Answering questions
Operational Excellence
APA format with headings
Strictly plagiarism free.
Assignments 1,2,3 each should have 2 references
total – 5 pages
Assignment 1 (discussion – 1 page)
Discussion: This week we focus on some additional terms for IT users. This week lets discuss what a community of practice is. Why are they important and how can they impact the culture within an organization?
Assignment 2 (Exercise – 1 page)
Chapter 13- Exercise 1 (2, 4) (Information Systems for Business and Beyond)
Assignment 3 (Essay – 1 page)
Chapter 11 – Review the employment challenge in the digital era (as well as the entire chapter). Reflect on the various challenges are present in the digital era. Will things get better or more complicated as times goes on? Explain. What are some methods to assimilate new generations into the workforce to think about competitive advantage? (Information Technology and Organizational Learning)
Assignment 4 (Practical assignment – 2 pages)
Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.
NOTE: Do not submit a paper you wrote for another class. This paper must be written specifically for this class.
NOTE: Do not include a job description from your current or previous job. This paper must be written to describe how this course would apply to your job.
Emerging threats_6.1
Research Paper:
Penetration testing is a simulated cyberattack against a computer or network that checks for exploitable vulnerabilities. Pen tests can involve attempting to breach application systems, APIs, servers, inputs, and code injection attacks to reveal vulnerabilities. In a well-written, highly-detailed research paper, discuss the following:
- What is penetration testing
- Testing Stages
- Testing Methods
- Testing, web applications and firewalls
Your paper should meet the following requirements:
- The answer should be a minimum of 4 pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
- Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
- Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook.
- Be clear and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.
Sorting – Java Coding Assigment
*** To do this assignment you are not to use any of the Collections API, or any
pre-implemented sort routines in Java. ***
In this assignment you are required to make use of the sorting routines in chapter 8 of you text book. You must ask the user to select which sorting routine he/she wants to use out of those routines implemented in the book (Insertion Sort, Shell Sort, MergeSort, or QuickSort). Based on the user input, you need to call the corresponding routine.
You are required to write one main program that will read in any number of integers and store it in an array of ints (not an ArrayList). What you need to do first is to ask the user what sorting routine he/she would like to use. Then you need to ask the user how many integers to be entered as input, and then ask the user to input that these integers.
Your program will store these integers into an array of integers first. Then your program is supposed to remove the duplicates out of this array by first sorting the array (using the user-specified sorting routine), and then removing any duplicates. Your program must not copy these elements into another array to remove the duplicates, the duplicates should be removed in place which means in the same array. Also, you must sort the array first before you start duplicate removal.
Once your array (the same array you started with) has only unique numbers, your program should print out the array followed by a list of all the numbers that were duplicated.
The numbers that were duplicated can be stored into another array.
--------
The following would be a sample scenario of running your program:
Make your choice of a sorting routine first. Then continue as follows:
Enter the number of integers: 10
Enter the 10 integers: 7 9 8 1 9 24 23 24 9 8
The resulting array is: 1 7 8 9 23 24
The numbers 8, 9, 24 were duplicated in the input.
--------
The only file that is to be submitted is a Main.java (or Assg6.java) and no other file.
Best of Luck
Discussion
The readings this week expand on investigation and of digital forensic analysis and investigations. Organizations, especially those in the public, health and educational areas are bound by legal and statutory requirements to protect data and private information, therefore digital forensics analysis will be very beneficial when security breaches do occur. Using this weeks readings and your own research, discuss digital forensics and how it could be used in a risk management program.
Cloud computing_31_1
Write a 2-3 page paper where you compare and contrast the differences between IDaaS, IaaS and IAM. The submission needs to include a minimal of 3 scholarly resources in APA format.
Please include the reference and citation. Need by 11/01 11:00 am.
Cloud Computing Discussion 10
Describe in 500 words discuss the scope of a cloud computing audit for your business.
Use at least three sources. Do not Use Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list. Example: “words you copied” (citation) these quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs. Standalone quotes will not count toward the 3 required quotes.
Python Assignment
airports = [{‘name’: ‘Cincinnati’, ‘altitude’: 2000, ‘code’: ‘CVG’}, {‘name’: ‘Chicago’, ‘altitude’: 1800, ‘code’: ‘OHA’}, {‘name’: ‘Indianapolis’, ‘altitude’: 1700, ‘code’: ‘INY’}]
1. Given the “airports” list above, create 3 lists, one of the airport names, one of the airport altitudes and one of airport codes using for loops… using list comprehensions…using another technique
2. Given the 3 lists from #1, combine them back into a list of dictionaries using the most efficient technique you can think of
3. Given the “airports” list above, find the total combined altitude using for loops… using the sum() function… using the reduce() function.
PLEASE PROVIDE PYTHON 2.X/3.X CODE FOR SOLVING THE EXERCISES ABOVE.
database management
IFB105 Database Management
Project – part A
Project overview
The IFB105 project gives you an opportunity to apply concepts and skills you acquired in the unit to a realistic database design scenario and reflect on the data requirements of an organisation.
The submission is divided into 2 parts due at different times during the semester. These parts will cover:
- Design of a database
- Creation and use of a database
The task for part A
In this part, you will:
- Design an ORM conceptual schema for a business domain based on sample reports required for that domain.
- Map a different ORM schema to a relational database schema.
.please there are several task on the file uploaded ..
vulnerability
Do a bit if research into File Inclusion Vulnerability.
- What is it?
- Why is is dangerous?
- What is the difference of low and remote inclusion?
- What methods can me employed to prevent a security breach?
- What programming languages are vulnerable to this type of attack.
write in 300words.
