b.com help

 

M6 Assignment

The M6 Assignment will have two parts.

Part One requires you to create guidelines for communicating effectively using social media. You will research what different organizations have created and also review what your own organization has created to ensure that employees follow the professional guidelines for communicating through social media on behalf of the organization. Your guidelines will be written in a report-style to your company’s CEO. If you are not currently employed, you can create a mock company in which to use for this assignment. Your report will be a minimum of two pages. Please include a cover page and a reference page with your report submission. You should use a minimum of four sources with APA formatting.

Part Two requires you to consider your own digital footprint and how your actions online will impact your professional career. You will create a PowerPoint presentation that includes the following elements:

  1. Discussion of which social media platforms you use and for what purposes.
  2. Discussion of how social media impacts one’s ability to be hired by a company.
  3. Discussion of what type of digital footprint you will create for yourself.

The PPT presentation should be a minimum of 10 content slides (not including the cover slide or the reference slide). Include either speaker notes in the “”notes”” section in the slides or record audio on each slide. A minimum of two sources are required. Use APA formatting for all sources.

When you are ready to submit your slides and script, you must save your slides in a format with the slides on the top of a page, with the accompanying notes (your script) beneath each slide, as seen below.

Create a RAPTOR

 using Loops and Subcharts
 

Create a RAPTOR program that will find multiples of either one of two integers, but not both, between 350 and 450.
The two integers are to be entered by the user at runtime. At least one of the integers must be an odd number. If not
the program should end quickly. Your program must use a loop and at least one subchart. Refer to the graphic that
demonstrates three sample runs with suggested ouput. 

YOUR ASSIGNMENT
Part 1
Work through an algorithm for the above program and submit pseudocode for this algorithm. Please enter the pseudocode in the dropbox message area.
 

Part 2
 use your pseudocode to create the RAPTOR flowchart program. Zip it up and submit the zip to this  

Journal Article: Decentralization

Journal Article: Decentralization

Your submission must include the following information in the following format: 

DEFINITION: a brief definition of the key term followed by the APA reference for the term; this does not count in the word requirement. 

SUMMARY: Summarize the article in your own words- this should be in the 150-word range. Be sure to note the article’s author, note their credentials and why we should put any weight behind his/her opinions, research or findings regarding the key term. 

DISCUSSION: Using 300-words, write a brief discussion, in your own words of how the article relates to the selected chapter Key Term. A discussion is not rehashing what was already stated in the article, but the opportunity for you to add value by sharing your experiences, thoughts and opinions. This is the most important part of the assignment. 

REFERENCES: All references must be listed at the bottom of the submission–in APA format. Be sure to use the headers in your submission to ensure that all aspects of the assignment are completed as required. Any form of plagiarism, including cutting and pasting, will result in zero points for the entire assignment.

Obscure IoT devices

Research 5 obscure IoT devices.

Explain what the purpose of this device is.

Describe the advantages of these devices being connected to the network.

Describe the possible security risks of having these devices on your network.

Need help with ERD diagram

 The goal of the projects throughout this semester is to implement a “prototype” database system application for a eCommerce social-network system called UCOnline where users can explore information about books/music/software, rate your purchase, identify purchase price and see ratings of their friends.The project will require your teams (same group as residency weekend) to complete the assignment. Below you will find the ERD deliverable requirements. Each assignment has a specific grading rubric (scheme) associated with the assignment. BUSINESS REQUIREMENTS ACROSS ALL ASSIGNMENTS. You will work with book/music/media information, user information, ratings of books, and users’ social network

  • Each book has an id, title, publication date, publisher, ISBN, functional category, page count, price (publisher), and product description
  • There are 3 categories of book: fiction, non-fiction, and specialty
  • There are 2 categories of music: digital and media-based
  • An author can write one or more books.
  • A musician can be a solo artist, part of a group, or both
  • An author can also be associated with one or more publishers.
  • A musician/group/act can be associated with one or more music houses
  • An author’s book can have one or more editions.
  • A song and or album can have more than one version/edition (i.e. EP, LP, CD, DVD etc)
  • A publisher can have many authors and many books.
  • A record company can have many artists associated and many albums associated with it. 
  • A record company can also be the publishing company (i.e. self-publishing)
  • Many ISBNs can also be associated with a given publisher but only one ISBN per form of medium (ie the ISBN is the PK no matter what).
  • An author can write many books.
  • An artist can write many songs, albums etc.
  • UCOnline needs to keep track of user ratings for each item sold in the online store (e.g., 1-5 and 1 for ‘Dislike’, to 5, for ‘Awesome!’).
  • A particular user rates a particular item at a given time.
  • A user CANNOT rate the same multiple times unless there are multiple editions of the item. Each edition can be rated separately.
  • Each user who submits a rating will be identified by a unique id and has a name, gender, age, and location. Nothing is anonymous.
  • There is also a social network between users. Users can send communication requests (i.e. instant messages/emails) to other users. Such requests can be accepted or ignored. Once accepted, the two users are considered ‘book buddies.’ If ignored, the user can send the request again. We want to add a store when the requests were sent (timestamp), the result of the requests and when the request was answered (timestamp).

