This is task to create a maze runner game using Tkinter. As I will be running it in auto grader I want the code’s to be as it is said in the a3.pdf following every guideline with Inline comments that all significant blocks of code should have a comment to explain how the logic works, and informative docstrings that every class, method and function should have a docstring that summarises its purpose.
Assignment 200 words 3 references
Please provide 5 Sub Topics of Search Engine Optimization.
No Plagiarism
Threats and Mitigation
we will continue building on what we have done in Parts 1 and 2.
- Write a 1-2-page paper that identifies five (5) potential threats and potential solutions to best mitigate loss.
- Remember to use proper APA formatting, including citations and references for all resources used.
wk 10
Many enterprise organizations believe that cloud computing is essential to their business operations. There are some; however, that argue it is not cost-efficient and operationally appropriate. Provide a use case where cloud computing is not appropriate and explain why you feel this is an appropriate decision for the enterprise.
project management week 8
From Part 11: Project Risk Management of Project Management: Case Studies read the Space Shuttle Challenger Disaster case study. Answer questions 3 and 4 under Risk Management Plan; 6 and 7 under Risk Identification; 5 and 6 under Risk Quantification; 3 and 4 under Risk Response (Risk Handling); and 4 and 5 under Risk Control.
All written work must be submitted in the student’s own words with sources properly attributed in APA format. For your convenience, the correct in-text citation for your textbook is (Kerzner, 2013). The correct in-text citation for your Case Studies book is (Kerzner, Project Management: Case Studies, 2013).
The correct full text references for each book appear below:
Kerzner, H. (2013). Project Management: A Systems Approach to Planning, Scheduling, and Controlling, 11th ed. Retrieved from VitalSource Bookshelf: https://online.vitalsource.com/#/books/9781118418550/
Kerzner, H. (2013). Project Management: Case Studies. Retrieved from VitalSource Bookshelf: https://online.vitalsource.com/#/books/9781118415825/
6 Pages report as per the instructions No Plagiarism in the report
Incident Response Report #2
This assignment is similar to the last incident response report. You will take the framework you
developed for your report, with corrections that I suggested as feedback, then develop a new
report for this incident. The grading rubrics will be the same, but the grading will be stricter
being this is your 2nd time developing an incident response report.
The incident scenario this time is that an employee was installing a new computer. They were
in the process of installing software when they noticed abnormal mouse activity on the
computer. At that point, they walked away from the computer and called you for help. Treat
this like an incident at a corporation, although the computer is not joined to a domain.
I am expecting that at a minimum you are able to tell the story of what happened during the
incident. What was the initial infection vector, what happened next? Are there any persistence
mechanisms in play? Are there any IP addresses associated with the attacker? And if so, what
are they?
Instead of a 22 page document with evidence, you will be working with evidence that has been
extracted from the computer in its raw form just like an incident responder would see if they
were working on the workstation. The evidence totals about 7 gigs with the memory image.
Some of the evidence collected may overlap evidence that was collected in another method.
Some of the included evidence is from:
• Netstat
• Complete directory / file structure listing for the entire C drive
• Services
• Several Kape collections – These will provide a rich set of evidence but take a little bit to
get used to the way Kape provides the collected evidence
• Browser information
• Prefetch
• Scheduled Tasks
• Users
• Windows Event Logs
• Forensic RAM image
The evidence can be downloaded from a Google Drive link I’ll post on D2L.
Not every piece of evidence collected will yield results. It is your job to comb through the
evidence to put together the pieces of what happened to develop your report. You can
successfully respond to the incident without doing the memory forensics, but it may provide
some easier insights if you want to give it a shot. The memory image is around 5.4 gigs in size.
I split the evidence into different folders to make it easier to download and work with if you don’t
have the full 7 gigs of free space on your drive.
Start by forming your investigative questions, then going searching for evidence that proves
your questions. Your IOCs this time will be generated based on actual evidence you find that
can be used to search other computers to determine if they are in scope of the incident as well.
