Java exam

Java quizz with 20 multiple choices questions and a couple programs to code 

You ll need to do it within 2 hours from the time i send it to you because it’s a live homework that I need to do in 3 hours 

computer architecture

onduct research on the IEEE or ACM journal articles or conference proceedings, published within the last one-year period, about the pipelining concepts. Submit a total of two-page summary for three important publications (along with the original paper complete reference information only).

2. This problem aims to investigate the major perspectives of RISC and CISC architectures in both a written report and a fun mock debate format.

a. There are different hypothetical real-life roles: a.1) Local City Mayor, a.2) Tier-1 Research University Biology Professor, a.3) Industrial Businessman, a.4) Hardware developer, a.5) Software developer, and, a.6) NASA Director.

b. Conduct research on major journal articles, conference proceedings, or real-life implementations about the RISC and CISC concepts and develop at least three fact-based debate arguments for both to defend and to destroy each architecture for each of the hypothetical roles. (You need to find strong as well as convincing arguments that go well beyond the fundamental class coverage)

c. Submit the report including your arguments for and against each architectural approach (as part of the project-2).

d. During the project due date, the hypothetical roles for RISC and CISC teams (to perform each role one at a time) and groups to promote each architecture will be randomly assigned in the class. (Satisfactory performance at each role is required for successful project completion)

3. Conduct research and explain the following concepts (with proper references): Gelsinger- Hennessy debates, SPEC benchmarks, Spectre and meltdown vulnerabilities (concise concepts and most recent developments), Blue gene supercomputers and corresponding architectures, Top-6 most powerful supercomputers, and Macro-op fusion.

4. Conduct research on recent processors from Intel, IBM, and ARM. Describe their specifications, obtain their figures, and compare their pipeline operations in terms of strengths/weaknesses, etc. Also, propose one new idea to improve the existing pipeline operations (make sure to include original source complete references).

Cybersecurity Training

 An organization should establish an effective cybersecurity training program for personnel having authorized access to critical cyber assets.

Create a training plan for everyone who works at the organization. The training plan should address (but is not limited to) the following:

1. Articulate a culture of security awareness, collaboration, and buy-in among management, staff, clients, and stakeholders.

2. Describe common security risks and how to avoid them.

3. Describe policies, access controls, and procedures developed for critical electronic devices and communication networks.

4. Describe the proper use of critical electronic devices and communication networks.

5. Describe the proper handling of critical information.

6. Present action plans and procedures to recover or reestablish critical electronic devices and communication networks.

7. Address the risks resulting from insecure behavior of employees.

APA style is not required, but solid academic writing is expected.

Refer to “CYB-690 Cybersecurity Training Scoring Guide,” prior to beginning the assignment to become familiar with the expectations for successful completion.

Word assignemnt

I attached A word file that needs to be edited, I also attached pictures that have the instructions needed to be done on the file, you need to be very specific as the instructor pays attention to details, please use the file I attached and send it back.

Discussion

  1. Explain network security plan and network security policy and their differences.

2. What are some methods for keeping hackers from viewing and changing router and switch configuration information?

3.  Discuss why should the database and web server be installed on separate machines apart from the rest of the network?

Please list your reference/s

Privacy Laws and Protection of Personal Information

  

The protection of personal and confidential information is tremendously important to U.S. citizens and organizations. The security of a private citizen’s information and personal effects is specifically addressed in the Constitution and in the Bill of Rights. In modern times, the Internet has provided a venue where information about individual users is gathered, stored, analyzed, and reported. This information is sometimes used by organizations to make better tactical and strategic business decisions. Considering the large amounts of data collected by the government and private industries, there are huge gaps in existing protection laws.

Review the article “Is Privacy Possible in 2020?” or select another case and provide the link to it in your writing and on the reference page.

Write a 3–5 page paper based on the information from the above link with supporting research activities. You may also use the information in the text (without plagiarizing), or other resources. Complete the following:

1. Identify and briefly describe 2–3 laws enacted to protect citizens’ privacy and intellectual property rights.

2. Identify the organizations responsible for enforcement or monitoring compliance with those laws.

3. Discuss 2–3 systems that gather data that citizens fear is being misused.

4. The European Union (EU) designed the General Data Protection Regulation (GDPR) to strengthen the protection of citizens’ data. Discuss the pros and cons of its use in comparison to the protections present in U.S. law or regulations.

5. Provide suggestions or recommendations of mitigations that citizens can use to protect themselves from possible loss or misuse of personal or intellectual information.

