Provide detailed answers for each
1. Explain the central limit theorem. (Ch 22(07), 10 points)
2. Describe the advantages and disadvantages of stratified random sampling, cluster sampling, and systematic sampling. (Ch 22(07), 10 points)
3. Describe hypothesis testing and explain how to develop null and alternative hypotheses. (Ch 23(09), 10 points)
4. Compare type I and type II errors. (Ch 23(09), 10 points)
5. Explain and compare independent simple random samples and matched samples. (Ch 24(10), 10 points)
300 words project (Mobile security)
Submit your final project topic here. Include a short paragraph describing your project and how you intend to research it.
Note your safe assign score. Score should be less than 25
Submit a brief abstract describing your final project.
Final Project: Design with Focus on Business Continuity Assignment
Overview
This phase of the project completes the design phase and develops a business continuity and disaster recovery plan for the final solution. This phase of the project must include the secured design diagrams that minimize risk and appropriately address the threats identified in Project 1: Problem Identification Assignment. Threats from “distributed denial of service attacks” – include semantic attacks and brute force attacks. And also Man in the middle attack from include semantic attacks and brute force attacks.
Any single points of failure must be addressed with appropriate fault-tolerant designs. Solutions must parallel the analyzed solutions. For example, if vulnerability was determined between 2 network gateways, a solution could include a virtual private network (VPN) with appropriate public key infrastructure (PKI) and certificates. If a man-in-the-middle network attack is a threat, Dynamic ARP Inspection and DHCP Snooping features on networking equipment can be indicated in the network design diagram to prevent these attacks.
Instructions
Each design must be justified by the textbook and peer-reviewed research. You will be evaluated based upon the appropriate security solutions to the identified problem. The final design must seek to construct the appropriate controls for the target given various, regularly used vulnerabilities. For example, if the target is availability and the vulnerability is connection flooding (e.g. SYN flood), appropriately designed solutions would likely include the minimum controls of an intrusion detection system (IDS), firewall, access control list (ACL) on the border gateway/router, and a honeypot to counteract unauthorized attempts. A design diagram must properly illustrate this secured solution, and the author must subsequently explain each dimension of the security strategy.
Current and proper APA formatting is required and must include a title page, proper margins, citations, organization, proper grammar and spelling, and an ending resources page.
At the minimum, this phase of the project must include:
I. Executive summary and introduction
II. Systems Design
a. Detail the final systems design, supporting the results given the original review of the literature and the analysis performed in Project 2: Methodology Development Analysis Assignment
b. Design the final solution
i. Target of the attack
ii. Vulnerability
iii. Control
c. Create the appropriate design diagrams for the secured solution
d. NOTE: Required minimum length (8 peer-reviewed sources and at least 10 double-spaced, current APA-formatted pages) in the grading rubric excludes all systems analysis and design (SAD) diagrams and any other tables and/or graphical elements
III. Business continuity and disaster recovery plan (must be supported by relevant and current research from scholarly, peer-reviewed journals)
a. Basic BCP Policy
b. Basic business impact analysis (BIA)
c. Preventative measures
d. Recovery and restoration
IV. Project conclusion
a. Summary of the solution
b. Future recommendations and implications for business
c. Final project conclusion
V. Diagram examples in this phase could include but are not limited to:
a. Secured and hardened advanced system and/or network architecture diagrams
b. Secured package, design class, system security, and system control diagrams
c. Secured CPU/Memory/OS buffer, segmenting, address, and/or data bus mappings
d. NOTE: A minimum of 5 diagrams exist that accurately analyze a secure system, network, and/or application solution. Within EACH of the 5 diagrams, a minimum of 10 elements exist that accurately detail analysis of the environment that needs securing (Note, if 10 elements are not necessary in a diagram, add diagrams as needed to sufficiently meet this requirement). Each diagram is thoroughly developed based upon existing architecture and/or applications. Each diagram meets the associated technical requirements, programming language, notations, formatting, and modeling rules of the language (e.g. UML), industry standards for the diagram, and/or literature review. Analysis and design diagrams must have an associated industry standard that is widely accepted to be recognized (e.g. UML).
Note: Your assignment will be checked for originality via the Turnitin plagiarism tool.
