Basic computer

  1. How can you make a PowerPoint colorful and lively?
  2. What is the difference between animation and transition effects?
  3.  Why is it important for the slides to be uniform in FONT and Design?

Research papper and PPT

Topic: The Security Challenges of the Healthcare Internet of Things. The topic should be a gap in research. Provide background information, why the area is of concern, propose a detailed solution, and future research areas.

Must be in APA format, minimum 16 pages research paper and 15 ppt slides

Title Page

Abstract

Body

Background

Problem Statement

Proposed Solution

Conclusion

Future Research Areas

References

Application Security Project – Assume Scenario 1 and answer Tasks in 2 pages (APA Format References)

 Overall Scenario 

Always Fresh Foods Inc. is a food distributor with a central headquarters and main warehouse in Colorado, as well as two regional warehouses in Nevada and Virginia. The company runs Microsoft Windows 2019 on its servers and Microsoft Windows 10 on its workstations. There are 2 database servers, 4 application servers, 2 web servers, and 25 workstation computers in the headquarters offices and main warehouse. The network uses workgroups, and users are created locally on each computer. Employees from the regional warehouses connect to the Colorado network via a virtual private network (VPN) connection. Due to a recent security breach, Always Fresh wants to increase the overall security of its network and systems. They have chosen to use a solid multilayered defense to reduce the likelihood that an attacker will successfully compromise the company’s information security. Multiple layers of defense throughout the IT infrastructure makes the process of compromising any protected resource or data more difficult than any single security control. In this way, Always Fresh protects its business by protecting its information. 

Scenario 1

Assume you are an entry-level security administrator working for Always Fresh. You have been asked to evaluate the option of adding Active Directory to the company’s network.

Tasks

Create a summary report to management that answers the following questions to satisfy the key points of interest regarding the addition of Active Directory to the network:

1. System administrators currently create users on each computer where users need access. In Active Directory, where will system administrators create users?

2. How will the procedures for making changes to the user accounts, such as password changes, be different in Active Directory?

3. What action should administrators take for the existing workgroup user accounts after converting to Active Directory?

4. How will the administrators resolve differences between user accounts defined on different computers? In other words, if user accounts have different settings on different computers, how will Active Directory address that issue? (Hint: Consider security identifiers [SIDs].)

Cybersecurity Strategy, Law, and Policy Team Assignment

 

The chief technology officer (CTO) has indicated that your organization has been requested by the National Security Council (NSC) to comment on the upcoming National Cybersecurity Strategy. The NSC has asked for specific recommendations as it relates to the next cybersecurity strategy, private/public partnerships, and comments on how specific technologies should be incorporated into the assessment.

The CTO has asked you to collaborate with your team to provide the organizational input.

Use the Cybersecurity Strategy, Law, and Policy Team Assignment Template to write your paper, which should cover the following topics:  

Part 5: Cybersecurity Technologies

  • The authors of the National Security Strategy (NSS) are looking to address particular technologies that have the opportunity to revolutionize cybersecurity. They believe that blockchain technology is a revolutionary technology that has the ability to significantly improve cybersecurity.
    • What would be your recommendation for how the NSS should incorporate this technology to the public?
    • Propose exactly what you believe should be written in the NSS. Specifically, explain the blockchain technology in layman’s terms to nontechnical people that may be reading the NSS, give examples of how it could be used to provide revolutionary cybersecurity, include examples of how it is being used to provide cybersecurity solutions, and discuss what, if any policies or laws should be established to mandate its use in specific industries.

 I only need part 5 done.

Physical Security

 The subject is CPTED (Crime Prevention Through Environmental Design) Best Practices. Please download the Research Paper Template and begin your research. Instructions are in the template. The Research Paper is due in week 7 and is worth 250 points (25% of the course). 

1Character and String Class Methods

  

Task #1Character and String Class Methods
 

2. In the Time.java file,add conditions to the decision structure which validates
the data. Conditions are needed that will
a) Check the length of the string
b) Check the position of the colon
c) Check that all other characters are digits
3. Add lines that will separate the string into two substrings containing hours and
minutes. Convert these substrings to integers and save them into the instance
variables.
4. In the TimeDemo class,add a condition to the loop that converts the user’s
answer to a capital letter prior to checking it.
5. Compile,debug,and run. Test out your program using the following valid
input:00:00,12:00,04:05,10:15,23:59,00:35,and the following invalid input:
7:56,15:78,08:60,24:00,3e:33,1:111.
 

Task #2 StringTokenizer and StringBuilder classes
1. Copy the file secret.txt(code listing 10.3) from www.aw.com/cssupportor as
directed by your instructor. This file is only one line long. It contains 2
sentences.
2. Write a main method that will read the file secret.txt,separate it into word
tokens.
3. You should process the tokens by taking the first letter of every fifth word,
starting with the first word in the file. These letters should converted to capitals,
then be appended to a StringBuilder object to form a word which will be printed
to the console to display the secret message.

Network security

Computer Emergency Readiness Team (CERT) provides a list of Top 30 Targeted High Risk Vulnerabilities. They also explain current trends in security. Take a look at the current list and prepare a briefing suitable for a boss or employer. Your submission should be between 1200-1500 words with references and following APA writing standards.

computer science

 Modify DepartmentSalesS project posted on Blackboard as “Observer Pattern Example – Chart Using Swing” Add an Observer to display monthly sales in a pie chart. You modify YDTChart.java so it will display a pie chart. Modify SupervisorView.java to add a PieChart observer and change Layout so it has three columns. Follow the link to see how to draw pie chart as multiple pies. http://cs111.wellesley.edu/~cs111/archive/cs111_fall06/public_html/labs/lab12/arc.html You may use a Color array like Color[] colors= {Color.blue,Color.yellow, Color.gray, Color.green, Color.cyan, Color.red,Color.magenta, Color.orange, Color.pink, Color.darkGray, Color.black, Color.lightGray}; Before you draw the pie piece for a month i, you set color like g.setColor(colors[i]); 2. Modify ChartS posted on Blackboard as “Observer Pattern Example – Chart Using Swing” Add a PieChart to display monthly sales You may follow the following website: http://tutorials.jenkov.com/javafx/piechart.html Create array of PieChart.Data using a loop. Add one a time to PieChart using a loop. To display the tip of %, you may follow the following website https://riptutorial.com/javafx/example/8733/pie-chart