response

 (Khenedye)There are many risk factors to consider when you don’t assess the technical risk that is associated with information system development projects. One of the risk factors is the user group. When dealing with things like this you should want some who is familiar with information systems entire development process and have had prior experience in using the system before. I feel when you are trying to minimize risk the experience can be detrimental to the success of the project as a whole. The development group is an important factor as well. You want someone who knows the lay of the land such as softwares, development methods, and application areas.  You also want to try to control the project size. People working on it should have an assigned task to keep things moving smoothly.  Deadlines along with departments within the organization should be a sign to keep things in order and no one is confused on what they should be doing. The consequences of not managing the risk could vary from a number of things potentially spiraling down to the point where your project is no longer salvageable. For one it could compromise the integrity of the project as a whole. Not setting deadlines could lead to more room for errors due to things lingering amongst the group. Another risk or consequence would be failure to obtain proficient performance levels. The larger the project is the more the project is at risk anyway. To alleviate some of this for projects that have no choice but to be large would be to possibly break the project down into sections and assigning certain people those projects compared to everyone working on the same thing. By doing this you ensure all bases are touched and result in a successful project because if everyone does there part the chance for error slims down.   

Security Training Program

 Please is important to refer to the attached document for the powerpoint presentation.

Urgently due tomorrow.

Module 06 Course Project – Security Training Program

The policies that you have created and modified have received final approval from management.

You have been asked to do the following:

  • Develop a security training program for the staff to ensure that the updated and new policies are fully understood.

For this submission, you will:

  • Create a PowerPoint presentation to be used for training the staff.
  • Highlight ALL changes whether they are new policies or changes to existing policies.
  • Provide 10 – 15 slides and include speaker notes.
  • Make your presentation clear and use an appropriate and influential tone to engage staff so that the new policies and changes are easily understood.
  • Use professional language, proper grammar and spelling.

It 230

Web design includes many different skills and disciplines in the production and maintenance of websites. In other words, you need to be sure that:

 

  1. You make the site easy, efficient, and delightful to use.
  2. You need to focus on the functional organization of the site’s pages and tools (buttons, links, menus…etc).
  3. Ensures that the site is favourable.

 

In your opinion and own words, How the above tasks can be achieved?

Not less than 250 words

Information systems

Question: As Customers, Students, Patients, Taxpayers, And Citizens, We Are Surrounded By Information Systems That Support Customer Interactions. Respond To The Following In A Minimum Of 175 Words: Identify And Describe Two Such Systems That You Have Used. Briefly Discuss The Types Of Customer Interactions You Have Experienced With These Systems. Compare What You what you found to be important features of each one. Are there features or functions that you would change or add to either systems.

Create a RAPTOR

 using Loops and Subcharts
 

Create a RAPTOR program that will find multiples of either one of two integers, but not both, between 350 and 450.
The two integers are to be entered by the user at runtime. At least one of the integers must be an odd number. If not
the program should end quickly. Your program must use a loop and at least one subchart. Refer to the graphic that
demonstrates three sample runs with suggested ouput. 

YOUR ASSIGNMENT
Part 1
Work through an algorithm for the above program and submit pseudocode for this algorithm. Please enter the pseudocode in the dropbox message area.
 

Part 2
 use your pseudocode to create the RAPTOR flowchart program. Zip it up and submit the zip to this  

Paper and Powerpoint Eric

The paper has to be four to five pages.  Please do not write more than four to five pages.  I will stop reading on the fifth page and you will get graded off what I read.  For each page over five pages I will take off 10 points for each page.  The font size of the paper must be 12 in Time New Roman.   Please do not try to use a bigger font size to make your paper four or five pages.  Please double space the whole document.  If the paper not four to five pages, I will not read the paper and you will receive a zero on the project part.  Please use MLA formatting for reference page.  Please make sure you have a reference page and cite all sources.   Please have the paper in APA formatting.  Please google an example of APA formatting.  No plagiarism. Make sure you cite all your sources.  Paper Outline