Project 1: Problem Identification Assignment.
Threats from “distributed denial of service attacks” – include semantic attacks and brute force attacks. And also Man in the middle attack from include semantic attacks and brute force attacks.
Project 2: Methodology Development Analysis Assignment – Communication and interoperability with existing networks must be protected by the NGN’s security architecture NEXT GENERATION NETWORK (NGN)
Management Information system.
Please upload your Project Topic here. Remember this should be a research paper with references,.
Possible topics (these are examples)
–Virtual teams in IT project management
–Agile project methodologies
–Social networking and quality of life/productivity
–COVID and work-life balance
–Need Blackboard submission of project topic and 200 words on what you would like to cover in the paper.
Many websites ask for phone numbers
Lab #09 Flowchart
Many websites ask for phone numbers. The problem is that there are many different ways to represent a phone number. Examples include 817-555-1234, 817 555 1234 (c), and (817) 555-1234 x23. Write a Raptor program which inputs a string containing a phone number in any format and outputs it in the standard format. For this assignment, the standard format is (817) 555-1234.
Your Raptor program should:
1. Input a string including the number
2. Copy only the digits from the input string into another string
3. Issue an error message if the input string does not contain at least 10 digits
4. If the input string contains more than 10 digits, include only the first 10 digits in the formatted number
5. Output the phone number in standard format
Notes:
1. In Raptor, a string is just an array of characters.
2. Lesson #9 has an example of working with strings in Raptor.
3. When only digits are input, Raptor assumes it is an integer instead of a string. Your flowchart does not need to properly handle an input like 8175551234, but your C++ version does need to handle that.
4. I recommend passing the digits only string to a procedure which outputs it in the standard format.
Sample Output (inputs in bold)
Please enter a phone number: 817-555-1234
The properly formatted number is (817) 555-1234
Please enter a phone number: (817)515 7259 x23
The properly formatted number is (817) 515-7259
Please enter a phone number: 214-555-999
The phone number must have at least 10 digits
Please enter a phone number: 800**4444xxx333
The properly formatted number is (800) 444-4333
Lab #09 C++
using the flowchart for Lab #09 as a guide, write a C++ program that also inputs a phone number and displays it in the standard format, (817) 555-1234. Your program may use either C-Strings or the C++ string Class, but should not mix them. Chapter 10 has examples using both kinds of strings.
Test your program to make sure it works properly, and then upload just the .cpp file.
Exp19_Access_Ch02_ML1 – Game Collection 1.2
Project Description:
You have cataloged your vintage video games in an Access database. In this project, you add two tables to a database you have started? One to identify the game system that runs your game and the other to identify the category or genre of the game. Then you will join each table in a relationship so that you can query the database.
Start Access. Open the downloaded Access file named Exp19_Access_Ch02_ML1_Games. Grader has automatically added your last name to the beginning of the filename. Save the file to the location where you are storing your files.
Open the Games table and review the fields containing the game information. Close the table.
Create a new table in Design view. Add the field name SystemID and select AutoNumber as the Data Type. Add the caption System ID. Set the SystemID field as the primary key for the table.
Add a second field named SystemName with the Short Text Data Type. Change the SystemName field size property to 15. Add the caption System Name. Save the table as System.
Switch to Datasheet view and enter the following system names, letting Access assign the System ID:
XBOX 360
PS3
Wii
NES
PC Game
Nintendo 3DS
Double-click the border to the right of the System Name column to set the column width to Best Fit. Save and close the table.
Create a new table in Design view. Add the field name CategoryID and select AutoNumber as the Data Type. Add the caption Category ID. Set the CategoryID field as the Primary Key for the table.
Add a second field named CategoryDescription and accept Short Text as the Data Type. Change the field size property to 25. Add the caption Category Description. Save the table as Category.
Switch to Datasheet view, and enter the following Category Description, letting Access assign the Category ID:
Action
Adventure
Arcade
Racing
Rhythm
Role-playing
Simulation
Sports
Close the table.
Establish relationships in the database by adding the Category, Games and System tables to the Relationships window. Close the Show Table dialog box. Create a one-to-many relationship between the SystemID field in the System table and the SystemID field in the Games table, enforcing Referential Integrity. Select the option to cascade update the related fields.
