Legal-g assignement

write an essay with 500 words minimum on addressing the applications and implications of a  Gramm–Leach–Bliley Act (GLBA) discussed in this course to the conduct of your duties as an Information Technology professional(order management – payment module). Your essay should address the following.

  • a definition and overview of  Gramm–Leach–Bliley Act (GLBA)
  • consideration of the duties of an Information Technology professional(order management – payment module)
  • an analysis of the application of that law or regulation in the context of the identified duties
  • a reference page(s)
  • Your paper must include a minimum of 4 peer-reviewed resources (articles or papers) 

IT project management

 

PART 1: PROJECT MANAGEMENT SCENARIO (20%) 

This part of the in-course assessment is intended to address Learning Outcomes 1, 2. For this part of the assessment, you are required to critically scope and author a project management case scenario which should contain sufficient appropriate detail for analysis and determination of an IT-related project management strategy, plan and toolset. This scenario could be fictitious or based on a real business need.Start with describing the business case and value(s) of the project, then add both qualitative and quantitative details to explain the scenario in more depth. The data might be used in the formulation of your plan or toolset. You can use appendices for finer details.

Word count for Part1: approx. 1,000 words (guideline only).

PART 2: PROJECT MANAGEMENT STRATEGY & PLAN (50%) 

This part of the in-course assessment is intended to address Learning Outcomes 1, 2, 5, 6, 7.  In this part of the assessment you will review, develop and defend a case for adopting a specific project management life cycle (PMLC) and develop a suitable project management plan. The aim is to demonstrate knowledge of alternative philosophies and project planning artefacts, critically evaluating which broad methodological approach (and toolset) would fit your described project scenario. It is therefore expected that you will analyse your scenario, compare and contrast project management approaches, then select the most appropriate ones for your scenario and justify your choices. 

Word count for Part 2: approx. 2,000 words (guideline only).

PART 3: TOOLSET (30%) 

This part of the in-course assessment is intended to address Learning Outcomes 3, 4.  In this part of the submission you are required to employ a suitable toolset portfolio, demonstrating how the tools advocated would / could be applied to the given project management scenario. You may use live case data, plausible invented data, or an exemplar, illustrative presentation of critical tools in your toolset. 

Word count for Part 3: approx. 300 words (guideline only),plus associated illustrations

This week’s journal articles focus on the digital retail sector and how it is constantly growing each year. The case study/article reviews the top four digital retail company’s financial performance.

 

Required Reading:

Read URBONAVIČIŪTĖ, K., & MAKNICKIENĖ, N. (2019). Investigation of Digital Retail Companies Financial Performance Using Multiple Criteria Decision Analysis. Science: Future of Lithuania, 11, 1–9. https://doi.org/10.3846/mla.2019.9737

http://search.ebscohost.com/login.aspx?direct=true&AuthType=shib&db=a9h&AN=141392864&site=eds-live&custid=s8501869&groupid=main&profile=eds_new

Assignment:

This week’s journal articles focus on the digital retail sector and how it is constantly growing each year. The case study/article reviews the top four digital retail company’s financial performance. After reviewing the reading, please answer the following questions:

  1. Present an overview of the top four digital retail companies.
    1. Note who they are and how they became the top four digital retail companies.
  2. Please review at least two other digital retail companies that are new in the market, note what you think they would have to do to obtain market share based on what you’ve learned this week.
    1. In response specifically list at least three key factors that would influence the success of the digital retail company, please be specific.
    2. Note a specific market that would thrive given the current market conditions and why.
    3. Discuss how innovation technology will influence the success of this new business.

Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research. Please be sure that journal articles are peer-reviewed and are published within the last five years.

The paper should meet the following requirements:

· 5  pages in length (not including title page or references)

· APA guidelines must be followed. The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.

· A minimum of five peer-reviewed journal articles.

Digital Forensics

 

Mr. Fahad Naseem, and Mr. Ronald Joseph FBI Agent.

 Mr. Fahad Naseem was arrested in connection with the kidnapping and killing of journalist Daniel Pearl and admitted sending ransom e-mails using his Laptop. The laptop and handwritten versions of the e-mails were found in his possession. 

