Eansy and own words in APA

       Answer the following questions in a short paper: 

Question 1: What functions and capabilities does project management software provide that you cannot do easily using other tools such as spreadsheet or database?

Question 2: Do a comparative analysis of MS Project and the three other software tools you researched.  This can be in the form of a MS Word table, showing a comparison of each in terms of specific features, pricing, etc.  Or you can write a brief synopsis of each.

Question 3: How can organizations justify investing in enterprise or portfolio project management software?

Do proper citation where required. add reference at end

Legal and Ethical Aspects of Cyber Operations

Introduction

The “Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations” (1) is one of the most comprehensive studies on the applicability of international law to cyberspace conflict, and thus cyber operations. In this study, multiple legal experts derived 154 rules from existing law. Several opinions on these rules were divided, so interpretation of the rules remains open for discussion.In this assignment, you will examine two of these rules, consider the ethical and legal aspects of these rules, and offer your perspective on each.The specific course learning outcome associated with this assignment is:

  • Review the legal and ethical aspects of cyber operations.

This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions.

Instructions

Write a 3- to 5-page paper in which you evaluate Rules 4 and 9.

Rule 4

Rule 4 states that, according to international law, a state must not conduct cyberspace operations that violate the sovereignty of another state. A large part of cyber operations includes performing the collection of detailed intelligence on another state. This reconnaissance and access is often done “without causing physical damage or loss in functionality” at the targeted state. (1)

  • Describe the laws and rules that govern sovereignty, citing specific, credible sources that support your assertions and conclusions.
  • Explain why a state would want to collect intelligence, why it might be required ethically, and whether cyber operations that collect detailed intelligence on another state violate its sovereignty. 
    • Provide a thorough, researched rationale for your perspective.
Rule 9

Rule 9 states that a state may exercise territorial jurisdiction over cyberspace infrastructure and persons engaged in cyberspace activities within its territory; cyberspace activities originating in, or completed within, its territory; or cyberspace activities having a substantial effect within its territory. A large part of cyber operations includes transmitting data—usually encrypted—which, because of network routing, may transit through the territorial cyberspace architecture of another state. (1)

  • Describe the laws and rules that govern territorial jurisdiction, citing specific, credible sources.
  • Explain whether cyber operations that collect detailed intelligence on another state may exercise jurisdiction over data that traverses its territory, citing specific, credible sources that support your assertions and conclusions. 
    • Provide a thorough, researched rationale for your perspective.
Source Citations and Writing
  • Support your main points, assertions, arguments, or conclusions with at least three specific and credible academic references synthesized into a coherent analysis of the evidence. 
    • Cite each source listed on your references page at least one time within your assignment.
    • For help with research, writing, and citation, access the library or review library guides.
  • Write clearly and concisely in a manner that is well-organized, grammatically correct, and free of spelling, typographical, formatting, and/or punctuation errors. 
    • Use section headers in your paper to clearly delineate your main topics.

Business cont plan and disaster recovery plan

 When law enforcement becomes involved, the need may arise to freeze systems as part of the evidence. There is also the likelihood that the incident will become known publicly. Do you think these issues play a significant part in the decision to involve law enforcement? Why or why not? Can you name some situations in which you believe that large organizations have decided not to involve law enforcement? 

Computer

 How might adding speaker notes to a presentation be helpful? What are some best practices for using speaker notes? 

Question

WEB230: JavaScript 1Final Project–To-DoList

This is a project. You are not allowed to discuss this project with anyone. It is to test your overall ability in JavaScript. You are allowed to research content on the internet, but you may not post questions, or use any code that you did not write. In this project, you will write code to create a Todolist. You are provided with HTML, CSS and a skeleton file. Look at the HTML and CSS file to get an understanding of how to select and manipulate your DOM elements. When researching online, you are allowed to look for guidelines. DO NOT copy and paste the code. That is considered cheating. NOTES• DO NOT modify the HTML or CSS files. Doing so will lose you marks.• Include a comment in the JavaScript file with your name, student number, and the date.• Follow best practices as discussed during the lecture.o Use camel-casing for variable names.o Remember to use letor constvariables.•Zip the folder containing the project files before submitting. Please submit in a zip format. Do not use any other archive formats (RAR, 7zip, tar, etc.).REQUIREMENTS For this final project, the to-do list must have:•When you create a new section, it should create a new divelement with a class named section, and idsectionwith a title. Example is provided in the index.htmlfile.oSection should have their own buttonto create their own items within’that section.•When clicking on the lielement, it should toggle the classstrikethrough, to signal that it isdone.oMake sure that this is done through event delegation on the ul element. (Remember to use tagName to identify for li).•Adding a new item should appropriately add the new item to that section.•Programmatically addyour own name as a pelement, and console logged your studentnumber onconsole.

WEB230: JavaScript 1PREVIEWBONUS•Have a button for each section that sorts the to-dolist alphabetically.(5 marks)•Have a button that removes all the finished to-do list items (those that are marked with a strikethrough).(5 marks) there’s the requirements

Create an ArrayList of strings and call it parks. Read in the names of national parks from the user until the user enters done (or DONE, or dOnE, .. ) Keep in mind, that the names of some national parks consist of more than one word, for example, Mesa V

 

  • Create an ArrayList of strings and call it parks.
  • Read in the names of national parks from the user until the user enters done (or DONE,
    or dOnE, .. )  Keep in mind, that the names of some national parks consist of more than one word, for example, Mesa Verde.
    As you read in the national parks, add them to the list.
  • Next, we are going to build a string based on the elements in the list parks. Since the text keeps changing as we add one park at a time, we use class StringBuilder for this task.  
  • Use a StringBuilder  called sb to create the string  nationalParks  .
  • Loop through all the elements of the list  parks and add them one at a time.
    The resulting string should have the following format:
    Favorite National Parks: {park1} | {park2} | . . . | {parkN}
    The parks are separated by a space, a vertical bar, and another space. However, there is no vertical bar after the last element. {park1}, {park2}, {parkN} are the various list elements with updated spelling.
  • Create a private method to update the spelling.
    We can’t control whether the user enters the park names in uppercase or lowercase letters. However, we can change the names to a spelling where all letters are lowercase except for the first letters of each individual word. In order to make those changes, create a private method called updateSpelling. It has the following method header:
    private static String updateSpelling(String text)
    E.g.: When you pass the string “MESA VERDE” the method returns “Mesa Verde”
    E.g.: When you pass  “yEllOwstOnE” it returns “Yellowstone”
    E.g.: Passing “black canyon of the gunnison” returns “Black Canyon Of The Gunnison”
    E.g.: Passing  “Denali” returns “Denali”