questions will be over converting Binary, Octal, Hexadecimal, and Decimal, 2’s Complement and Boolean Logic.
Paper for $8
Attach your discussion here
500 words
Project Team Lead
In 175 words or more imagine you are a project team leader and have been asked to develop a conversion and migration strategy. Create three conversion and migration tasks specific to a system implementation and discuss why those tasks are important for a successful implementation.
Malware Protection Procedure Guide
Requirements:
§ Format: Microsoft Word (or compatible)
§ Font: Times New Roman, size 12, double-space
§ Citation Style: APA
§ Length: 3 pages
Always Fresh allows external users, such as vendors and business partners, to access the Always Fresh Windows environment. You have noticed a marked increase in malware activity in the test environment that seems to originate from external users. After researching the likely source of new malware, you conclude that allowing external users to connect to your environment using compromised computers exposes Always Fresh to malware vulnerabilities.
After consulting with your manager, you are asked to create a policy that will ensure all external computers that connect to Always Fresh environment are malware free. You create the following policy:
“To protect the Always Fresh computing environment from the introduction of malware of any type from external sources, all external computers and devices must demonstrate that they are malware free prior to establishing a connection to any Always Fresh resource.”
Consider the following questions:
1. What does “malware free” mean?
2. How can a user demonstrate that their computer or device is malware free?
3. What are the steps necessary to establish a malware-free computer or device?
4. How should Always Fresh verify that a client computer or device is compliant?
Tasks
Create a malware protection procedure guide that includes steps for installing and running anti-malware software. Fill in the following details to develop your procedure guide:
1. Provide a list of approved anti-malware software solutions—include at least three leading antivirus and two anti-spyware products. You may include Microsoft products and third-party products. Instruct users to select one antivirus and one anti-spyware product and install them on their computer.
2. Describe the process of:
a. Ensuring anti-malware software and data is up to date. Mandate daily updates.
b. Running regular malware scans. Mandate that automatic scans occur whenever the computer is idle. If that setting is unavailable, mandate daily fast scans and biweekly complete scans.
3. Provide steps to follow any time malware is detected.
a. Immediate reaction—what to do with current work, leave the computer on or turn it off
b. Who to contact
c. What information to collect
The procedure guide may be used by company security professionals in the future. Hence, all steps listed should be clear and self-explanatory.
practical connection online
At UC, it is a priority that students are provided with strong educational programs and courses ( Enterprise Risk Management (ITS-835-02)that allow them to be servant-leaders in their disciplines and communities, linking research with practice and knowledge with ethical decision-making. This assignment is a written assignment where students will demonstrate how this course research has connected and put into practice within their own career.
Assignment:
Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.
Requirements:
- Provide a 500 word (or 2 pages double spaced) minimum reflection.
- Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.
- Share a personal connection that identifies specific knowledge and theories from this course.
- Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment.
- You should NOT, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.
- Any use of outside sources, including your own prior work, will result in a zero on the activity and a report being filed with Academic Affairs regarding plagiarism (even if self-plagiarism).
Data Analytics
1. Explain what analytics are? What are business analytics? Do they differ from other analytics and how? Explain why or why you cannot do analytics without data? Explain why or why you cannot do analytics without big data?
2. Where do you get the data for analytics? Is all of it internal to the company? Identify at least 5 sources of external data and explain when you might be able to use them.
1. What is data mining? Why is data mining so popular?
2. What are the privacy issues associated with data mining? Do you think they are substantiated? Why or why not? — ignore this question — already responded to in the discussion.
3. Distinguish data mining from other analytical tools and techniques.
4. Discuss at least 3 data mining methods. What are the fundamental differences among them
The above assignments should be submitted in one-word document. Include an APA cover page and a reference page.
When submitting work, be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations)
it
Have you heard of The American Film Institute (AFI)? According to their website they are:
” America’s promise to preserve the heritage of the motion picture, to honor the artists and their work and to educate the next generation of storytellers.”
In 1998 AFI gathered a wide variety of individuals from across their community to help compile a list of the top 100 films of all time. This list was adjusted in 2007, but we’re going to stick with the original list seen below. The full list can be seen here: Link (Links to an external site.)Links to an external site.
Watch: THE GODFATHER (Links to an external site.)Links to an external site.
1972
Using at least three or more of the dimensions of the film we have covered up to this point: narrative, mise-en-scene, cinematography, editing, and sound, write an essay exploring THE GODFATHER movie. Your essay can be organized in a number of ways, but students are often most successful when they pick a scene for each element and discuss how the cinematic element best plays out in said scene. Be sure to use terms we’ve learned over the past 4 weeks and provide specific examples from the film to support your points. The paper should be 4 pages long, double-spaced, typed in Times New Roman and 12 point font. Include a Works Cited section at the end of the essay listing the film and any references you may have used to write your pa
Project report
I need an project report for an application(approximately 10 pages). It’s an web application using solidity as the backend and react as the frontend . Already have the code everything just need the report for it. Web application is hotel management system Using blockchain technology.
enterprise_C_6
Review the included ISACA built risk case. You will need to complete the tasks identified in the later part of these slides labeled To Do. Re-evaluate the probability and risk level for all of the rows in table 2. When you make your decision on the new probability rating, you will need to justify this with one to two articles. When you identify the new risk level, you will need to identify two to three articles as examples or sources to justify the changes. Don’t just move it up or down, use current news and trends with similar companies to justify why you moved or even kept it the same. For each item, run a Quantitative or Qualitative risk analysis for a proposed mitigation. In other words, find a fix for each item and put a price tag with it. Decide what items are in budget and make your choice. You will add three new columns to table 2, one will be a proposed mitigation plan with budget and risk level from the FAIR methodology, and the second column will be if your risk decision (accept, mitigate, transfer, avoid). Submit the completed spreadsheet to the submission item in this week. You will also need to answer the 10 discussion questions at the end of the slides and submit those with your spreadsheet, either as a second page with answers in the cells or as separate document.
calculate dog age to human years netbeans java
For this assignment you must use the rules above to calculate the age of a dog in human
years given its weight and its actual age. Your program must do the following:
1.
Display a welcome message with your name in it.
2.
Prompt the user for the name of the dog.
3.
Repeatedly prompt the user for the age of the dog until the user enters a value is
between 1 and 16.
4.
Repeatedly prompt the user for the weight of their dog until the user enters a weight
that is greater than zero.
5.
Display the age of the dog using the name that the user entered in step 2.
6.
Repeatedly ask the user if they want to calculate the age of another dog until the user
answers
Y
or
N
.
7.
If the user enters
Y
, go back to step 2.
8.
If the user enters
N
, display a thank you message and exit the program.
Any time the user enters invalid input the program should display an error message before