Deviant Act

 

For this assignment, you need to do the following:

  • Research a deviant act that was conducted in a public place.
  • Describe the act.
  • What were the reactions to the deviant act?
  • Analyze and discuss the act using the theoretical perspective(s) that you believe best explains the reactions to the deviant act.
  • Your paper should be a minimum of 3-5 pages in length.
  • Remember to submit an APA formatted reference page.

Submit your completed assignment using the instructions below. Please check the Course Calendar for specific due dates.

Save your assignment as a Microsoft Word document. (Mac users, please remember to append the “.docx” extension to the filename.) The name of the file should be your first initial and last name, followed by an underscore and the name of the assignment, and an underscore and the date. An example is shown below:

Jstudent_exampleproblem_101504

Support Queue Case Study

 Instructions

For this project, you will apply the CompTIA 6-Step Troubleshooting Process to explain how you would tackle Hudson Fisher Associates Help Desk Tickets. There are three groups of tickets, Level 1, Level 2, and Level 3. You will pick two tickets from each group.

As you prepare to analyze and hopefully solve these typical IT help desk tickets, keep in mind that for this course, it is more about the process and less about finding the “correct” answer. You may not always find an exact answer from the information given. The problems are structured to approximate what you will find in the workplace. Use a logical and repeatable process (e.g., the CompTIA 6-Step Troubleshooting Process) and eliminate the improbable as you work your way through each scenario.

CompTIA 6-Step Troubleshooting Process:

  1. Identify the problem.
  2. Establish a theory of probable cause.
  3. Evaluate the theory to determine the actual cause.
  4. Establish a plan of action to resolve the problem and implement the solution.
  5. Verify full system functionality and if applicable implement preventative measures.
  6. Document findings, actions, and outcomes.

How Will My Work Be Evaluated?

As you progress in your information technology and cybersecurity career, you may find yourself making presentations to customers, client audiences, and management. For this assignment, you should articulate your findings from the six support cases.

But the challenge you face is in expressing a technical solution to a nontechnical audience. Avoid jargon and acronyms. Find a way to relay your solution (and challenges) in language that your audience will find easily relatable.

Communicating in this manner will not always be easy. You may struggle to find the right analogy or metaphor. But if you can master the skill of summarizing your results and recommendations to management in an effective presentation, you will demonstrate how you use your technical knowledge to convey your ideas to others in a professional setting. You will also earn the respect and trust of your peers, your supervisor, and upper management as an effective communicator. You will be viewed as an employee ready for advancement.

The following evaluation criteria aligned to the competencies will be used to grade your assignment:

  • 1.1.1: Articulate the main idea and purpose of a communication.
  • 1.1.3: Present ideas in a clear, logical order appropriate to the task.
  • 1.3.3: Integrate appropriate credible sources to illustrate and validate ideas.
  • 2.1.1: Identify the issue or problem under consideration.
  • 2.3.1: State conclusions or solutions clearly and precisely.
  • 12.7.2: Explain the process of analyzing IT incidents.
  • 13.1.1: Create documentation appropriate to the stakeholder.

Your deliverable for the project is an annotated PowerPoint Presentation covering the following:

  • List of the six tickets you selected (two each from Level 1, Level 2, and Level 3)
  • One to two slides for each ticket, in which you:
    • State the problem.
    • Describe the steps taken to troubleshoot/analyze the problem.
    • Propose a brief resolution.
  • One summary slide: What did you find challenging or interesting about one or two of the support cases (opinion-based)?
  • One reference slide (two to six IEEE references). Include references for materials you consulted in TestOut or on the internet.

If you haven’t already done it last week, download the Support Queue Case Study Presentation Template to get started.

Delete the instructional text from the template before you submit.  

Homework Computer Science

 Remember to review the syllabus expectations for initial discussion posts and peer replies! 

Discuss the following questions: 

1. Discuss Blockchain’s potential application in compensation systems (base wages, incentives, rewards). 

2. How can a token economy affect employee compensation? 

3. Based on your readings, do worldwide executives believe Blockchain has the potential to radical change the future of organizations?  

You are required to cite this week’s assigned readings in your paper. You may also cite prior week’s reading assignments and external sources if you wish.
Use the following headings to organize your paper: Introduction, Question 1, Question 2, Question 3, Conclusion, References.Submit your paper as a Word attachment in the discussion forum. I provide feedback within the paper and will not grade your post unless you submit it as an attachment. Your response to the discussion prompt should contain a minimum of 2 pages and it should be submitted no later than Wednesday before 11:59 pm EST. 

