short answer

 

We’ve been looking at the different ways CSS can be applied to a Website to create unique appearances. For this thread, we’ll take a step back from thinking about your projects and look at a fictitious company. QVR Tours is a small, family-owned travel shop that specializes in custom tours throughout North and South America. While the current site has a cohesive design for its overall look, the owners would like to spruce things up for some of their more popular tours. They would also like the forms for information about these tours to reflect the theme of the tour.

For this thread, select two of the tours listed and develop a style sheet for each tour including the information request form.

Popular Tours:

  • Southwest Canyons and Mountains
  • Lost Treasures of the Aztecs
  • Industrialized New England
  • Brazil and the Amazon Rainforest
  • Redwoods: Ancient Trees

You might want to take a look at CSS Zen Garden for inspiration and to see how simply changing your style sheet can change a site completely.

Homework Assignment 3

Refer back to the dataset you selected for Homework Assignment 2 (Week 3) and address each of the following three questions.  Each response should be 2-3 paragraphs with an explanation of all terms and reasons for your decisions. 

  1. Identify a chart type that could be used to display different editorial perspectives of your dataset and explain why you felt it to be appropriate.
  2. Identify two other chart types that could show something about your subject matter, though maybe not confined to the data you are looking at.  In other words, chart types that could incorporate data not already included in your selected dataset.
  3. Review the classifying chart families in Chapter 6 of your textbook.  Select at least one chart type from each of the classifying chart families (CHRTS) that could portray different editorial perspectives about your subject.  This may include additional data, not already included in your selected dataset.   

Ethical Hacking

 

Review the required reading material and summarize one of the scholarly articles listed on the selected websites. In 2-3 paragraphs, and using your own words, explain why ethical hacking is necessary in today’s complex business environment.

Click on the LINK above to submit your WORD document for this week’s assignment.

PHD Questions

Hello, 

 

Need Help for this assignment in 6 hours. Attached Is the question and the text book 

Application : SRM Assignment 

Chapter 7 : use this case study,  turning the organizational pyramid upside down

2.identify strategic objectives

3.Identify strategic Risks

4.Develop a PAPA model

5.Develop a Risk Matrix

6. Identify the differences that the two (PAPA and RIsk Matrix ) models 

7. Can a Monte Carlo simulation be applied?

Detailed Conclusion 

Discussion

 

Use Sage to answer the following questions.  Show all your sage input/output:

  1. Suppose your RSA public key factors as p = 6569 and q = 8089, and the public exponent e is 11.  Suppose you were sent the Ciphertext 28901722.  Perform the RSA Decryption and recover the plaintext.
  2. Suppose that you want to encrypt the number 449 and send it to someone with public key N =37617577, and e = 529
  3. Suppose that you forgot your public exponent, but you know that the prime factors of your Key’s modulus are 1723 and 5381 private exponent is 223.  Find the public exponent.
  4. Use sage to generate an rsa public / private key pair and perform an encryption and decryption.

Research Paper

 

Your final research paper assignment is to write a research paper that explains how Information Technology (IT) promotes getting people who are affected by policies involved in the policy-making process. Cite specific examples. 

To complete this assignment, upload a Microsoft Word document (.doc or .docx) that contains your complete paper. Remember that your paper, including your list of sources, must be in APA format, and you MUST cite your reference in the body of the paper using APA in-text citation format. A source is any paper or article that you will reference in your paper. If you need more information on APA format (for references list AND in-text citations), visit this reference: https://owl.english.purdue.edu/owl/resource/560/01/

This assignment must be YOUR OWN WORK!  This is an individual assignment. Plagiarism detected in your work will result in a grade of zero for the entire paper. 

Here are a few details about the overall research paper . 

You must reference two (2) peer-reviewed articles or papers that support your thesis statement. One of these papers may be from your annotated bibliography assignment. The final paper must be at least 500 words in length. (DO NOT exceed 500 words by a material amount. Excessive words or too many references will NOT impress me.) 

So in summary, here are the research paper requirements:

2 peer reviewed resources (articles or papers) (1 may be from your annotated bibliography assignment)

Paper MUST address: How Information Technology (IT) promotes getting people who are affected by policies involved in the policy-making process. Cite specific examples.

Cited sources must directly support your paper (i.e. not incidental references)

At least 500 words in length (but NOT longer than 1000 words)

If you are not sure how to identify peer reviewed papers or articles, please visit the following resources:

http://diy.library.oregonstate.edu/using-google-scholar-find-peer-reviewed-articles
http://libguides.gwu.edu/education/peer-reviewed-articles

week 5 MM

a) Select one element of the Marketing mix and discuss how marketing research could help that area.  Be specific in your recommendations (350 words and in APA formate)

b) 1 reply of 250 words 

Data visualization

According to Kirk (2016), most of your time will be spent working with your data.  The four following group actions were mentioned by Kirk (2016):
Data acquisition: Gathering the raw materialData examination: Identifying physical properties and meaningData transformation: Enhancing your data through modification and consolidationData exploration: Using exploratory analysis and research techniques to learnSelect 1 data action and elaborate on the actions performed in that action group.

– apa

– 2 pages

– strictly plagiarism free