discussion

 

To successfully complete this week’s discussion, you will need to:

  • Review this playlist of LinkedIn Learning videos: Make IT Work in Your Business [total time 1:43:08].
  • Review the instructions and scoring guide for the Infrastructure Design assignment due this week.

Please respond to the following in a substantive post (3–4 paragraphs):

  • Identify the major hardware and software components of your company’s information systems infrastructure.
  •  Describe the key design considerations of the infrastructure. 

Assigned problem Topic 3 Computer Science

 

Prove the statement below. Use only the definitions of the terms and the assumptions listed on page 146 of the textbook, not any previously established properties of odd and even integers. Follow the directions given in this section for writing proofs of universal statements. 

If x is any even integer and y is any odd integer, then 3x + y – 1 is even.

Notes: 

1. Use page 146 of the textbook. 

 

Discrete Mathematics with Applications 4th ed. by Susanna Epp (ISBN: 9780495391326), Cengage.

Calculus for Business, Economics, Life Sciences, and Social Sciences, 13th edition by Raymond Barnett, Michael Ziegler, and Karl Byleen (ISBN-13: 978-0321925138).

Web Forensics

Explain how cookies can show that a user has visited a site if that user’s history has been deleted.

Optional: install Windows Historian and see the sites visited by a particular user. 

Use your own words. Attach your WORD document here.

References:

Project Abstract:

Topic: Disater Recovery

How to Write an abstract:

https://www.scribbr.com/apa-style/apa-abstract/

Sample Abstract:

Creating a Poster

NoSQL( java script)

 

Build for MongoDB is for powering an online store or e-commerce solution.   MongoDB’s features can easily manage attributes in a product catalogue, track the interactions between the store’s inventory and customers’ shopping carts, and offer dynamically switching recommendations such as “Customers also bought” in a single shopping session.

1. Build a Database to accomodate the ecommerce

2. Build functions to insert and fetch data

3. Data should be in hierarchy fashion

4. Demo the full solution – when data is fectched by product identifies, name  – it should return hierarchial data

Discussion 14(Business continuity & Disaster recovery planning )

Question:  

We develop good DR plans and some of those plans will include a remote recovery site (hot or cold). 

 How do we ensure that the remote site is protected like we would the main location? 

Discuss the challenges of maintaining information security at a remote recovery location.

***Standard for all discussion posts:

Please make your initial post and two response posts substantive. A substantive post will do at least two of the following: 

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA 7)
  • Make an argument concerning the topic

****** No Plagirsam

*** References

ETC W 3 D

 

Malicious individuals have discovered several methods to attack and defeat cryptosystems. It’s important that understand the threats posed by cryptographic attacks to minimize the risks to your network systems.

Identify one cryptographic attack and how you can protect against it. 

Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA 7)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

Module 01 Content

 

  1. For this first project assignment, you will search the Fortune 500 list. Select at least three companies and explore their websites. Learn about their industry or field, the size of the companies, if they’re located only in the U.S. only or if they are international companies, and, if you can, what security framework the organization uses.

    After you have reviewed your three companies, pick one that best suites your interest and use this company as your guide as you progress through the course project assignments. Use this

     

SE492 Week 8

 

Week 8: Discussion

questions based on chapters 8 and 9.

1. Describe what needs to be done to manage risk on a project. When should this be done? How can a risk assessment matrix help in this process?

2. Discuss what needs to be done as part of closing a project. Why are these activities important?

_____________________________________________

You are required to make at least one comment on the responses posted by your classmates with a minimum of 50 words. Make sure you design your response with your own words. Your responses to your classmates must be of substance; not just “I agree” or “Good Post.” The purpose of the responses is to convert the discussion forum into a quality academic environment through which you improve your knowledge and understanding. Read and review all assigned course materials and chapters before you start working on your assignments.

SPM -6

 

Read chapter 6. Answer the following question.

1.  Go through pages 234-241 of the textbook to complete the Resource on your Consumer Market Study project you started earlier. Show screenshots of your work and discuss what you learn. 

ü  Students should avoid using phrases like, “In my opinion,” or “I think,” or “I believe.” To support your response post to the weekly discussion question

Exp19_Excel_Ch02_CapAssessment_Inland_Jewelers

  

Exp19_Excel_Ch02_CapAssessment_Inland_Jewelers

 Exp19 Excel Ch02 CapAssessment Inland Jewelers 

  

Project Description:

You are an account manager for Inland Jewelers, a regional company that makes custom class rings for graduating seniors. Your supervisor requested a workbook to report on new accounts created on payment plans. The report should provide details on total costs to the student as well as payment information. Each ring financed has a base price that can fluctuate based on ring personalization.

     

Start   Excel. Download and open the file named Exp19_Excel_Ch02_Cap_InlandJewelers.xlsx. Grader has automatically added   your last name to the beginning of the filename.

 

Insert a function in cell B2 to   display the current date from your system.

 

With cell B2 selected, set the   width of column B to AutoFit.

 

Insert a VLOOKUP function in   cell C5 to display the ring cost for the first student. The cost of the ring   type should be an exact match. Use appropriate relative and absolute cell   references.

 

Copy the formula from cell C5 to   the range C6:C11.

 

Apply Accounting number format   to the range C5:C11.

 

Insert an IF function in cell E5 to calculate the total   due. If the student has chosen to personalize the ring, there is an   additional charge of 5% located in cell B21 that must be added to the cost of   the ring; if not, the student only pays the base price. Use appropriate   relative and absolute cell references.

 

Copy the formula from cell E5 to   the range E6:E11.

 

Apply Accounting number format   to the range E5:E11.

 

Insert a function in cell G5 to   calculate the first student’s monthly payment, using appropriate relative and   absolute cell references. Ensure the result is a positive number.

 

Copy the formula from cell G5 to   the range G6:G11.

 

Apply Accounting number format   to the range G5:G11.

 

Calculate totals in cells C12,   E12, and G12.

 

Apply Accounting number format   to the cells C12, E12, and G12.

 

Set 0.3″ left and right   margins and ensure the page prints on only one page.

 

Insert a footer with your name   on the left side, the sheet name in the center, and the file name on the   right side.

 

Save and close Exp19_Excel_Ch02_Cap_InlandJewelers.xlsx.   Exit Excel. Submit the file as directed