Python Coding (list and loops)

 

Instructions:

You will complete this assignment in Python 3.x. Make sure you have downloaded the software, and it is installed correctly. You will download it from this site.

You will code the following and submit it in one file. Use the information in the Lessons area for this week to assist you. Save it as a python file (.py), and upload it into the Assignments area.

  • Create a comment block (starts at line 1 in the code) with the following information:

Joshua Kreider

Week 8

26DEC2020

  • Problem 1: Create a list (or tuple only, no dictionary) that contains the months of the year. ( do not hardcode the month number)
  • Problem 2: Create a loop to print the number and the months of the year from the list. 
  •      The output should like this:

Month 1 is January

Month 2 is February

….

….

Month 12 is December

Discussion 2 HRM

You are responsible for planning and conducting diversity training for your organization. List and explain a minimum of three topics that you would include in the training and explain your rationale.

APA format 300 words and intent citations and at-least 2 peer reviewed articles as references.

Professionalism assignment help

NEEDS SLIDES and SUPPORTING NARRATION

I WILL DO THE VOICE AFTERWARDS

Bulleted Points on each slide should include brief points that identify the areas that will be addressed in the narration.

Your PowerPoint presentation should include a total of six slides using the following format:

Slide 1: Cover page that includes assignment title, your name, course, section number, and date.

Slide 2: Introduction of Company (1–2 minutes of narration)

  • Introduce the presentation by explaining information about the organization and the observation that took place such as the name of the organization, type of organization, day and time of observation and your role as an observer (are you an employee, customer, etc.).
  • Share background information about the company to give the audience an understanding of what this organization does. Support the ideas shared with research about the company’s background.

Slide 3: Professional Appearance of Employees and Company (1–2 minutes of narration)

  • Use these questions to guide your response (do not use these questions verbatim in your presentation):
    • How do the employees dress?
    • Is there anything about the appearance of the employees that distracts from their professionalism?
    • Do the employees’ appearance fit the nature of the business? Why or why not?
    • What does the working environment look like? (furnishings, artwork, lighting, sounds, etc.)
    • Do the physical surroundings fit the nature of the business? Why or why not?
    • How do the employees interact with each other and outside people within the workplace? (greetings, tone of conversation, non-verbal communication, etc.)
    • How do employees interact with each other?
    • Do the interactions of employees fit the nature of the business? Why or why not?

Slide 4: Analysis of Company (1–2 minutes of narration)

  • What inferences can you make from your observation? You should cover the following ideas in your explanation:
    • Analyze the company based on information you have learned about organizational culture in the class. Areas to include:
      • Determine the dominant organizational culture the company follows by choosing one of the 4 organizational cultures you learned during this unit of the course. Support this information with what you have learned about organizational culture based on both observations and research.
      • Compare the work done at the company and the organizational culture and explain how this relates.
      • Research the mission of the company and explain if it aligns with what you have observed. Explain why or why not.

Slide 5: Evaluation of Your Fit (1–2 minutes of narration)

  • Based solely on what you have observed and researched about the company (not based on the field of the company), do you feel you would be a good fit for this company? Why or why not?
    • Support this information with what you have learned through your observation as well as what you have researched about the company.
  • Identify at least 2–3 social and behavioral attributes you have that would be an asset to this company. Explain why. How do these attributes specifically connect with the nature and needs of the company?

Slide 6: Reference Slide – follows APA guidelines. (Reminder: for each source on the reference slide, there must be a corresponding in-text citation in the body of the presentation.)

Narration Guidelines: Your narration for the slides should demonstrate the following:

  • Maintain a persuasive tone by summarizing observations and evaluations for each slide.
  • Words should be clearly enunciated, and professional tone should be sustained throughout the presentation narration.
  • Audio recording should be free of background noise and interruptions. 

Assignment Format

  • Two attachments will be needed to hand in for this assignment:
    • PowerPoint Presentation including narration with six slides that is professionally organized
    • Transcript shared in a Microsoft Word document should be included (be sure to separate each slide on a separate page).
  • Replace all template wording with brief bulleted points in your own words that guides the audience.
  • Slides 2–5 should include narration. See information on Slide 2 in the template which explains how to add narration to a PowerPoint slide – (be sure to remove this slide before posting to the Dropbox)
  • Ideas throughout the assignment should be supported by specific areas observed while conducting the observation during this course.
  • Bulleted points on each slide should include brief points that identify the areas that will be addressed in the narration.
  • Researched information should be included on Slides 4 and 5 (In-text citations should be included with any brief points that were researched from outside sources and the narration should fully explain the points).
  • With the presentation, there must be a transcript included in a Microsoft Word document that includes the narration word for word for each slide. Be sure to use headings for each slide narration, e.g., Slide 2, Slide 3, etc.
  • Identify the source of any pictures you use. NOTE: Pictures are not required for this presentation.

