1. Write a program to determine whether a person is eligible (18 years old) to vote or not. If not eligible, display how many years are left to be eligible. (use if – else) Sample Run 1 Enter the age : 10 You have to wait for another 8 years to cast your vote Sample Run 2 Enter the age : 25 You are eligible to cast your vote
Apply: Signature Assignment: Choosing a Methodology
Assignment Content
- A project plan is a document created at the beginning of the project lifecycle that gives stakeholders and everyone else involved a clear idea of what the project will entail in terms of effort, time, cost, and anticipated results.
The methodology or approach the project manager plans to use to manage the project must be identified before the project plan can be created. Choosing a methodology is important because a methodology provides the framework—that is, an overall process and suggested documents and deliverables—that will guide project development from beginning to end. Some project methodologies are more appropriate for some types of projects than for others.
Over the next few weeks you will develop pieces of a project plan. This week you will determine your methodology based on project requirements and the components needed in your plan.
Read the Manage Your Health Inc. Case Study and complete the assignment below.
Consider the differences between Agile and waterfall.
Select 1 methodology to use for a project plan for this initiative.
Create a simplified project plan such as the examples listed in the “Tips” section below. Include, at least, the following criteria:
- Name of task
- Duration
- Predecessors
- Notes
- After completing your simplified project plan, write a 175-word paragraph and complete the following:
- Define which methodology, Agile or waterfall, is most appropriate for this project. Why? Cite at least 2 sources to support your rationale.
- Describe the following roles for this project: project manager, project sponsor, business analyst, and scrum master or program manager.
- You may create your simplified project plan using Microsoft® Excel® or another software application of your choice.
Tips:
- Research additional project plan examples online.
- Consider the application characteristics and requirements when building your project plan. For example, the app will require a search feature so employees can search for available programs, will require security to protect personal information, etc., which will help with the Work Breakdown Structure (WBS). Note: This information will be helpful in the Wk 2 – Apply: Work Breakdown Structure assignment.
- Read the 2 linked examples of project plans implemented as Microsoft® Excel® spreadsheets: Example Plan A and Example Plan B. Use these as guides in creating your own draft project plan. Notice the differences between these 2 examples in terms of length (overall and task length), structure of the work breakdown (iterative vs. non-iterative), and methodology.
(Apple) Data Privacy Paper
Would like to know if I can have a grad paper written in:
5-page paper APA format.
Provided Background on the topic Including a personal viewpoint.
Make sure you cite any references.
“Here are some questions to ponder while you discuss this issue:
1. What harms are potentially produced by the FBI’s demand that Apple help it open an iPhone? What harms are potentially produced by Apple’s refusal to help the FBI?
2. Do you think Apple had a moral obligation to help the FBI open the iPhone in this case because it involved terrorism and a mass shooting? What if the case involved a different type of criminal activity instead, such as drug trafficking? Explain your reasoning.
3. Apple argued that helping to open one iPhone would produce code that could be used to make private information on all iPhones vulnerable, not only to the American government but also to other foreign governments and criminal elements. Do you agree with Apple’s “slippery slope” argument? Does avoiding these harms provide adequate justification for Apple’s refusal to open the phone, even if it could reveal crucial information on the terrorist shooting?
4. Politicians from across the political spectrum, including President Obama and Senator Ted Cruz, argued that technology preventing government access to information should not exist. Do you agree with this limit on personal privacy? Why or why not?
5. Ultimately, the FBI gained access to the iPhone in question without the help of Apple. Does this development change your assessment of the ethical dimensions of Apple’s refusal to help the FBI? Why or why not? Should the FBI share information on how it opened the iPhone with Apple so that it can patch the vulnerability? Explain your reasoning.”
Few video links listed in course:
Trump to Apple: Open the phone – https://youtu.be/PkcogFe3ZTM
Why Apple is fighting FBI court order – https://youtu.be/mXMeQ-76SRA
Apple: Break-in order a government ‘overreach’ – https://youtu.be/YTyuHgFPca0
Need paper on following
Article attached
Write a 2 1/2 page paper that supports or opposes the author’s findings. Please find two to three other peer-reviewed articles that support your position/argument.
Continue Report 3 Final
Please follow the to-do word document and Risk assessment.
*** Here is the topic I have selected risk assessment report on the Healthcare system for Reports 1 & 2. This is a tier 3 assessment*** Please continue on Report 1 & 2 doc. Please make sure to review the to-do word document and follow all the steps that are required Starting from Overview to Rubric. Please make sure it covers all the Rubric Grading Criteria. I also attached Reports 1 and 2 doc.
