Problem 1: Create a list that contains the months of the year. Problem 2: Create a loop to print the month number and name

Instructions:

Create a PowerPoint that contains a FLOWCHART and a PSEUDOCODE for each problem.

Use the information below to create a pseudocode (which can be a text-based description for solving the problems) and a flowchart (using flowchart symbols to illustrate how you would program) to solve each problem. Use Microsoft PowerPoint® for Pseudocode and the flowchart.

Problem 1: Create a list that contains the months of the year.

Problem 2: Create a loop to print the month number and name (do not hard code the month number)

Consider using the attached enumerate method to help!

Assignment

 

Learn About Defending Against DDoS

Using WORD, write an ORIGINAL brief essay of 300 words or more:

  • Find a DoS attack that has occurred in the last six months
  • You might find some resources at www.f-secure.com.
  • Note how that attack was conducted.
  • Write a brief explanation of how you might have defended against that specific attack.

Note your Safe Assign score. Continue submitting until your Safe Assign score is less than 25. You have three attempts to complete your assignment.

Attach your WORD doc and then hit SUBMT.

Tasks

 There are TWO tasks that you would need to do( they are separate): 

Task 1 (Minimum 300 words): 

 Your company is experiencing a decline in business because of competition. 

Your manager thinks they may be able to turn the company around if they can get help from an IT professional on E-Commerce and Mobile Technologies. 

Assume your company is a traditional retail entity similar to Sears, Macy’s or K-Mart, suggest ways your company can use E-Commerce and Mobile Technologies to increase its visibility and sales. 

In your discussion, explain what is E-Commerce and Mobile Technology..

TASK 2:

Write a reply to the two responses in the attached document ( Response 1 and Response 2) with 150 words for each. 

There should be no plagiarism. Attach a plagiarism report with 0 % similarity index. 

Incident Response Cloud

 

Discuss in 500 words or more the best practices for incident response in the cloud.

Cite your sources and APA format. Do not copy. Write in essay format not in bulleted, numbered or other list format. 

Java Mips Programming

 This homework requires students to create a MIPs program to simulate playing multiple games of “Craps” (a popular casino game) to determine an approximate winning percentage. : To simulate throwing two independent dice, you need to get two random numbers in the range of 1 to 6 and add them together. Do not get a single random number in the range of 2 to 12, as each value will not reflect the odds of rolling a particular numbe 

ERM Integration

The Attached document will have strategy and how ERM can be integrated with an organization’s overall strategy.    

Prepare a research paper on some of the various issues, protocols, methods, frameworks you found and discuss how – if possible – organizations can use ERM as strategy. It is perfectly acceptable if you deem ERM cannot be used as strategy, just back up your claim with scholarly research and justifications.

Your paper should meet these requirements: 

Be approximately four to six pages in length, not including the required cover page and reference page.

Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.

Be clearly and well-written, concise, and logical, using excellent grammar and style techniques

internet systems

Tips for completing this assignment:

  • Review the grading rubric to begin organizing your assignment. It clearly defines expectations and is what your faculty member will use to grade your submission.
  • Apply the knowledge and skills you have learned in this course.
  • Use the knowledge and skills you have learned in prior courses.
  • Ask your faculty member any questions you may have.

Pine Valley Furniture wants to use Internet systems to provide value to its customers and staff. There are many software technologies available to internet systems development teams, including SOAP, HTML, JSON, XML, CSS, ASP.NET, Objective C, php, JAVA™, Python, Ruby, AJAX, Swift™, AngularJS, Bootstrap, jQuery, R, and many more.

Create a 3- to 4-page Word document that includes a comparison table. The comparison table should be between 1/2 page to 1 page long. Include supporting narrative that addresses the table items and additional information listed below. Analyze and compare at least three internet systems development software technologies for use at PVF.

Analyze how the selected internet systems development software technologies support PVF’s core business processes.

Compare the selected technologies and then the reasons why, as an internet systems developer, you might choose one technology over another technology for PVF. 

Explain how these technologies can bring value to PVF.

Incorporate additional research to support your comparison. At a minimum, include 3 references.

Cite the references according to APA guidelines. This assignment requires a minimum of 3 academically acceptable references.

Submit your assignment.

Bid Response Proposal Presentation

  

Bid Response Proposal

The objective is to present a Bid Response Proposal that provides a security solution for any business process of your choice. The financial business has 60 employees and is struggling with security issues both internal and external. Employees use laptops and have remote access to the office systems. Your Bid Response needs to be a turnkey solution that will provide a solution to but not limited to the following problems (so be creative):

1) Equipment is disappearing

2) No building or computer room security.

3) No policies (AUP)

4) No virus protection and experiencing viruses daily

5) No intrusion detection and experiencing intrusions daily 

6) Passwords compromised 

7) There is an Internet connection but no protection and content filtering

8) Sensitive information is being copied from systems

9) If a disaster should happen to the building there are no plans to recover

Minimum topics to be included in your Bid Response Proposal are the following:

  1. Deliver      a Bid Response Proposal to provide a business security solution to      prevent malicious or unauthorized use of digital assets
  2. Create      and implement effective policies to mitigate risks
  3. Deliver      a detailed list of security products and pricing
  4. Provide      safeguards for the information assets

Format:

Format for the project should be a 15 PowerPoint presentation with a budget sheet.

discussion 10/16

 discuss the challenges of writing the recovery plan from the perspective of your current or previous employer’s work environment.   

 400 words.