Discussion

 

There are TWO tasks that you would need to do( they are separate): 

Task 1 (Minimum 300 words): 

 Organizational theory –  ‘Discuss confrontation and negotiation’.  

– Minimum two references. 

TASK 2:

Write a reply to the two responses in the attached document ( Response 1 and Response 2) with 150 words for each. 

There should be no plagiarism. Attach a plagiarism report with 0 % similarity index

one page of answers

 

  1. Problem statement: what kind of problem is presented by the authors and why this problem is important?
  2. Approach & Design: briefly describe the approach designed by the authors
  3. Strengths and Weaknesses: list the strengths and weaknesses, in your opinion
  4. Evaluation: how did the authors evaluate the performance of the proposed scheme? What kind of workload was designed and used?
  5. Conclusion: by your own judgement.

Please use PyCharm CE

Please use PyCharm CE 

My daughter’s volleyball league would like a program that will accept the number of points that each team scored in a volleyball match and then display the game data along with the winner of the match.

For this program, we will assume that all 5 games will be played and there will be a winning team for each game. In order to win a game, the winning team must score at least 15 points and must win the game by at least 2 points. In the case that one team reaches 15 points and does not have a 2-point lead, then the teams keep playing until one team achieves a 2-point advantage.

The program should ask the user to enter the number of points that each team scored in each game. If an illegal entry is made, an error message should be displayed, and the user will be allowed to reenter the scores for that game.

After all the scores have been entered, a formatted table should be which includes the game number, team scores for each game, and winning team for each game.

Finally, the winner of the match will be displayed. The winner of the match is the team that wins at least 3 of the 5 games.

Discussion

 Search “scholar.google.com” for a company, school, or person that has been the target of a network or system intrusion? What information was targeted? Was the attack successful? If so, what changes were made to ensure that this vulnerability has been controlled? If not, what mechanisms were in place to protect against the intrusion.(250 words)
 

 

300 -400 words assignment

 

Select one type of cryptography or encryption and explain it in detail. Include the benefits as well as the limitations of this type of encryption. Your summary should be 2-3 paragraphs in length and uploaded as a TEXT DOCUMENT. Click the link above to submit your work. There is an EXAMPLE attached to show you the format requirements.

What is most important is that you use YOUR OWN WORDS to summarize the news article. It is essential that you do not copy text directly from the Internet. Plagiarism is unacceptable. You can easily avoid this by rephrasing the contents and summarizing it using your own words.

Be sure ti include your reference citation.

Discussion

 Explain in your own words why businesses must have an Internet and IoT marketing strategy 

 post must be between 250-300 words 

object oriented application

  1. Write an object oriented application at your own choice using either Java or Python. Please use at least two OOP principles(Encapsulation/Inheritance/Abstraction/Polymorphism) in your application.
  2. Write a short (<1 page) summary of the objected oriented principles used in your program. There will be 2 deliverables with this assignment
  3. Java/Python source file
  4. One-page summary

Question

Server System

in 250 words, describe the differences between a scan conducted using CIS (Center Internet Security) Benchmarks to one using Security Technical Implementation Guides (STIGs) Benchmarks as well as defensive measures that can protect information within the network.

 in 250 word summary to include (a) security measures applies to protect information systems and security controls that were applied to minimize systems risks, threats, and vulnerabilities (b) baseline countermeasures that should be in place, and (c) preventive controls needed to decrease the threat of unintentional errors or unauthorized access. In addition, provide screenshots as directed.