Computer 11
Write 1 paragraphs per question.
1- Do some research, and write up an example of how IoT might provide a business with a competitive advantage and why you think this.
2- Provide one example of how information technology has created an ethical dilemma that would not have existed before the advent of Information Technology (IT). Consider things such as: How has this created a dilemma? Is the negative impact worth the positive impact? For who?
week 2
Search for a scholarly source on the topic of Heartbleed Vulnerability on Google Scholar (https://scholar.google.com/). Summarize the article and discuss your opinion on the article. Use APA formatting and be sure to cite your sources or references using APA Style.
Note: There is no length requirements on this assignment. Use your own judgement concerning the length of your assignment.
SECURITY POLICY & STANDARTS – 08 Creating an Incident Response Policy
Part 1: Research Incident Response Plans Note: In this part of the lab, you will research incident response teams to form a basis for their purpose and usage. Understanding the reason behind an incident response team is key to understanding the related policies and procedures.
- 1. Using your favorite search engine, search for a sample incident response plan.
- 2. Review the plan.
- 3. Describe the key components within the incident response plan you identified. Be sure to cite the plan by including a link.
- 4. In your browser, navigate to https://www.cynet.com/incident-response/incident-response-sans-the-6-steps-in-depth/.
- 5. Review the six steps listed on the website.
- 6. Outline the six-step methodology for performing incident response. List each step and its purpose. How closely does the plan that you reviewed follow this methodology?
Note: It is impossible to know at the beginning of any incident whether the case might become a court case. A good incident response team should approach every incident assuming that evidence documentation is required.
Part 2: Create an Incident Response Policy (0/7 completed)Note: There are many types of incident response plans. Remember that a plan is different from a policy. A policy is a high-level document that describes the organization’s stance on the particular topic and how it will comply with related governance and laws. A plan, on the other hand, is how the policy will be executed. An incident response plan should be generic enough to cover a variety of scenarios but also specific enough that an organization can quickly mobilize during an incident. Names of specific people should never be used in an incident response plan. Rather, roles and titles should define who is responsible for what portion(s) of the plan.
- 1. Navigate to “Security Policy Templates” at https://www.sans.org/information-security-policy/, then locate and review the “Security Response Plan Policy”.
- 2. Describe how this policy would be associated with an incident response plan.
Note: When responding to an incident, remember who the provider of information is and who the consumer is. Senior management approves the response policy and budget, but it does not possess the subject matter expertise to handle the incident. Meanwhile, the incident response team should make only recommendations to management, not make decisions that might impact business. It is up to senior management to either give or deny approval.
Management remains the consumer and chief decider, based on information provided to it by the experts.
- 1. Review the following characteristics of the fictional Bankwise Credit Union:
- The organization is a local credit union that has several branches and locations throughout the region.
- Online banking and use of the internet are the bank’s strengths, given its limited human resources.
- The customer service department is the organization’s most critical business function.
- The organization wants to be in compliance with the Gramm-Leach-Bliley Act (GLBA) and IT security best practices regarding its employees.
- The organization wants to monitor and control use of the internet by implementing content filtering.
- The organization wants to eliminate personal use of organization-owned IT assets and systems.
- The organization wants to monitor and control use of the e-mail system by implementing e-mail security controls.
- The organization wants to implement this policy for all the IT assets it owns and to incorporate this policy review into its annual security awareness training.
- The organization wants to create an incident response team to deal with security breaches and other incidents if attacked and provide full authority for the team to perform whatever activities are needed to maintain chain of custody in performing forensics and evidence collection.
- The organization wants to implement this policy throughout the organization to provide full authority during a crisis to the incident response team over all physical facilities, IT assets, IT systems, applications, and data owned by the organization.
- 1. Create an incident response policy that grants team members full access and authority to perform forensics and maintain a chain of custody for physical evidence containment. Create this policy for the Bankwise Credit Union.
Bankwise Credit Union
Incident Response Team – Access and Authorization Policy
Policy Statement
Insert policy verbiage here.
Purpose/Objectives
Insert the policy’s purpose as well as its objectives; use a bulleted list for the policy definition. Define the incident response team members and the authorization and authority granted to them during a crisis or while securing an incident situation.
Scope
Define this policy’s scope and whom it covers. What elements, IT assets, or organization-owned assets are within the scope of this policy? What access and authority are granted to the incident response team members that may be outside of standard protocol?
