Managing Inventory

  

This assignment relates to the following Course Learning Requirements:  

CLR 1: Using accounting software, identify and use the basic features, modules, and aids to produce reliable and accurate financial information.

CLR 2: Using accounting software, create a computerized accounting system for a new company.

CLR 3: Using accounting software, record all transactions in the accounting cycle.

CLR 5: Using accounting software, produce and export management reports and financial statements.

Objective of this Assignment:  

The objective of this assignment is to ensure students understand the step-up of inventory and the products and services.

Assignment Scenario:

Beautiful Blooms Floral Company is a relatively new and growing business that is switching its bookkeeping to QuickBooks Online. As their bookkeeper, in this assignment, you will enter the required start-up information by following the steps in 

· the Chapter 8 Reinforce Your Skills exercises and 

· the Chapter 8 Apply Your Skills exercises.  

Pre-Assignment Instructions:

1. To prepare you for this assignment, please read the content in Chapter 8 and follow the embedded learning activities (the Develop Your Skills exercises).

To follow along with the examples in the text before doing the assignment:

a. Use the QuickBooks Online sample company to follow along with the practice Develop Your Skills exercises in the textbook. See Module 3 for more information about the QuickBooks Online sample company. 

b. Remember that the sample company will refresh after a couple of hours of inactivity, so it is best to complete all the practice exercises in one session. You do not need to submit these practice reports. All exercises using the sample company are ungraded.

Assignment Tasks: 

1. Open the QuickBooks Online application software.

2. Use the chapter steps to complete the Chapter 8 Reinforce and Apply Your Skills exercises. Enter each transaction based on the information provided. 

3. Follow the steps in the Apply Your Skills exercises to export each report to Excel. You will only be submitting reports from the Apply Your Skills exercises. You do NOT need to submit the reports saved from the Reinforce Your Skills exercises. 

4. In order to submit your assignment into one excel workbook, you will need to cut and paste each report into ONE excel workbook.

5. Check to ensure that the asset and expense accounts have the correct debit balances.

6. Check to ensure that revenue and liabilities account have the correct credit balances.

Submissions:

You should be submitting ONE Excel file that contains one worksheet for each of the following reports (from the Apply Your Skills exercises):

1. Products and Service List

2. Inventory Valuation Detail

3. Sales by Product and Service Summary

Do NOT submit the reports from the Reinforce Your Skills exercises.

Save file as:

D8 Beautiful Blooms Floral Co Report Name – Student Name

Scoring Rubric – Assignment #6 [5%]

  

ITEM

REQUIREMENTS

MARK

 

Products and Service List

– Heading is complete   with Company Name, Name of report and date centered at the top three lines

– Correct number of items   are included with the correct values 

– Report is detail

– Report dated correctly

/20

 

Inventory Valuation Detail

– Heading is complete   with Company Name, Name of report and date centered at the top three lines

– Correct number of items   are included with the correct quantity

– Correct number of items   available included

– Report dated correctly

– Report is detail

/20

 

Sales by Product and Service Summary

– Heading is complete   with Company Name, Name of report and date centered at the top three lines

– Correct number of items   are included with the correct values 

– Report is detail

– Report dated correctly

/15

 

Format

– Assignment submitted in   Excel Format

– All reports included in   ONE workbook

– All required reports   included

– All reports are correct

– Consistent format   through workbook

/5

 

TOTAL

/60

Assignment 500 words

Research Optical Fiber. Identify two everyday examples of Optical Fiber use. For each of these examples show how Optical Fiber is used and how it works. Summarize your findings in a brief paper.

zero days vulnerability

 Zero days vulnerabilities in Digital Forensics…  Please, discuss your views and ideas on how can we be prepared for zero day vulnerabilities and attacks.  Share your views with your classmates and comment on at least two of your classmates’ posts. 

Questions

 

  • 10.1 What are three broad mechanisms that malware can use to propagate?
  • 10.2 What are four broad categories of payloads that malware may carry?
  • 10.3 What are typical phases of operation of a virus or worm?
  • 10.4 What mechanisms can a virus use to conceal itself?
  • 10.5 What is the difference between machine-executable and macro viruses?
  • 10.6 What means can a worm use to access remote systems to propagate?
  • 10.7 What is a “drive-by-download” and how does it differ from a worm?
  • 10.8 What is a “logic bomb”?
  • 10.9 Differentiate among the following: a backdoor, a bot, a keylogger, spyware, and a rootkit? Can they all be present in the same malware?
  • 10.10 List some of the different levels in a system that a rootkit may use.
  • 10.11 Describe some malware countermeasure elements.
  • 10.12 List three places malware mitigation mechanisms may be located.
  • 10.13 Briefly describe the four generations of antivirus software.
  • 10.14 How does behavior-blocking software work?
  • 10.15 What is a distributed denial-of-service system?

