Discussion

  

Security Architecture and Design 

  

1. What does an assessor need to understand before she or he can perform an assessment?

2. How active is each threat agent? How might a successful attack serve a particular threat agent’s goals?

Physical security 6

 Subject name: Physical Security

Provide a reflection of at least 500 words (or 2 pages double-spaced) of how the knowledge, skills, or theories of this course have been applied or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories, and knowledge could be applied to an employment opportunity in your field of study. 

REQUIREMENTS:

Provide a 2 page double spaced minimum reflection (i.e. no less than 2 full pages of content). This does not include the required APA Cover Page and reference page.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

Share a personal connection that identifies specific knowledge and theories from this course.

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 

Define and explain how the Twitter search function works to search for specific words in any Twitter post.

Define and explain how the Twitter search function works to search for specific words in any Twitter post.

In developing your initial response, be sure to draw from, explore, and cite credible reference materials, including at least one scholarly peer-reviewed reference. In responding to your classmates’ posts, you are encouraged to examine their opinions, offering supporting and/or opposing views.

2 and half page

I want to demo chat web application with technology Angular 8 or above (frontend) and Spring (backend) with mysql databse
1. user can signup and login and chat with each other (one to one chat for example facebook)
2. web page design is not needed.
4. all chat should be store in database. if user have some chat and when it logout then after login all previous chat should be present in chat history.
3. it should be work in windows 10.

Contracting & Service Level Agreements

 

Discuss in 500 words or more the top 5 details that should be included in your cloud SLA.

Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes.

Write in essay format not in bulleted, numbered or other list format. 

BSWA10

 

You are the web master for the Republican Party National Committee. Prepare a risk assessment analysis for your website. Some questions to consider:

  • Who is likely to attack your site?
  • When are attacks likely to occur?
  • What sort of attacks might take place?
  • How can you best minimize attacks and protect the integrity of your site?

Write between 200-300 words.

Use your own words.

cis210 essay

 

You were talking to members of your favorite local band after a recent show. The topic of software came up, and the leader said she has a love-hate relationship with it. She loves the recording software they use and is okay with QuickBooks for the band’s financial records. But, she does not like the available options to track bookings and create set lists that draw from their entire repertoire.

In addition to their regular weekly gigs, the band performs for many school assemblies and community events. They have to pick music that’s appropriate for the audience and the theme without being repetitive. They are constantly adding new songs to their catalog, and putting others on hiatus. The band likes to take requests, so they frequently update the set list after a gig. The band does not want to bother entering chords or lyrics because they don’t use computers or phones on stage.

You offer to put together a system design to address the band’s needs. It’s okay to collect ideas by looking at off-the-shelf solutions, but the design must be your own for this assignment. Include the following in your design:

1. A list and short explanation of each function to manage:

  1. the band’s song catalog,
  2. bookings,
  3. set lists, and
  4. any other category you believe is important for this application.

2. A logical data design that supports all of these functions. Use either an entity-relationship or a UML class diagram, which should be in third normal form. Indicate all primary keys, relationships, and cardinalities.

3. Recommend a system architecture that identifies the hardware and software components and how they interact. Include a short (not more than 500 words) description and rationale. Illustrate using your choice of a static functional decomposition or object-oriented diagram.

4. Identify security concerns and other nonfunctional requirements for this system.

5. Propose at least three distinct and measurable criteria to evaluate the quality of the finished software.

Important Note: The required attached template must be used for this assignment and is not optional. It has been designed so that papers are logically organized and includes prompts for all required information for the assignment. Assignments submitted not using this template will be returned ungraded and must be resubmitted using the template. Late penalties on improperly submitted papers will apply in accordance with the published late policy.

COM303 Week 3 Discussion 8

  

Put the word family into an internet browser search engine and then select “images” to look at the photos, cartoons, etc. that pop up when we look up the word family. What do you notice about those ‘families’ that the internet determines are families? Are there any disturbing trends? Any reassuring trends? Choose one photo that came up in your search and analyze it based on the elements and qualities your book uses to explain the family unit. (Be sure to include a link to the photo or upload it directly in your post.)