writing assignment

 

Introduction

For a simple decision it is either a question of taking one path or another path. With multifaceted decisions it can be a more complicated process because, one decision may affect the outcome of another decision and/or vice versa. In making decisions there also could be uncertainty and the degree of an uncertainty could affect the decisions.

Activity Instructions

To learn about decision trees in business conduct research within the TU library databases and credible Internet resources to explain the following:

  1. Discuss the concept of a decision tree.
  2. Outline its purpose in business.
  3. Explain the advantages and disadvantages over other decision techniques
  4. Describe how uncertainty is depicted within the tree and how it is considered within the tree to make decisions.
  5. Draw a decision tree making at least a 3-level decision:
    • Explain the decision the tree is depicting, and how the tree can be utilized to make the decision
    • When drawing the decision tree, you can use the features in Microsoft Word within your paper or draw the tree on paper, take a picture of the tree, and insert the picture into the word document. If you are not familiar with the tools in Microsoft Word, it may be simpler to draw the decision tree. If you draw the tree and take a picture, make sure you make the drawing large enough, the drawing is legible and the picture you take is clear and focused.

Writing and Submission Requirements

  • 2-3 pages (approx. 300 words per page), not including title page or references page
  • Minimum of 2 references

Discussion

 Their is little doubt we are living at a time when technology is advancing at a pace that some believe is too fast for humans to trucly understand the implications these advances may have.  Search the peer-reviewed literature for examples of this. You may select any topic relating to technology that illustrates the potential for really messing things up. Include, in your description, an analysis of what might have caused the problems and potential solutions to them. 

Prof writing & proposal Devel(DSRT) new question

 

Do a little bit of research on grant writing versus academic (scholarly) writing. 

Then…

1) Write a one sentence statement that describes the difference in grant writing vs. scholarly writing.

2)  Copy and paste this link in your browser https://walmart.org/how-we-give/local-community-grants and read about local community grants from Wal-Mart. Type up your grant application using the link, copy  the online application and paste it in the discussion forum (screenshots are okay). The amount of the award ranges from $250 – $5,000 and the application is very short.  Please apply for this grant for your school or organization if you can. 

3) Research a need in your community and write a 300 word needs section in an academic writing style, citing your references in APA format. Copy and paste into the discussion forum. 

4) Write One paragraph describing the mock dissertation topic (see list of topics below) that you will write about in this class and include your research question. Use academic writing style and standard. There is no word limit. 

  • Note: Topics chosen in this course cannot be used in your actual dissertation that you will complete in the future.
  • Students must choose from the listed topics of their school/program:
    • Business Students:
      • How Corporate Policies And Practices Enhance Company Competitiveness
      • Corporate Social Responsibility (CSR) and how it Affects Customer Loyalty
    • IT Students:
      • Enhancing Cyber Security In Healthcare -With The Help Of Machine Learning
      • Using Data Science Techniques To Enhance Data Security
    • Leadership / Educational Leadership Students:
      • Leadership Impact on Organizational Performance
      • The Influence of Visionary Leadership on Change Management and Implementation

5)  Reply to two other student’s posts. 

Project #4 CRC cards and Class diagram

Project #4 CRC cards and Class diagram

ACTIVITY DIAGRAM

The following activity diagram depicts the process of buying eye glasses from the viewpoint of the patient. The first step is to see an eye doctor who determines if the patient needs glasses then gives the patient a prescription. The patient goes to a glasses store, where he selects the frame and places the order for the glasses. Once the glasses have been made, the patient returns to the store for a fitting and pays for the glasses.

page1image2113242272

USE CASE DIAGRAM

The following use case diagram illustrates the process of buying eye glasses.

page2image2139489200

CRC CARDS AND CLASS DIAGRAM

The following concepts were identified from the Activity diagram and Use Case diagram above.

Patient Prescription Eyeglasses Frame

Lenses Order Doctor Store

ATTRIBUTES AND BEHAVIORS

The system needs to remember at minimum the following attributes and perform the following operations

System Attributes

System Behaviors

Eyeglasses getLenseID Eyeglasses getFrameID Order calculateTax
Order calculateItemCost Order calculateTotalCost Customer getContact Customer getPaymentInfo Prescription getSpecification Lens getStrength

Frame getStyle
Store getDirections Doctor getAppointment

Bill to address CC#
Email address ID

Customer
Customer
Customer
Customer
Customer
Customer
Customer
Doctor ID
Eye glasses Base cost Eyeglasses Description Eyeglasses Discount cost Eyeglasses Manufacturer Eyeglasses Model

Frame ID
Lens ID
Order Date
Order Discount price Order ID

Order Quantity
Order Retail price Prescription Date Prescription specification Product ID (eyeglasses) Ship to address

Store name Store phone Store address Store number

Name
Phone number (home) Phone number (work)

PROJECT REQUIREMENTS

1. Create a CRC card for each class
2. Use the classes that were outlined for you and create the CLASS diagram for the system.

