web development

 

1)Javascript & JQuery Book

2)San Joaquin Valley Town Hall

3)Join Email List

4)MPG Calculation

5) Enter Test Score

6)Enter Length

7)Image Swap Application

8)Develop a Book List Application

9)Validate with Javascript

10) Enhance the Future Value Application

Here is the 10 small web app shows how it suppose to be, find a free hosting website to publish it, with these 10 in there, give me the URL.

I have a screenshot of the app suppose to look like, it doesn’t have to be looking perfect, but some functionalities are needed.

Project1

 In this course you will prepare a project paper and summary presentation analyzing and evaluating the practical aspects of implementing information assurance change in an organization.  To begin your paper, review the systems security knowledge areas already selected for SyncSession Assignment1 (Security and Risk Management, Asset Security, Security Engineering, Communication and Network Security, Identity and Access Management, Security Assessment and Testing, Security Operations, Software Development Security).   From the best practices area selected that is of interest of you as the basis of this Project (Change Management Program), 

 

  1. Domain where the need for change (your research problem) exists.
  2. Information Assurance best practice being evaluated or selected and the justification for the selection.  You can make a problem statement and justification.
  3. Summary paragraph of why you think it is important to study the change process as it relates to your selected Information Assurance best practice.  Be sure to address how the change process impacts your research problem.
  4. Annotated bibliographic references of three of the previous articles used in your analysis.  

Excel Chapter 6 Grader Project – Delta Paint | Exp19_Excel_Ch06_CapAssessment_Delta_Paint

 Exp19_Excel_Ch06_CapAssessment_Delta_Paint 

 

1

Download   and open the file named   Exp19_Excel_Ch06_Cap_DeltaPaint.xlsx. Grader has automatically added your   last name to the beginning of the filename.

2

Create   appropriate range names for Total Production Cost (cell B18) and Gross Profit   (cell B21) by selection, using the values in the left column.

3

Edit   the existing name range Employee_Hourly_Wage to Hourly_Wages2021.
  Note, Mac users, in the Define Name dialog box, add the new named range, and   delete the original one.

4

Use   the newly created range names to create a formula to calculate Net Profit (in   cell B22). Net Profit = Gross Profit – Total Production Cost.

5

Create   a new worksheet labeled Range Names, paste the newly created range   name information in cell A1, and resize the columns as needed for proper   display.

6

On   the Forecast sheet, start in cell E3. Complete the series of substitution   values ranging from 10 to 200 at increments of 10 gallons   vertically down column E.

7

Enter   references to the Total_Production_Cost, Gross_Profit, and Net Profit   cells in the correct locations (F2, G2, and H2 respectively) for a   one-variable data table. Use range names where indicated.

8

Complete   the one-variable data table in the range E2:H22 using cell B4 as the column   input cell, and then format the results with Accounting Number Format with   two decimal places.

9

Apply   custom number formats to make the formula references appear as descriptive   column headings. In F2, Total Costs; in G2, Gross Profit, in H2, Net Profit.   Bold and center the headings and substitution values.

10

Copy the number of gallons produced substitution values from the one-variable data   table, and then paste the values starting in cell E26.

11

Type   $15   in cell F25. Complete the series of substitution values from $15 to $40 at $5   increments.

12

Enter   the reference to the net profit formula in the correct location for a   two-variable data table.

13

Complete   the two-variable data table in the range E25:K45. Use cell B6 as the Row   input cell and B4 as the Column input cell. Format the results with Accounting   Number Format with two decimal places.

14

Apply   a custom number format to make the formula reference appear as a descriptive   column heading Wages. Bold and center the headings and substitution   values where necessary.

15

Create   a scenario named Best Case, using Units Sold, Unit Selling   Price, and Employee Hourly Wage (use cell references). Enter these values for   the scenario: 200,   30,   and 15.

16

Create   a second scenario named Worst Case, using the same changing cells.   Enter these values for the scenario: 100, 25, and 20.

17

Create   a third scenario named Most Likely, using the same changing cells.   Enter these values for the scenario: 150, 25, and 15.

18

Generate   a scenario summary report using the cell references for Total Production Cost   and Net Profit.

19

Load   the Solver add-in if it is not already loaded. Set the objective to calculate   the highest Net Profit possible.

20

Use   the units sold as changing variable cells.

21

Use   the Limitations section of the spreadsheet model to set a constraint for raw   materials (The raw materials consumed must be less than or equal to the raw   materials available). Use cell references to set constraints.

22

Set   a constraint for labor hours. Use cell references to set constraints.

23

Set   a constraint for maximum production capability. Units sold (B4) must be less   than or equal to maximum capability per week (B7). Use cell references to set   constraints.

24

Solve   the problem. Generate the Answer Report and Keep Solver Solution.

25

Create   a footer on all four worksheets with your name on the left side, the sheet   name code in the center, and the file name code on the right side.

26

Save   and close Exp19_Excel_Ch06_Cap_DeltaPaint.xlsx.   Exit Excel. Submit the file as directed.

