Final paper

Topic: Compliance: Law and Ethics

 

Content for the paper should have the following at a minimum:

  1. Introduction to the topic
  2. A description of the each area of the topic
  3. How each area provides security for an organization
  4. What are the tools and methods used for each area
  5. What are the challenges in providing security and describe problems that can occur in each area
  6. A conclusion summarizing what you wrote

 

  • Assignment Format: APA format
  • Submission Format: MS Word
  • Length: 11 pages (not including cover & references pages)
  • Citations Required: minimum 10 citations (At least 3 Scholarly and 7 from other reliable sources)

Blockchain in supply chain management retail

Using Blockchain technology to Evaluate strategies and risks for cost reduction geologically in Supply chain management.

Deadline: April 6 time 10 PM EST

APA format
No Plagiarism

2000 to 2500 words minimum

In Paper: abstract, introduction, methods, results, discussion, and references

Methodology: Qualitative

Security Plan

 

you will fill in sections 1-12 of the Cyber Security Plan template download.  Please rename the file to “Security Plan – student name” before submitting it.

In Section 1 you will identify 3 systems you believe that South Balance would have in place.  If you are not familiar with systems companies might use, do some quick research.  This does not need to be detailed.  I would be surprised if all of you did not have “email system” as one of them as nearly all companies today have this.

In Sections 2-12 you will fill out information about the 3 systems you chose. If doing this for a real company there should be documentation to help you fill this in. However, since we don’t have that to fall back on, use some quick research and your imagination. Have fun with it but give me information that fits and is credible for the section.

Look at the rubric: original but credible will get you more points.

 

Security Plan Rubric Sections 1-12
Security Plan Rubric Sections 1-12CriteriaRatingsPts

This criterion is linked to a Learning Out come Section 

Completeness Are all sections completed?
25 pts Full Marks

25 pts
This criterion is linked to a Learning Outcome

Credibility Are the systems and information listed credible in nature?
25 pts Full Marks

25 pts
This criterion is linked to a Learning Outcome

Description quality In the description sections, are the descriptions quality in nature? Do they truly answer the sections requirements or are they minimal to complete the section?
25 pts Full Marks

25 pts
This criterion is linked to a Learning Outcome

Originality Did the student show initiative and originality in picking the 3 systems and providing the system owners and descriptions?
25 pts Full Marks

0 pts No Marks
25 pts
Total Points: 100

Embedded Systems

   

Embedded Systems
Tools and Models – Lab 2
Completion Date: 14
 of December 2018
Value: 12 marks
Q1.
Explain briefly how the code here
https://balau82.wordpress.com/2010/11/30/emulating-arm-pl011-serial-
ports/ uses the pl101 DR and FR registers to transmit and receive data over the associated UART peripheral of the Versatilepb board.
Q2
Give a brief overview of the clang generated Abstract Syntax Tree (AST) for the
while loop of the attached t2.c file. The attached t2.ast file from line 25 to line 53
shows a dump of the WhileStmt node and its children which corresponds to the
while loop. The t2.ast file was generated using:
clang-check -ast-dump t2.c –extra-arg=”-fno-color-diagnostics” >t2.ast
Clang/LLVM is a framework for the compilation and analysis of source code
written is several different programming languages. Clang provides many tools for the manipulation of its ASTs. See the video linked in this tutorial for details https://jonasdevlieghere.com/understanding-the-clang-ast/.
In this case we use clang to generate an AST for a given simple c function fred().
We use the -ast-dump command line argument to generate a textual
representation of the AST, which is stored in the file t2.ast. Each node in the AST
models a particular language construct. For example, the VarDecl class models a c declaration of a variable.
For instance, the c statement in the file t1.c:
int i,j=0;
is modeled in the AST as two VarDecl nodes and one IntegerLiteral node which
are in the t2.ast from line 15 to line 18:
-VarDecl 0x1c08820 col:5 used i ‘int’
-VarDecl 0x1c08890 col:7 used j ‘int’ cinit
 -IntegerLiteral 0x1c088f0 ‘int’ 0
If a c variable is used in an expression in t2.c, the AST will have a corresponding
DeclRefExpr node to model that use.
For example, the c statement:
j = 0;
will be modeled using the following AST nodes (dumped using the -ast-dump flag
to the compiler):
BinaryOperator 0x1c089f8 ‘int’ ‘=’
 | |-DeclRefExpr 0x1c089b0 ‘int’ lvalue Var 0x1c08890 ‘j’ ‘int’
 | `-IntegerLiteral 0x1c089d8 ‘int’ 0
Q3
The attached code (testbench.c and peak.c) is a testbench and a state machine
implementation of the peak constraint
http://sofdem.github.io/gccat/gccat/Cpeak.html. You are to write a c function
which implements the “valley” constraint and a second c function which
implements the “increasing peak” constraint. You are to update the testbench to
test these new constraints. A constraint is just a form of if statement. The valley
and increasing peak constraints are defined here:
http://sofdem.github.io/gccat/gccat/Cvalley.html
http://sofdem.github.io/gccat/gccat/Cincreasing_peak.html.
The valley constraint is a simple state machine, which is practically identical to
the peak constraint. An implementation of the peak constraint state machine is
given in peak.c. See figure 5.417.3 below for the valley constraint state machine.
The scope of this lab is the design of a hardware accelerator for detecting
anomalies in time series data. These anomalies are defined by the user in terms
of constraints which can be used to detect combinations of spikes and/or troughs
with particular characteristics. Such accelerators could be deployed for example