I will be providing the VM as an optional way to investigate the incident. The VM is provided as
is without any additional support from me. It is a VMWare image. Some of the evidence will still
be in the VM, but it will be provided post attack after that attacker is already gone.
To produce your report, analyze the evidence, then summarize and present it using the
guidelines from the chapter 16 lecture, chapter 16 from the textbook, and guidance from the
“ICS-487 incident report what to include” in the sticky section of D2L.
The report should be at least 5 not counting any pictures utilized and the mandatory coverpage.
There will be a point penalty if the report is less than 5 pages. Do not turn in a 50-page report
for this assignment. The objective is to be concise as you tell the who what when where and
how story.
As previously stated, the raw evidence for this report has already been collected for you. You
will need to comb through it to find useful artifacts to fill in the pieces for the report. This
means making up a company that was hacked, the name of your company that is responding,
etc. Basic remediation steps will also need to be described as partof this assignment. For the
lessons learned section, describe in a paragraph or two items that you learned about incident
response that you will apply to future investigations based on theevidence that was
provided to you this time.
You should list 5 Indicators of Compromise that you gleaned from the evidence that are worth
searching for enterprise wide to make sure no other systems are infected. These will be best
displayed in a table for the IOC section. These IOCs will be developed when you find
artifacts related to the investigation. A timeline should also be put into the report like last
time.
You will also need to develop 10 investigative questions that you would ask during the course of
this investigation.
Keep in mind that for this project this evidence is manually collected from a single computer.
This is a normal amount of evidence one would collect in the course of Incident Response. This
is why we are teaching the method of developing investigative leads, turning those leads into
IOCs, then searching for those IOCs. This type of manual collection does not scale across more
than one or two systems in an incident. The next Incident Response report will involve you
collecting the evidence, and then reporting on that evidence you collect.
Make sure you start this assignment early. This is a 400-level class and will require some critical
thought to complete this assignment along with utilizing the skills that have been taught up to
this point. A quality report will take time to produce especially when it comes to selecting
which pieces of evidence to use that will tell the story but not provide unnecessary detail.
Also keep in mind the responses I provided to your previous report.
A common mistake is making the executive summary and findings section too
technical. This should be written in language that an 80 year old grandma who doesn’t
have an IT background can understand.
Because this is an academic environment, anytime you use someone else’s ideas you must cite
it in IEEE format. It is assumed that most of your content will be coming from the provided
evidence document. You don’t have to cite general information you take from that document.
Make sure that you are re-telling the story. It is ok to use a sentence or two once in a while.
Do not just copy an entire paragraph from the evidence document and turn that in as your
work.
Grading Rubric
Requirement Possible
Score
Coversheet meets specifications including affected organization, incident number
or name, date published, name of the organization that performed the
investigation, and “Privileged and Confidential”
2
Table of contents 2
Report is at least 5 pages long not including cover sheet and any pictures used as
part of the report 3
Good grammar, style, and use of IEEE citations if applicable 10
Formatted according to specifications and style suggestions in Chapter 16 and
reporting lecture 10
10 quality investigative questions based on evidence provided 10
5 Indicators of Compromise based on evidence provided 5
1 – 2 paragraphs of lessons learned describing items that you learned from this
investigation that you will apply to future investigations 7
Remediation describes exact steps taken to expel malicious actors from the
network 5
Who what where when why is told to the best of the author’s ability with the
evidence provided throughout the documents without making the reader piece
any parts of the puzzle together
8
Executive summary containing how the incident was discovered, the type of
incident this is what the response was, the goal of the investigation, duration of
the work, start and stop date, and who sponsored the work
10
Findings section addresses the goals of the investigation by summarizing the
information found in the investigative questions, systems involved, IOC, evidence
collected and remediation sections in a manner that is written with nontechnical
executives in mind. No more than a page long.
