700 words Proposal Memo-APA Format(Note: No plagiarism)

 In our readings for this week, we’ve learned about designing interfaces and dialogues. For your assignment, you will apply what you’ve learned to make a recommendation.Here is the context for your assignment:Tim is happy with your work. The next part of the proposal will be to provide a high-level recommendation on the method of interacting with the proposed system. For this part of the proposal, Tim wants you to provide a high-level or executive summary and make a recommendation (see below for details).Compose a proposal that is a minimum of 700 words (double-spaced) in length and responds to the two tasks listed below with the necessary references to support your work:

  1. Provide a high-level or executive summary of the following interaction methods: object-based, form, natural language, and command language.
  2. Then, provide a recommendation for the proposed system. Make sure you provide a clear justification for your recommendation.

Making ER diagrams.

On page 89 of your textbook, complete exercises E.3.5a-E.35j. Use the tool ERDPlus (https://erdplus.com/standalone (Links to an external site.)) to create the diagrams.

Submit your answers in a Microsoft Word document :

The instructions are as follows: 

E3.5    For the ER diagrams created in the following exercises, map the ER diagram into a relational schema and do the following:

E3.5a  For exercise E2.2a, show several records in each relation and mark those values that indicate mandatory participation on the 1 side and those that indicate optional participation on the M side.

E3.5b  For exercise E2.2b, show several records in each relation and mark those values that indicate optional participation on the 1 side and those that indicate mandatory participation on the M side.

E3.5c  For exercise E2.2c, show several records in each relation and mark those values that indicate mandatory participation on the 1 side and those that indicate mandatory participation on the M side.

E3.5d  For exercise E2.2d, show several records in each relation and mark those values that indicate optional participation on the 1 side and those that indicate optional participation on the M side.

E3.5e  For exercise E2.2e, show several records in each relation and mark those values that indicate mandatory participation on one side and those that indicate optional participation on the other side.

E3.5f  For exercise E2.2f, show several records in each relation and mark those values that indicate mandatory participation on one side and those that indicate mandatory participation on the other side.

E3.5g  For exercise E2.2g, show several records in each relation and mark those values that indicate optional participation on one side and those that indicate optional participation on the other side.

E3.5h  For exercise E2.2h, show several records in each relation and mark those values that indicate mandatory participation on one side and those that indicate optional participation on the other side

E3.5i  For exercise E2.2i, show several records in each relation and mark those values that indicate mandatory participation on one side and those that indicate mandatory participation on the other side.

E3.5j  For exercise E2.2j, show several records in each relation and mark those values that indicate optional participation on one side and those that indicate optional participation on the other side.

Note: I will attach E.2.2a-j as a references to do the exercises, but you are not supposed to be doing them. You are supposed to be answering 3.5a-j.

Turnitin™ enabled

week 5 assignment

 Hide Assignment InformationTurnitin™Turnitin™ enabledThis assignment will be submitted to Turnitin™.Instructions

Assignment Instructions:

Case Study Question

Society is becoming increasingly dependent on computers and technology for functioning in every day life. Every aspect of our lives has been affected by the infiltration of computers and technology. Computers are used to conduct business from home, meet new friends and find old friends, maintain communications with distant family, and to met out some stress relief after a long day at the office. As more and more people rely on computers to succeed each day, it begs the question – are people becoming too dependent on computers, your paper should look at either the historical changes that shook up society or future changes being developed now that will shake up society?

Submission Instructions:
Please answer the question with a minimum of 500 words. Attach the submission in a word document. Credit will not be given if the document is not the minimum number of words.

Assignment

1 page

Read chapter 32 , online resources and reputable articles/journals AND:

Choose an organization that you are familiar with, for example a university, place that you are working for or any other organization and write 1 page and describe your plan and proposal for a comprehensive Disaster Recovery and Business Continuity plan.

List all your references/resources.

ratings list

use the for statement to iterate on the ratings list and subtract each rating score by 3.5, then store the subtracted value inside a new list.

use this list of rating scores: 2,2,3,3,3,4,4,4,5,5

Pseudocode:

Set the variable with the list of rating scores

Initialize a list variable named mean deviations

Use the for statement to iterate through the rating scores

Subtract the score by 3.5 then store it in mean deviations.

Display the mean deviations list.

2) Write a program that determines the value of the coins in a jar and prints the total in dollars

and cents. Read integer values that represent the number of quarters, dimes, nickels, and

pennies. This program will require user input, output needs to have the correct currency

format without using the currency formatting code.