into a nuclear power facility to quickly detect fluctuations in the sensor readings
from the instrumentation control systems of the plant.
http://www.mcobject.com/radico,
https://www.iaea.org/NuclearPower/IandC/index.html
The different constraints can be combined to form more complex filters. See for
example here
https://www.doulos.com/knowhow/systemc/tutorial/modules_and_processes/
where a systemc model of an EXOR gate is implemented using four NAND gates.
The code (testbench.c and peak.c) is a high level data flow model/design that
can be synthesised directly onto a FPGA using for example vivado HLS.
https://www.xilinx.com/video/hardware/getting-started-vivado-high-levelsynthesis.html

 

Exp19_Word_Ch04_Cap_College

 Word Chapter 4 Capstone – Funding College 

Exp19_Word_Ch04_Cap_College

Exp19 Word Ch04 Cap College

  

Project Description:

Funding a college education can be an expensive and daunting task for parents. Being a recent college graduate provides you with first-hand experience on how to finance a 4-year education. Upon graduation, you and a fellow student created a consulting business to educate parents on college funding and help them maneuver the maze of scholarships and federal funding. To get things started, your business partner has written a draft of the comprehensive guide to college funding and is ready for you to review it. In this project, you will format the paper to enhance readability. You will use track changes, accepting and rejecting them as necessary, credit sources used in the preparation of the report, address your partner’s comments, and include a cover page, a table of contents, page number, and an index.

     

Start Word. Download and open the file named Exp19_Word_Ch04_Cap_College.docx. Grader has automatically added   your last name to the beginning of the filename. 

 

Apply the following   formatting to the whole document:
  • Document is double-spaced.
  • The font is Times New Roman 12 pt.
  • There is no paragraph spacing before or after any paragraph.
  • Margins are 1” at the top, bottom, left, and right.
  • Alignment is left.

 

In the first   paragraph on the first page, reject the addition of the words 2- or both times in the same sentence.   Reject the Click here for more and   the deleted M change in the FAFSA section. Accept all   other tracked changes in the document and stop tracking.

 

Review all three   comments about heading formatting and change all headings to the correct   heading styles as per the comments left by your business partner. Reply to   these comments by typing I have made the style replacement. (include the period)   and mark them as Resolved.

 

Select the APA Sixth   Edition style. Click before the period ending in the sentence More information on how to complete the   FAFSA is available online. Insert the following website citation:
 

  Name of Web Page: How to Complete the FAFSA
  Name of Web Site: Collegeboard
  Year: 2018
  Month: May
  Day: 03
  URL: http://bigfuture.college.gov/financial-aid-101/how-to-complete-the-fafsa

 

Click before the   period ending the first sentence grants   and scholarships, federal loans, and work-study on page 1 in the FAFSA   section. Insert the following Web site citation:
 

  Name of Web Page: FAFSA
  Name of Web Site: fafsa
  Year: 2018
  Month: May
  Day: 3
  URL: http://www.fafsa.edu.gov

 

Insert a footnote on   page 2 before the period in the sentence ending for the academic year of 2017-2018: The amount of Pell Grant award   changes every year. For more information, please consult the Department of   Education. (include   the period.) Change the number format for footnotes to a, b, c in the   Footnotes dialog box. (Click Apply, not Insert.)

 

At the bottom of the   last page, delete the last comment. Insert a blank page and insert a Works Cited bibliography. Change the   title to References. The bibliography should be double-spaced   with no paragraph spacing before or after. 

 

Format the   bibliography with a font of Times New Roman and a font size of 12 pt. Center   the References title. All text in   the bibliography should be Black, Text 1 font color. Ensure that no text is   bold.

 

Insert the Retrospect   cover page. Change the author name to your own name and delete any   placeholders that you are not using. Address the first comment and then   delete the comment and the title.

 

Create a table of   contents, with an Automatic Table 1 style, on a new page positioned between   the cover page and the current page 2. Note: Mac users, create a Classic   style table of contents.