Writing Requirements for All Assignments:

  • References MUST be cited within your paper in APA format. Your reference page and in-text citations must match 100%. Papers without in-text citations will earn failing grades.
  • Always include a cover page and reference page with all submissions
  • Your paper must have headings in it. For discussion posts Introduction, Prompt/Question, and Conclusion will suffice as headings.  
  • Provide the EXACT web link for all online sources – do not provide just the home page, but the EXACT LINK – I check all sources
  • No abbreviations, no contractions – write formally
  • Write in the third person formal voice (no first or second person pronouns)
  • Write MORE than the minimum requirement of the word count assigned
  • As always, the word count is ONLY for the BODY of the paper – the cover page, reference page, and / or Appendix (if included) do not count towards the word count for the paper
  • Indent the first line of each new paragraph five spaces
  • Refer to the example APA paper in the getting started folder under the content tab if you need an example. Also, a power is provided under the information tab that addresses APA format.
  • Use double-spacing / zero point line spacing, a running header, page numbers, and left justify the margins.

Use these References in the Answer Reference—– 

 

1. Zielinski, D. (2018, March 18). Is HR ready for Blockchain? HR Magazine, 63(2), 62-63.

2. Kang, S. & Park, K. C. (2019, May). On the effectiveness of multi-token economies. 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC) Blockchain and Cryptocurrency (ICBC). 180-184.

From the Internet: Use the Link to Access the Article.  Note that when you hit the link for this required reading it will take you a web page and you will need to click on Explore Full Report to see the full reading assignment. This option is located on the bottom left hand part of the screen. Please read the full report.

3. Pawczuk, L., Massey, R., & Holdowsky, J. (2019). Deloitte’s 2019 global Blockchain survey: Blockchain gets down to business. Deloitte Insights. Retrieved September 5, 2019 from https://www2.deloitte.com/us/en/insights/topics/understanding-blockchain-potential/global-blockchain-survey.html?id=us:2ps:3bi:confidence:eng:cons:32019:nonem:na:pgYdRMoB:1141606406:77378219758056:bb:Blockchain:Blockchain_Survey_BMM:nb

programing in java

 Hello..

Hope you are having a great day, I have a problem and I need your help to solve it, So I have a Program and I took the code from a friend, it has some errors I want you to fix it, I’ll attach it below, also I want to change every or most of the methods,

first thing I care about is the output then the big O of the program. 

If you find a for loop change it to a nested for loop or change it to a recursion. 

I need it after 12-15 hours max 

Time is essential  

Thank you for your time. 50~80$ 

WRITING

 

Option A – Assume that you are the senior security analyst in your company and you have a new CIO who is just starting on the job next week. The CEO has asked you to provide a brief summary (several paragraphs) of the current state of the company’s security posture as a summary for the new CIO. Be sure to identify both positive and negative aspects. [This is a writing exercise and you can either use ‘real’ information from your current or past employer (don’t use the company name or disclose any proprietary or confidential information), or you can create your own assumptions about a fictitious company.]

Review and Reflect of Business Intelligence Course

 

Review and reflect on the knowledge you have gained from this course. Based on your review and reflection, write at least 3 paragraphs on the following:

  • What were the most compelling topics learned in this course?
  • How did participating in discussions help your understanding of the subject matter? Is anything still unclear that could be clarified?
  • What approaches could have yielded additional valuable information?
  • The main post should include at least 1 reference to research sources, and all sources should be cited using APA format.

Capture the Flag (CTF) Write-Up

  

Project Scenario

Your manager is putting together teams for a CTF competition coming up in a few months with some of the largest companies. Centralia Technology wants its own teams to compete with the best in the country. 

As a Security Operations Center (SOC) Analyst Blue Teamer at Centralia Technology, you have been asked to submit a survey to your manager of an individual CTF activity.

The CTF activities are designed to create a collaborative team learning environment. Your manager wants everyone to participate in a simulated CTF event individually. Following that, you will be placed into a team so that you and your team members can combine your skill sets to analyze and solve challenges.

Section II: Strategies Employed

Explain how you approached two of the 10 CTF challenges you attempted and solved. For example, what techniques, tools, websites, or other resources did you use?

Section III: Lessons Learned 

· What are your strengths/How would your skills benefit a CTF team? 

· Which challenge banks did you find easy?

· What areas do you need more practice in? 

· Which challenge banks did you struggle with or avoid? 

· Were there challenges you attempted but did not complete or challenges that you did not attempt?

· How can you improve your skills in that area (strategies, tools, websites, etc.)?

network security layers

A next-generation firewall (NGFW) is a device that offers additional capabilities beyond traditional firewall functionality. Traditional firewalls may offer stateful packet inspection while a NGFW may provide integrated IDS/IPS functionality, for example.

The ability of a single device to perform multiple functions can be cost effective and may not require additional in-house expertise to support the technology. A drawback of using an NGFW is that it could become a single point of failure.

Assume you are in charge of deciding which types of firewalls to acquire and implement for an organization.

Answer the following question(s):

Would you choose an NGFW for a small business? Why or why not?

Would you choose an NGFW for a large organization? Why or why not?

Advanced Database Discussion

 This discussion forum focus on the many dimensions of building a properly functioning database system that meets customer demands. Discuss some of the constraints that must be overcome in order to build a successful implementation of a database system. 

Initial Discussion – 400 words 

4 Responses – Each response 200 words.