An archer hits a bull’s-eye with a probability of 0.09, and the results of different attempts can be taken to be independent of each other. If the archer shoots nine arrows, calculate the probability that: (a) Exactly two arrows score bull’s-eyes. (b) At least two arrows score bull’s-eyes. What is the expected number of bull’s-eyes scored?
Course Assignment (course – Bussiness Continuation Plan & Disaster Recovery Plan )
In continuation of your project work, discuss the significance of formulating adequate policies and procedures in your organization. Outline the impact of such policies and procedures in your business continuity planning policy. Also, describe the five-step process for building a proper policies for business continuity.
Reading – Chapters 14, 15, and 16 of the following text: Wallace, M., & Webber, L. (2018). The disaster recovery handbook: a step-by-step plan to ensure business continuity and protect vital operations, facilities, and assets. New York, NY: AMACOM. ISBN-13: 978-0814438763
ASAP
I need this done. only 2 questions and super quick
ms08-067 exploit using metasploit
Based on the vulnerabilities found via nmap, use Metasploit to compromise the Windows XP machine. Gain shell access and transfer a file of your choice from the target machine to your Kali machine. Also, perform a remote screen capture using Metasploit of the compromised machine. You will need to use an auxiliary module to do this. Finally, install the persistence Meterpreter service. Be sure to document each step you take with both screen shots and descriptions of the commands employed. Tip: In metasploit you can use “search” keyword to find the exact vulnerability and payload you want to use Tip 2: You can exploit any vulnerability on the WinXP machine, but MS08-067 works very well.
What to Submit: Provide a report of your work. For each task, give a complete description of your steps, include all commands used, the reason why each command was used, and screenshots of the steps employed during your attack using the Metasploit framework. Perform screen captures of both the Metasploit and target machine, show the commands used and results to prove that you have accomplished each of the following steps: PAGE 3 OF 3 [20 pts] Obtain shell access to the Windows XP machine using the Meterpreter payload and set all necessary Metasploit options correctly. [10 pts] Transfer a file of your choice from the target machine to your Kali machine. [10 pts] Perform a remote screen capture of the compromised machine using Metasploit. This can be done in various ways; one way is to using an auxiliary module. [20 pts] Install the persistence Meterpreter service on the Windows XP machine that will automatically connect back when the system boots. Reboot the Windows XP machine and show that it automatically connects back to the Kali machine.
Homework Assignment 3
Refer back to the dataset you selected for Homework Assignment 2 (Week 3) and address each of the following three questions. Each response should be 2-3 paragraphs with an explanation of all terms and reasons for your decisions.
- Identify a chart type that could be used to display different editorial perspectives of your dataset and explain why you felt it to be appropriate.
- Identify two other chart types that could show something about your subject matter, though maybe not confined to the data you are looking at. In other words, chart types that could incorporate data not already included in your selected dataset.
- Review the classifying chart families in Chapter 6 of your textbook. Select at least one chart type from each of the classifying chart families (CHRTS) that could portray different editorial perspectives about your subject. This may include additional data, not already included in your selected dataset.
How these courses are useful for work
1. Operational Excellence
2. Information Governance
3. Data Science and Big Data Analytics
4. InfoTech Import in Strat Plan
5. Emerging Threats and Countermeasures
6. Cloud Computing
7.InfoTech in a Global Economy
I want to some points for these will useful for my job duties
1. Azure Cloud storage
2. Dynamics CRM(Customer Relationship Management)
3. Developer
- JavaScript
- Angular JS
- JQuery
- HTML/ HTML5, CSS
- SharePoint
- SSIS & SSRS
There are several emerging concepts that are using Big Data and Blockchain Technology. Please search the internet and highlight 5 emerging concepts that are exploring the use of Blockchain and Big Data.
The Final Portfolio Project is a comprehensive assessment of what you have learned during this course.
There are several emerging concepts that are using Big Data and Blockchain Technology. Please search the internet and highlight 5 emerging concepts that are exploring the use of Blockchain and Big Data.
Conclude your paper with a detailed conclusion section.
The paper needs to be approximately 6-8 pages long, including both a title page and a references page (for a total of 8-10 pages). Be sure to use proper APA formatting and citations to avoid plagiarism.
Your paper should meet these requirements:
- Be approximately six to eight pages in length, not including the required cover page and reference page.
- Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
- Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
- Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.
Industrial Control System Cyber Security
The assignment is consists of completing the following:
- Complete the first part that introduces an ICS product and asks for technical information related to the product, its usage in real-world applications, vulnerabilities that may exist within the product, and how the exploitation of a vulnerability could impact the ability of the product to perform its intended purpose.
- Complete the second part that looks at the typical control systems that may be existing in a household and how, if any security considerations exist to protect these systems from unauthorized access.
NOTE: ALL WORKS NEEDS TO BE DONE ON .dox FILE ATTACHED BELOW.
What do I Know About Where I Live?
For this discussion, you are to use the following website: https://www.census.gov/acs/www/data/data-tables-and-tools/data-profiles/2017/ (Links to an external site.)
- On the landing page, type in the name of your state, and then the name of your city or place.
- Click on “Get Data Profile”.
- On the new page, you will see links to 4 sets of information on your area:
- Social
- Education
- Housing
- Demographic
- Choose any two variables you think might be related and find them by using the links to the related set. In the tables, locate the variables you chose to work with. For example, you could use the number of rooms (in a house) under Housing and household incomes and benefits under Economy.
- Find the values for each of your two variables for several years. For example, you might use the number of rooms and household income for the years 2012- 2017.
- Use Excel to make a scatterplot and to find the correlation coefficient. You should then have 6 points on the scatterplot, one for each year.
Share your scatterplot and correlation coefficient in your post and use them to address the following in your discussion post:
- Why did you think a relationship exists between the two variables you chose?
- Based on the Excel scatterplot and output
- State what type of relationship exists: Negative, positive, or none.
- Describe the relationship in words including what happens to one as the other changes. For example, as the number of rooms in a house increases, does the family income increase as well?
- Does the statistical information you obtained support or refute your alternative hypothesis that a relationship exists?
- How?
- If you did not find a relationship, why do you think that is?
- What is the value to knowing there is a correlation between the variables? For example, what businesses might flourish in a wealthy area?
- Would another variable better explain the relationship?
- How might the city use such information to make improvements? For example, if you found a relationship between crime and poverty would it make sense to make addressing poverty a priority?
- Can you conclude that one variable is causing the other? Why or why not?
OE W 3 D
Discussion: This week we focus on the knowledge management cycle noted in Figure 5.3 in the Information Technology and Organizational Learning text. Note the various aspects of knowledge management, continuous innovation, and competitive advantage and how they integrate with one another.
Include at least one reference in your answer to the question. Your reference(s) should be APA compliant.
Textbook : Information Technology and Organizational Learning