Create a one-to-many relationship between the CategoryID field in the Category table and the CategoryID field in the Games table, enforcing Referential Integrity. Select the option to cascade update the related fields. Save and close the Relationships window.
Create a simple query using the Query Wizard. From the Games table, add the GameName and Rating fields (in that order). Save the query using the title Ratings. Switch to Design view. Sort the Rating field in ascending order.
Click the gray column selector at the top of the Rating field, then click and drag the column to move it to the first position of the query design grid. Add a Total row, click in the Totalrow of the GameName column, click the arrow, and then select Count. The records will be grouped by rating, and the number of games will be counted for each group. Run, save, and close the query.
Create a new query in Design view. Add the Category, Games, and System tables to the query design window. Add the following fields to the query (in this order).
GameName
CategoryDescription
Rating
SystemName
DateAcquired
Sort the query in ascending order by GameName and run the query. Save the query as Game List and close the query.
Copy the Game List query in the Navigation pane and paste it with the name PS3 Games. Modify the query in Design view by using PS3 as the criteria for SystemName. Remove the sort by GameName and sort in ascending order by CategoryDescription. Save and run the query. Close the query.
Create a new query in Design view. Add the Category, Games, and System tables to the query design window. Add fields (in this order) to display the name of the game, its rating, the category description of the game, and the system name. You only want to display Wii games with a rating of Everyone or Teen. Because the system name is the same for the games you plan to pack and share, hide this value from the results. Save the query as Thanksgiving Games and run the query. Close the query.
Job Market Projection (Individual Assignment)
After loading “Labor Market 2018 & Projected 2018–28” data set (you can download it in this assignment folder), please answer below questions. (Data is provided by U.S. Bureau of Labor Statistics, https://www.bls.gov/careeroutlook/2019/article/wages-and-openings.htm)
Create a scatter plot that shows “Median Annual Wage 2018” in Y axis and “Annual Average Openings, Projected 2018-2028” in X axis, bubble sized by number of records and colored by occupational group.
Please create your title of this figure and copy and paste it on this below box
Q1) Please locate the jobs that are related to data systems in this data. What are the median annual wages in 2018 and annual average openings projected from 2018 to 2028?
Q2) After exploring the data, are you willing to have this job for your future career? If you changed your mind, why? Then, locate the jobs that interest you for your future placements and lable them in your figure. Please elaborate on your decision.
Bayesian Probabilistic Theory
What are the probabilistic constructs of Bayesian Probabilistic Theory
HR Management & Blockchain
1. How might blockchain technology impact labor relations and employee safety and security?
paper: Introduction, Question 1, Conclusion, References.
Reference:
1. Morkunas, V. J., Paschen, J., & Boon, E. (2019). How Blockchain technologies impact your business model. Business Horizons, 62, 295-306.
2. Whitehouse, E. (2018, July/August). We can change the way you work. People Management, 30-34
PowerPoint Module 1: Creating and Editing Presentations with Pictures.
Design and Create a Presentation about Business Programs
Part 1: Your school is expanding the courses offered in the School of Business, and the department chair has asked you to help promote the program. She informs you that the classes emphasize creative and critical-thinking skills by combining material from the modern business world, liberal arts and sciences, environmental design, and engineering. Graduates possess technical skills that prepare them for success in their careers. Internships at local businesses provide real-work experience.
Use the concepts and techniques presented in this module to prepare a presentation with a minimum of four slides that showcase the School of Business program. Research business programs at local schools for additional information about specific classes, tuition costs, admission requirements, and graduation rates. Select a suitable theme, and include a title slide and bulleted lists.
Review and revise your presentation as needed.
Add your name to the first slide
Note: You need to make several decisions while creating the presentation in this assignment:
- what theme to use
- where to place text
- how to format the text (font, font size, paragraph alignment, bulleted paragraphs, italics, bold, underline, color).
- What was the rationale behind each of these decisions?
- When you reviewed the slides, what further revisions did you make and why?
- Where would you recommend showing this slide show?
When finished submit the presentation in PowerPoint format (not pdf) using the file name
5-PP-1-2-YourName.pptx