Analyze the breach in terms of reasons, use the following link to find information about the breach.

Adobe security breach 2013 October

Analyze the breach in terms of reasons, use the following link to find information about the breach you can search for other links also but you have to put the link in the document:

Compare and Contrast cloud computing and mainframes

– Research “Cloud Computing association with Mainframes (3 to 5 sources)” and “how they compare and contrast”, write a short report (2-5 pages) presenting your research findings and citing your sources.

– Number the references, and you MUST cite them in the paper where you use the references.

– Use Original Content. No plagiarism.

– The sections of this research paper could include:

1) What is a mainframe

2) What is cloud computing

3) Compare and Contrast cloud computing and mainframes (these sections’ titles could be changed to what the writer thinks is more accurate for the content)

Analyze the organization’s current information systems security measures in place that allow users to access the organization’s data. Evaluate the current cyberlaws to ensure that they protect the organization’s data against outside intrusion.

IT 659 Information Technology Risk Analysis and Cyber Security Policy Part 1 Guidelines and Rubric.
The first component of the summative assessment for this course is the development and creation of a risk analysis paper. The assessment will allow students the opportunity to investigate international and U.S. cyberlaws; state statutes; criminal, civil, private, and public laws; and ethics and then compare them within the current cyber business model of an organization to identify any implications for information technology. Students will research their chosen organization, studying the business models, to identify key areas of potential risk due to the business activities and industry.
Prompt: Submit a comprehensive risk analysis paper that identifies the cyberlaw foundations that affect the current information technology business model. The framework for the assessment will include how the business model ensures that their current cyber practices are both legal and ethical.
Specifically the following critical elements must be addressed:
1. Define and evaluate the information technology business model of the organization.
2. Analyze the precise cyber-security laws, private and public laws, state statutes, criminal and civil laws, and ethical guidelines that are pertinent to the organization.
3. Evaluate the current cyberlaws, regulations, and policies within the organization as they relate to the organization’s information systems.
4. Cyberlaw crimes
a) Evaluate how cyber-related crimes should be investigated and handled within an organization.
b) Analyze the impact that these cyber-crimes can have on an organization’s information technology structure.
c) Evaluate the appropriate information security measures that should be in place to safeguard an organization’s information.
5. Cyber-crime and e-commerce
a) Analyze the organization’s current information systems security measures in place that allow users to access the organization’s data.
b) Evaluate the current cyberlaws to ensure that they protect the organization’s data against outside intrusion.

Using scholarly material, explain how Enterprise Resource Planning (ERP) Systems mitigate risk and assist in organizational decision making.

Using scholarly material, explain how Enterprise Resource Planning (ERP) Systems mitigate risk and assist in organizational decision making. In addition, explain why mitigating risk and making better decisions are essential to operational efficiency. Also, discuss how ERP is helping to manage projects better. Remember to support your statements with factual information (i.e., attribution/citations). In addition, material from the course textbook or the textbook’s author(s) cannot comprise more than 25% of the sourced and/or quoted material.

The paper must follow the formatting guidelines in The Publication Manual of the American Psychological Association (2010), (6th ed., 7th printing), and contain a title page, five scholarly references, three to five pages of content, and a reference page. In addition, the paper will be submitted through the Turnitin originality-checking tool. More APA assistance can be found at the Purdue University Online Writing Lab (Links to an external site.) (Links to an external site.). In addition, the WilmU Student Success Center’s website (Links to an external site.) (Links to an external site.) contains more resources related to APA Formatting, Grammar, and Research Writing.

Write a report that explains what the minimum spanning tree problem is and how it can be solved with Prim’s algorithm and Kruskal’s algorithm.

Question 4 (25 marks)

This question is about spanning trees (Unit 5 Section 2.2.2), minimum spanning trees and Prim’s algorithm (Unit 5 Section 2.4) and assesses your skills in clear and succinct communication, which are required for the last question in the exam. Moreover, explaining a topic to others is a good way to consolidate one’s own learning.

Write a report that explains what the minimum spanning tree problem is and how it can be solved with Prim’s algorithm and Kruskal’s algorithm. Kruskal’s algorithm is not taught on M269 so you will need to find out about it yourself (remember you can use Library resources to do this e.g. Finding resources for your assignment). Your report must have this structure:

  1. A suitable title.
  2. An introductory paragraph explaining what a spanning tree is, then what a minimum spanning tree (MST) is, and the problem of finding it.
  3. One or two paragraphs explaining how Prim’s algorithm solves the MST problem with an example.
  4. One or two paragraphs explaining how Kruskal’s algorithm solves the MST problem with the same example, but showing how Kruskal’s algorithm arrives at this solution in a different way.
  5. A concluding paragraph explaining what the greedy algorithm technique is and why these are examples of it.
  6. A bibliography section with all sources that you consulted, apart from the M269 materials.
  7. At the end of the report note the number of words that you used for points 1 to 5. Please aim for 700 words. If you find yourself writing more, you are probably not explaining clearly, and if you have written a lot less, you probably have not explained well enough.

You may create your own figures or use someone else’s, as long as you acknowledge them, to support your explanation and reduce the need for text. Figure captions and text in the figures count towards the word limit, i.e. select all your text and figures and apply your word processor’s word count tool.

The report is aimed at students of M269. Assume they have studied up to and including Unit 5, Section 2.2.1 i.e. they have just learnt about the graph data type.

Make sure that you explain everything in your own words. The OU uses software to detect text plagiarised from articles and web pages. Omitting or replacing some words, changing the order of sentences, or copying from multiple sources does not fool the software. Detected cases will be passed to the OU’s plagiarism team.

Before writing your first draft, you may wish to look back at TMA 01 Question 2: skim Joe’s report, your feedback to him, and your tutor’s feedback on your feedback. This will help you avoid making the same mistakes as Joe.

Your report will be marked against the following criteria:

  • a.Content (points 2 to 5): Is the explanation clear and complete? Will the reader understand Minimum Spanning Trees and the differences between Prim’s and Kruskal’s algorithms as a way to solve them? Will they understand how these are both examples of greedy algorithms?

(15 marks)

  • b.Writing (all points): Is the title descriptive? Does your report follow the structure above? Does it follow the Checklist with advice on writing and the OU Harvard guide to citing references (both in the TMA questions and guidance page)? Have you kept to the word limit?

(10 marks)

Note that the checklist mentioned is generic and not specific to this TMA. In particular, your report needs no headings other than the title.

After completing and revising your answers, upload your TMA as a single .zip file to the eTMA system. The zip archive should include 4 files only:

  • your Solution Document;
  • TMA02_Q1.py;
  • TMA02_Q2.py;
  • TMA02_Q3.py.

Make sure that you:

  • have not changed the names of the code files;
  • have pasted the methods and functions that you changed or added as text (not as an image) into the Solution Document, so that your tutor can give inline feedback;
  • have not included the test files in the archive.

 

Plan, negotiate and complete a piece of independent work related to a computing topic.

This project must include some element of original data collection. The writer is expected to conduct a literature search in creating a mobile game, app development, apps for kids, it will effectively be for the prototype of an app which is suitable for kids, simple tap on the screen / flappy bird style game which will be the basis for critical analysis and evaluation of original data collection.

The written project report will be accompanied by a physical or software product that is an outcome of your enquiries and it is imperative that the writer use a lot of intuition and assumptions when performing a lit review on a game like flappy bird.

The writer can also integrate your knowledge and skills from several different subject areas. For example, computer science, programming, games development etc. It is important to maintain contact as the app is still being developed over the next few days, but this should not get in the way of creating the following:

Just keep in mind: FLAPPY BIRDS! (basic tap screen, mobile, platformer game)

  1. Introduction
    Title, Abstract, Aims and Objectives (creating a simple app demo)
    Justifications.
    Planning:
    Bit of research
  • Programming language and properties to use
  • Aim of the game
  • Usage of programs
  • Game difficulty, choices, interface
  • Asset acquirement

Planning

  • Building the game
  • Programming (Unity Engine & C#)
  • Game functions (tap screen)
  • Target audiences (kids upwards)
  • Time management (assume from mid-January till end of March)

Implementation

  • Creation of assets
  • Creation of game logic
  • Creation of menu and controls
  • Coding
  • VFX / SFX

Testing

  • Self-testing
  • External testing

 

I will send along a GAANT chart that outlines the app development.

  1. Literature Review
    Whatever the writer can source in terms of why more people are playing mobile
    games, mobile games for kids, maybe a bit on unity ads, will be created in the unity engine, big bulk of the research into mobile gaming etc.
  2. Existing research
    something in relation to original data collection, this can be fabricated, ie. 20kids played with the app and thought A, B and C – this element should make the writing easier as it can be assumed.

