short answer

 

Please respond to the following:

  • Given the various types of loops available in JavaScript, recommend the one that you believe is better for processing data from an array. Provide a rationale for your response.
  • Flesh out your thoughts and interact with your classmates. Post your initial response by Wednesday each week and then return on a couple of other days to see what’s going on with the discussions. The more you interact, the more you learn from your peers, and the more you share with them about what you know. You will also be showing your instructor what you have picked up.
  • Be sure to respond to at least one of your classmates’ posts.

Emerging Technologies Research Paper

Subject:  Emerging Technologies 

Book: Technology Ventures: From Idea to Enterprise 

Research project in stages throughout the course, to include:  selecting a topic, submitting an abstract/outline, and submitting final project (paper) for evaluation.  Must support work by using at least six appropriate, properly cited sources in addition to your course textbook. Project (paper) will comprise 3000 to 3500 words (not including title and reference pages).  

1st need  project abstract/outline

2nd research paper 3000+

Project (paper) must be formatted according to APA guidelines as a Word document, double spaced, Times New Roman, 12-font, with one inch margins.

Question:

Many new clean tech ventures have relied on funding and partnership from established corporations. Select a recently funded clean tech venture with corporate venture involvement. Did the funding impact the structure of the new venture? What does the new venture expect to gain from the backing by the larger corporation? What does the larger corporation expect to gain from being involved in the new venture?

computer science

 network analysis/tech using the NS3 network simulator and , report-1000 words and , 10 ppt slides w/o notes 

unit 8

 

Directions

Part I: Complete Your Original Response to the Main Topic

The requirement of this activity for this module is for every student to solve one programming problem from the book, and post the source code in the discussion board for further analysis and discussion. In order to have more diversity of problems from the chapter, each student will select a problem number using the process described below.

Selecting the Problem Number to Use

Consider the following rules in calculating the problem number to solve:

  • Divide your student ID by 20, consider the remainder and increment it by 1. The result you obtain represents the number of the programming exercise you will solve for this online discussion.

Posting the Solution

Once you determine the problem number, complete the solution to that problem. When you are satisfied with your solution, click the Reply link below to post in this discussion forum.

  • In the first line of your post, your should add the chapter number, problem number, and page number of your problem.
  • Your posting must include the source code along with explanations of how you have solved the problem.  

Cloud Incident

Topic:  Discuss the challenges that incident handlers face in identifying incidents when resources have been moved to a cloud environment.   

Follow up your discussion with a recent article discussing a company who has begun utilizing a cloud environment and what challenges they may face.  Make sure to cite the article.

Class Diagram and Use Case Diagram

 

Address the first question posed and then create the two diagrams as instructed below.

You can create your diagrams in Visio®, Word, or PowerPoint® (using drawing tools in Word or PowerPoint) or draw them out by hand and share photos.

Assignment Requirements

  1. Describe the difference between a use case and a class diagram. What is the purpose of each? What role do they play in object-oriented-programming design specifically?
  2. Create a class diagram that describes an automobile dealership. Your class diagram should include at least 6 classes and show the relationships between the classes.

Refer to this site for additional examples of class diagrams:
http://www.agilemodeling.com/artifacts/classDiagram.htm

  1. Create a use case that depicts the actors (people and systems) and processes involved in a university system that registers students for classes. Be sure that your use case includes all actors (systems and people) Involved in a university class registration process and show the interactions between actors. At a minimum, you should show the student, the registrar, the online registration system, and accounts receivable.

Refer to this site for additional examples of use case diagrams:
https://www.uml-diagrams.org/use-case-diagrams-examples.html

Aligning Risks, Threats, and Vulnerabilities to COBIT P09 Risk Management Controls

  Introduction

Ask any IT manager about the challenges in conveying IT risks in terms of business risks, or about translating business goals into IT goals. It’s a common difficulty, as the worlds of business and IT do not inherently align. This lack of alignment was unresolved until ISACA developed a framework called COBIT, first released in 1996. ISACA is an IT professionals’ association centered on auditing and IT governance. This lab will focus on the COBIT framework. The lab covers two released versions: COBIT 4.1, which is currently the most implemented version, and COBIT 5, which was released in June 2012. A newer version, COBIT 2019, was released in 2019.

Because COBIT 4.1 is freely available, with registration, at the time of this writing, the lab uses this version to present the handling of risk management. COBIT presents this topic using a set of COBIT control objectives called P09. COBIT P09’s purpose is to guide the scope of risk management for an IT infrastructure. The COBIT P09 risk management controls help organize the identified risks, threats, and vulnerabilities, enabling you to manage and remediate them. This lab will also present how COBIT shifts from the term “control objectives” to a set of principles and enablers in later versions.

In this lab, you will define COBIT P09, you will describe COBIT P09’s six control objectives, you will explain how the threats and vulnerabilities align to the definition for the assessment and management of risks, and you will use COBIT P09 to determine the scope of risk management for an IT infrastructure.