  •   Determine which class each attribute belongs to.
  •   Identify and add associations to the diagram
  •   Name your associations
  •   Add attributes and behaviors to the diagram
  •   Identify and add multiplicity indicators to the diagram
    PROJECT DELIVERABLES
    1. Upload your PDF version of the project to the assignment posting on blackboard 2. Use the cover page at the end of this handout as the first page of your assignment

Authentication and Authorization

  1. Add authentication (movie-login and movie-logout). 
    • In movie-login, include salting/hashing/sanitization.
    • Add username to session upon successful login.
    • Write session check code. Include (use PHP include or require) session check to every page (except login and logout pages). This  means that when a user goes directly to any page without login, the user will be redirected to the login page. 
    • Upon logout, destroy session and other code (see lecture). Redirect user to the movie-login page upon logout.
  2. Add Authorization.
    • Add DB table for ROLE. There should be two types of roles: customer and admin. See document for role access info for each use case.
    • Add PHP code to perform authorization (role matching) in authorizing.php. Include (use PHP include or require) authorizing.php into all secured pages (pages that need authentication to access them). 
    • Add unauthorized.php to direct users without authorization to. 
    • Add one new page to show a list of all Users. Only ‘admin’ has access to this page. Both ‘admin’ and ‘customer’ have access to other Movie pages. (5 pts extra credit for those who did pages for Add/Update/Delete User data).

4s week 8 assignment EH

In 300 words,

Keystroke logging, often referred to as keylogging or keyboard capturing, is the action of recording (logging) the keys struck on a keyboard, typically covertly, so that the person using the keyboard is unaware that their actions are being monitored. Explain a situation where using a keyloggers may be used in either a legitimate (legal) way or used as a tool for criminals.

Include references.

No copy paste, use your own words.

Network 4

https://computer.howstuffworks.com/internet/basics/internet-infrastructure.htm

One of the greatest things about the Internet is that nobody really owns it. It is a global collection of networks, both big and small. These networks connect together in many different ways to form the single entity that we know as the Internet. In fact, the very name comes from this idea of interconnected networks.

write a brief (3 page) review of the Link, describing why you chose this particular topic and what you found particularly valuable. As always proper spelling, punctuation, citation of referenced sources is expected

Wk 2 Penetration Testing

 

  •  
    Week 1 is attached.  Assignment request is below.

    Assignment Content

  1. A Penetration Tester evaluates the security of an information infrastructure by intentionally, and safely, exploiting vulnerabilities.

    Take on the role of Penetration Tester for the organization you chose in Week 1.

    Use the Penetration Testing Plan Template to create a 3- to 4-page Penetration Testing Plan for the organization you chose.

    Research and include the following:

    • Pentest Pre-Planning
    • Engagement timeline: Tasks and who performs them
    • Team location: Where will the penetration team execute their tests?
    • Organization locations tested: multiple locations, countries (Export restrictions and government restrictions)
    • Which pentest technologies will be used? Consider the following as you research options:
    • Scanning Tools: Nmap, Nikto
    • Credential Testing Tools: Hashcat, Medussa, John the Ripper, Cain and Abel
    • OSINT Tools: Whois, TheHarvester
    • Wireless Tools: Aircrack-ng, Kismet
    • Networking Tools: Wireshark, Hping
    • What client personal are aware of the testing?
    • What resources provided to pentest team?
    • Test Boundaries:
    • What is tested?
    • Social engineering test boundaries? What is acceptable?
    • What are the boundaries of physical security tests?
    • What are the restrictions on invasive pentest attacks?
    • What types of corporate policy affect your test?
    • Gain Appropriate authorization (Including third-party authorization)
    • Pentest Execution Planning: Given the scope and constraints you developed in your Pentest Pre-Plan, plan the following pentest execution activities
    • Reconnaissance
    • Scanning
    • Gaining Access
    • Maintaining Access
    • Covering Tracks
    • Pentest Analysis and Report Planning: 
    • Analyze pentest results
    • Report pentest results
    • Note: The page assignment length requirement applies to the content of the assignment. Start the assignment with an APA formatted title page and add a reference section with at least two professional references. Use the references in the text of the assignment. For assignments that require use of the template, insert the completed template into the APA document. Delete the assignment instructions from the document. This will improve the originality score from Safe Assign. Make sure to check the SafeAssign originality score. Individual assignments can be submitted more than once to correct any content, quality, or originality issues.

      Submit your assignment.

      Resources: