A detailed statement discussing how you obtained this CPT employment(Java Developer) as well as how this CPT employment is directly related to major area of study(Masters in Information Technology).
Technical Writing Project
Answer the following
- Find a professional article online written for people in your field. Identify the intended reader and purpose. Write description of the article describing the elements in the article that helped you identify the reader and purpose. Be sure to include the URL of the article.
- Study your school’s Web site. Imagine you are a potential transfer student looking for a new school. Analyze the usefulness of the information available and how easy it is to locate information about various majors and directions about applying for admission. Identify 2-3 features of the Web site you would change in some way. Support your answer with citations from the text.
- The following bulletin at a large manufacturing company provides guidelines for the plant security supervisors in assigning duties to the plant security guards at five separate plants. Revise and reorganize to make the bulletin easier to read and more useful to the supervisors. All supervisors must be conscious of the need to reduce costs and properly use available security guards int he most effective manner. Consider staggering the start and quit times to ensure a larger force during the peak demand hours. Every effort should be made to eliminate nonsecurity service functions, such as airport pickup, mail runs, drives to banks, drives to medical centers, parcel pickup. The supervisors should regularly review the schedule to be sure the coverage meets the needs of the plant. Guards assigned to gates should advise the shift supervisors whenever they leave their posts, including for lunch break. Nonsecurity service functions should be contracted out if possible. Drives to banks should be performed by the responsible department, but a department may request a security guard escort. Guards assigned to patrols, shipping and receiving docks, and special surveillance should tell the shift supervisors when they leave their assigned task, even for the lunch break. Supervisors should consider combining spot checks with regular duties of guards. For example, if a guard must open a gate and passes the trash center, the guard can spot check the trash pickup on the way to or from opening the gate. Supervisors must know about outside employment of guards. These outside activities should not adversely affect the security arrangements at the plant. In general, security guards should not also work at racetracks or casinos, or any places associated with gambling. Guards also should not be in partnership with co-workers since that relationship could negatively affect plant security. Supervisors need to check attendance records regularly. Frequent illness may indicate the guard cannot do the physical tasks appropriately. Questionable illness reports should be checked. Guards who operate small businesses may resist the normal rotation because it will interfere with their outside employment. Security requires a 7-day operation.
- Find a real-world letter, memo, bulletin, pamphlet, or report online. Identify specific style problems. Evaluate the style and clarity of the document, and identify specific areas where revision would help readers. Support you answers with citations from the text. Be sure to include a url to the document you are evaluating.
- Find a Web site you use frequently and analyze how you use it. How easy is it to find the features you want to see? Has the home page changed since you began using it? Can you recall which features were redesigned? How consistent is the placement of navigation links on the pages you use? How informative are the headings and page titles? Are there any distracting elements? Are the graphics helpful or simply decorative? Are there moving graphics or text? If so, do they enhance the usefulness of the site? Write a memo to your instructor, analyzing the design of the Web site. Support your answers with citations from the text. Be sure to include the url.
- Find the home pages for the following: a) Ford Motor Company, b) Chrysler, and c) General Motors. Analyze the design features of these home pages in terms of users who are seniors or have problems making precise movements with the mouse. Report your findings to your instructor in a memo.
- Find a review of a computer product online. Using the information in the review, write a task oriented set of instructions from the review. Be sure to include meaningful tasks and graphics. Use your book as a reference. Be sure to include the URL as a reference.
DCL 4
The attachment has all needed requirements.
PLEC Week 8
Answer each these questions in a paragraph with at least 3-4 sentences: Include the question and number your responses accordingly. Provide a citation for each answer.
1. With all the stories about millions and millions of bytes of personal data having been exposed, why is their still any faith at all in the Internet?
2. How has the term hacking changed meaning over the years?
3. What is the most dangerous hacker tool?
4. From the news: How were NSA’s hacker tools compromised?
5. What was the vulnerability in the Target Breach?
6. What do you think of hactivism?
7. How did Stuxnet work?
8. What was the Arpanet?
9. Deep brain stimulation is a treatment for Parkinson’s disease. Medical devices such as these are now becoming accessible through the web. Consider the dangers (threat surface)?
10. What is the Red Team?
Endless Running Games: Temple Run 2
Endless Running Games: Temple Run 2 – Fall Jungle Update!
Run or Die! So hurry!!
Continue the endless-running journey with Professor Jones in Temple Run 2.
The temple was at one time on the ground; an ancient civilization built the temple but they were killed by a disease.
The leader of the civilization was spared by a remedy, but because he didn’t die, the potion turned him into the large demon monkey that chases you from the temple.
As time passed, the temple remained unfound until the gems that were placed all over the huge temple were suddenly charged by an unknown source of power.
Your mission this time is to escape from the demonic forest along with the spoils is “the cursed god statue” – which you stole from a mysterious temple.
Remember, the Devils are still hunting for you!