Use the PowerPoint template provided and submit your two files (both the PowerPoint with audio narration and the MS Word document with the transcript) to the Unit 6 Assignment Dropbox.

Research Paper on 2019 Georgia Cyberattacks

  2019 Georgia Cyberattacks

You are assigned with the task of writing a 1500-2000 word critical analysis academic paper on the incident response and disaster recovery of a specific cybersecurity incident. You will find your assigned cyberattack/breach in the list below. Your paper must analyze how the targeted/victim organization detected, responded to, and recovered from the attack. Your paper must include the following:

1. It must be 1500-2000 words not including the references (you will lose marks if you exceed or fail to meet the wordcount by). 

2. It must be an original work of your own research and writing skills, free of plagiarism. 

3. It must be in the ieee format with correct citations and references. 

4. It must be written in professional academic language free of colloquialisms but also written so that a reader with an unknown level of knowledge (such as a C level executive, a board member, or manager) can understand your meaning, argument, and purpose. 

5. You must use reliable sources. i.e. Trusted verifiable web resources (i.e. legitimate websites, news resources, white papers, peer reviewed works such as books, conference papers, reports journal articles, etc) NOT Wikipedia or personal blogs. 

6. Your paper must have an introduction with a clearly stated thesis (an argument statement that tells the reader the point you will make. For example, XYZ company’s response to the ABC cyberattack was poorly managed due to a lack of communication or 123 Corp prevented severe financial losses due to their incident response handling). The introduction is the roadmap/outline to your paper. Following the introduction there must be a body containing the history of the attack/breach and an analysis of the incident that supports and proves your thesis. Lastly, you must write a conclusion that states how you have proven your argument and why it matters to Contingency Planning (IRP, BCP, DRP). The written part of the paper must be followed by a properly formatted list of references.

802.11x phones with a cellular system

 

The CEO of your selected industry has asked you to explore the possibility of replacing the wireless 802.11x phones with a cellular system. Explain the security program described, the differences in core architecture between different generations of cellular and mobile network technologies, the end-to-end delivery of a packet and/or signal, and what happens with the hand-off at each step along the communications path to the CEO.

Overview detailing the following:

  1. Various smartphone generations and technologies (e.g., GSM, WCDMA, CDMA2000, LTE).
  2. Recommendation for embedded smartphone operating systems (e.g., iOS, Android).
  3. Changes to existing networking infrastructure.
  4. Implementation of mobile protocols, logical channels, and encryption standards.
  5. Using mobile-unique identifiers and location-based services to track device and data input validation.

Your recommendations should cover the feasibility of using cellular systems to enter secure data into proposed databases.

assignment

 

FORENSIC DESIGN ASSESSMENTS

This task relates to a sequence of assessments that will be repeated across Chapters 6, 7, 8, 9 and 10. Select any example of a visualisation or infographic, maybe your own work or that of others. The task is to undertake a deep, detailed ‘forensic’ like assessment of the design choices made across each of the five layers of the chosen visualisation’s anatomy. In each case your assessment is only concerned with one design layer at a time.

For this task, take a close look at the colour choices:

  1. Start by identifying all the applications of colour deployed, listing them under the headers of 1) data legibility, 2) editorial salience, and 3) functional harmony.
  2. How suitable are the choices and deployment of these colours? If they are not, what do you think they should have been?
  3. Go through the set of ‘Influencing factors’ from the latter section of the book’s chapter to help shape your assessment and to possibly inform how you might tackle this design layer differently
  4. Also, considering the range of potential applications of colour, what would you do differently or additionally?

Assignment Link: http://book.visualisingdata.com/chapter/chapter-9

Website enrollment form

 

Website enrollment form

A blogging website wants users to enroll to get access to the blogs.  The figure above shows the form layout for enrollment.

Develop a Java WindowBuilder Application to implement this form.

Add a Button called “Enroll” at the bottom.

When the user clicks this button, the information entered by the user should be displayed in the box called Enrollment information.

All the information user entered should be displayed along with their selections indicated by the  Checkboxes and Radio Buttons under their proper headings (Interests, Communication Preference, How referred)

Example Output: 

Name: xxxxxxxxxxxx 

Email:  [email protected] 

Phone: 123-456-7890 

City: zzzzzzzzzzz 

State: TX

Interests                             Communication                 How Referred                        

Electronics                         E-mail                                Website                               

Website 

Technology 

Travel 

Shopping

Auditting

Analyze audit procedures for determining compliance with physical access policies for your organization or an organization with which you are familiar.

In 175 words or more discuss how you can internally audit procedures for determining compliance with physical access policies. Why is it important to maintain compliance with physical access policies? Share how you, as an IT manager, would expect to respond if an external auditor found evidence that your organization is out of compliance with its own physical access policies?