operational excellence assignment

Assess an IT organization you are familiar with using the Balanced Scorecard approach. 
Be sure to (1) address at least one KPI including hypothetical goal, measure and target for each of the four perspectives (financial, customers, etc.) in tabular format and (2) draw or sketch out a dashboard for your scorecard.  Include a brief narrative (at least two sentences) explaining your specific scorecard as it relates to the organization.

You might want to review the below video first.

https://youtu.be/AdXt8BfiGJg 

Visual studio programming

1. Name the project FinalExam

2. Has a title bar with your name as the displayed text.

3. Has a text box, with a label next to it saying “Enter an integer:”

4. Has two buttons, one saying “DOUBLE” and one saying “HALF”.

5. Pressing the DOUBLE button, should generate a Message box (MsgBox) that displays two times the number in the text box, and clears the text box.

6. Pressing the HALF button, should generate a Message box (MsgBox) that displays half the number in the text box, and clears the text box.

You can add features to this program for up to 10 extra points – but be sure to document them both in the code, and in a text submission along with your project.  Suggested features might be additional controls, input data checking, . . . .

Submit the zipped project folder for your application, along with a text submission of any extra features.

Wireless

 What are the various technologies employed by wireless devices to maximize their use of the available radio frequencies? Also discuss methods used to secure 802.11 wireless networking in your initial thread. 

Cloud Computing and Digital Forensics

1.) Describe in 500 words the shared security responsibility model that a dba must be aware of  when moving to the cloud.

Use at least three sources. Use the  Research Databases available from the Danforth Library  as your first choice. 

Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  

Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes. Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. Write in essay format not in bulleted, numbered or other list format. 

2.) Use the web or other resources to research at least two criminal or civil cases in which recovered files played a significant role in how the case was resolved. Use 200-300 words.

program C , Write a program count, c that reads an existing ASCII text he, and prints on screen

Write a program count, c that reads an existing ASCII text he, and prints on screen the number of bytes and the number of lines in the file. The name of the file is a command line argument. The number of lines in the file is not laiown beforehand, but each line can be at most 100 characters long. 

EXAMPLE: Suppose the ale myfile.txt contains the lines 

yeti ayes f atma 

The compiled program count .exe will be executed as follows: count. ex e myf ile.tx-t And the output on the screen would be: Number e bytes-20 Number of lines.. 

myfile.txt

ali

veli

ayse

fatma 

Case Study

 

1) Read the CASE STUDY and answer the two questions in the attached document(CASE STUDY),

-No plagiarism in the answers 

-A minimum of 100 words for each question

– One reference. 

2) Reply to the responses in the attached documents(RESPONSE 1 and RESPONSE2),

– Minimum of 100 words