Download Temple Run 2 new version.
usage of Cloud Computing Concepts in Information Technology
can you provide a few cloud computing Concepts used in information Technology in 500 words
Safe Harbor Provisions
Write an essay of at least 500 words discussing the Safe Harbor provisions under HIPAA.
Do not copy without providing proper attribution. This paper will be evaluated through SafeAssign.
Write in essay format not in outline, bulleted, numbered or other list format.
Use the five paragraph format. Each paragraph must have at least five sentences. Include 3 quotes with quotation marks and cited in-line and in a list of references. Include an interesting meaninful title.
Include at least one quote from each of 3 different articles. Use the Research Databases available from the Danforth Library, not Google. Place the words you copied (do not alter or paraphrase the words) in quotation marks and cite in-line (as all work copied from another should be handled). The quotes should be full sentences (no more, less) and should be incorporated in your discussion (they do not replace your discussion) to illustrate or emphasize your ideas.
Cite your sources in a clickable reference list at the end. Do not copy without providing proper attribution (quotation marks and in-line citations).
http://blog.securitymetrics.com/2014/05/hipaa-faq.html
https://www.hitechanswers.net/hipaa-hospitals-five-reasons-medical-data-storage-often-not-compliant/
https://www.careersinfosecurity.com/2-million-hipaa-penalty-after-patient-data-exposed-on-web-a-9465
https://www.medscape.org/viewarticle/810563_2
https://www.bankinfosecurity.com/ocr-considering-hipaa-privacy-rule-enforcement-changes-a-10750
Heaps and prority queus In python
You have been provided a Python file, heap.py, which constructs a heap structure with a list. Using that code as a guide:
Develop a heap data structure using a linked structure (Nodes and Pointers)
The heap must support add and remove from the heap
All operations most abide by the rules that govern a heap (see lecture slides for reference)
Once you have your heap structure created, next you must use it as a backing structure to a priority queue.
Develop a priority queue data structure that is backed by a heap (linked structure NOT A LIST)
Implement the normal methods that accompany a priority queue structure
Enqueue, dequeue, and peek by priority not position
Also length and whether or not the structure is empty (is_empty)
Perform the following operations to showcase your working structure
Enqueue the following items: 4, 7, 5, 11, 8, 6, 9
Dequeue 3 items by priority, they should be 4, 5, & 6.
related heap.py file code is below
class Heap:
def __init__(self):
self.heap = [0]
self.size = 0
def float(self, k):
while k // 2 > 0:
if self.heap[k] < self.heap[k//2]:
self.heap[k], self.heap[k//2] = self.heap[k//2], self.heap[k]
k //= 2
def insert(self, item):
self.heap.append(item)
self.size += 1
self.float(self.size)
def sink(self, k):
while k * 2 <= self.size:
mc = self.minchild(k)
if self.heap[k] > self.heap[mc]:
self.heap[k], self.heap[mc] = self.heap[mc], self.heap[k]
k = mc
def minchild(self, k):
if k * 2 + 1 > self.size:
return k * 2
elif self.heap[k*2] < self.heap[k*2+1]:
return k * 2
else:
return k * 2 + 1
def pop(self):
item = self.heap[1]
self.heap[1] = self.heap[self.size]
self.size -= 1
self.heap.pop()
self.sink(1)
return item
h = Heap()
for i in (4, 8, 7, 2, 9, 10, 5, 1, 3, 6):
h.insert(i)
print(h.heap)
for i in range(10):
n = h.pop()
print(n)
print(h.heap)
Application Security
Discuss the following, supplying citations to support any information that you provide. Do not include your opinion, only what you can support with a citation. Address the following topics.
- Describe operating system hardening
- Define it
- Why is it done?
- What steps are usually done in a Windows environment?
- Describe system restoration methods and procedures
- Define it
- Why is it needed?
- What tools and approaches are recommended?
- Describe network security controls
- Define it
- Why is it needed?
- What steps, tools, and policies are used to secure networks?
- Describe incident response teams and the role of evidence
- What are incident response teams and why do they exist?
- How does evidence collection relate to incident response teams?
- Discuss evidence
- Describe why evidence is collected,
- How it should be collected
- What can happen if it is collected or handled in an inappropriate way
For all writing assignments ensure that you do the following:
- Write 1000 to 1500 words in APA format.
- Utilize at least five scholarly references.
- Note that scholarly references do not include Wikipedia, .COM websites, blogs, or other non-peer reviewed sources.
- Utilize Google Scholar and/or the university library.
- Do not copy and paste bulleted lists. Instead, read the material and in your words, describe the recommendation citing the source.
- Review the rubric to see how you will be graded.
- Plagiarism will result in a zero for the assignment.
- The second instance of plagiarism will result in your failure of this class.
- If you use a source, cite it. If you do not, it is plagiarism.
Business analytics
Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references.