Python coding Variables, IF/THEN/ELSE, Loops

 

You will complete this assignment in Python 3.x. Make sure you have downloaded the software and it is installed correctly. You will download it from this site

You will code the following and submit it in one file. Use the information in the Content area for this week to assist you. Save it as a python file (.py), and upload it into the Assignments area.

Create 2 Python programs based on week 5 flowcharts and requirements. You must use loops, do not use function call

Here is a SAMPLE run for a simple calculator to add to numbers (this is for reference only)

Simple Calculator

What is your name –> Supa

Enter first number –> 7

Enter second number –> 5

Supa, The total of 7.0 + 5.0 = 12.0

Do you want another calculation ? (y/n) y

What is your name –> Lupa

Enter first number –> 21

Enter second number –> 11

Lupa, The total of 21.0 + 11.0 = 32.0

Do you want another calculation ? (y/n) n

Thanks for using my calculator

Cloud Computing-1

Q1   Define and discuss the uses of IDaaS in at least two paragraphs.  Also, find three IDaaS providers and compare and contrast their  services.

You must include at least one scholarly peer-reviewed article as an APA cited reference.

Q2   Discuss the use of cloud collaboration tools in today’s  geographically diverse environment in at least two paragraphs.  Cite at  least one scholarly peer reviewed article.

Also, compare and contrast two popular video collaboration tools.

Case Project 13-7: Lake Point Security Consulting

 

“Lake Point Consulting Services (LPCS) provides security consulting and assurance services to over 500 clients across a wide range of enterprises in more than 20 states. A new initiative at LPCS is for each of its seven regional offices to provide internships to students who are in their final year of the security degree program at the local college.

Predish Real Estate and Auction (PREA) buys and sells high-end residential and commercial real estate across a multistate region. One of the tools that PREA offers is a sophisticated online website that allows potential buyers to take virtual tours of properties. However, PREA’s site was recently compromised by attackers who defaced the site with malicious messages, causing several customers to threaten to withdraw their listings. PREA’s senior management has demanded a top-to-bottom review of their security by an independent third party. LPCS has been hired to perform the review, and they have contracted with you to work on this project.

  1. The first task is to perform a vulnerability assessment of PREA. Create a PowerPoint presentation for the president and his staff about the steps in a vulnerability assessment. List in detail the actions under each step and what PREA should expect in the assessment. Your presentation should contain at least 10 slides” (Ciampa, 605).

Carefully read the case project statement and step number 1 to ensure you cover all of the requested topics. Refer to the information given in the Module 4 assignment that was similar to this for reminders about how to create good presentations. Remember to use the speaker’s notes (this is especially important as I will not see you give this presentation. I need to know what you will say if you were in front of an audience), few bulleted items on the screen, and applicable graphics (charts, graphs, clipart) to make the presentation interesting. You should have an introduction slide, a conclusion slide, and a slide for the list of your sources, along with any content slides needed to get your point across. Information technology specialists always need to be prepared to talk about technology to those who are not versed in the subject. This assignment gives you practice in doing just that.

Discussion question, 300 words and 2 references.

Search “scholar.google.com” for a company, school, or person that has been the target of a network
or system intrusion? What information was targeted? Was the attack successful? If so, what changes
were made to ensure that this vulnerability was controlled? If not, what mechanisms were in-place to protect against the intrusion.

rp

This week, you have read about entrepreneurship in a global economy. For your written assignment this week, complete a case study of the organization you work for (use a hypothetical or “other” organization if more applicable) that will address the following prompts:

  • Describe the organization’s environment, and evaluate its preparedness to go global, if not already, and it’s strategy for staying global if it is.
  • Research other company’s strategy for going global and explain if this will or will not work for your company. 
  • Make a recommendation for a global strategy in the organization, including a justification for your recommendations.

Submit your midterm research paper as a single document. Your paper should meet the following requirements:

  • Be approximately five pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

Activity Diagram

Create an activity diagram of the Request For Proposal (RFP)/Proposal interaction between a potential customer and Acme Electric, LLC (Acme).

You are an analyst tasked to create an activity diagram in the analysis phase of an object-oriented analysis and design project. What follows is the interaction between a potential customer and Acme. The activity starts when the potential customer creates and sends an RFP. This activity ends when the potential customer either accepts or rejects Acme’s Proposal and possibly informs Acme of the decision.

You are NOT documenting a system, you are creating an activity diagram for a business process. The business process that you will model using an activity diagram is as follows:

A potential customer (Customer) creates and sends to the owner of Acme (Owner) a Request For Proposal (RFP) which includes an Electrical Drawing (ED) for the proposed work. An ED is an architecture blueprint which only includes the electrical portion of the work.

Owner studies the ED and RFP for the following:

  • Amount and types of electrical materials required
  • Amount and types of special equipment that may be required
  • Amount of labor that may be required
  • Specific dates Customer may have asked for the project to occur
  • Any other information that Customer may have included in the RFP

Owner sends to his supply person (Supply) a:

  • Bill of Materials (BOM)
  • special equipment list

For both lists, Supply enters the wholesale price and availability of each item. The gathering of data for each list is not dependent on the other for completion and return. Supply obtains the information for the BOM either from stock on-hand or electrical supply vendors, completes the form, and returns the BOM to the Owner. Supply obtains the special equipment information from equipment vendors, completes the form, and returns the special equipment list to Owner.

Owner checks his crews’ calendars for availability during the time period that the customer has requested.

After Owner has gathered all the information, Owner decides on a proposal price. Owner prepares a proposal and sends it to Customer.

If Customer likes the proposal, they sign it and return it to Owner. If Customer does not like the proposal, they either ignore it or inform the owner of the decision.

– UML state/activity

Final Paper 12/03

 

Final Paper Assignment: 

Write a 3-4 page APA formatted paper comparing your organization’s disaster recovery and business continuity plans with the best practices outlined in your course text.  Content should include, but not be limited to:  selecting the DR. team, assessing risks and impacts, prioritizing systems and functions for recovery, data storage and recovery sites, developing plans and procedures, procedures for special circumstances, and testing the disaster recovery plan. 

Your paper should include an abstract and a conclusion and a reference page with 3-5 references: