Anybody with Good C++ knowledge and can help me with programming
P_Task
Demonstrate how BUSINESS INTELLIGENCE course has connected and put into practice within the career as software developer(UI Developer)
Assignment: Share a personal connection that identifies the specific knowledge, skills, or theories of BUSINESS INTELLIGENCE course has connected and demonstrate how this course have been applied, in a practical manner to your current work environment or workplace as software Developer(UI Developer).
Requirements:
Provide a 500 word (or 2 pages double spaced). proper APA formatting, at least 2 references and in-text citations. If supporting evidence from outside resources is used those must be properly cited.
Plain View Doctrine
Describe the plain view doctrine, and why it has such a significant impact on digital forensics? What are three approaches to determining whether the doctrine applies to a specific case?Need in a word document with no less than 250 words.
Discrete Probability Distributions (Binomial)
An archer hits a bull’s-eye with a probability of 0.09, and the results of different attempts can be taken to be independent of each other. If the archer shoots nine arrows, calculate the probability that: (a) Exactly two arrows score bull’s-eyes. (b) At least two arrows score bull’s-eyes. What is the expected number of bull’s-eyes scored?
IP WK7
Q1. Provide a Reflection on the Chapter 7: Scope Planning. Identify what you thought was the most important concept(s), method(s), term(s), and/or any other thing that you felt was worthy of your understanding. 200 words
Also, provide a graduate-level response to each of the following questions:
Q2. The sponsor for a project you have been managing sends you an email that he would like to make a small change to the project. What is your response and why? 175 words
Q3. A potential client wants you to be project manager for the construction of a new house, but she is vague about the details. List a few questions you could ask her to gain a better understanding of the scope of the project. 175 words
Q4. Problem set: Use the template attached . Instructions for this exercise are provided within the attached exercise template. 200words
Creating Company E-mail and WIFI / Internet Use Policies
Creating Company E-mail and WIFI / Internet Use Policies Attached you will find a description of your final project assignment.
ou have just been hired as the Security Manager of a medium-sized Financial Services company employing 250 people in New Hampshire, and have been asked to write two new security policies for this company. The first one is an e-mail policy for employees concentrating on personal use of company resources. The second policy is that of WIFI and Internet use within the company.
There are many resources available on the web so researching these topics and policies should be easy. The most difficult part of this exercise will be determining how strict or how lenient you want to make these policies for this particular company.
Project Plan
You are asked to create two separate policies on use of EMAIL and a WIFI/INTERNET USE within the company.
Be specific in your terms and conditions of use. Consider these items to be included in your policies (as applicable).
1. Overview
2. Purpose
3. Scope
4. Policy
5. Policy Compliance
6. Related Standards, Policies and Processes
7. Definitions and Terms
Compose a letter to your CEO describing the different types of network firewalls
You have a new CEO. They are non-technical and came to your organization from a completely different market segment. Your organization narrowly escaped being breached due to the diligence of your Blue Team, but they said it was touch and go – the breach almost went through – and improvements need to be made in the area of network firewalls, specifically. Those improvements require funding. Given the current pandemic situation money is more scarce than usual and you need to put forth a convincing case for the network firewalls.
Compose a letter to your CEO describing the different types of network firewalls and where each should be used/deployed within a hypothetical/fictional corporate network (feel free to be inventive and creative – please). Your goal is to get the funding for network firewalls. Use any persuasive techniques you have at your disposal. If you need to draw pictures, draw pictures.
***Give your CEO a name. CEOs can be any gender***
IDM W 7 A
Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.
The course mentioned here is INTRODUCTION TO DATA MINING
Current work is Software Developer
Textbook :
Title: Introduction to Data Mining
ISBN: 9780133128901
Authors: Pang-Ning Tan, Michael Steinbach, Anuj Karpatne, Vipin Kumar
Publisher: Addison-Wesley
Publication Date: 2013-01-01
Edition: 2nd ED.
Redaction
Discuss in 500 words, how much redaction is necessary to anonymize an electronic health record. Is it enough to redact the name? The name and address? Is a medical record like a finger print?
Use at least three sources. Use the Research Databases available from the Danforth Library, not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list. Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.
Write in essay format not in bulleted, numbered or other list format.
Creating Company E-mail/WIFI/Internet Use Policies
(Overall Work should be around 3000 Words)
You have just been hired as the Security Manager of a medium-sized Financial Services company employing 250 people in New Hampshire, and have been asked to write two new security policies for this company. The first one is an e-mail policy for employees concentrating on personal use of company resources. The second policy is that of WIFI and Internet use within the company.
There are many resources available on the web so researching these topics and policies should be easy. The most difficult part of this exercise will be determining how strict or how lenient you want to make these policies for this particular company.
Project Plan
You are asked to create two separate policies on use of EMAIL and a WIFI/INTERNET USE within the company.
Be specific in your terms and conditions of use. Consider these items to be included in your policies (as applicable).
1. Overview
2. Purpose
3. Scope
4. Policy
5. Policy Compliance
6. Related Standards, Policies and Processes
7. Definitions and Terms
Some useful links and resources for your research:
https://resources.workable.com/email-usage-policy-template
https://www.sans.org/security-resources/policies/general/pdf/email-policy
https://resources.infosecinstitute.com/acceptable-use-policy-template-public-wifi-networks/#gref
https://www.techrepublic.com/article/download-our-wireless-policy-template/