Discussion 1

Resistance to change is a normal everyday aspect in the workplace.  Note what happens to the organizational climate when this resistance occurs and any tactics to reduce negative connotations when dealing with change.

Note: The first post should be made by Wednesday 11:59 p.m., EST. 

Need it in APA Format 

NO Plagiarism 

1 Page, Remember the APA cover page and the references 

cloud computing security and integrity

  

The research project will focus on research related to a cloud computing in financial industry ( capital one bank ) Pre-work on the project including the proposed Title and Outline should be emailed to the professor early for review and acceptance on Saturday afternoon.  The team should then begin to work on the project Saturday afternoon of the residency to be sure it can be completed during the Residency weekend. 

Hints :

Take capital one bank as a example case study.how they use aws to continue their business and what difficulties did they face etc…, how is their security with in cloud ?

Requirements for the research paper include… 

• Must be written in APA format and should be 20-25 pages long. 

• Contain at least 3-5 works cited (references)

• At least 2 of the works cited should be peer-reviewed articles ( not more than 5 years old)

• No Wikipedia citations

Web-Based Business Application

  

34) What JavaScript object and method is used to write HTML to the web page?

a. document.println()

b. document.writeln()

c. window.write()

d. window.print()

35) How many DOM nodes are created from the paragraph?

Feed the dog.

a. None

b. One for the p element

c. One for the p element and one for the paragraph text

d. One for the p element, one for the paragraph text, and one for the whitespace within the paragraph text

36) Which statement changes the Pinterest link to a YouTube link?




DOM example

 

 Pinterest
 

 

a. para.href = “https://www.youtube.com/”;

b. link.href = “https://www.youtube.com/”;

c. para.innerHTML = “https://www.youtube.com/”;

d. link.innerHTML = “https://www.youtube.com/”;

37) What is the preferred way to register an event handler that allows multiple handlers for the same event?

a. myButton.addEventListener(“click”, clickHandler);

b. myButton.onclick = clickHandler;

c.

d.

38) An event that occurs when someone enters their name in an input field is a(n) _____ event.

a. click

b. load

c. input

d. submit

39) On a given keypress event, the event object’s _____ property is used to access the object where the keypress event occurred.

a. event

b. click

c. target

d. element

40) The _____ is required to cancel the interval:

let timerId = setInterval(repeatMe, 1000);

a. clearInterval(repeatMe)

b. clearInterval(timerId)

c. stopInterval(timerId)

d. setTimeout(timerId)

41) What code would be used to call a function called repeat every 3 seconds?

a. setTimeout(repeat, 3)

b. setInterval(repeat, 3000);

c. setInterval(repeat, 3);

d. setTimeout(repeat, 3000)

42) How many times isshowMe()called when the following code is executed?

let timerId = setTimeout(showMe, 3000);
 

function showMe() {
 let div1 = document.getElementById(“div1”);
 div1.style.display = “block”;
 alert(“called”);
 let timerId = setTimeout(showMe, 3000);
}

a. indefinitely

b. 1

c. 2

d. 3

43) In the following JSON, the datatype associated with friends is _____.

{“friends”: [{ “name”:”Bobby”}, {“name”:”Celia”},{“name”:”Judy”}]}

a. string

b. object

c. array

d. char

44) How is the age field accessed after the following is executed:

let obj = JSON.parse(‘{“name”:”Bobby”, “age”:20}’);

a. this.age

b. age

c. obj.age

d. obj.name.age

45) What doesstringify()return?

JSON.stringify({“friends”: [{ “name”:”Bobby”}, {“name”:”Celia”},{“name”:”Judy”}]});

a. single string

b. string array

c. JSON object

d. undefined

46) A(n) _____ allows older browsers to function with newer features by providing missing functionality.

a. trifill

b. backfill

c. polyfill

d. altfill

47) A polyfill is engineered to:

a. Use JavaScript to implement a feature whenever possible

b. Replace HTML to implement a feature after checking if a feature exists

c. Use JavaScript to implement a feature after checking if a feature exists

d. Use Ajax to implement a feature whenever possible

48) The _____ website shows what features are supported by major browsers and frequency of use.

a. W3C

b. Tiobe

c. CanIUse

d. W3Schools

49) Which strings match the regex?

let words = [“dapper”, “paper”, “cat”, “flack”];
let re = /pa|ac/;

a. dapper, paper

b. paper, flack

c. flack, cat

d. dapper, flack

50) Which regular expression matches only the words burp, dirt, and right?

let randomWords = [“burp”, “try”, “dirt”, “right”];

a. let re = /[a-i]/

b. let re = /[e-i]/

c. let re = /[i-u]/

d. let re = /[r]/

51) Which string inwordNumsmatches the regex?

let wordNums = [“blahblah!!”, “yea”, “N()P3”, “H!”];
let re = /waS!/;

a. blahblah!!

b. yea

c. N()P3

d. H!

52) Which line of code instantiates Adele and the album 21?

function PlayList(artist, album) {
 this.artist = artist;
 this.album = album;
};

a. Adele.PlayList = (“Adele”, “21”);

b. Adele = new PlayList(“Adele”, “21”);

c. Adele new PlayList = (“Adele”, “21”);

d. Adele = PlayList (“Adele”, “21”);

53) Which line of code creates a prototype method for PlayList called showCollection?

function PlayList(artist, album) {
 this.artist = artist;
 this.album = album;
};

a. PlayList.prototype.showCollection = function() {
 console.log(“My playlist so far: ” + this.artist + ” : ” + this.album);
};

b. prototype.PlayList.showCollection = function() {
 console.log(“My playlist so far: ” + this.artist + ” : ” + this.album);
};

c. this.prototype.showCollection = function() {
 console.log(“My playlist so far: ” + this.artist + ” : ” + this.album);
};

d. PlayList.showCollection.prototype = function() {
 console.log(“My playlist so far: ” + this.artist + ” : ” + this.album);
};

54) In strict mode, _____ variables must be declared.

a. most

b. some

c. all

d. no

55) Which function is in strict mode?

a. function abc123() {
 “restrict”;
}

b. function abc123() {
 “use strict”;
}

c. function abc123() {
 “strict”;
}

d. function abc123() {
 “strict mode”;
}

56) http://www.google.com and https://www.google.com are _____.

a. different origins

b. the same

c. data sharers

d. web storage objects

57) Which line of code deletes all data fromlocalStorage?

a. localStorage.clear();

b. localStorage.delete();

c. localStorage.remove();

d. localStorage.clearAll();

58) What does this line of code do?

localStorage.removeItem(“name”);

a. Removes the “name” key and associated value from storage

b. Removes the “name” key from storage

c. Removes all values from storage

d. Deletes a local variable named “name”

Paper 3

  

APA format is required. References should be listed immediately after the question that is being answered. Each question lists a minimum number of unique scholarly references; the textbook is considered one unique reference (per question) regardless of how many times it is used. All references should be from the years 2010 to present day.

1. Give two examples of technologies that have had a big effect on globalization. Use at least three unique references. Length: 4-5 paragraphs. 

2. What are some of the advantages of globalization? Use at least three unique references. Length: 4-5 paragraphs.

3. What is a code of ethics? What is one advantage and one disadvantage of a code of ethics? Use at least three unique references. Length: 4-5 paragraphs.

4. Give an example of how NORA could be used to identify an individual. Use at least three unique references. Length: 4-5 paragraphs.

— 4 Pages 

For the final project, you will be conducting a forensics investigation using one of the following items: A smartphone A network (ideally, a wireless network)

 

For the final project, you will be conducting a forensics investigation using one of the following items:

  1. A smartphone
  2. A network (ideally, a wireless network)

 You may use either for your investigation. However, be aware of legal issues surrounding your data gathering. If you are using any system you do not personally control and have authority to investigate/discover, please get written permission from the owner/operator of the system or refrain from your forensics analysis of that systems and use a personal system. For a network, you can use your own personal home network. For a smartphone, consider using an image from the Internet or a personal device. There could be issues related to using a live, active, personal device (example: corruption of the device). If using a personal device, consider using an old, outdated phone, if available.

 You will review various forensics tools used with your selected system. Select a tool and use that tool to gather forensics data for analysis. You are simulating the process of gathering this data, so you do not need to investigate a compromised device or system. The project deliverables are as follows:

 Week 7 – Prepare an investigative report of the forensics data capture conducted using the tool selected for this purpose. The paper should provide the following information: 

  • Executive Summary of your investigation, including a description of the device or systems and the tool used for the forensics analysis
  • Step-by-step description you used to gather data for analysis
  • Report on the information that was obtainable from the device
  • Graphics evidence that you conducted the forensics data gathering and analysis

 The paper should be in a form that would be used for reporting to a court or a law enforcement agency. Be sure to provide graphics evidence of your forensics investigation effort (Screenshots, reports, etc.). References should be in APA format.

IT PROJECT

 Conduct Internet research and identify an established process improvement strategy. Explain the strategy and describe what you feel are its biggest strengths.(75words)

 Describe what you think are the two most important aspects of leading a successful IT project. Provide examples to justify your selections. (75words)