Individual Assignment and Rubric.docx

 As the new Chief Information Security Officer (CISO) for PostCyberSolutions (PCS) LLC you are developing a Security Program Plan for the Executive Board approval. Based on your research for Unit 1:

  • Develop the PCS security program charter for the corporate network and satellite offices.
  • Clearly state the CISOs vision including elements of a strong security program.
  • Include information regarding some of the regulations or laws that influence the direction of your security program.
  • Identify the key roles and responsibilities of the various company stakeholders.

The requirements for your assignment are:

  • 1-2 page APA paper excluding title and reference pages
  • Provide at least two references and in-text citations in APA format
  • College-level writing

Refer to the attached document for the grading rubric. 

10p1

4-5 pages and must include minimum 5 scholarly references. The page requirements listed below apply to the project and not the final capstone. It important that students follow the capstone format/subheadings for both proposal and capstone. Questions concerning APA format,

5/2 Discussion Read

  1. Read Chapters 9 and 10, and review Chapter 6 in your textbook.
  2. Using the discussion link below, respond to the following questions:
    1. What was the most useful takeaway for you from this workshop’s reading?
    2. What concept from the reading is the most applicable to you now in your profession, and how might you implement it?
  3. 300 word

Computer and Number Systems

  

Computer and Number Systems

1. You have been hired to develop a website-based sales system for a large international retail firm. List and describe at least fourfeatures that are specific to the Web design of your system and customer service important to consider if your system is to be successful at attracting and keeping customers living outside of the US. Include not only characteristics of the user interface, but those issues that must be uniquely addressed to successfully service your non-US customers.

The first characteristic concerns the need to understand the critical concept of colors and the potential significance. Red for example in a US environment may signify an error or warning whereas other cultures may use green or black for the same purpose.

Secondly, any symbols or flags should be treated with caution due to certain connotations causing problems in certain cultures – the thumbs up in Iran for example would be highly offensive.

Thirdly payment options should also take into account cultural considerations, with some countries preferring electronic payments while others are using money orders – there should be appropriate payment options for each country that is being served by the website.

It would also be advisable to create different versions of content for each specific culture/region that will be using the site – in this way relevant analogies and formatting of content can be adjusted accordingly.

  

2. In order to receive credit for these problems, you must show all of the steps you took to arrive at your answers.

(c) Convert the following decimal number to binary:

 

(d) Convert the following binary number to decimal:

 

(c)Convert the following hexadecimal number to decimal:

 

(d) Convert the following binary number to hexadecimal:

 

3. ASCII, Unicode, and EBCDIC are, of course, not the only numeric / character codes. The Sophomites from the planet Collegium use the rather strange code shown in the Figure below. There are only thirteen characters in the Sophomite alphabet, and each character uses a 5-bit code. In addition, there are four numeric digits, since the Sophomites use base 4 for their arithmetic. Given the following Sophomitesequence, what is the corresponding binary message being sent by the Sophomites?

4. Define memory cache write-through and write-back techniques and describe the advantages and disadvantages of each.

Input / Output

5. Answer the follow questions about interrupts.

a. Describe in detail the steps that occur when a system receives an interrupt.

b. Describe how these steps differ in the case when a system receives multiple interrupts

6. Answer the following questions about clusters.

a.Describe how you might use a cluster to provide fault-tolerant computing

b.Describe how you might use a cluster architecture to provide rapid scalability for a Web-based company experiencing rapid growth.

7. Answer the following questions about communication protocols.

a.Using the operations of UDP (User Datagram Protocol) and TCP (Transmission Control Protocol) as a basis, carefully explain the difference between connectionless and connection-oriented communication.

b. If you were ordering a number of items from an online seller, such as amazon.com, which Protocol (TCP or UDP) would you recommend and explain why.

8. In the context of network security, 

a.explain the purpose of non-repudiation. 

b.How does non-repudiation differ from authentication?

c.(4 pt) Create a business scenario that illustrates the importance of each.

9.Circleor highlight the correct answer to the following questions / statements about data communications:

(a)What characteristic of an analog signal is measured in Hertz, or cycles per second?

a. Amplitude c. Phase

b. Frequency d. Skew

(b)What measurement unit describes the speed and capacity of a communication channel?

a. Throughput c. Response Time

b. Access Time d. Data Transfer Rate

(c)____ can be produced by a variety of sources, including electric motors, radio equipment, and nearby power transmission or communication lines.

a. EMI c. Distortion

b. Attenuation d. Signal/noise (S/N) ratio

(d)A(n) ____ can extend the range of an electrical signal by boosting signal power to overcome attenuation.

a. repeater c. amplifier

b. return wire d. signal wire

(e)Which of the following does not allow multiple messages to be carried on a single channel?

a. time division multiplexing c. packet switching

b. frequency division multiplexing d. half-duplex

10. Answer the following questions about user interfaces:

(a) List and explain at least two of the definite advantages to the use of a command line interface (CLI) over other types of interfaces. 

File Management

11. Answer the following:

a.Use the following four processes that have arrived in the ready queue in the sequence shown below and answer the following about process scheduling:

  • Process      1 has a total run time of 25 seconds and a priority of 2, but it will      require 15 seconds of I/O after 10 seconds of execution
  • Process      2 has a total run time of 30 seconds, a priority of 1, but it will require      10 seconds of I/O after 20 seconds of execution
  • Process      3 has a total run time of 15 seconds and a priority of 3
  • Process      4 has a total run time of 20 seconds, a priority of 2, but it will require      15 seconds of I/O after 5 seconds of execution

(ii)If the round robinscheduling algorithm is used, which process will finish first? At what time will it complete?

(i)Both shortest job first and non-preemptive priority queue scheduling algorithms will complete all four 

ITGE W 4 A

Find a peer-reviewed scholarly journal article discussing blockchain technology. Complete a review of the article by writing a 2-3 page overview of the article. This will be a detailed summary of the journal article, including concepts discussed and findings. Additionally, find one other source (it does not have to be a peer-reviewed journal article) that substantiates the findings in the article you are reviewing. You should use the UC library (https://www.ucumberlands.edu/library) and/or Google Scholar to find these types of articles (https://scholar.google.com/ )Once you find the article, you will read it and write a review of it.  This is considered a research article review.Your paper should meet these requirements: 

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Be sure to check your safe-assign score.  If it’s over 30%, you need to review the safe-assign report, revise your paper accordingly and resubmit.  You may resubmit as many times as needed BEFORE the due date. 

Discussion wk 4 responds 1

Explain the basic structure of the Medicare program.  

The reference at the bottom of your post should appear as follows:
Reference
Carol J. Buck, Saunders. Step-by-Step Medical Coding, by Carol J. Buck, Saunders