Fireboy and Watergirl: Online on the App Store

Fireboy and Watergirl are an exciting series of adventure games developed by Oslo Albet and Jan Villanueva. 

Fire, Water, Forest, Ice, Light, Wind, and Crystal, seven brand new temples for the official Fireboy and Watergirl series. 

In each temple the boy and girl must run and jump between fire and water, you should know that Fireboy is immune to fire, so he can step freely in pools of boiling lava, but he must be careful from stepping into the water. 

Watergirl is resistant to pools of water but gets hurt when stepping in the lava. 

Let us join with two main characters on the journey to remote, dangerous temples, to seek unimaginable wealth. 

The temple is full of sparkling diamonds waiting to be discovered only by the bravest. 

Solve the puzzles, beat the times, and collect all the diamonds! 

What are you waiting for? 

Update Fireboy and Watergirl full series.

Use the W-A-S-D keys to control the Watergirl.

Use the Arrow keys to control the Fireboy.

Final project..

 

For this project, select an organization that has leveraged Data Mining technologies in an attempt to improve profitability or to give them a competitive advantage.

Research the organization to understand the challenges that they faced and how they intended to use Data Mining to overcome their challenges. The paper should include the following sections each called out with a header.

• Company Overview: The section should include the company name, the industry they are in and a general overview of the organization.

• Challenges: Discuss the challenges that limited their profitability and/or competitiveness and how they planned to leverage Data Mining to overcome their challenges.

• Solution: Describe the organization’s Data Mining implementation and the benefits they realized from the implementation. What was the result of implementing Data Mining? Did they meet their objectives for fall short?

• Conclusion: Summarize the most important ideas from the paper and also make recommendations or how they might have achieved even greater success.

The paper must adhere to APA guidelines including Title and Reference pages.There should be at least three scholarly sources listed on the reference page. Each source should be cited in the body of the paper to give credit where due.

Per APA, the paper should use a 12-point Time New Roman font, should be double spaced throughout, and the first sentence of each paragraph should be indented .5 inches.

The body of the paper should be 3  pages in length.

The Title and Reference pages do not count towards the page count requirements.

Digital Forensics Tools & Tchq

Find a criminal case that involved Digital Forensics. describing the case and how digital forensics were used in the investigation. 

Using WORD, write an ORIGINAL brief essay of 500 words or more.

I need at least 3 references and Turnitin Report.

Technical Writing Project

  Answer the following

  • Find a professional article online written for people in your field. Identify the intended reader and purpose. Write description of the article describing the elements in the article that helped you identify the reader and purpose. Be sure to include the URL of the article.
  • Study your school’s Web site. Imagine you are a potential transfer student looking for a new school. Analyze the usefulness of the information available and how easy it is to locate information about various majors and directions about applying for admission. Identify 2-3 features of the Web site you would change in some way. Support your answer with citations from the text.
  • The following bulletin at a large manufacturing company provides guidelines for the plant security supervisors in assigning duties to the plant security guards at five separate plants. Revise and reorganize to make the bulletin easier to read and more useful to the supervisors. All supervisors must be conscious of the need to reduce costs and properly use available security guards int he most effective manner. Consider staggering the start and quit times to ensure a larger force during the peak demand hours. Every effort should be made to eliminate nonsecurity service functions, such as airport pickup, mail runs, drives to banks, drives to medical centers, parcel pickup. The supervisors should regularly review the schedule to be sure the coverage meets the needs of the plant. Guards assigned to gates should advise the shift supervisors whenever they leave their posts, including for lunch break. Nonsecurity service functions should be contracted out if possible. Drives to banks should be performed by the responsible department, but a department may request a security guard escort. Guards assigned to patrols, shipping and receiving docks, and special surveillance should tell the shift supervisors when they leave their assigned task, even for the lunch break. Supervisors should consider combining spot checks with regular duties of guards. For example, if a guard must open a gate and passes the trash center, the guard can spot check the trash pickup on the way to or from opening the gate. Supervisors must know about outside employment of guards. These outside activities should not adversely affect the security arrangements at the plant. In general, security guards should not also work at racetracks or casinos, or any places associated with gambling. Guards also should not be in partnership with co-workers since that relationship could negatively affect plant security. Supervisors need to check attendance records regularly. Frequent illness may indicate the guard cannot do the physical tasks appropriately. Questionable illness reports should be checked. Guards who operate small businesses may resist the normal rotation because it will interfere with their outside employment. Security requires a 7-day operation.
  • Find a real-world letter, memo, bulletin, pamphlet, or report online. Identify specific style problems. Evaluate the style and clarity of the document, and identify specific areas where revision would help readers. Support you answers with citations from the text. Be sure to include a url to the document you are evaluating.
  • Find a Web site you use frequently and analyze how you use it. How easy is it to find the features you want to see? Has the home page changed since you began using it? Can you recall which features were redesigned? How consistent is the placement of navigation links on the pages you use? How informative are the headings and page titles? Are there any distracting elements? Are the graphics helpful or simply decorative? Are there moving graphics or text? If so, do they enhance the usefulness of the site? Write a memo to your instructor, analyzing the design of the Web site. Support your answers with citations from the text. Be sure to include the url.
  • Find the home pages for the following: a) Ford Motor Company, b) Chrysler, and c) General Motors. Analyze the design features of these home pages in terms of users who are seniors or have problems making precise movements with the mouse. Report your findings to your instructor in a memo.
  • Find a review of a computer product online. Using the information in the review, write a task oriented set of instructions from the review. Be sure to include meaningful tasks and graphics. Use your book as a reference. Be sure to include the URL as a reference.

Discussion and Assignment 7

Discussion:

Focus on some additional terms for IT users. Lets discuss what a community of practice is. Why are they important and how can they impact the culture within an organization?

Need 125 words on this topic with references and in a separate document.

Assignment 1 (Information Systems for Business and Beyond):

Q1::

If you were going to start a new technology business, which of the emerging trends do you think would be the biggest opportunity? Do some original research to estimate the market size.

Q2::

What privacy concerns could be raised by collaborative technologies such as Waze?

Q3::

Write up an example of how the Internet of Things might provide a business with a competitive advantage.

The above assignments should be submitted in a separate document with references.

Assignment 2:

Chapter 11 – Review the employment challenge in the digital era (as well as the entire chapter). Reflect on the various challenges are present in the digital era. Will things get better or more complicated as times goes on? Explain. What are some methods to assimilate new generations into the workforce to think about competitive advantage? (Information Technology and Organizational Learning)

The above submission should be one page in length and adhere to APA formatting standards with references included.

Both textbooks are included in the attachments.

Linux System Scan

 

As part of your Vulnerability Management project last week, you analyzed a report on a Windows system within the company network vulnerable to the MS17-010 exploit. That report was created using OpenVAS, a free vulnerability scanner designed to run on Linux operating systems (https://www.openvas.org/). Now that you’ve examined a vulnerability assessment report for a Windows machine, it’s time to see what the same tool produces from a Linux system. OpenVAS was used to scan a Linux machine on the network running the company’s database applications. This machine is using an older version of Linux because the company’s database applications are not supported with the latest Linux shared libraries. This system contains critical data and cannot be taken offline.

Your analysis of these two reports should provide you with a good understanding of the OpenVAS tool and the reports you will encounter in the workplace. The report used for this discussion limits the scope to a single host to allow you to focus on the vulnerabilities you would encounter on a Linux machine in the workplace. You will also be able to compare/contrast the vulnerabilities across the two OS platforms.

You will analyze the results from a commercial VM scanner. You’ll be better prepared to assess the output from the two different vulnerability scanning tools and to form the basis of your recommendation to management.

Review Report of Linux Server (OLD) and answer the following questions in your response:

1. For this Linux system, what do you recommend fixing right away? Are there dangers if the vulnerabilities and associated threats are not fixed?
2. How do you fix the problem(s) identified? Can you defer mitigation for another time? How can the problem(s) be fixed if the system cannot be taken offline?

Judy is considering asking the pen tester to rescan the company systems using the commercial tool, Nessus. The organization has an evaluation version that can be used for 30 days. After that, the company will need to purchase the tool. The cost is significant.

3. Since some machines were already scanned with OpenVAS, should you also consider scanning the same systems with Nessus? Why or why not?
4. Conduct open source research using the internet. Roughly, what is the cost to license Nessus for one year?

Research Paper

 

The final portfolio project is a three- part activity. You will respond to three separate prompts but prepare your paper as one research paper. Be sure to include at least one UC library source per prompt, in addition to your textbook (which means you’ll have at least 4 sources cited). 

Start your paper with an introductory paragraph.

  • Prompt 1 Blockchain (2-3 pages): Explain the major components of blockchain. Be sure to include how blockchain is affecting a global economy and how you see it growing in the future. 
  • Prompt 2 Big Data (2-3 pages): Describe your understanding of big data and give an example of how you’ve seen big data used either personally or professionally. In your view, what demands is big data placing on organizations and data management technology?  How does big data affect a global economy.
  • Prompt 3 Government and Policies (2-3 pages):  Discuss the role government plays in a global economy.  Also, look at what policies are currently in place and then discussion what policies should be put in place.

Conclude your paper with a detailed conclusion section (1-2 pages long).

Your paper should meet the following requirements:

  • Be approximately eight to twelve pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course, the course textbook, and at least ten scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find supplemental resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Practical Connections assignment

At UC, it is a priority that students are provided with strong educational programs and courses that allow them to be servant-leaders in their disciplines and communities, linking research with practice and knowledge with ethical decision-making. This assignment is a written assignment where students will demonstrate how this course research has connected and put into practice within their own career.

Assignment:
Provide a reflection of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Requirements:
Provide a 500 word (or 2 pages double spaced) minimum reflection.
If supporting evidence from outside resources is used, they must be properly referenced and cited.
Share a personal connection that identifies specific knowledge and theories from this course.
Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 

You should NOT provide an overview of the assignments assigned in the course. The assignment asks that you reflect on how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.

My Courses Business Intelligences

Organ Leader Decision Making  

Mobile Security

 

Mobile devices are always in the workplace and being used for both personal and company business. You have been asked to create an informative poster to display throughout the office that highlights ways to secure mobile devices and safety precautions. This poster will be seen by the entire company in hopes of empowering employees to protect themselves and the company from mobile breaches. 

Create a visual poster or infographic to display in the company’s break room.  

Include the following information: 

  • At least 2 mobile device threats 
  • List of ideal mobile security settings to defend against threats 
  • Brief instructions for setting up at least 2 security settings 
  • An explanation on what happens when mobile devices are not secured from these threats 
  • Appropriate images and graphics 
  • 2 resources for more information on mobile security with appropriate citations 

Format your assignment according to APA guidelines.

batch shell script processing.

THE CODE MUST BE IN C ONLY.  Every shell needs to support a number of built-in commands, which are functions in the shell itself, not external programs. Shells directly make system calls to execute built-in commands, instead of forking a child process to handle them. 

 Add a new built-in exit command that exits from your shell with the exit() system call. Also add support for signal handling and terminal control (Ctrl-C, Ctrl-Z). You do not want those signals to terminate your shell. Instead, you need to handle them and terminate processes that your shell started if any. Be aware that forked processes will inherit the signal handlers of the original process.