Assignment

Current laws that govern cyberspace are inadequate to handle advances in the Internet and computing technologies. In your opinion, is this an accurate statement? Support your position or answer with a few examples. Your submission should be:

  • between 300-500 words (or one to two pages double spaced)
  • in-text citations and at least two (2) references using the APA style
  • double spaced
  • no title page required
  • DO NOT add an Introduction or a Conclusion.

Personal Reflection: Problem Solving in the Workplace

It is important for students to understand how their curriculum is applied to real world workplace environments. How what you are studying can or will benefit you in your current, or future, career. For this assignment, you will need to review your program’s curriculum and goals and compare that to your current job/internship (if unemployed, reflect on a job/career that you desire to obtain in the future). To complete the assignment, please follow the below instructions:

 

Courses: 

 1. Comp Crimes & Digital Forensic.

 2. Digital Forensics Tools & Tech.

  1. Review your program’s goals and curriculum on the UC Webpage and the UC Graduate Course Catalog:
  1. Reflect on (research, if needed) your current (or future) job duties and responsibilities.

Assignment Details:Part 1 – Identify a Problem

  • Problem solving starts by being able to identify existing problems, gaps in service, inefficient systems/processes, flawed policies, or any other areas of our job/career where improvement is needed. Identify a problem or gap at your workplace and explain why/how this problem exists.

Part 2 – Solve the Problem

  • Use your knowledge that you’ve learned in the program (or hope to learn in a future course) to implement a plan to solve the problem.

Grading Expectations:

  •  Fully answer both parts of the assignment.
  • Word requirement: 400-500 words

*Please include job details (job title and employer, if available). 

Activity 4- Exe Proj

 

 Chapter 4. Leadership and the Project Manager  

Consider the profile examples on project leaders Sir John Armitt and Jim Watzin from the chapter. If you were to summarize the leadership keys to their success in running projects, what actions or characteristics would you identify as being critical? Why? What are the implications for you when you are given responsibility to run your own projects? 

Text 

 

Title: Project Management

ISBN: 9780134730332

Authors: Pinto

Publisher: Pearson

Edition: 5TH 19

Data backup

 

Experts recommend the 3-2-1 method for backing up data, both professionally and personal data as well. This is three copies of your data, on two different devices, and one off-site.

  • Why is it important to back up my data?
  • It is mandatory for businesses to back up their data?
  • What can we do personally to meet the 3-2-1 methodology?

System Design

 Specifically the following critical elements must be addressed: 

III. Systems Design: 

Propose a solution that addresses the identified problem in your case. Be sure to include screenshots of all relevant diagrams, charts, and tables. 

a) Specifications: Provide a physical design that will meet the specifications outlined in the systems requirement document. 

b) Data Design: Create entity relationship diagrams (ERDs) that accurately describe the proposed solution, including 3NF table designs. 

c) User Interface Design: Illustrate the user interface design. Specifically, be sure to address your proposed human computer interactions (HCIs) and graphical user interfaces (GUIs). Your proposals should follow user-centered design principles and address all design requirements. 

d) System Architecture: Describe the system architecture. Specifically, be sure to address the corporate organization and culture, enterprise resource planning, total cost of ownership, scalability, integration and interface requirements, and security. 

e) Feasibility Analysis: Provide supporting details that justify why your proposed solution is appropriate for solving the problem. In your defense, be sure to address operational, technical, economic, and scheduling feasibility. Be sure that you frame your response for communicating effectively to your target audiences.  

dq

Web server auditing can go a long way in enforcing tighter security and ensuring business continuity. The power of log data is tremendous. Web server logs record valuable information pertaining to usage, errors, and other important security events. Using a specialized auditing tool can be extremely helpful during the audit of web servers. In your discussion this week, please discuss the methods of identifying weak web server configurations and how to mitigate them for a secure web server. Possible concepts to include are SSL certificates, HTTPS usage, attack surface, SQL injection, vulnerability migration, and least privilege. In at least one of your peer responses, provide an overview of how to audit the web server’s security and implement best practices.

Write a paper on following topic

 

select an organization that has leveraged Cloud Computing technologies in an attempt to improve profitability or to give them a competitive advantage. Research the organization to understand the challenges that they faced and how they intended to use Cloud Computing to overcome their challenges. The paper should include the following sections each called out with a header.

  • Company Overview: The section should include the company name, the industry they are in, and a general overview of the organization.
    • Challenges: Discuss the challenges the organization had that limited their profitability and/or competitiveness and how they planned to leverage Cloud Computing to overcome their challenges.
    • Solution: Describe the organization’s Cloud Computing implementation and the benefits they realized from the implementation. What was the result of implementing Cloud Computing? Did they meet their objectives for fall short?
    • Conclusion: Summarize the most important ideas from the paper and also make recommendations or how they might have achieved even greater success.

Requirements:

The paper must adhere to APA guidelines including Title and Reference pages. There should be at least three scholarly sources listed on the reference page. Each source should be cited in the body of the paper to give credit where due. Per APA, the paper should use a 12-point Time New Roman font, should be double spaced throughout, and the first sentence of each paragraph should be indented .5 inches.

The body of the paper should be 3 – 5 pages in length. The Title and Reference pages do not count towards the page count requirements.

Write a program to calculate

      Write a program to calculate and print out cellular phone bills for one month, and write a test plan to test the program.
The rates will vary depending on the calling plan of the customer:
Fixed rate plan (code F),
per Minute charge plan (code M),
Home customer plan (code H),
home Plus customer plan (code P), or
Business customer plan (code B).
The rates are as follows:
• Code F: A flat $150.00 fee for unlimited minutes (not available to businesses)
• Code M: A charge of $5, plus 21 cents a minute
• Code H: $40 for the first 600 minutes used, plus 19 cents for each additional minute.
• Code P: $64 for the first 1000 minutes used, plus 17 cents for each additional minute
• Code B: $150 for up to 2,000 minutes; $210 for up to 3,000 minutes, and $240 if over
3,000 minutes
No other codes should be accepted. Remember to define constants for all fixed values. Use double precision floating point variables for all dollar & cents figures.
The program should first explain the program to the user.
Then prompt for a 5-digit customer account number (no leading zeros allowed) and error check that the value entered is valid. Re-prompt until a valid value is entered. This input should be read and error checked from within the main function.
Next call display a menu of plan codes, along with descriptions of each, to the user. Prompt for the plan code and error check that the user entered a valid plan code (accepted in upper or lowercase). Re-prompt until a valid value is entered.
If necessary (all plans except plan F), also prompt for the number of minutes used and error check that the number entered is not negative (i.e. must be at least 0). Minutes used will always be whole numbers. Re-prompt until a valid value is entered.
©2012, Regis University
Calculate the bill total and display the results.
The output should display: the customer account number, the plan chosen in words, the number of minutes used (unless the plan chosen was F), and the total amount of the bill. Display neatly with descriptive text.
After displaying the results, ask the user whether to execute the program again, and do so, as long as the user wishes to continue.
At a minimum, the program must implement three separate functions (in addition to main), as described on the next page:
• One function to read and validate the plan choice, and if necessary, to read and
validate the number of minutes used. Both the plan choice and the number of minutes
used will be passed back to main via reference parameters.
• One function to calculate the amount of the bill and return the bill amount. Pass in
any necessary data as input parameters.
• One function to display the bill output. Pass in any necessary data as input
parameters.
Use of global variables is NOT allowed. The functions must use parameters to pass required