Discussion

1.  What are your thoughts on the differences between leadership and management?

2.  Describe what you believe are the strengths and weaknesses of Trait Theory?

3.  In your workplace, describe the leadership style of your current boss.  Do not mention the person by name.

Dynamic Array of Strings

 Dynamic Array of Strings  
One problem with dynamic arrays is that once the array is created using the new operator the size cannot be changed. For example, you might want to add or delete entries from the array similar to the behavior of a vector. This project asks you to create a class called DynamicStringArray that includes member functions that allow it to emulate the behavior of a vector of strings.
The class should have:
A private member variable called dynamicArray that references a dynamic array of type string.
A private member variable called size that holds the number of entries in the array.
A default constructor that sets the dynamic array to NULL and sets size to 0.
A function that returns size.
A function named addEntry that takes a string as input. The function should create a new dynamic array one element larger than dynamicArray, copy all elements from dynamicArray into the new array, add the new string onto the end of the new array, increment size, delete the old dynamicArray, and then set dynamicArray to the new array.
A function named deleteEntry that takes a string as input. The function should search dynamicArray for the string. If not found, return false. If found, create a new dynamic array one element smaller than dynamicArray. Copy all elements except the input string into the new array, delete dynamicArray, decrement size, and return true.
A function named getEntry that takes an integer as input and returns the string at that index in dynamicArray. Return “” string if the index is out of dynamicArray’s bounds.
Overload the operator[] so that you can get and change an element by an index integer. If the index is out-of-bounds, return a “” string.
A copy constructor that makes a copy of the input object’s dynamic array.
Overload the assignment operator so that the dynamic array is properly copied to the target object.
A destructor that frees up the memory allocated to the dynamic array.
Create a suitable test program to test your class.
You should name the project ASG10. When you zip up the project folder, ASG10, include all the files (.sln, .cpp, etc) and subdirectories (Debug, etc.).
 

Your consulting firm has been hired to

  

Your consulting firm has been hired to develop a program that meets the following requirements. Your program must provide a menu to the user. This menu should list three different products of your choice. Once the user selects one product, they should specify which state they are located. The state choices should include CT, VT, WI, CA and WA. State taxes vary for each state (7.5%, 7.8%, 6.8%, 7.2% and 6.4%, respectively). The user should then specify the desired number of cases (assume there are 12 items per case). The appropriate state tax should be added to the total cost of the product (item quantity multiplied by unit price).
Display the following to the user.
Name of the product selected
Number of cases
Number of items
Subtotal (units x price per unit)
State tax (with the percentage and state abbreviation in parentheses)
Total cost (subtotal plus state tax)
a) Your program needs to include at least one repetition statement, one selection statement, Scanner class, and at least one array in this code.
b) Appropriate calculations are necessary.
c) Print out to the user the above bulleted items.
Your assignment submittal should include your Java source code, class files, program design document including class diagrams and pseudocode.

Cyber-Forensics

 

Final essay: 5 pages (not including reference page), well-written, properly cited with Website link, and with plenty of critical thinking applied to this topic:

APA 7 format

– When considering forensic investigations, how do criminal and cyber investigators need to work together? What common investigative techniques are used? How can these two disciplines work together to investigate potential crime scenes?  

Need it by 3 June 2021 6:00pm.

Course reflection

 

Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Cyber Security Research paper DUE MONDAY 9PM CST