  • On the Contrary-A, Naseem later retracted his confession and the defense attorney asserted that logs from Mr. Naseem’s Internet Service Provider (ISP) indicated that Mr. Naseem’s account was not active and connected to the Internet at the time the e-mails were sent. 
  • On the Contrary-B

Naseem’s defense attorney claimed that the compromised Laptop produced in court had a different serial number from the one that was initially recorded in police records; hence, documentation relating to the computer and evidence in the case was inconsistent. 

  • On the Contrary-C

Documentation presented in court indicated that the Federal Bureau of Investigation (FBI) agent, Mr. Ronald Joseph examined Mr. Naseem’s Laptop between February 4 and 7, 2002. In contrast, documents indicated that the Laptop was not seized from Mr. Naseem until February 11, 2002, and the court denied the appeal, including the following explanation.

  • On the Contrary-D

The lead investigator Mr. Shaikh Naeem recovered the Laptop labeled (connection No. 66) retrieved from the accused, Mr. Fahad Naseem, on November 2, 2002, was provided to Mr. Ronald Joseph, FBI agent, who examined, conducted the forensic investigation, formulated his report, and conveyed evidence to the Consulate General of the United States of America. 

  • The report’s content asserted that the Black Soft Computer came with “Proworld” written on the exterior of the Laptop, and upon opening the case, a Dell Latitude Cpi laptop was discovered. 
  • The Laptop was identified in the report produced by this witness to be of model PPL with Serial number ZH942 located inside the Laptop as an IBM travel star hard driver [sic], confirmed to have been removed from the Laptop.
  • During examination, the label on the hard drive was identified as a system with 4.3 GB storage capacity, and serial number OKLA24302 on the outside of the laptop.  
  • After examining Exhibits, Mushernama who recovered the Laptop asserted that without a doubt whatever, the compromised Laptop is the same equipment that was seized from the accused, Mr. Fahad Naseem on November 2, 2002. 
  • On the Contrary-E

The forensic investigation report confirmed that the same Laptop was recovered on April 2, 2002 by the defense team. Availability of the Laptop at the American Consulate on April 2, 2002 is not unnatural and impossible because Marianne Pearl filed a complaint with the police on April 2, 2002, hours when the case was in the at the hands of the Investigating Agency.

Questions 1. As an Aspirant and Hopeful Digital Forensic Investigator:

1:1. Submit concluding evidence to the public and the court substantiating that Mr. Fahad Naseem is guilty of kidnapping and killing Mr. Daniel Pearl, the journalist.

1:2. Submit concluding evidence to the public and the court demonstrating that Mr. Ronald Joseph examined Mr. Naseem’s Laptop between February 4 and 7, 2002, whereas documents indicated that the Laptop was not seized from Mr. Naseem until February 11, 2002.

1:3. Submit concluding evidence to the public and the court attesting that Mr. Naseem’s Laptop’s availability at the American Consulate on April 2, 2002, is unnatural and unrealistic occurrences. 

group pro

Explore at least 3 strategies that firms can use in their attempt to capitalize on the potential of blockchain technology. Look at methods, such as industry consortiums, innovation labs, etc. research the question and prepare a 6 page paper that provides a research supported answer to the question. The paper should include an introduction, literature review, and conclusion. The introduction should include some background information, the purpose and research question, and a preview of the paper. The literature review should be organized in a way that appropriately presents the existing literature pertaining to the question under exploration. The conclusion should answer the question that was assigned. This paper should be in APA style and follow the writing requirements for this course. You may use the assigned course readings in this paper, but are required to use an additional 5 sources.

Chat application demo (using Angular and spring)

 

I want to demo chat web application with technology Angular 8 or above (frontend) and Spring (backend) with mysql databse

1. user can signup and login and chat with each other (one to one chat for example facebook)

2. web page design is not needed.

4. all chat should be store in database. if user have some chat and when it logout then after login all previous chat should be present in chat history.

3. it should be work in windows 10.

Business Stratergy

 1) 350 words – Why is it critical for company managers to have a clear strategic vision regarding their organization? 

2) 1 reply of 150 words

BSWP Week 4

Assignment on secure passwords. 

Then pick and three passwords: one not secure, one acceptable, and one very secure. Then write a brief description of the passwords you have chosen, indicating why they are secure or not secure. 

Post between 200 and 300 words.