is 50 pounds or less, the program should display “No Charge”. If the baggage weight is greater than 50 pounds, the baggage charge is $5.00 plus $0.95 for each pound over 50.
book's observation ( web usability)
Observations, questions, comments about “Don’t make me think” by Steve Krug ( the book is attached)
question must answer:
1/ What have you learned so far that you didn’t already know?
2/ What might you incorporate into your group project?
( two paragraph) less than a page
Complete a Physical Security Assessment (internal and external) of your place of work or living area. IRefer to your text on the importance of Lighting and Access Control and be sure to cover the salient issues discussed in the text.
Topic: Complete a Physical Security Assessment (internal and external) of your place of work or living area. If you use your work area make sure you inform the Security Manager to get permission as to what you are doing. If you live in a gated community inform the security guard of your activities. Refer to your text on the importance of Lighting and Access Control and be sure to cover the salient issues discussed in the text.
Instructions: Please download the Assignment 2 Physical Security Assessment template (MS Word), which is already in APA 7 format, using size 12 Times New Roman font, 1-inch margins, TOC, Headings and Reference page. If you insert images or tables in your report make sure you label them appropriately according to APA. Once completed name your file: YourName_Assignment_2_Physical_Security_Assessment.docx and submit to the appropriate assignment folder.
Also review any additional files attached for more information.
Business Statergy D-2
1) What are the key factors for competitive success and why? 350 words
2) 1 reply of 150 words
How to get assignment
homeworkmarket.
Organization leader and Decision making – Research Paper
Note : Please write Research paper in APA 7 format
This week’s journal article was focused on how information and communication innovation drives change in educational settings. The key focus of the article was how technology-based leadership has driven the digital age. Also, that the role of technology leadership incorporates with the Technology Acceptance Model (TAM).In this paper, address the following key concepts:
- Define TAM and the components.
- Note how TAM is impacting educational settings.
- Give an overview of the case study presented and the findings.
Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research. Please be sure that journal articles are peer-reviewed and are published within the last five years.The paper should meet the following requirements:
- 3-5 pages in length (not including title page or references)
- APA guidelines must be followed. The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.
- A minimum of five peer-reviewed journal articles.
The writing should be clear and concise. Headings should be used to transition thoughts. Don’t forget that the grade also includes the quality of writing.
Web server auditing
Web server auditing can go a long way in enforcing tighter security and ensuring business continuity. The power of log data is tremendous. Web server logs record valuable information pertaining to usage, errors, and other important security events. Using a specialized auditing tool can be extremely helpful during the audit of web servers. In your discussion this week, please discuss the methods of identifying weak web server configurations and how to mitigate them for a secure web server. Possible concepts to include are SSL certificates, HTTPS usage, attack surface, SQL injection, vulnerability migration, and least privilege. provide an overview of how to audit the web server’s security and implement best practices.
Discussion: IT Security – Phishing
You arrive at work, open your email, and see this:
Employment Opportunity!!!
This Job is currently recruiting. A Job that will not affect your presents employment or studies, fun and rewarding. You get to make up to $300 weekly, I tried it and i made cool cash, If You are interest you can visit their website at http://getacoolJobreallyfast.work to apply and read more about the job.
Best Regards,
Human Resources and Benefits
Pyramid Placement Agency
5555 Fifth St.
Anytown, US 11111
HR&[email protected]
There are many things in this example that let you know this is not a real opportunity for employment, but more likely an opportunity for someone to gain access to your computer and your company’s private information. However, real-world attempts are not always this obvious and can take many forms. Social engineering, phishing, malware, spoofing, hacking, and card skimming are all risks to our personal and business information.
In your discussion post, consider the scenario presented here, or a real-world example of phishing, as you respond to the following:
- Describe indicators you can use to identify a phishing email.
- Explain the importance of employee knowledge concerning phishing attempts.
- Provide several recommendations for information security practices that could be implemented to limit the risks and impact of phishing emails.
When responding to your peers, provide an additional suggestion for an information security practice they did not identify, and explain how your suggested practice would deter or reduce the impact of phishing within the company.
To complete this assignment, review the Discussion Rubric.
Emerging Threats
Malicious individuals have discovered several methods to attack and defeat cryptosystems. It’s important that understand the threats posed by cryptographic attacks to minimize the risks to your network systems.
Identify one cryptographic attack and how you can protect against it.
Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:
- Ask an interesting, thoughtful question pertaining to the topic
- Answer a question (in detail) posted by another student or the instructor
- Provide extensive additional information on the topic
- Explain, define, or analyze the topic in detail
- Share an applicable personal experience
- Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA 7)
- Make an argument concerning the topic.
At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post
short answer
Please respond to the following:
- Given the various types of loops available in JavaScript, recommend the one that you believe is better for processing data from an array. Provide a rationale for your response.
- Flesh out your thoughts and interact with your classmates. Post your initial response by Wednesday each week and then return on a couple of other days to see what’s going on with the discussions. The more you interact, the more you learn from your peers, and the more you share with them about what you know. You will also be showing your instructor what you have picked up.
- Be sure to respond to at least one of your classmates’ posts.