Write a Terraform script to deploy an Azure infrastructure.
Discussion question, 350 words and 2 references.
Pease list in order of your preference the five top areas in which you think computer-based laws should be passed or strengthened by legislatures, and a brief description of why you chose this law and its ranking.
Note: Student lists in order 5 laws which should be passed or strengthened
CGS
Can I post my hw about Access Modules? I would have to provide my account inf. Is that allowed?
Project
need help with project #3
Sporting Goods Project Plan
Overview:
For this assignment, write a two-page project plan for Sporting Goods. For example, if choosing the creation of a website for a company, some of the tasks involved in Sporting Goods might be the hiring of a web designer and programmer, interviews with users to ascertain their requirements, the creation of a home page, etc.
Instructions:
Include in the Sporting Good plan the start date of each task, the estimated end dates, the resources assigned to each task (that is, the people, equipment, supplies, etc. needed for each task), the cost associated with each task, and the order of the tasks that are specific to your project. Also, include how the tasks are related to each other, that is, which tasks must be completed before other tasks can begin. Also, milestones should be included. Examples of milestones might be: “completion of phase one,” “hiring of all project employees completed,” and “entire project completed.”
Requirements:
• The plan should be 2 pages in length, with additional cover and reference pages.
• The summary should be double-spaced, written in 12-point Times New Roman font, and use a 1-inch margin.
• Use at least two (2) scholarly sources and include all references and citations properly formatted in APA.
• Use complete sentences and appropriate grammar and spelling.
Signature Assignment: Choosing a Methodology
Create a simplified project plan such as the examples listed in the “Tips” section below. Include, at least, the following criteria:
- Name of task
- Duration
- Predecessors (What is the last task that needs to be completed before you start on this task? That is its “predecessor.”)
- Notes
Explanation
1) APA FORMAT,
2) NO PLAGARISM
3) NEED PLAGARISM REPORT
4) INTEXT CITATION
5) QUESTIONS AND REQUIREMENT ARE ATTACHED
week 1 research
Select a major organization that was located with a major natural disaster area, such as the Hurricane Katrina disaster area. Research their experiences and prepare a report detailing the unexpected challenges the organization encountered in returning their operations to normal. Give suggestions on what might be added to the organization’s contingency plan to mitigate those unexpected challenges. ***Standard for all Research Assignments Your paper should meet the following requirements:
- Be approximately four to six pages in length, not including the required cover page and reference page.
- Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
- Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
- Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.
Job Discription
– Correlate your job responsibilities with the course of ‘Organizational theory’ outcomes listed below with a minimum of 250 words. (Do not need references for this assignment)
Course Outcomes:
1. Enhance understanding of organizations and organization theory. 2. Synthesize organizational strategy, design, effectiveness, and structure. 3. Develop an understanding of open system design elements, with an added focus on the international environment. 4. Analyze internal organizational design elements. 5. Integrate culture, values, innovation, change and conflict management, and decision-making processes as part of organizational dynamics.
– Absolutely no plagiarism, attach a plagiarism report with a 0% similarity index
Questions
Question 1
This Internet threat uses targeted fraudulent messages from reputable companies to elicit information from end users.
Crypto malware
Spear phishing
End-point attack
Supply chain attacks
Question 2
An SMB server should only allow access to which port?
443
445
80
22
Question 3
The Internet started as a project to route network communications around failed hardware.
True
False
Question 4
An HTTPS server should only access to which port?
443
445
80
22
Question 5
This Internet threat uses holes in the manufacturing process to insert malware or vulnerabilities.
Crypto malware
Spear phishing
End-point attack
Supply chain attacks
Question 6
A DMZ is a?
Demilitarized zone
Delta metal zone
Data message zero
None of these
Question 7
Port 80 is typically used by which protocol?
HTTP
HTTPS
SMTP
IMAP
Question 8
This Internet threat encrypts your hard disk and ransoms the keys to decrypt it.
Crypto Malware
Phishing
End-point attack
Supply chain attacks