Sum-Wk-5

Assignment 1

Analyze the structure of advanced encryption standards in cryptography and why it makes it so strong. 

Requirement: 

· Minimum 300-350 words. Cover sheet, abstract, graphs, and references do not count.

· Add references separately for each assignment question.

· Strictly follow APA style. Length – 2 to 3 paragraphs. 

· Sources: 2 References to Support your answer

· No plagiarized content please! Attach a plagiarized report.

· Check for spelling and grammar mistakes!

· $5 max. Please bid if you agree.

Discussion 4- Planning Project

Assigned Readings:Chapter 9: Scope PlanningChapter 10: Project Schedule PlanningInitial Postings: Read and reflect on the assigned readings for the week. Then post what you thought was the most important concept(s), method(s), term(s), and/or any other thing that you felt was worthy of your understanding in each assigned textbook chapter.Your initial post should be based upon the assigned reading for the week, so the textbook should be a source listed in your reference section and cited within the body of the text. Other sources are not required but feel free to use them if they aid in your discussion.Also, provide a graduate-level response to each of the following questions:

  1. Go online and research the difference between total slack and free slack.
    1. Prepare proper reference citations for the sites you located, using APA style.
    2. Write definitions of total slack and free slack in your own words.
    3. Why would the distinction between different forms of slack be important to a project manager?
  2. How does scope management differ from scope control?
[Your post must be substantive and demonstrate insight gained from the course material. Postings must be in the student’s own words – do not provide quotes!]  [Your initial post should be at least 450+ words and in APA format (including Times New Roman with font size 12 and double spaced). Post the actual body of your paper in the discussion thread then attach a Word version of the paper for APA review]

Text-

Title: Project Management 

Subtitle: https://opentextbc.ca/projectmanagement/ 

ISBN: 978-1-77420-013-1 

Authors: Adrienne Watt 

Publisher: BCcampus 

Publication Date: August 14, 2014 

Edition: 2nd Edition

Information Compliance

  1. Write an initial response to the following key question(s) or prompt(s):
    1. What are the similarities and differences between a security management plan and a risk management plan?
    2. Identify the importance of each plan.

attached response, please review and write 750 words of review and what is learned from the attached document.

3 APA references needed

Assignment(Physical security)

 

Question: Perform a LOPA (Layers of Protection Analysis) of your local living area or work location. Remember to get permission from security. 

Instructions: Please download the Assignment 7 Layers of Protection Analysis (LOPA) template (MS Word), which is already in APA 7 format, using size 12 Times New Roman font, 1-inch margins, TOC, Headings, and Reference page. If you insert images or tables in your report make sure you label them appropriately according to APA. 

****No plagiarism

****Follow the instructions 

Assignment

 

Describe in 500 words discuss the scope of a cloud computing audit for your business.

Use at least three sources. Use the Research Databases available from the Danforth Library not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes.

wire frames mock up

  A wireframe is a visual guide to the layout of a site, focusing only on structure, not on the site’s look and feel.  For example, the above image(Attached file) is a wireframe for a website found online. Notice that it does not include the images, and the font choice is deliberately random, to indicate that it’s just placeholder text.That’s so that viewers will understand that they’re supposed to focus on the “framework” of the site — where the different components of the site are located relative to each other — rather than the details of the various elements.Your set of wire frames should include mock ups for your intended

  • Home page,
  • Item page,
  • Visualization heavy page,
  • Text-Based Details page, and
  • Generic About page.

To draw your wireframes, you can use Axure, Photoshop, Visio, PowerPoint etc. Make sure though it is converted into a PDF for readability when being submitted.  

HomeWork

Discuss the benefits of technology to support Access Control.

Length, 2 – 3 pages.

All paper are written in APA formatting, include title and references pages (not counted). Must use at least two references and citations.

Please reference the rubric for grading.

All paper are checked for plagiarism using SafeAssign, you can review your score.

Please use the blank APA template to get started.

TM352 TMA

 

Develop a web-based project as part of a system for “Team management and communication.” over two phases. The system should enable any registered team leader to: add, update, or delete a task. The system should also allow registered team members to view his tasks along with their data ,deadline and progress.

Hint: you should search for task attributes (not less than 3) other than ID, name, deadline and progress from the internet and give the associated reference.

Phase 1 (GUI)

At phase 1, develop the client interface to provide the following tasks

Differentiating user in the client side

For team leaders only:

  • Add a task
  • Delete a task using its ID
  • View all tasks for his team

For both team leaders and registered team members:

  • View his task details using its ID
  • Search for tasks that have specific values for one of the attributes (not less than 2 attributes)

Hint:

Provide the necessary attributes and GUI interfaces and use the necessary communicating protocol.                                                        

Phase 2 (Server-side service)

At phase 2, develop five web-side services using the JAVA programming languages. For each service listed in phase one, you should provide a website service using JAVA and provide the required security for your services to grant access only to authorized users

Here are some details regarding the functionality of some services:

  • Add task: this service should store on the server side in a file (in XML or JSON format) with the information passed from the client side. Please note that this service should first check if the task does already exist on the file, if found then progress should be updated.
  • Delete task: this service should update the corresponding file.
  • View all tasks: this service should return the whole content of the file to the client to be presented in a user-friendly format.
  • View task details using its ID: return to the user the attributes of the required task.
  • Search for tasks that have specific values for one of the attributes (not less than 2 attributes) and return all matching tasks to be presented in a user friendly format.