Standards
Does this policy point to any hardware, software, or configuration standards? If so, list them here and explain the relationship of this policy to these standards
Procedures
Explain how you intend to implement this policy across the organization. Also, define and incorporate the six-step incident response approach here along with how the chain of custody must be maintained throughout any evidence collection process.
Guidelines
Explain any roadblocks or implementation issues that you must address in this section and how you will overcome them per defined policy guidelines.
Challenge Exercise Note: The following challenge exercise is provided to allow independent, unguided work – similar to what you will encounter in a real situation.
Having an incident response plan is a great first step. However, if the plan is never tested, it likely will not work in a scenario when needed. One way to test an incident response plan is to execute a tabletop exercise. During a tabletop exercise, a probable scenario is created, and all incident response team members are required to meet and discuss the scenario. The purpose of the exercise is to see which parts of the plan work well and which parts fail. Once the exercise has been completed, the incident response team (along with policy and plan writers and other stakeholders) meet to update the plan as necessary.
As the CISO and leader of the organization’s incident response team, you are required to hold an annual tabletop exercise involving the incident response team. Before the exercise can begin, you must complete the following tasks:
Identify and define an incident scenario for Bankwise Credit Union. The incident must involve some type of cybersecurity issue.
Create a brief abstract of the scenario to be approved by C-level executives.
Management of an Information Technology Department
Overview
Your team recently turned in a report to the CIO of Acme Inc., describing the organization’s opinion of the IT department. The CIO immediately assigned you the high priority task of recommending, without input from the other team members, how Acme should correct the deficiencies mentioned in the report.
Instructions
Based on the following description and survey results, make recommendations for correcting four of the deficiencies you see.
Question Results
1. IT quickly and effectively corrects issues.
- Agree 60%
- Disagree 35%
- No Response 5%
2. IT communicates changes prior to their occurrence.
- Agree 40%
- Disagree 40%
- No Response 20%
3. I feel IT works to avoid interrupting my services.
- Agree 35%
- Disagree 45%
- No Response 20%
4. IT provides a reliable and effective system that enables me to be effective in my job.
- Agree 35%
- Disagree 45%
- No Response 20%
5. The Help Desk system is user-friendly and helpful.
- Agree 37%
- Disagree 43%
- No Response 20%
6. Services at Acme Inc. are reliable.
- Agree 35%
- Disagree 45%
- No Response 20%
7. The Internet speed is adequate at Acme Inc.
- Agree 15%
- Disagree 80%
- No Response 5%
8. Do you feel the uptime of each of the following services is acceptable?
- Service Now (cloud) 25% agree, 75% disagree
- Office365 (cloud) 20% agree, 80% disagree
- Workday (cloud) 30% agree, 70% disagree
- Drive Shares (onsite) 80% agree, 20% disagree
- Microsoft Office (onsite) 90% agree, 10% disagree
- SharePoint (cloud) 10% agree, 90% disagree
9. Do you feel that IT ethically handles its responsibilities?
- 99% Agree
- 1% Disagree
10. Do you feel that Acme Inc. ethically handles its responsibilities?
- 90% Agree
- 10% Disagree
11. Do you feel IT does a good job providing support and resources to you and your team?
- 10% Agree
- 90% Disagree
Aligned Objectives
- Navigate ethical issues both personally and at the corporate level
- Describe the organization of an IT department
- Device and correct perception and visibility issues in an IT department
- Develop procedures that protect a department when terminating staff
Criteria
Write a one-page or two-page double spaced paper describing what changes you would make to the organization and technology utilized by Acme Inc. You should cover four topics including but not limited to potential software limitations, communication issues, visibility, recommended hardware or service replacement, etc.
operating system
Upload Assignment: Project2
ASSIGNMENT INFORMATION
- Points Possible100
- Project2: A Simple Distributed Computing Platform (Due at 11:59:59pm on 03/25/2021 (EDT))
Description:
You are asked to develop a replicator (client) that distributes a large job over a number of computers (a server group) on a single switched LAN (our Linux lab). In this assignment, a large (simulation) job can be divided into a number of small jobs, each of which can be assigned to one machine from the server group for execution. The execution results of the small jobs can be merged once all of them successfully terminate.
System Architecture:
client server1 server2 server3 … | | | | | | | | | LAN | | | |——————|————–|————–|—–The client and servers are running Network File System (NFS) so that user files are visible at $HOME directory. You may want to set up the following environment:
- $HOME/replicate.hosts: a list of (server) hostnames which participate in the simulation. There is no reason why your implementation cannot support up to 10 servers.
