bidis1

 Compare and contrast predictive analytics with prescriptive and descriptive analytics. Use examples.

Chat application demo (using Angular and spring)

 

I want to demo chat web application with technology Angular 8 or above (frontend) and Spring (backend) with mysql databse

1. user can signup and login and chat with each other (one to one chat for example facebook)

2. web page design is not needed.

4. all chat should be store in database. if user have some chat and when it logout then after login all previous chat should be present in chat history.

3. it should be work in windows 10.

EH week6 DB

 

Hello,

i need this paper by 10/01 afternoon.

Strictly No plagiarism please use your own words.

Explain in your own words what type of information can be obtained by using network scanning techniques and why it is an important intelligence gathering process.

 300 words

Make sure Strictly No plagiarism content should not match and even the reference should not match in plagiarism 

Coso Framework

The COSO framework of internal controls is practiced within companies around the world. The objectives of the COSO framework are closely related to its five components. For this week’s activity, please discuss these five components of the COSO framework. Be sure to include each components’ impact on each of the COSO framework objectives. What do you feel an auditor would most be concerned with during an IT audit? Lastly, discuss suggestions for integrating COSO framework compliance into a company in which you are familiar. 

Your paper should meet the following requirements:

• Be approximately four to six pages in length, not including the required cover page and reference page.

• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

Emerging Threats & Countermeas – Research Paper

Develop a disaster recovery plan for an organization. There are many different templates available online for you to use as reference and guidance. Your plan should cover the following sections (these sections detail the elements in a DR plan in the sequence defined by industry compliance standards ISO 27031 and ISO 24762): 

  1. Important: This section should summarize key action steps (such as where to assemble employees if forced to evacuate the building) and list key contacts with contact information for ease of authorizing and launching the plan.
  2. Introduction
  3. Roles and Responsibilities
  4. Incident Response
  5. Plan Activation
  6. Document History
  7. Procedures

Your paper should meet the following requirements:

  • Be approximately six to eight pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least four scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Problem 1: Create a list that contains the months of the year. Problem 2: Create a loop to print the month number and name

Instructions:

Create a PowerPoint that contains a FLOWCHART and a PSEUDOCODE for each problem.

Use the information below to create a pseudocode (which can be a text-based description for solving the problems) and a flowchart (using flowchart symbols to illustrate how you would program) to solve each problem. Use Microsoft PowerPoint® for Pseudocode and the flowchart.

Problem 1: Create a list that contains the months of the year.

Problem 2: Create a loop to print the month number and name (do not hard code the month number)

Consider using the attached enumerate method to help!

Assignment

 

Learn About Defending Against DDoS

Using WORD, write an ORIGINAL brief essay of 300 words or more:

  • Find a DoS attack that has occurred in the last six months
  • You might find some resources at www.f-secure.com.
  • Note how that attack was conducted.
  • Write a brief explanation of how you might have defended against that specific attack.

Note your Safe Assign score. Continue submitting until your Safe Assign score is less than 25. You have three attempts to complete your assignment.

Attach your WORD doc and then hit SUBMT.

Tasks

 There are TWO tasks that you would need to do( they are separate): 

Task 1 (Minimum 300 words): 

 Your company is experiencing a decline in business because of competition. 

Your manager thinks they may be able to turn the company around if they can get help from an IT professional on E-Commerce and Mobile Technologies. 

Assume your company is a traditional retail entity similar to Sears, Macy’s or K-Mart, suggest ways your company can use E-Commerce and Mobile Technologies to increase its visibility and sales. 

In your discussion, explain what is E-Commerce and Mobile Technology..

TASK 2:

Write a reply to the two responses in the attached document ( Response 1 and Response 2) with 150 words for each. 

There should be no plagiarism. Attach a plagiarism report with 0 % similarity index. 

Incident Response Cloud

 

Discuss in 500 words or more the best practices for incident response in the cloud.

Cite your sources and APA format. Do not copy. Write in essay format not in bulleted, numbered or other list format. 

Java Mips Programming

 This homework requires students to create a MIPs program to simulate playing multiple games of “Craps” (a popular casino game) to determine an approximate winning percentage. : To simulate throwing two independent dice, you need to get two random numbers in the range of 1 to 6 and add them together. Do not get a single random number in the range of 2 to 12, as each value will not reflect the odds of rolling a particular numbe