6. Use at least three quality resources in this assignment. Note: Wikipedia and similar websites do not qualify as quality resources. The Strayer University Library has many excellent resources.

Pick 2 of the 4 “What Went Wrong” (p. 301)

  

Discussion Question #1 page 336
Pick 2 of the 4 “What Went Wrong” (p. 301)
1 page write-up for both.
———————————-
Discussion Question 1. Discuss some of the examples of poor quality in IT projects presented in the “What went wrong?” sesction. Could most of these problems have been avoided? Why do you think there are so many examples of poor quality in IT Projects?

The two picked out of the four. In 1981, a small timing difference caused by a computer program change created a 1-in-67 chance that the space shuttle’s five onboard computers would not synchro-nize. https://iacademicessay.com/2021/05/26/im-working-on-a-operating-systems-writing-question-and-need-support-to-help-me/ The error caused a launch abort.

In one of the biggest software errors in banking history, Chemical Bank mistakenly deducted about $15 million from more than 100,000 customer accounts. The problem resulted from a single line of code in an updated computer program that caused the bank to process every withdrawal and transfer at its auto-mated teller machines (ATMs) twice.

For example, a person who withdrew $100 from an ATM had $200 deducted from his or her account, though the receipt in-dicated only a withdrawal of $100. https://getacademicessay.com/ The mistake affected 150,000 transactions.

Please read the Scrum Primer and

  

Please read the Scrum Primer and analyze the Scrum process 

Write a paper 1. Comparing the RUP SCLC we discussed in class to the Scrum SDLC process 2. Identify in the Scrum SDLC Process a. What activities and tasks you would implement in the process to ensure that you are mitigating risk, and software security is “built in” though out the process. Please briefly describe the salient point of those activates and tasks. b. At what steps in the Scrum process would you implement the activities and tasks you have recommended § Please be brief and concise as possible, I suggest that the paper could be as brief as two (2) to three (3) page. Feel free write more than several pages if you need to, to ensure that you have adequately describe you software risk mitigation assurance activities and tasks. § Please follow the APA Template format.

3 page paper due tomorrow

 
September 2021

Week 6: Scenario Activity

TABLE OF CONTENTS

Scenario Summary

Introduction

You are a Project Manager for a small private but growing company that specializes in the manufacturing of military electronics named Integrated Systems Design (ISD). You have been tasked with putting together a contract for a recent award for the government for your company’s newest technology. Your company’s technology, called Independent Operation (IO) offers limited artificial intelligence capabilities to allow drones to operate independently. The new computer brain that your company has developed will allow drones (or other equipment) to operate without the need to remain in contact to avoid being disrupted in the field. The company, Integrated Systems Design, realizes that their technology is new, but it will likely be copied by others who are attempting to accomplish the same.

Company Details

The company is called Integrated Systems Design (ISD) and they have been producing military grade electronics and guidance systems for about 6 years and have grown to have 5 million dollars in sales this year. They specialize in high end, highly reliable and cutting edge type items. They have been primarily doing business with the US Military and Department of Defense.

The company is based in Los Angeles. The Los Angeles office handles sales, distribution as well as customer service. The Los Angeles facility houses manufacturing, research and development, marketing, supply chain, distribution, and reverse logistics. All manufacturing is done in the US, but some components are purchased overseas. The total number of employees is 20.

Since the company understands that others will try to copy their technology, the company has been firm about making sure that all people involved have signed nondisclosure documents and that all material supplied is always marked confidential.

Current Situation

ISD has just been awarded the largest contract ever for the company as the government seeks to corner the market by contracting for the exclusive use of the Independent Operation (IO) technology. The government wants exclusive use of the technology and in turn the government will agree to protect the technology and treat it as a national security secret to avoid having information disclosed about the project. Although the contract will be for 30 million dollars over the next five years, there are those that are concerned that this might limit the company’s growth potential.

Your Task

The President of the company has asked you to discuss with the key players to find out their position about moving forward with the contract, to put together a pros and cons list, and to put together details about the essential elements of the contract that need to be included.

Your Role

As the project manager, you have been tasked with gathering feedback from different parties and to put together a go forward plan.  Below is a summary of some of the important comments from your individual meetings with these individuals.

Key Players

Click the left or right arrows to view the key players.

Accessible CarouselPrevious

Phil, ISD Vice President, Operations

“I think that this government award is great, but I worry if we will be able to supply everything they requested.  I want it to happen, but all the problems land on my desk and if we cannot produce, the government will cancel the contract.  I’m not saying that we can’t do it, but one cannot just double production overnight.