Prolog Puzzle Project

Please read the following instructions and make sure you can finish it on time. And note the puzzles you choose in coding. And it must be tested in this way:

check :-
   solution(S), solve(S),
   aggregate_all(count, (solve(_T)), Count), format(“Found ~w solutions~n”, [Count]),
   Count=1. 

Overview

The “funniest” way I can think of to practice logic programming is to use it to solve a logic puzzle. A logic puzzle is typically presented as a mystery and list of clues that can be used to infer facts such as “who done it”.

For this assignment, we will use the Printable Logic Puzzles (Links to an external site.) website to find two puzzles to solve. One will be a “challenging” puzzle and the other will be a “Very Hard” puzzle.

For this assignment, you will write all of the clues as rules in a prolog program.

Your prolog file must obey the following format:

  1. The name of the prolog files must be ‘challenging.pl’ and ‘veryhard.pl’
  2. Your prolog file must provide a url/1 fact to get the URL of the puzzle being solced.
  3. Your prolog file must also provide a solution/1 fact with the correct solution hardcoded in. You will get the correct solution from the Printable Logic Puzzles (Links to an external site.) website.
  4. Your prolog file must provide a solve/1 rule that uses the clues to find one, and only one, table that is the solution.
  5. Your puzzle must have a series of clueX(T) rules that are satisfied whenever the solution in T is consistent with clue X.
  6. Your puzzle must include the check rule as follows:
check :- solution(S), solve(S), aggregate_all(count, (solve(_T)), Count), format("Found ~w solutions~n", [Count]), Count=1. 

To receive credit, your puzzle must find one, and only one, solution to the puzzle.

Your assignment will be checked by running swipl in the docker container as follows:

swipl -q -g check -g halt challenging.pl 

or

swipl -q -g check -g halt veryhard.pl 

which will use your solve and solution predicates to make sure you find exactly one solution and that it is the correct solution.

You can, of course, work on your solution using SWISH (Links to an external site.) in which case you may want to also use their table rendering plugin (Links to an external site.) to display your solution. Once you have a solution, however, you should confirm that it runs properly in the container. This may mean commenting out the part where you load the plugin.

Checking Your Solution

make check

or

make check-challenging
make check-veryhard

All of these MUST pass before you submit the assignment.

8-1 Discussion: Integrating Multiple Networks

 For a growing business, one location is typically not enough. With enough personnel and capital, many businesses prefer to set up multiple offices to attract different regions of customers.

With separate offices, how can your business install a network so all the locations can work, communicate, and share information easily, instantaneously, and effectively? For your main post, assume the following:

A business has two locations in different states. Both locations have their own T1 internet connections. How do you join these two networks together so every computer can see every other computer?

Your solution should provide a suggested overview to achieve the end goal of integrating the networks. Be sure you address important issues like maintaining security, reliability, end-user operations, and network speed.
 

Discussion 7- Org Behavior

Chapter 7. Motivation ConceptsInitial Postings: Read and reflect on the assigned readings for the week. Then post what you thought was the most important concept(s), method(s), term(s), and/or any other thing that you felt was worthy of your understanding in each assigned textbook chapter.Your initial post should be based upon the assigned reading for the week, so the textbook should be a source listed in your reference section and cited within the body of the text. Other sources are not required but feel free to use them if they aid in your discussion.Also, provide a graduate-level response to each of the following questions:

  1. Given that individuals tend to judge the favorability of their outcomes relative to what others receive, what can be the result of someone getting rewarded for their performance but yet being disappointed in the reward that they receive?
[Your post must be substantive and demonstrate insight gained from the course material. Postings must be in the student’s own words – do not provide quotes!]  [Your initial post should be at least 450+ words and in APA format (including Times New Roman with font size 12 and double spaced). Post the actual body of your paper in the discussion thread then attach a Word version of the paper for APA review]

Text-

Title: Essentials of Organizational Behavior, Student Value Edition 

ISBN: ISBN-13: 9780135468890 

Authors: Stephen P. Robbins, Timothy A. Judge 

Publisher: Pearson 

Edition: 15TH

paraphrase 270 lab report + turnitin.com report.

This is a lab report not a regular paper. I just need this to be paraphrased to show under 10% on turnitin.com. Thanks.

The purpose of this lab is about how to properly configure a pfsense firewall for a server,

how to implement Network Address Translation (NAT), creating a Common Address

Redundancy Protocol (CARP), and creating a Virtual IP and implementing firewall rules. The

purpose of a firewall to protect your internal network from any malicious threats that are out

there on internet.

