Teloxy Engineering

Case study: Teloxy Engineering (A)

1) Using expected value, is it economically better to make or buy the component?

2) Strategically thinking why might management opt for other than the most economical choice?

Two pages .

Cyber Law – Discussion 3

 A. Explain why there are two types of legal systems in the United States: State and Federal systems. How are they similar and how are they different?

Post should be 500 words and add references in APA format.

CSCI 457 Assignment 2 – Hexadecimal Calculator

Implement a hexadecimal calculator for iOS.

Requirements:
  • The calculator should support 4 basic arithmetic
    operations: + – * and /
  • The calculator will operate on hexadecimal numbers, not
        decimal numbers 
  • The calculator only needs to operate on unsigned integers
    (i.e. UInt). You do not need to consider negative numbers
    or fractions.
  • The calculator should support the 16-digit hexadecimal
    numbers (i.e. The range of the numbers is from 0 to FFFF FFFF FFFF FFFF). Prevent the user from entering a number that is greater than FFFF FFFF FFFF FFFF.
  • The calculator should handle overflow and underflow gracefully. The app must not crash.
  • The calculator should handle division-by-zero error gracefully. The app must not crash.
  • The calculator should be able to support most of the devices and orientations. If it does not support the old devices earlier than iPhone 6, it is okay.
    Hint:
  • To convert a string to a hex number, use “radix: 16” as an
    argument. For example:
    var s:String?
    s = “1A”
    var intHex:UInt = 0
    intHex = UInt(s!, radix: 16)! print(intHex) // shows 26
    intHex = 90
    s = String(intHex, radix: 16).uppercased() print(s!) // shows 5A
  • It is recommended that you use a UI label instead of a text field, so that the user will not type directly by using a keyboard. You will need to provide a button for each digit.
  • Strings may be concatenated by using + operator. E.g. var s1 = “1234”

var s2 = “5”
print(s1 + s2) // shows 12345
You may want to do string concatenation in the action of each digit button.

  • To prevent the user from entering a number exceeding the size of 16 digits, you may verify the length of the string associated with the UI label.
  • To handle overflow and underflow, use &+, &-, and &* instead of +, -, and *.
  • To support different devices and orientations, use stack view, scroll view, or both.
  • Design your algorithm first! Think about the status of the calculator: when to take the first operand, when to take the second operand, when to append digits to the current number, and when to refresh the current number, etc.
    The functionality of your hex calculator worth 60% of the credit, while the appearance of the user interface worth 40%.
    When you submit the assignment, please compress the entire project folder into a single zip file, and upload it to D2L. In addition, please provide 4 to 5 screenshots of your app in different devices and orientations. If your app doesn’t work on every device/orientation, please specify why.
    The screenshots of a sample program are shown below. Your UI does not have to be the same as the sample program. As long as it has a pleasing looking, it should be fine.

Duscussion

 

Conduct independent research to find a targeted recruiting strategy. Then answer the following:

  • Describe the strategy.
  • Who does it target?
  • Does it work?

Also share other recruiting strategies you personally think are worth using.

  • Please describe them
  • Share why you think they work

Cite sources.

information technology

This presentation should summarize what you learned by completing your CRP (Career Research Project). You need to plan your presentation. Include before, during and after assignment thoughts. If you use outside resources, cite your sources with the presentation. While completing this presentation you should use several of the PowerPoint features you learned while completing the PowerPoint Tutorials assignment including: themes, transitions, lists, pictures, animation and audio. This Student Presentation assignment is worth 25 points.

You are required to follow Guy Kawasaki’s 10 20 30 rule. This rule is you should have no more than 10 slides, you should not talk for more than 20 minutes and you should not use a font size that is less than 30 points. Look Guy up and see what his background is. Check out his web page. He explains the rule nicely in this short video:

If you did not submit Phase 5 of the CRP, you are to create a presentation selling this course to another student. You must follow all of the requirements listed above. 

ig 2.2

Q2: In policy development, program Controls, Monitoring, Auditing, and Enforcement, we must gather metrics to determine the level of employee compliance, its impact on key operational areas, and progress made toward established business objectives. What are those types of metrics you will need to gather and how will you measure them? Please provide 2-3 page APA standard answer.

network security plan

 i think you have this on your site already but no way to search. 

Case Study:

You are a consultant working with a dental office that has just merged with another dental practice. The original office housed three dentists, two dental assistants, and one receptionist in one location. With the merger, there are now five offices in different parts of the city, 15 dentists, 12 dental assistants, and five receptionists. Four of the dentists work in the offices but also are mobile in that they provide dental checkups to elderly patients in their homes or at the senior citizen centers, and to school children in the three inner-city elementary schools. The mobile dentists need to be able to send and receive patient records while they are out of the office. All the dentists and dental assistants must have real-time access to all patient records and daily schedules. The lead dentist has reminded you that they are required to meet HIPAA requirements for protecting patient information. You, as a telecommunications specialist, have been asked to design the telecommunications network to support this new multi-location practice. Others on the team will develop the applications and databases. 

Create a network security plan that includes the following information:

  1. About the Company
  2. Objectives of the Plan
  3. Physical Assets
  4. Risks (Internal and External)
  5. Action Items (purchasing, installing, configuring, etc.)
  6. Policy Changes
  7. User Education
  8. Response Planning
  9. Ongoing Maintenance and Compliance

Define the requirements and then design an appropriate network that would support this dental practice. Your answer should:

  1. Explain the benefits of the proposed network solution.
  2. Identify the risks and risk mitigation strategies associated with the proposed network solution.

Your paper is to be prepared using APA format and include at least three academically credible references plus the class textbook for a total of four minimum cited references. Information from your research should be appropriately incorporated into your written work in your own words and properly cited. Extensive use of direct quotes is not permitted. Use the Grading Rubric below to ensure all aspects of the assignment have been adequately covered.

Preview the document

Unit 5 Graded Exercise: Review

 

Instructions

Unit 5 Graded Exercise 1 Downloadable InstructionsPreview the document

In this lab you will be creating a network using three routers, three  switches, one server and three PCs.  You will configure routing using  the RIP protocol.  You will set up DHCP on your server to allow the PCs  to pull dynamic addresses through the network.  Finally, you will  connect to a corporate server through the multiuser link.

Download the graded exercise instructions. Type your class number:  10.___.0.0/16 in all of the underline ___ indicators, answer the  questions as you go through the steps and add the screenshots where  indicated in the instructions document.

Methodology used on topic

   Try to find a quantitative, a qualitative and a  mixed-method dissertation that may be closely related to   Cloud migration and data security as key indicator in e-commerce and business success topic. Describe the method used, the sample, the population chosen, was there a survey involved, or a set of questions asked as in a qualitative study. Finally, can you identify the problem the dissertation tried to examine.