Cyberstalking

Answer below questions.

  

1. Conduct an internet or library search on cyberstalking. Read one or two articles that you find most interesting. Document the article(s) that you reviewed.

2. Using your search engine of choice, look up the Federal Interstate Stalking and Prevention Act at 18 U.S. Code, section 2261A.List three to five behaviors that may constitute cyberstalking.

3. Describe how the Interstate Stalking and Prevention Act attempts to address cyberstalking.

4. Based on what you have read about cyberstalking, do you think that this law is sufficient to deter cyberstalkers? Why or why not?

5. Conduct an internet or library search on cyberbullying. Read one or two articles that you find most interesting. Document the article(s) that you reviewed.

6. Research your state’s cyberbullying laws.

7. Conduct an internet or library search on cyberbullying. Read one or two articles that you find most interesting.Document the article(s) that you reviewed.

8. Research your state’s cyberbullying laws.What is the citation for your state’s cyberbullying law?

9. What is the prohibited behavior?

10. What are the procedures for reporting cyberbullying?

11. What are the consequences for the perpetrator?

12. What are the safeguards for the victim (if any)?

13. Using your research, write one paragraph describing whether you think your state’s cyberbullying law is sufficient to prevent cyberbullying. Why or why not?

14. The director of human resources at Astounding Appliances is updating the company’s antiharassment policy for the employee handbook. She asks you to help her write a paragraph or two outlining what cyberstalking is, including a definition and examples of prohibited behaviors. She asks you to specifically include examples of prohibited behavior that could happen in the work environment using company-provided computing devices. Prepare the materials that the director of human resources asks for. As you complete the exercise, are there any other recommendations that you might make to the director of human resources regarding actions to take in response to cyberbullying activities that take place using company-provided computing devices?

Intro to Networking: Assignment 4

Must be one full page. At least (2) APA reference. 100% original work. no plagiarism. Attached are the previous assignment instruction leading to this assignment. Also, attached is the answer that will you for this work.

Assignment Instructions:

  • Uh-oh, the Legal department and the HR department are demanding their own network.
  • The departments feel that their data is sensitive enough that their data should be separated from the other departments.
  • In addition, the Outside Sales department has gotten brand new Apple iPads for all of their users. So there needs to be a Wireless network setup so they can go online.
  • So, you need to build out a change order for the network to account for these two curveball requests.
  • Your submission should be in a Word document and should cover the following (not a complete list)
    • How will you separate the networks, physically or virtually?
    • What type of WiFi network will you setup?
      • What hardware will you use?
      • What encryption method will you use?
      • Will you limit the WiFi signal via physical means?
    • What additional hardware is needed? Software? Etc?
    • Remember to justify your choices

4/1 Devotional

The Bible has much to say about sin, the failure of humankind to observe the divine law of God. How serious is sin (as we apply the idea to cybercrime) in God’s eyes? Psalm 11:5 states, “The Lord tests the righteous, but his soul hates the wicked and the one who loves violence” (English Standard Version). How prevalent is sin? Again, the Word of the Lord says, “The Lord saw that the wickedness of man was great in the earth, and that every intention of the thoughts of his heart was only evil continually” (Genesis 6:5). However, the good news is that God has made a way to be forgiven of sin. Romans 8:1–3 says:

Therefore, there is now no condemnation for those who are in Christ Jesus, because through Christ Jesus the law of the Spirit who gives life has set you free from the law of sin and death. For what the law was powerless to do because it was weakened by the flesh, God did by sending his own Son in the likeness of sinful flesh to be a sin offering. (New International Version)

Christ Jesus became the righteous sacrifice for a sinful world.

Instructions: 

  1. Review the material in the “Getting Started” section above, and read Psalm 11:5, Genesis 6:5, and Romans 8:1–3.
  2. Be sure to address the following prompts in your paper:
    1. The Bible states that “all have sinned and fallen short of the glory of God” (Romans 3:23). Reflect on the aforementioned verses. What should our response be to the need for forgiveness?
    2. Is there a way out of our sinful behaviors even in how people behave in their interactions in cyberspace?
  3. Your paper should be at least 250 words in length.

Project Time and Cost Management: Running Case

 

Project Time and Cost Management: Running Case

Complete the two tasks associated with project time management and the three tasks associated with project cost management. (…total of five tasks) Put all your work on one word document. Separate your tasks by headings and/or page inserts. Remember… turn your work in on a word document as ONE attachment for grading.

***Note: This is a continuation of the running case started in week three and continues through the rest of the course. Tasks based on this case are explained following the case study. These tasks will build on work done in previous weeks.

Project Time Management: Case Study

Tony Prince is the project manager for the Recreation and Wellness Intranet Project. Team members include you, a programmer/analyst and aspiring project manager; Patrick, a network specialist; Nancy, a business analyst; and Bonnie, another programmer/analyst. Other people are supporting the project from other departments, including Yusaff from human resources and Cassandra from finance. Assume that these are the only people who can be assigned and charged to work on project activities. Recall that your schedule and cost goals are to complete the project in six months for under $200,000.

Project Time Management: Assignment (2 Tasks)

Review the WBS and Gantt chart you created previously. Propose three to five additional activities that would help you estimate resources and durations. Now, identify at least eight milestones for the Recreation and Wellness Intranet Project. Remember that milestones normally have no duration, so you must have tasks that will lead to completing the milestone. Add your activities and milestones to your Gantt chart, creating a new Gantt chart. Estimate the task durations and enter dependencies as appropriate. Remember that your schedule goal for the project is six months. Copy the Gantt chart and network diagram to a word document.

After your Gantt chart and network diagram, summarize how you would assign people to each activity. Include a table or matrix listing how many hours each person would work on each task. These resource assignments should make sense given the duration estimates you made. Remember that duration estimates are not the same as effort estimates because they include elapsed time.

Project Cost Management: Case Study

Tony Prince and his team are working on the Recreation and Wellness Intranet Project. They have been asked to refine the existing cost estimate for the project so they can evaluate supplier bids and have a solid cost baseline for evaluating project performance. Recall that your schedule and cost goals are to complete the project in six months for under $200,000.

Project Cost Management: Assignment (3 Tasks)

Prepare a one-page cost model for the project described in the Running Case, similar to the model below:

Types of Cost Estimates

Type of Estimate

When Done

Why Done

How Accurate

Rought order of magnitude (ROM)

Very early in the projec tlife cycle, often 3–5 years before project completion

Provides estimate of cost for selection decisions

−50% to +100%

Budgetary

Early, 1–2 years out

Puts dollars in the budget plans

−10% to +25%

Definitive

Later in the project, less than 1 year out

Provides details for purchases, estimates actual costs

−5% to +10%

Source: TABLE 7-2 Types of cost estimates © Cengage Learning 2014

Use the following WBS, and be sure to document your assumptions in preparing the cost model. Assume a labor rate of $100/hour for the project manager and $60/hour for other project team members. Assume that none of the work is outsourced, labor costs for users are not included, and there are no additional hardware costs. The total estimate should be $200,000.

a.  Project management

b.  Requirements definition

c.  Web site design

o  Registration for recreational programs

o  Registration for classes and programs

o  Tracking system

o  Incentive system

d.  Web site development

o  Registration for recreational programs

o  Registration for classes and programs

o  Tracking system

o  Incentive system

e.  Testing

f.  Training, rollout, and support

Using this cost model you created, prepare a cost baseline by allocating the costs by WBS for each month of the project.

Assume that you have completed three months of the project. The BAC was $200,000 for this six-month project. You can also make the following assumptions:

PV = $120,000
EV = $100,000
AC = $90,000

a.  What is the cost variance, schedule variance, cost performance index (CPI), and schedule performance index (SPI) for the project?

b.  How is the project doing? Is it ahead of schedule or behind schedule? Is it under budget or over budget?

You will rewrite the temperature conversion

  

You will rewrite the temperature conversion program from the previous week. Your GUI application must inherit from the JFrame class. The GUI and event handling setup should be done in the constructor. Do not use any of the GUI editing capabilities of Eclipse for this assignment. The temperature conversion application should have a label and JTextField in which the user inputs a value which must appear in the upper part of the frame. There should be a set of three radio buttons which indicate the input scale of the value to be converted.

There should also be a set of three radio buttons which indicate the output scale to be converted to. The three input scale buttons must appear vertically aligned (i.e., use a JPanel) on the left side of the display, and the three output scale buttons must appear vertically aligned (i.e., use another JPanel) and appear on the right side of the display. Event handling should be set up so that selection of any input or output radio button causes an event which triggers the event handling code to determine which of nine possible conversions is needed. You can display the result in an output text field or in a Jlabel which appears in the bottom part of the display.

Your program should accurately convert from Fahrenheit, Celsius, Kelvin to Fahrenheit, Celsius, Kelvin. NOTE: Only the selected conversion is displayed in the output area!!! When the conversion selection changes, the output area should change to show only the new result. The output should display three digits after the decimal point. HINT: Use the ItemListener interface and use the isSelected method on the radio buttons to learn which buttons are turned on!

ethical hacking

 

You must choose one specific subject area to write your paper.  For example, ‘USB’ is not specific. ‘RFID’ is not specific. 3com USB vulnerabilities IS specific. RFID vulnerabilities in Credit Cards IS specific.

Once you have made your selection, using a minimum of 3 current sources (the textbooks cannot be a source) write a double spaced 3-5 page research APA format paper (a paper, not just a bullet list of response answers).  Note, your cover page, and your reference page, are not included in the 3-5 page requirement. You should have 3-5 pages of written text in addition to your cover page and reference pages. Use in-text citations when paraphrasing and quoting sources to avoid plagiarism. 
GoalIn your paper:1. At minimum, discuss three different vulnerabilities you found in your specific subject area research.2. Discuss how those vulnerabilities can be exploited3. Discuss available countermeasures for each vulnerability you mentioned.Your paper should start with an introduction or problem statement that clearly defines your specific subject and end with a conclusion regarding what your research found.
All sources used must be cited on the last page in a bibliography.  Proper grammar and sentence structure must be used for this formal paper. The cover page for your paper must contain your name, date, course, and instructor. The paper must be double-spaced, left-aligned.  Font should be a 10 or 12 point common font.  Do not misuse white-space as a filler; points will be deducted for not meeting the minimum requirements. Remember – APA format is required! 

Cloud Provider

 

Follow the instructions below to complete this assignment:

  1. Select one of the three Cloud Service models (SaaS, PaaS, IaaS).
  2. Research and list at least three Cloud providers, and select one that will support your service model.
  3. Write a 1-page paper. It should address the following:
     

    • Why do you believe those cloud providers of your choice would be a good fit over other cloud providers?
  4. Remember to use proper APA formatting, including citations and references for all resources used.

IMPORTANT: Your paper should be one page, NOT including cover page or references.