Cybersecurity Planning

A.) Do some research on Threat Response software. Find one particular software package to investigate.

What does the software do?

What are it’s major features?

What kind of training is required?

How much does the software cost?

Do not do the same software as everyone else. 

Write 200-300 of your own words and submit in a WORD document here.

————————————————————————————————————-

B.) Answer each these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.

1. Describe Digital Literacy (how to know what is real on the web). 

2. None of these people exist. What does this mean to you?

3. Why is Wikipedia more reliable than a paper encyclopedia?

4. How useful are crowd sources answers?

5. What are some drawbacks to crowd sourced answers?

6. Do people generally utilize the diversity of sources on the Internet effectively?

7. How reliant are we and how reliant should we be on getting our news from social media?

8. How do humans remain vigilant when we turn over authority to computers? Have you tried to navigate without gps?

9. If models are simplifications or reality, why do we rely on them?

10. Why was this model, used by Amazon for hiring, wrong?

11. Why did Skynet declare war on the human race?

Methodology of Software

1- Describe the components and quality which is necessary for the documents of software specification.

2- Define the blue print methodology.

3- What are the differences between verification and validation in software development, and the benefits of verification and validation in software development?

4- Explain the various types of models which used in software Engineering.

5- Explain the waterfall & agile model in detail.

CMIS 102 6383 Introduction to Problem Solving and Algorithm Design

 

This week you have been reading about African American English (AAE). There has been some controversy surrounding AAE. Some feel that AAE is just a sloppy version of standard English, while others feel that AAE is a legitimate dialect with its own rules and language regularities. If you were asked to explain AAE to someone who had no background in linguistics, how would you do it? Which side of the controversy do you support? Make sure to apply the relevant course concepts to support your opinion.

Provide your initial post by 11:59 pm on Sunday. Your initial post should be at least 200 words in length, excluding the discussion prompt and the references. Please use in-text APA citations within your post as well as full APA references at the end of your post.

Exp19_Excel_Ch12_ML2_Travel_Expense

 Exp19_Excel_Ch12_ML2_Travel_Expense 

 Exp19 Excel Ch12 ML2 Travel Expense 

 Excel Chapter 12 Mid-Level 2 – Travel Expense 

  

Project Description:

You are a financial analyst for VJD Financial, a wealth management company with 10 offices located across the United States. Currently your traveling account executives send receipts through inner office mail to document their travel expenses. You want to create a template to standardize the documentation process. To minimize the amount of development time required, you will download and edit an existing template from Office.com. You will customize the template by editing fields, adding comments, and creating a custom function using VBA.

     

Start Excel. Download and open   the file named Exp19_Excel_Ch12_ML2_HW_TravelExpense.xlsx.   Grader has automatically added your last name to the beginning of the   filename.

 

Select the range A1:J16 and   clear all data validation that was included in the worksheet.

 

Click cell B7 and type Mileage Rate

 

Click cell C7, click Align Left   in the Alignment group, and type .25.

 

Insert a column after column D.   Name the column Miles.

 

Use the VBA Editor to create a   custom function named Mileage. Type the following code to create the custom function.
 

Function   Mileage (Miles,Rate)
 

‘Creates   custom Mileage function
 

Mileage   = Miles * Rate

 

Exit the VBA Editor and click   cell F11. Type =IFERROR(Mileage(, click cell E11, type , and then click cell C7. Press F4, and type ), 0). Press ENTER to complete the   function. 

 

Click cell E10 and add the   comment Enter miles driven. 

 

Insert a new worksheet named Code.

 

Open the VBA Editor, open module   1, and copy the code. Paste the code in the Code worksheet starting in cell   A1.

 

Save and close EXP19_Excel_Ch12_ML2_HW_TravelExpense.xlsx.   Exit Excel. Submit the file as directed.

Homework

Use below topic as a reference, Explain the concept of information stores. Why is an understanding of how different clients store messaging information critical to the success of an email search?(300 words add References)

Reference topic:

Define several forms of metadata that can be useful to an investigation. How is it valuable to an investigator 

Discussion 8- Monitoring Project

  • Offer some insights, from researching the Internet, around the importance of client acceptance throughout the project.
  • If you were leading a project, and the project declines the final acceptance, what do you believe the team may have failed at?
  • Provide a few highlights that the course has offered you (you can pull from your practical connection assignment).

Text

A Guide to the Project Management Body of Knowledge (PMBOK® Guide) – Seventh Edition and The Standard for Project Management (RUSSIAN) 

ISBN: 9781628257007 

Authors: Project Management Institute Project Management Institute 

Publisher: Project Management Institute 

Publication Date: 2021-08-01

“Internet Security: From Stand-alone Computers to Web-based Systems”

  

For this writing assignment you will create a paper entitled, “Internet Security: From Stand-alone Computers to Web-based Systems”. The contents of the paper will be based on subjects covered in the textbook. The goal of creating this paper is for you to learn more in-depth information about various subjects covered in the textbook.

From each of the chapters 1 through 8 in the textbook pick one major section that is of interest to you. For each section that you selected, do the following:

Use the chapter number and the title of the section in the textbook as the title for that part in your paper, for example, “(Chapter 1) Client/Server Computing”. Then in 200 – 250 words, either confirm the information given in the section or add to the information in the section (or both). Find this material by using the references listed in the back of the textbook and by searching on the WWW. Your confirmation or addition of information should be based on primary sources rather than information from other textbooks or from magazine (i.e., web-zine) reviews. Do not use Wikipedia or other such websites as a reference. Also, do not copy/paste sentences from the textbook into your paper.

Your completed paper should follow APA format. The paper should consist of eight parts (one for each chapter) and contain a total of 1600 to 2000 words. 

Create your paper in a Microsoft Word document, and submit the Word file on the course website.