 

Insert a footer with   a centered page number, using Plain Number 2 format. Note: Mac users, move   the insertion point to the center position in the footer, then insert the   default page number. Do not display the page number footer on the first page.   Numbering begins with page 1 on the Table of Contents page.

 

Mark the following   words as index entries, selecting Mark All for each: scholarship, Grant, and   FAFSA. Select the first occurrence   of college in the Introduction and   set a cross-reference as See university. Do not mark entries in the   bibliography.
 

  Note, please be sure to search your document to ensure that all occurrences   are marked as specified; press CTRL+F and use the Navigation Pane to locate   each one. Do not mark instances that vary from those specified, for example,   do not mark “scholarships”, “grant”, etc. 

 

Add an index on a   blank page at the end of the document. Use Classic format and accept all   other default settings.

 

Save and close Exp19_Word_Ch04_Cap_College.docx. Exit   Word. Submit the file as directed.

Prompt Thus far in our class we have read and discussed a wide variety of arguments for specific foreign policies beginning with the early Republic though the start of the Second World War. Doing so has allowed us to see how certain ideas, arguments, and

 

Prompt

Thus far in our class we have read and discussed a wide variety of arguments for specific foreign policies beginning with the early Republic though the start of the Second World War. Doing so has allowed us to see how certain ideas, arguments, and themes have changed in response to new threats and opportunities. Although all of these arguments were made prior to the advent of modern game theory, they all nevertheless employ implicit or explicit strategic logic. Indeed, given our readings in the intellectual development of US foreign policy, it is clear that the earliest statesman of the United States understood the role of strategy and advocated for policies which they believed were in the best interests of America’s strategic place in the world.

In this essay, you are to select 4 selections from previous readings and analyze their strategic logic. You can choose any selections that we have read thus from Ideas and American Foreign Policy. Possible questions to consider include (but are not limited to):

  1. Do the early policy-makers advocate for positions which make strategic sense? Why or why not?
  2. Are there lessons from the early history of American foreign policy which can be applied today?
  3. Why do several others seem to point to the same principle but reach different conclusions? Is it because some misunderstood or were misrepresenting the principle, or because the application of the principle changed according to different fact-patterns in the changing landscape of international politics?
  4. Is America safer with a foreign policy of engagement with the world or with a turning away toward insular concerns?

Guidelines

Your paper should follow the standard 5 paragraph essay, with one paragraph for an introduction, one for a conclusion and three well-written paragraphs which defend or otherwise advance your thesis. If necessary, you may include an additional 2 paragraphs for a total of 7 paragraphs. Your paper should therefore be about 1000-1400 words.

Your paper must have a clearly defended thesis. You must also rely only on the texts to justify your position. Outside citations are not permitted: this is not a research paper but a sustained reflection on the course to this point.

You be graded on the quality of your thesis, evidence, logic, formatting, and spelling/grammar.

The best papers will, in addition to a clearly articulated and defended thesis, format their papers in line with the Chicago Manual of Style. Papers should use 1″ margins on all sides, use 12pt Times New Roman Font, and double spaced text. Include a formatted title page. For additional information on these guidelines, see the formatting handout given in class. (If you were not in class, you should consult Kate Turabian, A Manual for Writers, Eighth Edition[Chicago Press].).

ITSD427U1IP

 

Assignment Description

For this assignment, complete the following steps:

  1. Write a research paper of 4-5 pages (cover and references pages not included in page count) that details the design and layout characteristics of Android phone applications.
  2. Specifically describe the design process for an Android phone application.
    • Include a discussion of the role of Extensible Markup Language (XML) in the design process and how XML is used in the Android application files.
  3. Discuss the best practices and also the problems and solutions regarding design, layout, performance, compatibility, and security.
  4. Explain the difference between a light and a heavy layout and how they both relate to overall performance

 UNIT2

Assignment Description

Note: Prior to developing your project, please make sure you have downloaded and installed the Android Studio IDE and the Android Development Tools (ADT) according to the instructions found by clicking here.Assignment DetailsYou have been hired to create a mobile application for Healthy Life, a local organic bakery and grocery store. The owners want to offer a mobile application to customers that features recipes that contain ingredients that they sell in their store. Over the next few weeks, you will be developing, testing, and dep 

Corporate IT Security Audit Compliance

 

  • Read the Article:   Upcoming Compliance and Governance Events. (2014). Compliance Week, 11(126), 70-71
    (this Article is located in the EBSCO Host of the University of the Potomac Library)
  • Write a summary analysis and discuss the relevance of each of these events to the educational, ethical and opportunities provided for growth in compliance. 

Writing Requirements

  • 3-4 pages in length  (excluding cover page, abstract, and reference list)
  • APA 6th edition, Use the APA template located in the Student Resource Center to complete the assignment.
  • Please use the Case Study Guide as a reference point for writing your case study.