Complete your answers on a WORD Document, 

Discussion – 6 ( Information Governance and Information Technology)

 Question:

Information Governance and Legal Functions: According to the authors, Smallwood, Kahn, and Murphy, IG is perhaps one of the functional areas that impact legal functions most. Failure to meet them could be literally put an organization out of business or land executives in prison.  Privacy, security, records management, information technology (IT), and business management functions are very important. However, the most significant aspect of all of these functions relates to legality and regulatory compliance from a critical perspective. 

For this discussion, identify the industry you will be writing about in your final paper and discuss the regulatory compliance requirements that the company has to meet and the corresponding security, privacy, and records management functions that would need to be enabled for that organization. 

Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

No Plagiarism********* 

BI wk 2

different options for testing blockchain applications. For our course, we have chosen to use Ganache, a local test blockchain. Explore some of the advantages and disadvantages of using local and public blockchains to test apps and contrast the two options.  

  • Contract the advantages and disadvantages of using local and public blockchains to test applications.
  • Explain how each advantage and disadvantage impacts blockchain application development, and why each is important to a successful blockchain implementation

Instructions This assignment will help students understand interface implementation as a crucial software engineering component. You will implement the given interface in JAVA

  

Instructions This  assignment will help students understand interface implementation as a  crucial software engineering component. You will implement the given  interface in JAVA. Overall interface coding This assignment requires you  to write the Utilities211Code.java class which implements the  Utilities211Interface.java interface shown below. After you have written  the code for the Utilities211Code.java program, you will then test your  code with the Utilities211Driver.java code that I provide for you at  the end of the page. The expected results are at the bottom of the page  as well. Each of the methods properly implemented Overall coding  practices, comments, following the ICS Java coding standard, correct  results printed. Utilfties211Interface: abstract interface Utilities 211 Interface /*  Method reads a string and verifies that the string contains at least 2  non-blank characters. For example if the String is ” a b ” the string  length is 7 and the method returns true ” x ” the string length is 8 and the method returns false “” the string length is 0 and the method returns false ”   ” the string length is 12 and the method returns false “123abc” the  string length is 6 and the method returns true Just pointing out that  the length of the string doesn’t determine the validity of the string.  @param String s the string to be tested @return boolean valid = true,  false otherwise */ abstract boolean validString(String s); /* @param  double d number to be tested @returnint 1 of the number is positive −1  of the number is negative 0 of the number is zero */ abstract int  numberSign(double d); /* This method receives 2 int numbers and counts  the numbers in range between them For example if int 1=20 and int 2=33 it will return 13 if int 1=12 and int 2=−5  it will return 17 @param int1, int2, numbers defining the range @return  int, range */ abstract int range(int i1, int i2); } Utilities211Driver.java. Use it to test your code. public class  Utilities211Driver{ public static void main(String[ ] arg)র double d=−2.1 int x=5; int y=−6; String s1= ” x “; String s2=  ” cow “; Utilities211Code u = new Utilities211Code( );  System.out.printIn(u.validString(s1));  System.out.println(u.validString(s2)); System.out.println(u.numberSign( d  )); System.out.println(u.range( (x,y) ); } } Your output when running this program should be:

Please provide assistance in writing a Code that will implement Utilities211Interface and Utilities211Driver. Thank you

Discussion 500 words

 Discuss in 500 words or more  federated architecture in cloud systems. Remember that this is a cloud class not a database class.  

Discussion 1

 The topic I have selected is a  DoS occurred in 2020 to Amazon Web Services

Introduction to Risk

Individuals, businesses and governments face risk daily. Risk is manifested in different forms and may be described as business, non-business, or financial. Irrespective of the type of risk, it’s important to remember the basic goals of security – to maintain confidentiality and integrity, while also ensuring the availability of data and systems. Organizations and governments usually employ different approaches to mitigating risks, but with a good understanding and consideration for risk elements including (i) vulnerabilities, (ii) threats & threat agents, (iii) impact, and (iv) likelihood. Other considerations include an organization or government’s appetite for risk, business goals, as well as internal and external drivers (laws, regulations, and standards). Proven strategies to deal with risk employ an enterprise risk management approach, and also rely on risk management frameworks including but not limited to: NIST’s risk management framework, ISACA’s risk IT framework, and COBIT 2019.

Overview

Follow these directions to complete the assignment:Identify a cybersecurity-related attack:Using scholarly sources and/or the web, research, identify, and share an example of a cybersecurity-related attack. Examples may include cyber warfare such as “Stuxnet” or the “Equifax” data breach. Feel free to use any of these. Once you’ve decided on the example you will share, “claim” it by posting it to the discussion. Do not post about the same type of attack as your classmates.Create your post:In a discussion post of approximately 600 to 800 words, explain risk and risk elements related to this attack, including a synopsis, attack type, characteristics, vulnerabilities, threats & threat agents, impact, and likelihood of this attack. You may need to make some assumptions as you write about the risk elements. Clearly state any assumptions that you make. Do not offer a potential solution to the attack; 

Action Items

  1. Complete all of the reading for this module.
  2. Claim the cybersecurity-related attack you intend to discuss by posting it to the discussion.
  3. Create your discussion post according to the directions in the overview.