  1. Define what COBIT (Control Objectives for Information and related Technology) P09 risk management is for an IT infrastructure.
  2. Describe COBIT P09’s six control objectives that are used as benchmarks for IT risk assessment and risk management.
  3. Explain how threats and vulnerabilities align to the COBIT P09 risk management definition for the assessment and management of IT risks.
  4. Use the COBIT P09 controls as a guide to define the scope of risk management for an IT infrastructure.
  5. Apply the COBIT P09 controls to help organize the identified IT risks, threats, and vulnerabilities.

 Deliverables

Upon completion of this lab, you are required to provide the following deliverables to your instructor:

  1. Lab Report file;
  2. Lab Assessment (worksheet or quiz – see instructor for guidance).

cloud computing service

You are the CIO of ABC Corp a government contracting corporation that prioritizes security. You are tasked with moving the development team’s resources to the cloud. You need to provide a report to top leadership justifying the type of cloud solution that would be appropriate for this move. Provide the following in your report.

  1. Describe the MOST appropriate cloud service and research justification of its appropriateness.
  2. Select a Cloud Deployment model and research justification of its appropriateness.
  3. What are some of the pros and cons of both the cloud service and model you selected?

Paper should be in APA format, with at least two scholarly resources, and at least 1000 words.

Images

Excel 2019 In Practice – Ch 5 Independent Project 5-4

 

Wilson Home Entertainment Systems monitors cash flow at their individual locations separately and consolidates data. After the summary is complete, you insert hyperlinks to each of the supporting worksheets.

[Student Learning Outcomes 5.1, 5.4, 5.6, 5.7, 5.8]

Files Needed: WilsonHome-05.xlsx (Available from the Start File link.) and WHES.png (Available from the Resources link.)

Completed Project File Name: [your name]-WilsonHome-05.xlsx

Skills Covered in This Project

  • Group and format worksheets.
  • Create a static data consolidation with SUM.
  • Insert a picture from a file.
  • Insert a hyperlink.
  • Copy a hyperlink.
  • Encrypt a workbook with a password.
  1. Open the WilsonHome-05 start file. The file will be renamed automatically to include your name. Change the project file name if directed to do so by your instructor, and save it.
  2. Group all the worksheets.
  3. Edit and format grouped sheets.
    1. Select cells A1:B2 and click the Launcher in the Alignment group [Home tab]. Choose Center Across Selection from the Horizontal list and click OK.ImagesFigure 5-76 Consolidate dialog box for cash flow
    2. Click the Launcher in the Page Setup group [Page Layout tab] and click the Margins tab.
    3. Choose Horizontally from the Center on page list and click OK.
    4. Edit the contents of cell A10 to read Cash paid for marketing.
    5. Select cell A1 and ungroup the sheets.
  4. Select the CashFlow sheet.ImagesFigure 5-77 Image positioned as title
  5. Build a static data consolidation for the Cash flow from operations section.
    1. Select cells B4:B12.
    2. Use SUM to consolidate the data from the three location sheets without links. (Figure 5-76).
  6. Build a static data consolidation for the Cash flow from banking and investment section in cells B15:B21. Delete the references in the Consolidate dialog box and use SUM as the function.ImagesFigure 5-78 Hyperlink text to switch to Cash Flow sheet
  7. Build a static data consolidation for the Cash balance at the beginning of the quarter amounts in cell B24 with SUM as the function.
  8. Insert a picture from a file.
    1. Delete the contents of cell A1 on the CashFlow sheet.
    2. Click cell D2.
    3. Click the Pictures button [Insert tab, Illustrations group].
    4. Find and select WHES from your student data files.
    5. Click Insert. The picture is placed at a default size.
    6. Click the Height box [Picture Tools Format tab, Size group].
    7. Type 1.2 to replace the default height and press Enter.
    8. Format the height of row 1 to 86.25 (115 pixels).
    9. Point to the logo frame to display a move pointer.
    10. Drag the image to appear in cell A1 as a main label for the worksheet (Figure 5-77).
    11. Click cell D2 to deselect the image.
  9. Insert and copy a hyperlink.
    1. Click cell C3 on the Peoria worksheet.
    2. Create a hyperlink that displays Total Cash Flow and switches to cell A1 on the Cash Flow worksheet (Figure 5-78).
    3. Right-click cell C3 and choose Copy from the menu.
    4. Select the Champaign sheet tab and paste the hyperlink in cell C3.
    5. Select the Rockford sheet tab and paste the hyperlink in cell C3.
    6. Select the Peoria sheet, and press Esc to remove the copy marquee if it is still visible.
    7. Select cell C5 and then click the cell with the hyperlink to test it.
  10. Save and close the workbook (Figure 5-79).
  11. Upload and save your project file.
  12. Submit project for grading.