Discussion: datamining with 500 words with APA and references

 There is much discussion regarding Data Analytics and Data Mining.  Sometimes these terms are used synonymously but there is a difference.  What is the difference between Data Analytics vs Data Mining? Please provide an example of how each is used. Also explain how you may use data analytics and data mining in a future career. 

Business Solution

 

This assignment allows students to look at a problem from a managerial perspective, and see how a technical solution supports the business needs of the organization.

You are the IT manager at XYZ Company, and you notice that the business is lacking efficiency. Reports are being completed manually, information is not well transferred throughout the departments, the business is having trouble keeping up with its order volume, and customer satisfaction is faltering as a result.

Outline how your solution would address the common issues of identity management associated with ERP implementation, specifically single authentication, automatic trust, and managing full access rights. Then, using Figure 8.4 from the textbook, construct a formal business case for an ERP system. Analyze the effectiveness and efficiency gained with departmental cooperation. Then, present an effective case to efficiently input, transfer, communicate, and display company data.

This assignment requires the use of at least two additional scholarly research sources published within the last 5 years. Include at least one in-text citation from each cited source.

SEE ATTACH Figure 8.4

Data Structure Arrays

Assignment Overview

Write a program for a real estate agent. The program should perform the following tasks:

  1. Create an array to hold average house price for the each of past 25  years for a single family residence of 1500 square feet. Initialize the  array with the values in sorted order, assuming the average house price  increases each year.

    Prompt the user for a house value.

  2. Use a binary search algorithm to determine the year that most  closely matches the house value entered by the user and display the year  and average house value for that year.

    After you finish the program, submit the source code and a screen shot of the output.

Assignment Expectations

  1. Use proper data structure to solve programming task.
  2. Demonstrate your knowledge of searching using the binary search algorithm.

Required Reading & Resources

Binary Search (n.d.). Retrieved from http://leepoint.net/algorithms/searching/binarysearch.html

project

1. Museum Background and Visit Experience (25 points):

This portion should be comprised of information about the museum you selected to visit.  What was your personal experience of walking through the facility? How did you feel, particularly while taking this course?  What senses did this stimulate? What works caught your eye? Also include a light background on the museum and description of the space and format of the galleries as it pertains to viewing the artworks.    

* Length:  At least 500 words, no more than 750 words.

2. Artist (25 points): This portion should be comprised of information about the artist of your choice as well as why you selected them. Begin with: Who is the artist? Why did you choose the artist – what is generally interesting to you about it? Additional suggestions for material: date and place of birth and death, family information, lifetime accomplishments, famous art pieces, effects or impact on society, or historical significance. 

* Length:  At least 500 words, no more than 750 words.

3. Critical Analysis Artwork: Objective Response (25 points):  

This portion of the writing assignment should be your own objective critical response to a work of art by the same artist you chose.  You must base your opinion on formal elements of art (EOA) and the principles of design (POD) – using this specific vocabulary throughout. Describe the of the artwork = use descriptive adjectives = a description is what you see in the artwork, NOT an interpretation. provide appropriate background information about the artwork.  Your objective interpretation/POV should be supported through an explanation of HOW the FEA, POD & context support your interpretation. Which media that we have learned about is utilized to create this artwork?  How does the artist’s use of their selected media (material) emphasize and support their content – the meaning of the work? Does it align to your subjective response?

Things to consider: how does the artist’s use of the EOA and POD to emphasize and support their content – the meaning of the work?  Be sure to not simply describe the work, but rather, elaborate with specific details from the work that illustrate your analysis.  Answering the “HOW” part is crucial to your analysis. It is not enough to just identify the characteristics and list a few historical facts; you have to synthesize the information into a cohesive interpretation.

* Include the title of the work (in italics) and a picture of the artwork

* Length:  At least 500 words, no more than 750 words

4. Critical Analysis Artwork Subjective Response (25 points):  

This portion should be your own subjective response to a work of art (the same you selected above) by the same artist you selected.  Why did you choose the artwork – what is generally interesting to you about it? What was your initial, subjective interpretation of the artwork?  What is the artwork saying to its audience, to you? What does the artwork mean? Did it change as you found out more about the context of the artwork? What emotions, concepts, or ideas did it provoke in you?  Do not simply describe the work or state whether or not you “like” the work; but rather, elaborate with specific details from the work that illustrate your response. Are there broader thematic messages conveyed by the artwork? What are they?

* Length:  At least 500 words, no more than 750 words.