Our operational footprint is still quite small and expansion will be tough.  Also, lets not forget the government wants everything delivered in Virginia and we are based in Los Angeles.  Its not just a walk down the road and now we will be moving our proprietary technology that we will have to protect in transit.  It just is a very complex situation that will take planning and coordination so we need to be careful about how the contract is written.  I know that the government wants everything tomorrow, but we need to be smart about how we expand.  We don’t want to be in a situation where we over promise and under deliver, because then the government will have a reason to cancel the contract.  If the government cancelled the contract, we will own a lot of stock and have no sales.”

Iris, ISD President and CEO

“The government contract will ensure the future of the company.  It will double our revenue and we will be able to do so much more in the future. I know that there are some concerns that we could do more if we sold this technology to others, but my biggest worry is that if this technology ended up in the wrong hands, they would be able to reverse engineer it and we might not be able to compete.  Having a solid contract with the government with a steady cash flow will give us a solid base as well as to help protect our interests for the next five years.”

Tony, ISD Vice President, Sales & Marketing

“I like the idea of working with the government, but this is really going to hurt our sales.  I have been working with clients to have them buy into our IO technology so it will be a big disappointment if I have to go back to them and tell them I can’t sell it to them.  I am sure that I could bring in millions of dollars in sales just from the clients I have been telling them about this technology.  I know the government wants it for drones, but I think that the application of this technology could have a much broader appeal.”

Phil, ISD Vice President, Operations

“I think that this government award is great, but I worry if we will be able to supply everything they requested.  I want it to happen, but all the problems land on my desk and if we cannot produce, the government will cancel the contract.  I’m not saying that we can’t do it, but one cannot just double production overnight.

Our operational footprint is still quite small and expansion will be tough.  Also, lets not forget the government wants everything delivered in Virginia and we are based in Los Angeles.  Its not just a walk down the road and now we will be moving our proprietary technology that we will have to protect in transit.  It just is a very complex situation that will take planning and coordination so we need to be careful about how the contract is written.  I know that the government wants everything tomorrow, but we need to be smart about how we expand.  We don’t want to be in a situation where we over promise and under deliver, because then the government will have a reason to cancel the contract.  If the government cancelled the contract, we will own a lot of stock and have no sales.”

Iris, ISD President and CEO

“The government contract will ensure the future of the company.  It will double our revenue and we will be able to do so much more in the future. I know that there are some concerns that we could do more if we sold this technology to others, but my biggest worry is that if this technology ended up in the wrong hands, they would be able to reverse engineer it and we might not be able to compete.  Having a solid contract with the government with a steady cash flow will give us a solid base as well as to help protect our interests for the next five years.”

Next

  • 1
  • 2
  • 3

Assignment

Deliverable: Turn in a three- to five-page paper outlining your complete responses to the above questions.

  1. Write one page about if the company should or should not move forward with the contract. Base this upon the facts, the comments from the key players and other supporting research (Note: Review Chapter 9 of the Procurement Project Management Success: Achieving a Higher Level of Effectiveness book). Justify your decision and explain your position.
  2. Put together a pros and cons listing and score each pro and con (You can just list them in order of importance). Remember to define and explain each pro and con in detail.
  3. Identify the required elements that should be included in this important contract. Justify each required element.
  4. As part of the award, the government has requested that your company attend a debrief meeting. What will you disclose and what will you not disclose at this meeting?

Strategy

 Consider your company or one that you know well and evaluate the words of their mission and vision statements. You must include the company’s mission and vision statements in your initial post.Using the information in Table 2.2 from our text, critique the adequacy and merits of the words of their vision statement identifying effective elements and shortcomings. Using the below criteria, evaluate the adequacy and merits of the words of their mission statement. Mission Statement Criteria:

  1. Identifies the company’s products and/or services.
  2. Specifics the buyer needs that the company seeks to satisfy and the customer groups or markets that it serves, and
  3. Gives the company its own identity.
  4. What recommended changes (identify at least one change for each statement) would you make for each statement and why? 

Please note that you are not evaluating what you know of can find out about the company, but simply the words they use for their vision and mission statements. 

 Your initial response to the discussion question should be 250-300 words. You must have at least one course (our text) and one non-course scholarly/peer reviewed source in your initial posting.  Sources require in-text citations and must be incorporated into the body of the post in addition to a full APA citation at the end of the post. 

References: