The elementary school for which

 The elementary school for which you are doing development work has asked you to create a program algorithm in pseudocode to store quiz grades for the students of a class. The program should have the following specifications:
 

The program should prompt the teacher to input a student number.
The quiz score for that student will be displayed.
The program can prompt for each quiz score, or the scores can be preloaded or hard-coded into the program.
Your solution must include an array.
 

Your solution must include the following 5 parts:
 

A problem analysis chart with sections for given information, required results, the processing required to obtain the results, and solution alternatives
A flowchart showing the program processing flow
A chart showing input, output, and processing
An algorithm in pseudocode describing the steps that the program will perform
A written description of how each of the 6 problem-solving steps was addressed

 

Problem- week 2- Monitoring the project

Choose a journal article related to project scope, monitoring, or control (do not re-use a journal from a prior course).   Write a 4-5 page review of your chosen journal article.  Please choose a peer reviewed journal, and an article that has been published in the past five (5) years.The review should contain the journal article title, author’s name and year of publication. Your paper should contain the following headings:

  •      Introduction
  •      Summary of the article
  •      Relevant points made by the author
  •      Critique of the article
  •      Application of the concepts in the article

You are going to review a single journal article, therefore your reference page should only contain the information from the article you reviewed.

Text

A Guide to the Project Management Body of Knowledge (PMBOK® Guide) – Seventh Edition and The Standard for Project Management (RUSSIAN) 

ISBN: 9781628257007 

Authors: Project Management Institute Project Management Institute 

Publisher: Project Management Institute 

Publication Date: 2021-08-01

Se943 week 1 A

Due: No Later Than Sunday this week.

Assignment Description

Please read chapter 2 of your  textbook and review lecture slides/ and library resource and reputable articles/journals and in your own word explain your understanding of the following Software Process Models:

A) The waterfall model and  its problems

B) Incremental development model AND Incremental development benefits AND Incremental development problems.

Risk and compliances

 As an IT analyst for Dominion Online, a company providing voting solutions to a global client base, you are working to convince the organization to move its infrastructure to a public cloud. With the growth the company is experiencing, and the internal data centers maxed out, you want to get the executives on board with moving to a public cloud rather than trying to expand the current infrastructure. Please respond to the following questions for Dominion Online1: Identify the Most Appropriate Guidelines for Managing Risks

2: Identify Potential Privacy Issues and Mitigation Measures

3:Create Risk Management Matrix to assess/analyze that risk and make recommendations for risk mitigation measures. Please use excel format to create Risk Management Matrix.

4: Please add references 

visual logic console

 

Directions: Use Visual Logic Console for all inputs and outputs.  If you are not familiar with Visual Logic, a flow chart can be used instead of a program to answer the questions that require Visual Logic.

Choose any 4 out of 5 Questions.

1. Write a Visual Logic program that calculates the following.    

a) The user enters an amount

b) The program calculates the interest at 5%. Write a procedure to calculate the interest earned and the total amount which includes the interest.

c) Write the output using format currency to display the interest earned and the total amount calculated in b).

Copy and paste the program and the output for credit and upload the program file.

2. Write a Visual Logic program where the user rolls two dice and the program displays the sum of them. Each dice contains numbers from 1-6.

a) Use random for the first dice. Display the first dice.

b) Use random for the second dice. Display the second dice.

c) Add them together as the sum.

Copy and paste the program and the output for credit and upload the program file.

If the highest subscript in an array is nine and the subscripts start at zero, what is the size of the array?

Think about arrays that they use in everyday life situations. What are the advantages of using these types of arrays? Are there any disadvantages?

5.       a) Write a Visual Logic program to declare and populate an array to hold five student test scores.  

           b) Write a Visual Logic program to calculate the student’s average for the test scores. Output the average test score.

Assignment 350 words 3 references

California Privacy Rights Act Assignment

On November 3, 2020, California’s Privacy Rights Act is on the ballot. As of the time this assignment is being written, we do not know whether it will pass or not. Please write a 350 words on what the Act contains, and if it passed the ballot or not. Please tell why it passed or did not pass.

Summary Report To Management That Describes Hardening Techniques

As a security administrator for Always Fresh, you have been instructed to ensure that Windows authentication, networking, and data access are hardened. This will help to provide a high level of security.

The following are issues to be addressed through hardening techniques:

Ø Previous attempts to protect user accounts have resulted in users writing long passwords down and placing them near their workstations. Users should not write down passwords or create passwords that attackers could easily guess, such as words founds in the dictionary.

Ø Every user, regardless of role, must have at least one unique user account. A user who operates in multiple roles may have multiple unique user accounts. Users should use the account for its intended role only.

Ø Anonymous users of the web server applications should only be able to access servers located in the demilitarized zone (DMZ). No anonymous web application users should be able to access any protected resources in the Always Fresh IT infrastructure.

Ø To protect servers from attack, each server should authenticate connections based on the source computer and user.

Tasks

Create a summary report to management that describes a hardening technique that addresses each issue listed above. Provide rationale for each selection.

Due to the Always Fresh expansion, management wants additional network controls to protect their growing network.