- $HOME/replicate_out: the directory that stores the small job execution result.
- The simulation program “hyper_link
” (binary) is provided. In this assignment, you don’t need to know or care what “hyper_link” does, and actually it is a computing intensive (CPU demanding) simulator. The command line arguments of “hyper_link” are job# 1000000 999 1 2 2 100, where the job number determines the number of small jobs in your simulation. To allow the client to run a large job, the job# should be given in a tuple: start, end, and step. For example, the command (from the client) “hyper_link 1 100 1 1000000 999 1 2 2 100” yields 100 small jobs with the job# starting from 1 to 100. Each small job produces a screen output (see example below) at the end (if finished successfully). Your code needs to redirect the output to a file and save it in $HOME/replicate_out. For example (on the server side),
./hyper_link 1 1000000 999 1 2 2 100
will produce a screen output looks like (it takes approximately 2 minutes on spirit):
1:1000000:999:2:0.5:1.125193e+00:2.454346e-04:6.251640e-01:2.205078e-04:0.000000e+00:0.000000e+00Requirements:
- The communications between the replicator and servers are achieved through remote procedure calls in the client-server fashion. You can only use C programming lanuage to complete this project. Your implementation should not rely on any extra library (to compile your code). Your code must compile by using gcc installed on the Linux workstations in FH 133.
- A user interface is required for the replicator to control the server. A command line interface will be acceptable. A (working) graphic user interface (GUI) will impress the instructor and earn up to 20 bonus credits. Your client interface should at least support the following operations.
- start a large job. For example: hyper_link 1 100 1 1000000 999 1 2 2 100 (start 100 small jobs with job number starting from 1 to 100)
- show the current CPU load of a certain server (if the server is active).
- show the current server status (active or inactive).
- stop a certain server.
- restart a certain server.
- For those who are going to implement GUI, you need to create an icon for each server, and show the server status in the real time, e.g., the CPU load (with the mark of hi-threshold), active/inactive, etc.
- The hi-threshold and lo-threshold can be set to the pre-determined values (as long as they are reasonable). Alternatively, you will impress the instructor by implementing the configurable threshold values during the run. If that is the case, you have to provide two extra commands that set the values.
- The replicator has to make sure all small jobs are successfully finished.
- If a server crashes (or not responsive), the running job (not finished yet) will be killed and rescheduled (at a certain time per your design) for execution.
- If a server CPU load exceed the preset threshold (the higher threshold), the replicator stops the server (and therefore kills the job).
- The replicate should keep polling the CPU load of the stopped server. Once the load becomes lower than the lower threshold (a preset value), the server should be reactivated to run the jobs.
- The replicator can also stop any server (through user interface) if needed. Once happened, the unfinished job will be killed.
- If a job terminates abnormally (e.g., being killed), the replicator has to reschedule the job execution later.
- Makefile: you need to provide a Makefile that allows the instructor to compile your code by simply typing “make”.
- Write-up: you are required to write a README document (in txt format) that describes your project design detail and the execution sequence (with the commands). In particular, please explicitly state which part, if there is any, does not work and the possible reasons why that module does not work. For those working modules, please give a brief (in short) sample output.
- Hints:
- RPC programming: a brief (Sun) RPC programming introduction is given in the class.
- CPU load: please check /proc/loadavg for the CPU load information in Linux.
- Linux signal: the signal mechnism must be used to control the simulation execution at the servers.
- Submission:
- Create a folder and name it as your Linux account username, concatenated with “_p2”, e.g., hwang_p2 (all lower case).
- Copy all your source code to the above folder (clean your source code folder and remove all binary files). Please do not submit any binary code! Only the client, server source code as well as *.x file are required.
- Provide a Makefile such that the instructor only needs to type “make” to generate the RPC client stub, the RPC server stub, and compile all the client and server binaries.
- Edit a README file (in plain text format only) and provide the following information:
- Design details
- Compiling instruction and execution sequence (with commands)
- A sample test run
- Please explicitly state which part, if there is any, does not work and the possible reasons why that module does not work.
- Log in grail, go to the parent director of the folder you created, and run (suppose the your folder is “hwang_p2”)
$ turnin -c cis620w -p p2 hwang_p2
If there is no error message, your submission is successful. - Your most recent submission will always automatically overwrite the previous one.