Discussion Activity

  

 Review and summarize your ideas about the usefulness for the IT manager of a) a glossary that defines terms; b) the course readings; and c) working on a team including nominating potential teammates from the class roster.

13 Assignment

1. Using a Microsoft Word document, please review ONE of the following films  and tell how that film represents a contribution to the field of CyberLaw.

War Games (1983)Citizen Four (2014AlphaGo (2017)Google and the World Brain (2013)

2. The minimum word count shall be not less than 1000 words APA format and citations.

2 PPT slides

Compensation: Involves designing and implementing compensation, benefit, and incentive systems for employees and ensuring that compensation systems are fair and consistent.

Description of problems or challenges organizations face when performing this function

Review the attached pdf and answer the following questions

Answer to the following questions:

  1. Do you think the regression line sufficiently captures the relationship between the two variables? What might you do differently? 5 pts
  2. In the Iris slide example, how would you characterize the relationship between sepal width and sepal length? 5 pts
  3. Did you notice the use of color in the Iris slide? Was it effective? 5pts
  4. Why or why not? 5pts

Sort question

9.1 Give examples of applications of IPsec.

9.2 What services are provided by IPsec?

9.3 What parameters identify an SA and what parameters characterize the nature of a particular SA?

9.4 What is the difference between transport mode and tunnel mode?

9.5 What is a replay attack?

9.6 Why does ESP include a padding field?

9.7 What are the basic approaches to bundling SAs?

9.8 What are the roles of the Oakley key determination protocol and ISAKMP in IPsec?

Order # 13501

Title: Programming in C: Getting Started

Paper type Other (Not listed)

Paper format APA

Course level Undergraduate

Subject Area Technology

# pages 1   ( or 300 words Minimum)

Spacing Double Spacing

# sources 4

Paper Details

This assessment consists of four short programs. Use Code::Blocks to complete your work. You will submit the four C source code files for this assignment. Please zip the files and include your name in the name of the compressed file.

Part 1: Commenting Code

Including comments in source code that explains what the code does and how it does it are an important professional best practice. Code that is well-commented and well-formatted facilitates communication between programmers and others needing to work with the code. Commenting your code needs to be a habit from the beginning. Adding comments to code will also help reinforce important C programming concepts in your own mind.

Type in the code provided in the assignment Resources, build/compile the program, and run it. Typing the code in yourself rather than copying and pasting will help you get to know the C language. When you have the code running, go through the code and add comments to explain what the code does and how it does it. Be sure to add a header like the following to all code files (with your name and the date).

/* Ann Smith – IT-FP2240 – u01a1 – Part 1

* 10/01/2015 Rev. 1

*/

You should add at least five comments to the code provided. Be sure to recompile and test the code after you have added your comments to make sure you have not introduced any syntax errors.

Part 2: About You

Create a program that prints three lines of text about yourself. Be sure to include appropriate spacing and new line characters to make the output in the terminal window readable. As with all programming code, but sure to format the program correctly and include comments and a header for the file, such as shown above.

Part 3: Integer and Floating Point Arithmetic

Write a single program that prints the results of two arithmetic expressions using integers and the results of two floating-point calculations. Print out both the arithmetic expressions and the answers calculated by the code. For this program, it is fine to use “hard-coded” values (the numbers used in the calculations are provided in the code) rather than user input. Be sure to format the code correctly and include relevant comments in the source code (including the comment at the top of the file with your name and identification of the program).

Part 4: User Input

Write a program that prompts the user to enter a character, an integer, and floating point number. After reading the input, the program should print out the values entered. Be sure to format the code correctly and include relevant comments.

When you are ready to turn in your assignment, download your .c source code files and zip them together for submission.

Requirements

Include a title page and reference page, if necessary.

•APA format.

•Times New Roman font, 12 pt.

•Double-spaced.

Literature

 

The bonds between siblings are among the strongest. May-Lee Chai describes the relationship between two sisters in her short story, “Saving Sourdi.” 

After reading “Saving Sourdi,” discuss the following questions in 3–5 paragraphs:

  1. The story begins with a strong revealing statement from Nea, the narrator. How do you think Nea feels about her sister Sourdi based on this information? How does what happens at the beginning of the story foreshadow what happens later?
  2. This story is told from Nea’s point of view. How do you think the story would change if it were told from Sourdi’s point of view? Do you feel closer to the character than you would if this story were told in third person?
  3. Nea briefly mentions an experience she and Sourdi had in a minefield when they were younger. What impact do you think this had on the relationship between the sisters?
  4. Nea’s family is not originally from the United States. What are some clues the author gives to describe the origin of their ethnicity? Give 2 examples of characters who say things that are racially offensive, and discuss how this makes you feel about those characters. Can you relate to these experiences?
  5. How does the author describe Duke and Mr. Chhay? Do you get a sense of who these characters are based on these descriptions?
  6. As the story progresses, how does the relationship between Nea and Sourdi change? Why do you think it changes?
  7. What does the mother value, based on how reaction to updates she receives from Sourdi? Why do you think she might feel this way?

Research Paper (operation security)

 

The primary goal of operational  security is to protect & secure the operations of an enterprise,  while securing the technologies needed to maintain network and resource  availability.  Your residency project will include research &  analysis on the below: 

Write a ten to fifteen (10 – 15) page paper in which you:

  1. Compare & Contrast access control in relations to risk, threat and vulnerability. 
  2. Research  and discuss how different auditing and monitoring techniques are used  to identify & protect the system against network attacks. 
  3. Explain  the relationship between access control and its impact on CIA  (maintaining network confidentiality, integrity and availability).
  4. Describe access control and its level of importance within operations security.
  5. Argue  the need for organizations to implement access controls in relations to  maintaining confidentiality, integrity and availability (e.g., Is it a  risky practice to store customer information for repeat visits?)
  6. Describe the necessary components within an organization’s access control metric.

Your assignment must follow these formatting requirements:

  • Use at least ten – twelve (10 – 12 ) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. 
  • Be  typed, double spaced, using Times New Roman font (size 12), with  one-inch margins on all sides; citations and references must follow APA  or school-specific format.
  • Include  a cover page containing the title of the assignment, the student’s  name, the professor’s name, the course title, and the date. The cover  page and the reference page are NOT included in the required assignment  page length.

Duscussion

 

Conduct independent research to find a targeted recruiting strategy. Then answer the following:

  • Describe the strategy.
  • Who does it target?
  • Does it work?

Also share other recruiting strategies you personally think are worth using.

  • Please describe them
  • Share why you think they work

Cite sources.

Research and make powerpoint

As you can see from this module’s content, technology can be found everywhere including musics and movies. For example, “Kodachrome” by Paul Simon mentioned “kodachrome” and “Nikon camera”. If you are not familiar with this song, you need to search and listen to “Kodachrome” in order to complete this assignment.

1. Research on what kodachrome is/was and the history of it;

2. Research on the history of cameras; 

3. Create a PowerPoint document to include your research results. (25 points)

4. In the Notes section for each slide, provide a description and interpretation of the information you put on that slide:

You need to present your research results within these notes, as well as, discuss how technology can affect people’s way of communication and affect people’s way of sharing information based on your research. For example, what impact of kodachrome had? Why is it not popular now? What impact of cameras (film and digital cameras) have on people’s life? What other technologies have made or are making impact on people’s communication?

The information on your slides should not be an exact mirror of your notes (and vice versa). 

You may want to review Tips for Making Effective PowerPoint Presentations (Links to an external site.)

(25 points)