5. Bibliography (25 points):  You must provide a bibliography in one of the formal the correct citation styles that includes at least 5 sources.  Online sources are ok, but at least one source must be a book/journal/periodical/catalog and must be in addition to your textbook, and remember, Wikipedia doesn’t count. You are encouraged to research the artwork at your school’s library by searching through books and articles, written by scholars in the field of art and art history. Check out your campus’s library online and ask a librarian or tutor for help. 

BMIS 664 – Final Project

  Final Project Assignment Instructions

Overview

In order to fully comprehend the many aspects that factor into information forensics and risk management, you must examine a situation from the perspective of a computer forensic specialist. For the Final Project Assignment, you will be placed in a hypothetical scenario in which you must utilize all of the information gained throughout this course.

Instructions

Assume that you are the Chief Information Security Officer (CISO) of Corporation.  If your name is “Mariah Smith” the name of the company should be named the Mariah Smith Corporation. While performing your regularly scheduled duties, you receive a call from the Senior Vice President of the Human Resources Department informing you that, in the past 4 days, there have been 4 occurrences of money transfer to unauthorized recipients. Given your position and your understanding of recent cyber and information security attacks, you assume that an attack of some sort is at fault for the unauthorized transfers.

During the conversation, you are given the name of the department where the fund transfers have occurred.  The department is internal to the organization but only certain fund transfers were committed internal to the network. In addition, you know the external public IP address of the system that executed the transfers. Privilege escalation, man-in-the-middle attacks, buffer overflows, and malicious code were all present during the Information Assurance Team’s initial investigation.  Some of this is puzzling, given the IP address location that seems to be the source. You are given specific instruction not to engage anyone from the department where the money transfer have occurred; however, you are permitted to engage law enforcement and third party agencies if appropriate. This is to preserve any ongoing investigations and to allow the greatest opportunity to catch the suspect. 

Refer to the Final Project Network Diagram.  The enterprise network is much larger, with many additional pieces of hardware. Regardless, these are the only systems the initial investigation indicated were affected. The organization fund/money transfer systems are comprised of Microsoft, Linux, and Solaris servers. The firewall prior to the Cisco core switch only allows access to necessary web facing application ports. The Microsoft servers are responsible for authentication through directory services. Despite one firewall and some group policy being verified as sound and uncompromised by the investigation, the current information system components identified play certain roles in the unauthorized transfers.

The Final Project Network Diagram will be used as a point of reference in determining what is necessary to determine how this incident could occur in a real organization; this includes applications, information systems, human experts, and any other stakeholder involved in such an incident. Your goal is to identify where vulnerabilities and threats could exist specific to anauthorized transfers in this scenario and how to mitigate future occurances. 

The final plan must identify the technology and equipment and all access and file data that is compulsory—including log files, auditing, group policies, firewall rules, and other information system elements—to determine the root cause. Upon the successful completion of the investigation plan, a subsequent plan will determine a superior information system and plan for future mitigation and prevention. This can include everything from firewall rules to policy.

Before being graded, all code, access control rules, diagrams, and/or Visio diagrams (each) must include screenshots with a valid date and piece of data that shows completion on the student’s personal computer. The Final Project Assignment must be comprehensive and include a minimum of 5,000 words (excluding the title page, diagrams, and reference page). Each project deliverable should be well supported by related, relevant, and current scholarly literature. In total, it should contain at least 20 peer-reviewed sources. The Final Project Assignment must also be written in current APA format, include a title page, table of contents, introduction, conclusion, references, and appendixes with appropriate data. You are encouraged to utilize Microsoft Visio or a similar application in order to provide visual aides to assist in your assessment of the situation as well as Microsoft Project and/or valid alternatives. In your analysis, be sure to include the following:

· A comprehensive literature review of unauthorized transactions, how this can occur, and a comprehensive review of the affected IT infrastructure;

· A project adhering to an industry standard methodology (such as PMBOK) to manage the Final Project completion;

· An appraisal of the situation using the knowledge gained from this course and personal experience;

· A thorough assessment of the Information Assurance Team’s initial findings;

· A performance of a forensic investigation on the matter;

· An illustration of your strategy for conducting this investigation;

· The formulation of a complete plan including: a proposed personnel structure/team, mechanisms of defense, budget, schedule, risk management, procurement management, secure systems analysis, and design to prevent this incident from occurring in the future; 

· Over two (2) new unique IT architecture diagrams using at least two (2) network security frameworks that highlight the new strategy and design that could mitigate future unauthorized transactions. Diagrams must have screenshots from the user’s computer in the program they were designed and include the operating system date and time from the student’s person computer.

· A strong attempt to integrate a biblical worldview into the secure enterprise solution. 

Introduction  More than 3 scholarly sources and 250 words 

Review of literature – 2,500 words 10 scholarly journal articles

Mitigation Plan – Over two (2) new comprehensive network architecture diagrams with proper screenshots and over 20 pieces of hardware that 2,000 words 10 scholarly sources

Conclusion – More than 2 scholarly sources and 250 words 

Total Overall – Over 5,000 words and Over 20 unique scholarly sources