There are a multitude of settings on a pfsense firewall, part of this lab was to create the

Common Address Redundancy Protocol (CARP) Virtual IP and attach that public address to the

Wide Area Network (WAN). In order for these effects to take place you have to manually apply

the changes on the top tight side tab. After this step you have to use the Network Address

Translation (NAT) feature on the firewall in order to be able to attach that internal IP to the

Outside IP.

The second part of this lab was to create a rule that allows traffic to pass from the public

network to the private network. You have to create several rules in order to make this work, the

internal network is not usually routable but by using NAT you are afforded that ability. The rules

set in place permits certain traffic that you specified to be able to access the public but not vice

versa.

Ultimately using any firewall will make any environment more secured. This will also

involve making sure you are using the firewall as a security device. Just because you have a

firewall doesn’t mean you are protected. You have to make sure you do your due diligence and

configure the firewall to your specific environment needs.

Case Studies II and Cyber Responses

Provide (3) 150 words substantive response with a minimum of 1 APA references for RESPONSES 1 AND 2. Additionally, answer the question on DISCUSSION 1 below. Response provided should further discuss the subject or provide more insight. To further understand the response, below is the discussion post that’s discusses the responses. 100% original work and not plagiarized. Must meet deadline.

RESPONSE 1:

It has been gone over in the school’s given curriculum, but one instance of a cyber attack that I feel is very important to mention is the success of Stuxnet. While Iran was building what the United States intelligence determined was a nuclear arsenal, the United States and Israel were working in a conjoined effort in building an extremely sophisticated worm – with the purpose of setting back the Iranian nuclear arsenal financially and at least a couple of years. At the time, this was considered groundbreaking levels of technology for a worm, and it was very successful. Stuxnet was unleashed, and centrifuge tubes needed for nuclear construction began spinning erratically, with some becoming damaged while others self destructed entirely. It’s estimated that over two thousand centrifuges were destroyed, and that it set Iran back around two years of progress, and more importantly, valuable economic power to re-purchase the centrifuges. Crucially, if more centrifuges were purchased, it could help confirm the presence of the heavily suspected nuclear facility, enabling potential further action or sanctions onto Iran. 

– DANIEL

RESPONSE 2:

Reported by the Department of Justice (2018), the series of intrusions involving the Fancy Bear Hack Team which include what has been referred to as the DNC hack resulted in an investigation conducted by the FBI. The objective of the agency was to determine the identities of assailants, mechanisms of intrusion and associated actors which in this case comes down to the Russian state through military actors.

In the same DoJ report, the officers of Russia’s Military Unit 26165 researched victims later targeted in a spear-phishing campaign using proxy servers and maintaining command and control infrastructure for the deployment of malware as a mechanism of penetration. From here, the investigative cyber response transitioned to a legal format where officers identified in this unit were charged in a court of law.

Importantly and what is hopefully now common knowledge is that these operations aren’t standalone, and have been emphatically stated to be part of a larger series of Russian cyberespionage and subversion operations which continues now.

Bibliography

Department of Justice. 2018. U.S. Charges Russian GRU Officers with International Hacking and Related Influence and Disinformation Operations. Retrieved from: https://www.justice.gov/opa/pr/us-charges-russian-gru-officers-international-hacking-and-related-influence-and.

-JOSHUA

DISCUSSION 1:

Evil Corp, which is known to be a cybercrime organization, is led by Russians Maksim Yakubets and Igor Turashev, who were yet to face charges until 2019 in the US. The level of sophistication of the group is yet to be figured out correctly as the cybercrime organization is thought to have very close ties with the Russian intelligence agency (FSB) (McCullagh et al., 2006). I can add that, in the United States, precisely in New York, the FBI secretly installed software on two key members of the Genovese crime family’s cell phones, converting them into “roving bugs” that could be remotely activated to eavesdrop in on discussions in a room, even if their owners had switched them off.

However, despite the indictment of its top members in the United States, Evil Corp is still operating in the hacking business, but it may have transitioned into corporate spying services. This organization has stolen masses of dollars from unwary banks. One is the South Korean banks (Allyn, 2019). In the year 2011, hackers used a compromised laptop of an IT support contractor to obtain access to systems belonging to Nonghyup, a South Korean bank. The malware erased vital data on over 100 servers within the network, preventing millions of clients from accessing their accounts and ATMs for three days. Backup files for disaster recovery were also corrupted. I also agree that in another attack by Evil Corp, the software used was known as ‘botnet.’ It would freeze a computer’s operating system leading to a malware spread where the hackers would transfer money from victims to their overseas accounts.

QUESTION: So you bring up a great point about Russia.  Why are we not doing more?  Why is the United States Government not holding Russia accountable?  Is holding 12 Russian’s responsible enough?