assignment

Assignment1– Analyzing and visualization 

Select any visualization/infographic and looking at any individual chart included. Try to extract and write down in language terms what this chart shows across the angle, the framing, and (where relevant) the focus?

Does it feel that the definition you have arrived at is consistent with the aims/claims of the chart as it is published? In other words does the chart show and include what you think it is actually supposed to be doing or is there a disconnect?

Assignment2 — business intelligence- data science discipline

 Provide a personal reflection, supported by research information and ideas, of how the knowledge, skills, and/or theories of this course have been applied, or could be applied, in a practical manner to your current work/employment environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.  

Wk 4 – Apply: Controls, Protocols, and Threats

Assignment Content

  1. Imagine you oversee cybersecurity for a major online sales company. It’s imperative that you have the most effective cybersecurity available, Resolution after an attack has occurred is not a viable solution; your job is to make sure an attack never occurs.

    Create an 8- to 10-slide multimedia-rich PowerPoint® presentation, including interactive diagrams, media, or videos, displaying the most common controls, protocols, and associated threats to your business. Address the following in your presentation:

    • What do they protect against?
    • What is their purpose?
    • Write a 2- to 3-page analysis of your findings answering the following questions:
    • How are controls or protocols implemented to defend against attacks and to limit risk?
    • What significance do the OSI, TCP/IP, and SANS 20 Controls play in network protection?
    • What controls and protocols would you find in a security policy?
    • WARNING – There are two assignment in one for this week, the presentation and written assignment. Please submit them as two separate documents 1) PowerPoint and 2) MS Word.  

      Presentation checklist:

    1. Use the bullets or key points in the instructions and create corresponding heading and sub headers. This way it will be obvious that you hit the key points 
    2. Consistent fonts and font sizes throughout the presentation 
    3. Use colors and background. No black and white presentations.  
    4. Include at least one references that are properly cited 
    5. Follow APA format (fonts, etc) – For details on the formatting see the UOP library tab. 
    6. Include speaker notes for every slide except title and reference pages. 
    7. Did the use slides to convey ideas and handouts to communicate details?  
    8. Did the slides follow the golden rule of one idea per slide?.  
    9. Did the slide titles convey the key message of each slide? 
    10. Did the visual diagrams to convey the concepts in a simple, clear, and memorable way? 
    11. Can the charts be understood in less than 5 seconds? 
    12. Did the pictures add clarity to the message the slides  
    13. Did the presentation build curiosity in the audience by revealing information in stages?  
    14. Did the presentation repeat the agenda slide as a guidepost to review your points periodically? 
    15. Did the presentation minimize distractions for the audience by removing distracting backgrounds and attention diverting animations?  
    16. Are the slides clearly readable from the last row in the room?  
    17. Consistent fonts and font sizes throughout the presentation?

      In addition to the points above, I will be looking for speaker notes and be sure to include references. If you have not used speaker notes please research it on the Internet. 

      Assignment checklist:

    18. The reflection must be 350 – 700 words (about 1-2 pages but I will be looking at word count) 
    19. Use the bullets or key points in the instructions and create corresponding heading and sub headers. This way it will be obvious that you hit the key points 
    20. Include at least one references that are properly cited 
    21. Any images must have a caption and referenced in the paper. 
    22. Follow APA format (fonts, etc) – For details on the formatting see the UOP library tab. 

CSS/562: Programming Concepts – NetBeans JAVA Programming

I have  2 Assignments to be completed and I require for both of the assignments the use of only NetBeans. No other JAVA programming tool accepted. Therefore, programming only with NetBeans.

Assignment 1:  Wk 2 Assignment: GUI and Input, Output, and Variable

 

Assignment Content

  1. In your position as the leader of a programming team, sometimes you need to take on tasks when the team is overloaded with work. Your team is currently busy, so you are taking on a customer request to create a business application that allows the user to determine an approximate cost for a business trip. The customer will add functionality and features to the application throughout the development process. You will continue to modify this application throughout the remainder of the course.

    Create a Java™ travel authorization request graphical user interface (GUI) application via NetBeans to calculate the cost of a business trip.

    Include the following functionality:

    • Traveler name (text field)
    • Airfare cost (text field)
    • Food cost (text field)
    • Hotel cost (text field)
    • Car cost (text field)
    • Shuttle cost (text field)
    • Summary: Display request total in label (must use a variable to store each item and calculate totals)
    • Button
    • The user will enter the name of the traveler and the cost of each item for a trip request. When the user clicks the calculate button, 10% of the total amount will be added to the trip total and be displayed in the Summary field. The use of variables are required to store the costs of the individual items.

      Submit your assignment as follows the Netbeans project file (export/zip file), cut/paste the source to a MS Word document and a screen shoot of the output. Also, let me know if you are using a Mac or a PC platform.

Assignment 2:  Wk 3 Assignment: Condition/Objects

 

Assignment Content

  1. The customer is pleased with the first set of functionality and features added to the business application in Week 2. This week the customer wants you to add functionality and features to the application you created last week.

    Modify the deliverable from Week 2 to:

    • Include a combo box for the locations with five cities of your choice.
    • Modify the food field to make it automatically place a value in that field based on the location selected.
    • The values for the food field will be 70 when the first location is selected and 80 when the second location is selected.
    • The food values will then increase by 5 for the remaining locations when selected.
    • Add to the car field to allow for three rental car companies to select from using a radio button.
    • The value for the cost of the rental car will remain as a text field.
    • Submit your assignment.

Both assignments to be submitted by latest coming Monday 07.12.2020 6PM of USA Arozona Time

Required Files: NetBeans Exported ZIP File, Code copy to Word, a screenshot from the output showing that the displayed program GUI is working sucssesfully.

dis_dba11

 While there are many benefits to the use of cryptocurrency, there is also much skepticism from the general public.  Much of this concern centers around legal protection associated with transactions. Search the Internet and outline what legal protections exist for Bitcoin users in the US and other countries.  

one and half page in apa formart, with 2 scholar references , no plagarism of any kind

cryptography and Network Security

I need the solutions for the 2 problems of this uploaded file. like;

 For the Protocols 1, 2, 3, and 4, given below, determine which of the following five security services are being implemented and which are not implemented. In each case, explain why. 

 Services: 

 C – Confidentiality, 

 AS – Authentication of the Sender, 

 AR – Authentication of the Receiver, 

 NS – Non-repudiation of the Sender, and 

 NR – Non-repudiation of the Receiver. 

The file uploaded has the whole 2 problem Questions

CYS-13-D

If you could, what would you do to help create a national “security culture,” in which everyone is more knowledgeable and proactive about threats to information security? 300 words

Practical Connection Assignment

  

Assignment:
Provide a reflection of at least 500 words of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have observed these theories and knowledge being applied to an employment opportunity in your field of study. 

Requirements:

Provide a 500 word minimum reflection.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited. 

Share a personal connection that identifies specific knowledge and theories from this course. 

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 

You should NOT provide an overview of the assignments given in the course. Rather, reflect and write about how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.