5
Systems involved are described and information that is known based on the
limited evidence provided is recorded.
3
Evidence collected section contains detailed account of the evidence that was
utilized for the report, how it was collected, what facts it is providing to back up
the rest of the report. Any procedures have to be documented in such a way that
a third party could replicate the results of the analysis. You may have to do a little
googling here to come up with any missing parts of the analysis and collection.
15
Recommendations section describes fixing the holes that caused this incident and
any larger suggestions for the company as a whole to improve their overall
security posture
5
This report has a total of 25 grading points available. Each individual item will be scored as a
percentage adding to a total of 100% for the assignment. Your total percentage will be what
percent of the 25 points you get on the assignment. For example, I produce a report that
scores a total of 85 of the 100 available percentage points. 85% of 25 is 21.25 so I will get 21.25
points on the assignment.
please answer this question
please answer this question
GAMS- Case Study
You may use Excel or GAMS. I recommend GAMS. If you are using Excel, I recommend OpenSolver.
I Highly recommend that you use GAMS for this problem.
Terminal and bash
Help with my homework
Solved Exp19_Excel_Ch07_Cap_Real_Estate | Excel Chapter 7 Real Estate
Solved Exp19_Excel_Ch07_Cap_Real_Estate | Excel Chapter 7 Real Estate
Project Description:
You are the office manager for a real estate company in northern Utah County. You tracked real estate listings, including city, agent, listing price, sold price, etc. Agents can represent a seller, a buyer, or both (known as dual agents). Your assistant prepared the spreadsheet structure with agent names, agent types, the listing and sold prices, and the listing and sold dates. You want to complete the spreadsheet by calculating the number of days each house was on the market before being sold, agent commissions, and bonuses. In addition, you will use conditional functions to calculate summary statistics. For further analysis, you will insert a map chart to indicate the average house selling price by city. Finally, you will create a partial loan amortization table and calculate cumulative interest and principal to show a potential buyer to help the buyer make decisions.
The spreadsheet contains codes (BA, DA, SA) to represent agent roles (Buyer’s Agent, Dual Agent, Seller’s Agent). You want to switch the codes for the actual descriptions.
In cell E12 of the Details sheet, insert the SWITCH function to evaluate the agent code in cell D12. Include mixed cell references to the codes and roles in the range J2:K4 for the values
and results arguments. use all cell references in the function. Copy the function to the range E13:E39.
Now you want to calculate the number of days between the list date and sale date.
In cell J12, insert the DAYS function to calculate the number of days between the Listing Date and the Sale Date. Copy the function to the range J13:J39.
You want to calculate agent commissions based on their role.
In cell K12, insert the IFS function to calculate the agent’s commission based on the agent code and the applicable rates in the range L2:L4. Use relative and mixed references correctly. Copy the function to the range K13:K39.
You want to calculate a bonus if the sold price was at least equal to the listing price, and if the house sold within 30 days after being listed.
In cell L12, insert an IF function with a nested AND function to calculate a bonus. The AND function should ensure both conditions are met: Sold Price divided by the Listing Price is greater than or equal to 100% (cell L7) and the Days on Market are less than or equal to 30 (cell L8). If both conditions are met, the bonus is $1,000 (cell L9). Otherwise, the bonus is $0. Use mixed cell references to the input values in the range L7:L9. Copy the function to the range L12:L39.
The top-left section of the spreadsheet is designed for summary statistics for one condition. You will calculate average selling prices and the number of houses sold in each city (the condition).
In cell B2, insert the AVERAGEIF function to calculate the average Sold Price for houses in the city of Alpine. Use mixed references for the range; use a relative reference to cell A2. Copy the function and use the Paste Formulas option to paste the function in the range B3:B5 so that the bottom border in cell B5 is preserved.
You want to count the number of houses in one city.
In cell C2, insert the COUNTIF function to count the number of houses in the city of Alpine. Use mixed references for the range; and use a relative reference to cell A2. Copy the function and use the Paste Formulas option to paste the function in the range C3:C5 so that the border in cell C5 is preserved.