  • Please follow the Research report guide to finish the paper without those guidelines it will be useless
  • Research Paper Topics
    1)      How phishing is evolving and getting more sophisticated
    2)     Evolution of Ransomware
    3)     The effects of the Cryptocurrency movement affect cybersecurity
    4)     How effective is the two-factor authentication?
    5)      How can companies respond to hacking in their system?
    6)     Cyber-physical attacks: how do they work?
    7)      How can public Wi-Fi or the internet be used to steal personal data?
    8)     What are the differences if a “white hat hacker vs. a “black hat” hacker?
    9)     What forensic tools work the best to detect cyber-attacks?
    10)  When a password is changed regularly, can it help predict the detection of cyber-attacks?
    11)   What are some proven strategies that are effective in preventing cyber-attacks?
    12)  Is computer forensics important in the current digital age of our society?
    13)  How efficient are RFID security systems?
    14)  What are the pros and cons of using blue tooth while traveling?
    Reference: Thesis Rush (2021). 50 Best Cybersecurity Topics For All Levels. Retrieved July 24, 2021, from https://thesisrush.com/blog/cyber-security

Paper

 

  Choose one or more of the issues as your focus. Research and write a 2-3 page business brief about the network anomaly detection tools and methods that you propose as solutions to your chosen issue(s). Your audience for this brief is C-Suite (company leadership). They have some technical knowledge but will need your guidance to understand the need for new tools and methods.

Configuring

 Case Project 9-2: Configuring Preferences page 369
Users in the Engineering Department need a higher level of access on their local computers than other users do. In addition, you want to set power options on mobile computers that Engineering users use. All Engineering Department user and computer accounts are in the Engineering OU.

1.What should you configure to meet the following criteria? 

 

Writing Requirements

  • 2-3 pages in length  (excluding cover page, abstract, and reference list)
  • APA 6th edition, 

Discussion

 Select from the following list four (4) topics and discuss. Use only 50-words max per topic to discuss and present your answer.  

Chapter 3 topics:

  • Define and describe PaaS.
  • List the benefits of PaaS solutions.
  • Describe potential disadvantages of PaaS.
  • Describe how a cloud-based database management system differs from an on-site database.
  • List the computing resources normally provided with a PaaS.

Chapter 4 topics:

  • Define and describe IaaS.
  • Define and describe system redundancy. Discuss how you might use IaaS to implement a redundancy plan.
  • Define and describe load balancing. Discuss how you might use IaaS to implement load balancing.
  • Define and describe NAS. Assume you must implement a shared file system within the cloud. What company would you select? Why? What costs should your client expect to pay for cloud-based data on a gigabyte (GB) basis?
  • Define and describe colocation. Discuss how you might use IaaS to implement colocation.
  • Compare and contrast a cloud-based disk storage device (with a file system) with a cloud based database.
  • Compare and contrast physical, dedicated virtual, and shared virtual servers. Search the web for companies that provide each. What cost should a customer expect to pay for each?

Chapter 5 topics:

  • Define and describe SSO.
  • Define and describe IDaaS.
  • Define SAML and describe its purpose.
  • Define and describe provisioning.
  • Define and describe FIDM.
  • List factors that make mobile ID management difficult.

Discussion 8- Legal

Assigned Readings:

Chapter 9. Business Torts.I

nitial Postings: Read and reflect on the assigned readings for the week. Then post what you thought was the most important concept(s), method(s), term(s), and/or any other thing that you felt was worthy of your understanding in each assigned textbook chapter.Your initial post should be based upon the assigned reading for the week, so the textbook should be a source listed in your reference section and cited within the body of the text. Other sources are not required but feel free to use them if they aid in your discussion.Also, provide a graduate-level response to each of the following questions:

  1. Explain each of the elements of the tort of negligence, providing examples of each in a business setting.
  2. Franky Fraud makes spaghetti sauce.  He names his spaghetti sauce “Michael Jordan’s Spaghetti Sauce” and puts a picture of the athlete Michael Jordon on the label.  Franky Fraud also claims that the sauce will extend your life ten years if you eat it every day.  Many bottles of the sauce also contain razor blades.  What tort or torts has Franky Fraud committed?
[Your post must be substantive and demonstrate insight gained from the course material. Postings must be in the student’s own words – do not provide quotes!]

Text

Title: Business 

ISBN: 9780357447642 

Authors: Marianne M. Jennings 

Publication Date: 2021-01-01 

Edition: 12th Edition