Assignment 3 (Building APPS) – Business proposal with 3 – 5 peer-review references

 Using the industry where you currently work or have worked before, write a 4 to 5 page business proposal recommending your choice between Android or iOS. From a user and developer’s perspective, which would you recommend to your company and why?Your assignment must follow these formatting requirements:

  • Please provide 3 – 5 peer-review references to substantiate your viewpoint. Note: Wikipedia and similar Websites do not qualify as quality resources.
  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment.

Discussion Questions 4-5 sentences

 Review your storyboard before beginning this thread. For this  discussion, define what elements you would control with CSS and why. Are  there instances where you would need to use more than one style sheet  for a site? Explain how you might use multiple style sheets or various  kinds of styles (inline, embedded, external). 

Please answer the following

At UC, it is a priority that students are provided with strong educational programs and courses that allow them to be servant-leaders in their disciplines and communities, linking research with practice and knowledge with ethical decision-making. This assignment is a written assignment where students will demonstrate how this course research has connected and put into practice within their own career. Assignment: Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. Requirements: Provide a 500 word (or 2 pages double spaced) minimum reflection. Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited. Share a personal connection that identifies specific knowledge and theories from this course. Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 

Employed as software developer

2 Sets of Customer Service Questions

Save each chapter 5 and 6 questions separately in a word document

Chapter 5

1. List three characteristics skilled professionals must display when facing difficult

customer situations.

2. What is empathy?

3. What are four preparatory steps you can take prior to each customer interaction in

order to get focused?

4. Why is it important to let an angry customer vent?

5. How do customers want their incidents and complaints to be handled?

6. What do you need to do if you are a predominantly left-brained service provider?

7. What do you need to do if you are a predominantly right-brained service provider??

8. List four techniques a person can use to stay calm when facing a difficult situation.

9. What physical benefits do you derive from taking a deep breath when under

pressure?

10. What is positive imagery?

————————————————————

Chapter 6

1. Define the term root cause.

2. Explain the relationship that exists between processes and procedures.

3. A(n) __________ is a sign or an indication that an incident has occurred.

4. List two types of data you must gather before you can begin diagnosing an incident.

5. What are two ways that a short incident description is used?

6. List three benefits that are derived by asking questions.

7. Why is incident management referred to as a “closed loop process”?

8. When can incident notification occur?

9. What are the goals of customer notification?

10. What does an Ishikawa diagram display?

The Cybersecurity Analyst's Toolbox

During job interviews, employers often ask if you are familiar with cybersecurity software. For this reason, it is a good idea to become familiar with commonly used software, including capabilities and limitations. These software products are the tools for conducting your day-to-day duties.

For the first six weeks of this course, you have been exposed to many different tools that an analyst should become familiar with: analyst tools, exploitation tools, and forensics tools. Provide a response in which you:

1. Describe a lab or a software tool that you used that has helped you to better understand the role of an analyst within an organization, such as:

  • Kali
  • Metasploit
  • Nessus
  • Nmap
  • Process Explorer
  • Splunk
  • Wireshark
  • Any other tool used in the course

2. Describe the process to install, set up, and configure the tool you selected above. Did you find the tool easy to use? Did you encounter challenges?

3. Highlight some of the benefits of the tool you selected above. Provide some examples of where you think using the tool would benefit you as a cybersecurity threat analyst. Why do you think the tool would be best?

Report #1 Computer System

  PFA

Your report should have the following layout:

  • Cover Page (with report # (1),      Report Title, your class (CSCI 6643 – Section 1, your name)
  • Table of contents
  • Introduction (explain what is this      report about, why do we care about it,…)
  • Literature review (topic, the sources      you used to research each topic, ….)
  • Description (the body of research      outcome, one section for each topic with a title and subsections 
  • Conclusion 
  • References (list of resources you      found your information from, numbered, (refer to these sources in your report by enclosing the number      associated with it in [ ] after it is used ) 

Java : Question: Pleased write a program that allows your computer program play the rock-paper-scissors-lizard-spock game against itself. Refer to http://en.wikipedia.org/wiki/Rock-paper-scissors-lizard-Spock for more information.

 

Question: Pleased write a program that allows your  computer program play the rock-paper-scissors-lizard-spock game against  itself. Refer to  http://en.wikipedia.org/wiki/Rock-paper-scissors-lizard-Spock for more  information. 

In  this problem, the program simulates two players who play against each  other. The play continues until one of the computer-generated players  wins 4 times. Solve the problem using a class called  “RockPaperScissorLizardSpock”. Feel free to use as many other classes as  needed to make proper use of OOP design.

The  program should use multiple threads to simulate “simultaneous play”,  just as in the real game itself. Use multi-threading / concurrency  techniques to simulate the actual game’s simultaneous play method where  both players throw their hand at the same time for each iteration of the  game and then determine who wins this play.

In  this game, in every iteration, two random integers are generated in the  range of [1 to 5] – 1 refers to Rock. 2 refers to Paper. 3 refers to  Scissors. 4 refers to Lizard. 5 refers to Spock. 

For  example, if the computer randomly generates integers 2 and 5 in the  first iteration, 2 is for the first player and 5 is for the second  player. 2 refers to Paper and 5 refers to Spock. Based on Rule 8 in the  following 10 rules, Paper (2) disproves Spock (5), so player 1 wins. 

Likewise,  continue the iterations until one player wins 4 times. All other  outcomes such as the “Spock vs. Spock” would be considered a draw. Also,  ensure that the play ends after a certain number of iterations. Use  custom Exceptions with try/catch and not accept any system error  message. 

rule 1: Scissor cut paper

rule 2: Paper covers rock

rule 3: Rock crushes lizard

rule 4: Lizard poisons Spock

rule 5: Spock smashes (or melts) scissor

rule 6: Scissor decapitate lizard

rule 7: Lizard eats paper

rule 8: Paper disproves Spock

rule 9: Spock vaporizes rock

rule 10: Rock breaks scissors

Application security – Discussion

Assume you are a security awareness trainer. Part of your job is to convince end users that paying attention to security procedures makes the entire organization more successful.

Answer the following question(s):

  1. When a user does not follow security procedures, what are two consequences to the organization you would emphasize? Why?

Fully address the question(s) in this discussion; provide valid rationale for your choices, where applicable; and respond to at least two other students’ views.

Requirements:

  • Sources: 2 References to Support your answer
  • Citation Style: APA format
  • Length: 2 – 3 para graphs
  • Engagement: Respond to two other students’ views
  • Posting Days: Initial Post due Thursdays of the week. Replies due by Sundays.

Project 6 Description

     

Project 6 Description

 In this module, you will find two files:
Teams.txt – this file contains a list of several Major League baseball teams in alphabetical order.  Each team listed in the file has won the World Series at least once.
WorldSeriesWinners.txt – this file contains a chronological list of the World Series winning teams from 1903 – 2012.  The first line in the file is the nae of the team that won in 1903 and the last line is the name of the team that won in 2012.  Note that the World Series was not played in 1904 or 1994.
Create an application that displays the contents of the Teams.txt file in a ListBox control.  When the user selects a team in the ListBox, the application should display the number of times that team has won the World Series in the time period from 1903 to 2012.
Tip:  Read the contents of the WorldSeriesWinners.txt file into a List or an array.  When the user selects a team, an algorithm should step through the list or array counting the number of times the selected team appears.

To Do:
1.  Zip your entire project together.   Upload your .zip file into the dropbox.
2.  Check the Calendar for the due date.
3.  Check the rubrics to see how your project will be graded.