Developing An Incident Communication Plan

                                                

Wk 11 Discussion -Developing an Incident Communications Plan

Developing an Incident Communications Plan*You are the CSIRT leader for a major ecommerce website, and you are currently responding to a security incident where you believe attackers used a SQL injection attack to steal transaction records from your backend database. Currently, only the core CSIRT members are responding. Develop a communication plan that describes the nature, timing, and audiences for communications to the internal and external stakeholders that you believe need to be notified. 

*Activity 11.3: Chapple, Mike; Seidl, David. CompTIA CySA+ Study Guide Exam CS0-002 (p. 400). Wiley. Kindle Edition.  

Just  one page

U4

Group 1

Discuss the weakest link in the information security chain and provide an explanation to support your selection.

Describe the different types of users and indicate how they are treated in different and similar manners.

Discuss how to govern different types of users with policies.

Discuss acceptable use policies (AUPs).

Discuss the significance of a privileged-level access agreement (PAA).

Describe what security awareness policies (SAPs) are.

Describe what the best practices for user domain policies are.

Discuss the difference between least access privileges and best fit access privileges.

Describe some case studies and examples of user domain policies.

Group 2

Describe the following:

What the basic anatomy of an infrastructure policy is.

What the common Workstation Domain policies are.

What the common LAN Domain policies are.

What the common LAN-to-WAN Domain policies are.

What the common WAN Domain policies are.

What the common Remote Access Domain policies are.

What the common System/Application Domain policies are.

What the common telecommunications policies are related to the IT infrastructure.

What some IT infrastructure security policy best practices are.

What some case studies and examples of IT infrastructure security policies are.

Group 3

Discuss the following:

What the common data classification policies are.

What the common data handling policies are.

What the common business risks related to information systems are.

What a risk and control self-assessment (RCSA) is and why it is important.

What the common risk assessment policies are.

What the methods of quality assurance (QA) and quality control (QC) are.

What the common best practices for risk management policies are.

What some case studies and examples of risk management policies are.

Data Visualization

Post a 4-6 sentence summary of why you chose the visualizations.  What caught your attention? Were they effective in presenting the provided data? If possible, explain how you would you do to improve the  visualization?

Visualizations:
1) https://www.compas.ox.ac.uk/migrationinthenews/#

2) https://webarchive.nationalarchives.gov.uk/20160105222714/http://www.ons.gov.uk/ons/rel/census/2011-census-analysis/immigration-patterns-and-characteristics-of-non-uk-born-population-groups-in-england-and-wales/non-uk-born-census-populations-1951—2011—full-infographic.html

3) https://www.scientificamerican.com/article/water-in-water-out/

4) https://www.compas.ox.ac.uk/migrationinthecensus/#

Checkilist:

Min 250 words

APA formatting

2 references

Computer

 You can build and save a list of master sources you have used in research papers and reports and display them using Manage Sources. What are the advantages of storing sources over time? 

project doc

Project implementation is arguably the most exciting stage of the project management process. It is during project implementation that project plans begin to come to life and assumptions are able to be tested and measured in real-life scenarios.

One of the outcomes of project implementation is a set of deliverables that typically includes a system diagram; a network diagram; a database design document, including an entity-relationship diagram, a data dictionary, and table definitions; a clearly articulated cybersecurity plan; and source code.

To complete this assignment, you will create:

  • A system diagram that shows, in graphic form, the components of your project.
  • Your system diagram should follow the system description you submitted in your Week 2 project plan (but may differ based on the research you have conducted since Week 2).
  • You may create your system diagram in Microsoft PowerPoint or a graphics program of your choice.
  • A network diagram that shows, in graphic form, the flow of data within your project.
  • Your network diagram should follow the network description you defined in the Week 2 project plan (but may differ based on the research you have conducted since Week 2).
  • You may create your network diagram in Microsoft PowerPoint or a graphics program of your choice.
  • A database design document, including an entity-relationship diagram, a data dictionary, and table definitions, representing all of the data that must be stored and maintained within the context of your project and how that data is organized.
  • A clearly articulated cybersecurity plan that explains how you plan to secure project data and processes.
  • Source code (may be partial) for at least one software application.
  • Your source code may be implemented in HTML/JavaScript, Java, C++, or another programming language.
  • Download and unzip the HTML/JavaScript/CSS sample code files for an example of a partial software application implementation.
  • A quality assurance and software test plan.
  • Download the Software Test Plan for an example of what information is typically included and how it is typically organized in a software test plan.

Note: All deliverables must be portfolio ready, which means as complete and error-free as possible.

Contingency planning

Contingency Planning

Contingency planning is a risk mitigation process for developing  back-up plans in anticipation of events (scenarios) that might disrupt  ‘business as usual’. Business continuity planning is an expanded version  of contingency planning that typically encompasses a more comprehensive  and extended response plan for getting back to ‘business as usual’. In a  well-formatted, highly-detailed research paper, address the need to  contingency planning, ensuring to address the following items:

(1) Benefits of scenario events/planning.
(2) Questions to consider when implementing scenario planning.
(3) The common types of scenario planning.

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the  required cover page and reference page. (Remember, APA is double spaced)
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at  least two scholarly journal articles to support your positions, claims,  and observations, in addition to your textbook. The UC Library is a  great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent  grammar and style techniques. You are being graded in part on the  quality of your writing.