You want to calculate the total commissions for each agent (the condition).
In cell B7, insert the SUMIF function to total the commissions by agent. Use mixed references for the ranges; and use a relative reference to cell A7. Copy the function and use the Paste Formulas option to paste the function in the range B8:B9 so that the borders are preserved.
The top-middle section of the spreadsheet is designed for summary statistics for multiple conditions. You will calculate the number of houses sold for each agent when he or she served as a Dual Agent (DA). Use mixed references for ranges and the agent code condition in cell J3. Use relative cell references to the agent condition in cell E2. When you copy the formulas, use the paste Formulas options to preserve border formatting.
In cell F2, insert the COUNTIFS function in cell F2 to count the number of houses sold by the first agent (cell E2) who was a Dual Agent (DA) (J3) for that house. Use all cell references in the function. Copy the function to the range F3:F4 and preserve the bottom border for cell F4.
You are ready to calculate the total value of those houses for each agent when he or she served as a Dual Agent (DA). Use mixed references for ranges and the agent code condition in cell J3. Use relative cell references to the agent condition in cell E2. When you copy the formulas, use the paste Formulas options to preserve border formatting.
In cell G2, insert the SUMIFS function to sum the selling prices of the houses sold by the first agent (cell E2) who was a Dual Agent (DA) (J3) for that house. Copy the function to the range G3:G4 and preserve the bottom border for cell G4.
Now, you will calculate the highest-price house highest-price house sold for each agent when he or she served as a Dual Agent (DA). Use mixed references for ranges and the agent code condition in cell J3. Use relative cell references to the agent condition in cell E2. When you copy the formulas, use the paste Formulas options to preserve border formatting.
In cell H2, insert the MAXIFS function in cell H2 to display the highest-price house sold by the first agent (cell E2) who was a Dual Agent (DA) (J3) for that house. Copy the function to the range H3:H4 and preserve the borders in the range H3:H4.
The Map worksheet contains a list of cities, postal codes, and average house sales. You will insert a map chart to depict the averages visually using the default gradient fill colors.
Display the Map worksheet, select the range B1:C5 and insert a map chart.
Cut the map chart and paste it in cell A7. Set a 2.31″ height and 3.62″ width.
You want to enter a meaningful title for the map.
Change the map title to Average Selling Price by Zip Code.
Display the Format Data Series task pane, select the option to display only regions with data, and show all labels. Close the task pane.
You are ready to start completing the loan amortization table.
Display the Loan worksheet. In cell B8, type a reference formula to cell B1. The balance before the first payment is identical to the loan amount. Do not type the value; use the cell reference instead. In cell B9, subtract the principal from the beginning balance on the previous row. Copy the formula to the range B10:B19.
Now, you will calculate the interest for the first payment.
In cell C8, calculate the interest for the first payment using the IPMT function. Copy the function to the range C9:C19.
Next, you will calculate the principal paid.
In cell D8, calculate the principal paid for the first payment using the PPMT function. Copy the
function to the range D9:D19.
Rows 21-23 contain a summary section for cumulative totals after the first year.
In cell B22, insert the CUMIPMT function that calculates the cumulative interest after the first year. Use references to cells A8 and A19 for the period arguments.
The next summary statistic will calculate the principal paid after the first year.
In cell B23, insert the CUMPRINC function that calculates the cumulative principal paid after the first year. Use references to cells A8 and A19 for the period arguments.
Rows 25-28 contain a section for what-if analysis.
In cell B27, use the RATE financial function to calculate the periodic rate using $1,400 as the
monthly payment (cell B26), the NPER, and loan amount in the original input section.
In cell B28, calculate the APR by multiplying the monthly rate (cell B27) by 12.
Create a footer with your name on the left side, the sheet name code in the center, and the file name code on the right side of each worksheet