  • History (Who created it, What year, Who uses it?  General History)
  • Definition
  • Advantages and Disadvantages
  • Interesting Facts
  • Example of where it is used.
  • What audience uses this product?
  • And many more information you think is important.
  • Conclusion

Note:  Please make sure you have lead in sentences

  • The research papers are to be written in your words.  Copy and paste is unacceptable unless it is cited.
  • Must include the following:
    • Cover page with title and your name
    • Introduction/overview of topic and issues to be discussed
    • Background, description, and/or history 
    • Advantages, Disadvantages, etc.
    • Summary (your comments or evaluation)
    • List of at least three references.
  • Library, Internet sites, Topics from Class

Programing Assignment (C language)

  

Programing Assignment – Blackjack 

Using C language

1. The basic rules of game

A deck of poker cards are used. For simplicity, we have unlimited number of cards, so we can generate a random card without considering which cards have already dealt. The game here is to play as a player against the computer (the dealer). The aim of the game is to accumulate a higher total of points than the dealer’s, but without going over 21. The cards 2 to 10 have their face values as points. J, Q, and K are10 points each, and the Ace is either 1 point or 11 points (player’s choice). To simplify the matter, we consider that the Ace is 11 points and we don’t have card J, Q, or K unless you like to implement the option anyway.
 

a)  Betting

 The player first places a bet. Let’s assume the minimum bet is $10 and maximum = is $1000.

b)  Each play will result in one of the following events for the player

  • Lose      — the player’s bet is taken by the dealer.
  • Win      — the player wins as much as the bet. If s/he bet $= 10, s/he wins $10      from the dealer.
  • Blackjack      – the player wins 1.5 times the bet. With a bet of $10, s/he wins $15 from      the dealer. To simplify the matter, you can ignore Blackjack.
  • Push      – the hand is a draw. The player keeps his/her bet, neither winning nor      losing money.

c)  The start of the game

 At the start, the player and the dealer receive two cards each. The player’s cards are normally dealt face up (displayed), while the dealer has one face down (called the hole card) and one face up. The best possible blackjack hand is an opening deal of an Ace with any of the ten-point cards. This is called a “blackjack”, or a natural 21, and the player holding this automatically wins unless the dealer also has a blackjack. If a player and the dealer each have a blackjack, the result is a push.

 d)   The player’s turn

 The player can keep his hand as it is (stand) or take more cards from the deck (hit), one at a time, until either the player judges that the hand is strong enough to go up against the dealer’s hand and stands, or until it goes over 21, in which case the player immediately loses (busted).

 e) The dealer’s turn

The dealer turns over the hidden hole card. The dealer hits (takes more cards) or stands depending on the value of the hand. The dealer must hit if the value of the hand is lower than 17, otherwise the dealer stands.

 If the dealer is busted, the player wins. Otherwise the player wins if s/he has a higher score, loses if s/he has a lower score, or pushes if s/he has the same score as the dealer.

Blackjack consideration is not required, unless you like to implement the option anyway. By the way, a blackjack hand beats any other hand, also those with a total value of 21 but with more cards (which is not a natural blackjack).

 f)  The program towards the end

 If the player won or lost, s/he must decide whether to quit or to play another game unless the player runs out of money. Your program should give the player an initial betting amount of $1000.00. 

2. The specific design of this assignment

a)  The main() program and its variables

 You will need to decide on appropriate variables in which to store the player’s bankroll (in order to keep track of how much money or how many points the player has), the bet at a game, and other information. Let’s use an integer array gamerecord[] to store how many times the player won, lost, hit a blackjack, and got busted. (Again, blackjack is optional).

 The bankroll, bet, and gamerecord[] should be kept up to date on the player’s current status. (The program calls playing() to play a game, as discussed below. )

 After each game, the program must report the result of the game: the amount of money won or lost, the current value of the bankroll, how many times the player won and lost, and how many times the player hit a blackjack and got busted. (You may want to record and report how many times the dealer got busted as well, as an option.)

