Using the PERT method sample file uploaded, follow the method outlined in the .pdf file and PPT to complete the schedule with 95% confidence level.
Find the Z value for 95% confidence level in pdf file containing the z table.
Using the PERT method sample file uploaded, follow the method outlined in the .pdf file and PPT to complete the schedule with 95% confidence level.
Find the Z value for 95% confidence level in pdf file containing the z table.
How is a software development process different from software modeling? Explain how one helps the other in creating quality software. Feel free to include a UML model in your discussion.
You manage a company that provides corporate training workshops. Your two types of clients are business people and college professors. You want to complete a spreadsheet that calculates gross revenue for upcoming training workshops. Finally, you will improve the appearance of the worksheet by applying font, alignment, and number formats.
EMBL (European Molecular Biology Laboratory) and EBI (European Bioinformatics Institute) are basically the equivalent of NCBI here in the US. They hold the same data but store the data in a different format. Your task is to parse out an EMBL record (see file attached) just like we did for GenBank records in the discussions.
EMBL’s records are actually easier to parse out! Just parse out the sequence ID (line starts with ID), description (DE) and sequence (SQ). Use at least one function.
(KB) Net Present Value Analysis
In this assignment you will perform a Net Present Value Analysis for a project.
1. Assume a student is planning to pursue a two-year master’s degree. There are two educational options the student is considering, with investment and cash flows as follows.
Option A: Full-Time Education Example cash investment: $100,000. Currently the student is earning $30,000. The student will quit his/her current job to study a Master’s degree in computer science. Upon graduation the student hopes to earn $60,000 per year in new job.
Option B: Part-Time Education Example cash investment: $100,000. Currently the student is earning $30,000. The student can work part-time for three years at a salary of $20,000 while studying towards the master’s degree in project management. Upon graduation the student anticipates a possible increase in salary by $10,000 (total $40,000) in the same company.
The requirements for the assignment are:
• Answer the following questions based on the unit readings:
1. Briefly describe what net present value is, how it is calculated, and what it is used for.
2. Calculate the NPV for each educational option. The discount rate is 8%.
3. Which option should the student choose? Explain your decision including any necessary assumptions made.
• The paper must be APA-formatted as a Word document.
• SafAssign will be used to check this assignment for plagiarism. Remember to paraphrase in your own words and do not copy directly.
• The length must be 1-2 pages, excluding the title and reference pages.
• Include at least one reference.
The readings this week discusses broad context of risk and investigative forensics. Part of risk management is to understand when things go wrong, we need to be able to investigate and report our findings to management. Using this research, or other research you have uncovered discuss in detail how risk and investigate techniques could work to help the organization. ERM helps to protect an organization before an attack, where as forensics investigate technique will help us after an attack – so lets discus both this week.
Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:
In this module, you learned that random numbers (or, at least, pseudorandom numbers) are essential in cryptography, but it is extremely difficult even for powerful hardware and software to generate them. Go online and conduct research on random number generators. What are the different uses of these tools besides cryptography? How do they work? Explain your answer using your own words in 2-3 paragraphs
Identify a recent incident in cyber(in)security, investigate it in detail and write up a report on it using the following structure. Please see below for ineligible incidents.
Maximum 2000 words. This does not include references. Provide citation of sources using any recognized format.
The paper must contain the following two sections:
Use the framework of the model to identify Adversary, Victim, Infrastructure and Capability. Pay special attention to what the paper calls “the Social-Political meta-feature determining the Adversary-Victim relationship, and the Technology meta-feature enabling both the infrastructure and capabilities.”
Identify at which level of organization this problem is best addressed. Does this incident, in your judgment, reflect the need for some kind of public policy change at the national (9) or transnational (10) level? Or is it best handled at the organizational (8) or industry level (8.5)? In making this assessment, consider how common these types of incidents are, what kinds of risks they pose, and what kind of legal, technical or policy tools could combat them.
Grading will be based on the following criteria:
Ineligible Incidents
The below incidents can not be used for this assignment. The reason is that some incidents have already been analyzed in class, or there are already too many materials floating around on the web that could be copied. Here is a list of incidents that are not allowed:
It is related to C programming & Simulation
Password to open Project is Ko0LchIPS22!23
– Pick one of the following terms for your research: collaboration, divisional structure, functional structure, horizontal structure, matrix structure, outsourcing, reengineering, teams, vertical linkages, or virtual team.
– The paper should have a definition, Summary and Discussion ( Summary should have 150-200 words and discussion should have 300-350 words. )
– Attach minimum 2 references
– Absolutely no plagiarism, attach a plagiarism report with 0% similarity index.