Discussion 9

Select from the following list four (4) topics and discuss. Use only 70-words max per topic to discuss and present your answer. The discussion questions this week are from Chapter 9  (Jamsa, 2013).

Chapter 9 topics:

  • List the security advantages of cloud-based solutions.
  • List the security disadvantages of cloud-based solutions.
  • Define and discuss the data wiping process.
  • Discuss how a cloud-based solution provider may reduce the risk of a DDoS attack.
  • Define and discuss hyperjacking attacks.
  • Define and discuss guest-hopping attacks.

NOTE: You are required to use at least two-peer reviewed sources (besides your textbook) to answer the above questions.   

ME-12

 

1) Describe the purpose of the balance sheet and how this information is useful to the stakeholders of the corporation.  

2) Please describe the information presented on the statement of cash flows.  Why is this information important for the stakeholders of a corporation?  

Research paper

Research: Annotation and Color

Background: According to Kirk (2016), typography will have a significant role in your visualizations. You have to be careful with your text, but you must also be concerned with how the text looks. This then leads to color and functional harmony. You must provide the balance of colors in your visualizations (Kirk, 2016).  The harmony of colors you select during design will impact many aspects of the overall visualization.

Assignment: Write a research paper that contains the following:

  • Discuss Typography and the importance of appearance of text
  • Discuss the following color harmonies: (Usage, Pros, and Cons)
  • Complementary colors
  • Analogous colors
  • Triadic colors

Your research paper should be at least 3 pages (800 words), double-spaced, have at least 4 APA references, and typed in an easy-to-read font in MS Word (other word processors are fine to use but save it in MS Word format). Your cover page should contain the following: Title, Student’s name, University’s name, Course name, Course number, Professor’s name, and Date.

Submit your assignment on or before the due date.

Lab computer science

 

For this lab you will implement a Java program that uses several different data types and operators.

  1. Start Apache NetBeans.
  2. Create a new project called Lab 3.
  3. Add a java main class called yourlastnameLab3.java with your last name to the project and csci1011.lab3 as the package name
  4. Your program must have the following comments at the top of it

//
// Sample program to calculate the value of a deposit
// after a year of earning interest.
// CSCI 1011 Lab 3

  1. It then should show a welcome message
  2. It then prompts the user to enter an initial deposit amount
  3. It reads the initial deposit value and assigns it into a double variable.
  4. Program then updates the new value of balance by using the following formula:

balance = balance + (balance * 0.049);

  1. Then the program will show a message like:

With a 4.9% APR your deposit will be worth $Y in one year.”

  1. Instead of Y you must show the value of balance variable.
  2. Run the program and test it with sample input. Do this several times.
  3. Modify the program so it uses a named constant in place of 0.049.
  4. Run the program and test it to see if it gives the same values.
  5. Modify the interest rate to 0.059.
  6. Run the program again and test it to see the values it gives have changed.
  7. Did you change the output so it now says 5.9%? If not make that change and run the program again.
  8. Since it would be easier not to have to change the program in two places, declare a new double variable called percent and set its value to 100 times the interest rate.
  9. Modify your output statement so it uses the percent variable instead of 5.9.
  10. Run the program again and test it to make sure it still works properly.
  11. Add some additional statements to compute what the balance will be after a second year of earning interest and display this result along with the original result.
  12. Run the program again and test it to make sure that the new code works.
  13. Here is an output of the program:

Welcome to (your name)’s interest calculator

Please enter your initial deposit amount:

10

With a 5.8999999999999995% APR your deposit will be worth $10.59 in one year.

With a 5.8999999999999995% APR your deposit will be worth $11.21481 in two years.

  1. Upload the file yourlastnameLab3.java to the drop box folder labeled Lab 3.

Legal Reg, Compliance, Invest Discussion

One and half page is fine

Managing Risk

Your company has decided to implement a human resource demographic portal.  Under the system envisioned, employees would be able to use an online internal web page to change various personal information items themselves, such as, address phone, etc.  In addition, the employees would be able to change limited payroll related items, such as 401k deduction percentages or amounts, optional United Way contributions, and the number of federal and state exemptions to be claimed. Along with thie portal would be the ability to view, download, and print current and YTD pay information, including the current paycheck and check “stub”.  

Under the current system, employees must go to the HR office to make any changes – there is no online access.

Your company already requires direct deposit for all employees, and under the new system, pay stubs would no longer be printed.  Employees would be able to do this as needed through the portal.

 There are many potential risks associated with this project

  1. Your task is to Identify as many risks as you can (4 is a minimum, but feel free to identify more risks if you so desire).
  2. Determine the relative likelihood of each risk occurring (lowmedium high)
  3. Propose at least one strategy for addressing each risk, and describe the strategy in terms of the 4 risk responses (Avoidance, Transference, Mitigation, or Acceptance).

Remember that sometimes, risks are acceptable and can be taken, so long they are identified and a strategy to address the risk is presented.  For example, driving a car is a risky venture, but to address that risk we have driver’s education (mitigation), manufacturing safety standards (mitigation), insurance (transference), and staying at home (avoidance). Driving an older, unsafe vehicle by an unlicensed and uninsured motorist could be considered acceptance,

.

Turn in as much as needed. (Sometimes less is more, sometimes more is more; it’s your call.)

Support your strategies as needed with external references, and make sure your answer directly address the potential risks with the  human resource demographic portal.

Research topic

 Topic- Journal of Systems and Software 

This is a continuing assignment; you will be using this drop box until you and your faculty mentor approve your topic. 

In a 200-word document, describe your topic. Identify research in the area any models/theories developed in the area. Have you identified a cite problem/gap in this body of knowledge?

Are you considering doing a qualitative, quantitative, mixed method, project, etc., study, identify a possibly population to gather data from.

If you are a CPT student, please include the following as well:
Have you been issued CPT or are currently on CPT? If so what is your CPT code?

If you have a CPT code then:
Post your job description.Upload an official job description on company letterhead. Please copy/paste your current job responsibilities identify how your proposed topic in your discipline relates to the program goals and core courses. 

  • Once your mentor has approved your topic, you will use the below form to add all the components and submit to the school.

3 page APA compliant paper with NO PLAGIARISM on transformational leadership and knowledge and knowledge sharing

3 page APA compliant paper with NO PLAGIARISM with a minimum of five peer-reviewed journal articles.

Answer the following questions:

  1. How do trustworthy and ethical leaders enhance knowledge sharing in organizations?  How does this impact the rate of information technology implementations?  How does this impact data management within organizations? 
  2. How does servant leadership assist with transferring knowledge in an organization?
  3. When thinking about data analytics, how does transformational leadership assist with building good data structures?

The paper should meet the following requirements:

  • 3-5 pages in length (not including title page or references)
  • APA guidelines must be followed.  The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.
  • A minimum of five peer-reviewed journal articles.

Operating System Project 2

Developing a Linux-like command shell with C/C++ language

 your implementation of the “builtin commands”:
a. cd – Change the current default directory to
. If the argument is not present, report the current directory. If the directory does not exist an appropriate error should be reported. This command should also change the PWD environment variable.
b. clr – Clear the screen.
c. dir – List the contents of directory .
d. environ – List all the environment strings.
e. echo – Display on the display followed by a new line (multiple spaces/tabs may be reduced to a single space).
f. help – Display the user manual using the more filter.
g. pause – Pause operation of the shell until ‘Enter’ is pressed.
h. quit – Quit the shell.
i. The shell environment should contain shell=/myshell where /myshell is the full path for the shell executable(not a hardwired path back to your directory, but the one from which it was executed).