After each game (by calling playing()), the program should allow the player to continue playing until s/he chooses to quit, or until s/he runs out of money. This central program control may be done within main(), in a do-while loop: 1) call playing() to play a game; 2) check whether to play again. We will add some more components later.

 b) “Dealing” the card: the dealing() function

 A separate dealing() function will be used to generate a card number.  You may want to implement and double check this function first. You will use a random number generator. The random number generator needs to be seeded with the current time at the beginning of the main program. The possible random values generated are 1 to 10 (or 13 if J, Q, and K are considered), representing the cards’ face values.  This function will return the number generated. The return value 1 represent the Ace’s face value (and the return value 11, 12, and 13 are J, Q, and K’s face value, respectively.) A large random number n can be converted to a value between 1 to 13 by:  (1 + n%13).

 c) “Playing” the game: playing() function

 A second function playing() will be used to play a single game until the player either wins or loses a bet, based upon the rules given above.  This function should get a bet, modify the current amount of the player’s bank roll according to the game result, modify the gamerecord array values of the player won or lost, and the player hit the blackjack or got busted.  These values are returned through function parameters by address passing in playing().

 Within the function, the player is asked to place a bet (10 to 1000 within the bankroll amount), so the corresponding value is read from the keyboard. The system (dealer) then “deals the cards” (simulated by calling the function dealing(), one card at a time). After each dealing, this function should report the card values, except the dealer’s hole card. The function should have two variables to store the player and the dealer’s scores. Remember face value 1 represents score 11 (or 1 if you want to be more complete as an option, and 11, 12, or 13 represents score 10).

 The player can keep his hand as it is (stand) or take more cards from the deck (hit), one at a time, until either the player judges that the hand is strong enough to go up against the dealer’s hand and stands, or until it goes over 21, in which case the player immediately loses the bet.

 The dealer turns over his hidden hole card by displaying the hold card face value, and starts the game process automatically until the dealer wins or loses.

d) “Ending” and “Beginning” of the game

 This part is implemented after you have done your programming as described above already.

You need a separate function ending() to do the following: you should report the current value of the bank roll, how many times the player won, lost, hit a blackjack, and went busted. You need to save the above information into a text file as well.

 You need a separate function beginning() to do the following at the beginning of your program in main(): the function will open the text file you used to save the game information for reading if it exists, so that your game can continue from previous played results. If the file does not exist or the bank roll has a balance below the minimum bet, you start the game from scratch as usual, and report “new game” or “continual game”.

So,  main() includes 1) beginning();  2) a loop: playing(); 3) ending(); 

 3. Additional functions may be necessary and/or appropriate, depending upon the final overall design of your program.

It’s your choice to have minor variations, but you should have the required components.

 4. Testing and Submitting

 Test your program to make sure it compiles and runs properly in various types of cases.

 When your program is finished, write a short program report in plain text format.  Your report should describe any functions that are not implemented and any bugs that still remain in your program.  

 Show your output by compiling it and demonstrating it where the user plays at least three full games. You should submit your program report, and the source file of your program.

data mining in Business intelligence

 What are the privacy issues with data mining? Do you think they are substantiated? 

 Your response should be 250-300 words.
There must be at least one APA formatted reference (and APA in-text citation) to support the thoughts in the post.  Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations. 

discussion

 

SSL-VPNs have allowed organizations to rollout clientless remote access. But is this good enough? SSL-VPNs simplify an enterprise deployment, but can expose your enterprise to unnecessary threats. Would you recommend using a two-factor authentication along with a SSL-VPN?

In your initial post explain why or why not you would further protect an SSL-VPN with a two-factor authentication token. When replying back to another student, instead of agreeing with them, take a position in which you debate why the methodology selected is not the best solution.