Unit 4 DB: Website for Both U.S. and Offshore Sales

Your friend John was very happy with the valuable information that you provided him in the last unit’s discussion and decided to hire you as an IT consultant.  John and his wife Pam were on a trip to Europe last summer.  Pam made a few of her sauces and appetizers for a renowned restaurant in Portugal.  She received positive feedback from a chef at the restaurant.  Pam and Michael thought that they could sell these items both in the U.S. and overseas.  What advice would you give them to consider when developing a website for onshore (U.S.) sales, as well as some European countries (for example Italy, Spain, Portugal, and France)?

In response to your peers, please discuss the cultural, legal, and other challenges to implementing international information systems.

1 page apa format 

IT Project management part two

 Project 2 – Identify Tasks, Sequencing, Dependencies, and Critical Path   

As you review your project plan and the content of chapters 5 and 6 build a task and timeline for your project. Figures 6-11a and 6-19 are potential examples. You can also look at the internet for additional examples/templates to use. 
Some potential sites to look at: 
https://templates.office.com/en-us/simple-gantt-chart-tm16400962
https://www.vertex42.com/ExcelTemplates/excel-gantt-chart.html 

pls check the sample i upload right now

it217 wEEK7 DISCUSSION

 APA FORMAT AND CITATION WITH HEADER AND PAGE AND 250 WORDS 

Read chapters 6-7. Run the two argument files to understand different ways of using arguments and the use of subroutine with numerical values to bring the values from the subroutine to the main program or not. Run also GuessMyNumber game from the module.

1. How can you pass arguments in the program?

2. What are the mistakes to avoid when working with arguments?

Write a method that computes future investment value at a given interest rate for a specified number of years. The future investment is determined using the formula in Programming Exercise 2.21. Use the following method header: public static double fu

 

 

6.7 (Financial application: compute the future  investment value) Write a method that computes future investment value  at a given interest rate for a specified number of years. The future  investment is determined using the formula in Programming Exercise 2.21.  Use the following method header: public static double  futureInvestmentValue(double investmentAmount, double  monthlyInterestRate, int years) For example,  futureInvestmentValue(10000, 0.05/12, 5) returns 12833.59. Write a  program that prompts the user to enter the investment amount (e.g.,  1000) and the interest rate (e.g., 9%) and prints a table that displays  future value for the years from 1 to 30, as shown below. First, truncate  the future value values to two decimals (See Chapter 2). Then use the  System.out.printf() method to format the output (See Chapter 4). 
 

Program name:

  Lab06.java
 

Sample Runs:

The amount invested: 1000

Annual interest rate: 5

Years      Future Value 

1              1051.16 

2             1104.94 

3             1161.47 

4             1220.89 

5             1283.35 

6             1349.01 

7             1418.03 

8             1490.58 

9             1566.84 

10            1647.00 

11            1731.27 

12            1819.84 

13            1912.95 

14            2010.82 

15            2113.70 

16            2221.84 

17            2335.51 

18            2455.00 

19            2580.61 

20            2712.64 

21            2851.42 

22            2997.30 

23            3150.65 

24            3311.84 

25            3481.29 

26            3659.39 

27            3846.62 

28            4043.42 

29            4250.29 

30            4467.74

blockchain

choose one aspect of app maintenance from the material in chapter 8, and describe the life cycle problem and how addressing your chosen problem in a blockchain environment differs from a traditional application development life cycle. Then think of three questions at the bottom of the page.

advantages of MAC, DAC, and RBAC.

 

Discuss in 500 words or more the differences between and advantages of MAC, DAC, and RBAC.

Use at least three sources.   Use the Research Databases available from the Danforth Library not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes.

WK10272021

NOTE: **** Follow APA7 format

Question 1: 400+ words (APA format & latest scholarly journal article references 2016 on words)

Should the COVID vaccine be mandated or voluntary for Americans

Pros and cons of mandating covid vaccine

File Identification and Profiling in Digital Forensics

Assignment:

Please research a scholarly article on scholar.google.com and briefly summarize the article on the topic of File Identification and Profiling in Digital Forensics.

Paper requirement:

1. The paper must be in APA format.

2. Number of references should be at least 3. 

3. The length of the paper can be from 3-4 pages. (excluding reference page).

4. No need of cover page.

5. Should cite references using APA style. Deadline 48 Hours

Unit 3 Lab I need it paraphrased

I need the below 280 words paraphrased so that it shows less than 10% match on turnitin.com report.

Please provide me with the report.

The purpose of this lab is about how to properly plan the steps of configuring the pfsense

firewall, and also how to navigate and use the tools provided within the firewall. Firewalls are an

exceptionally great tool that provides better internet security then your usual tools you have. As

an example, would be like using the host based firewall on your computer but on a higher end

scale. With the proper configuration you can prevent multiple cyber attacks, such as DoS, Hacks

and several others. At the beginning at of the lab it had us in the planning phase. Part of this was

how to properly layout the information needed to make sure we configure the firewall

accordingly. The excel spreadsheet provided was very useful in this phase because it laid out the

essential information needed such as Hostname, Primary DNS, Secondary DNS, Time Zone, IP

Address, subnet mask, and even password. After that the second spreadsheet had the actual

layout of fire wall rules. This was very useful because the way it was set up matched up with

how the firewall was configured. The spreadsheet layout had its setup by Action, whether its pass

or block, or reject. Next was which interface it was, for us we only had two options either the

WAN interface or the LAN. Followed by that was Family and protocol. For this lab we used

IPv4 with TCP and ICMP. Next was the Source IP and Destination IP followed by the Ports. In

this lab we used HTTP, SMTP, FTP, DNS, and ICMP.

Knowing how to configure firewall rules can be very instrumental and very beneficial. It

is one of the most effective way to secure a network and prevent unauthorized access.