    Conclude
    and References in Harvard Format

At the end of the project it should have clearly displayed an ability to:

  1. Plan, negotiate and complete a piece of independent work related to a computing topic.
  2. Review, select and integrate relevant theoretical perspectives in the context of the area studied.
  3. Collect, analyze and interpret data (primary and secondary) within the professional context.
  4. Communicate and demonstrate ideas, evaluate an argument clearly and present conclusions in an appropriate medium.

Assessment

A written report should be submitted presenting a critical view of games development and mobile games for kids (referencing the demo). You should ensure that you have met all of the learning objectives listed above. You should also refer to the suggested marking scheme for more information on what should be contained in your final report, (the 2nd document attached)

Material drawn from a variety of sources should be utilised and an appropriate

bibliography presented. As there is a mobile game demo as the basis for a presentation or demonstration of the use of the system. Then the written report may be limited to 3000 words but anything upwards is appropriate too.

Further below shows the some of the points in the marking criteria:

Investigate traffic engineering and service differentiation into the internet 6 Critically analyze the Multi-Protocol Label Switching technology and its QoS capabilities.

Assessment Brief

Complete the following tasks in the form of a report. Your answers should include formal references, diagrams where appropriate and a detailed bibliography.

Learning Outcomes Assessed 1 Compare and contrast Quality of Service methods and their requirements. 2 Investigate traffic engineering and service differentiation into the internet 6 Critically analyze the Multi-Protocol Label Switching technology and its QoS capabilities.

TASK 1 – QUEUEING & SHAPING (40% WEIGHTING) [LO1]

QoS parameters are determined by an associated SLA. To ensure that the traffic being routed by the ingress router doesn’t break the terms of the SLA, packets need to be classified and managed to ensure they exit the router in a controlled manner (Performance Tuned). There are a number of methods that can be used to accomplish this with the main methods being:  • Packet Classification • Queuing • Shaping • Admission Control (active and passive) With regard to the Performance Tuning methods listed above, discuss how these are implemented within a network to ensure that QoS as determined by an SLA, can be met.

TASK 2 – QOS DELIVERY (35% WEIGHTING) [LO2]

When traffic exits the ingress router, there are a number of architectures that can be implemented to ensure that the QoS compliant delivery of Voice, Video or Data packets.

For delivery of packets between ingress and egress edge router interfaces three important technologies can be implemented to ensure that QoS are met these are:  • Integrated Services • Differentiated Services • RSVP Evaluate these methods, their operation and requirements for achieving QoS, and discuss how these technologies can be used in conjunction with each other to ensure QoS delivery.

TASK 3 – MPLS (25% WEIGHTING) [LO3]

To ensure QoS can be achieved at ISP level, label switching technologies are implemented. However due to the behaviour of various protocols used by ISPs (IPv4, IPv6, Ethernet, PPP, OSPF etc.), MPLS was introduced to alleviate issues such as latency and jitter amongst others and improve packet delivery.

Evaluate the benefits of label-switching in MPLS and consider the characteristics of the technology and how it allows QoS in modern network technologies.

Word count approx. 2,400. References should be in the B&FC Harvard format and diagrams, tables and supplementary information supplied in appendices. Failure to do so will result in a loss of validity and reliability in your work which in turn will result in a loss of marks. Please aim to be concise, selecting key points, comparing, contrasting and evaluating where appropriate.  Please refer to grading descriptors for more information on how this will be marked.

What are the shortcomings of the existing risk management frameworks used in DAD projects?

Title: A risk management framework for distributed agile projects.

Actually, this project is to propose a risk management framework for distributed agile projects…
First of all, need to find out the causes of all risks affecting DAD projects, understand how dsd properties/characteristics/features are impacting Distributed agile (DAD) projects.
then we need to find out all existing risk management frameworks developed by other authors that are being used in DAD projects. and then analyze their shortcomings and advantages… then propose a better risk management framework to eliminate these shortcomings and risk causes/factors… then need to validate this proposed improved framework by implementing in real-life DAD projects.

My 5 Research questions are as follows:
RQ1: What are the causes and factors of risks that adversely affect DAD projects?
RQ2: How do the DAD features adversely affect DAD projects?
RQ3: What are the shortcomings of the existing risk management frameworks used in DAD projects?
RQ4: What efforts can be made to improve the risk management framework to minimize these shortcomings identified in RQ3 in DAD projects?
RQ5: To what extent will the proposed risk mgt framework benefit real-time DAD projects (in Mauritius?)?

Dissertation format- should include
abstract
introduction
literature review
methodology
data analysis
recommendations for better framework
validation of improved framework
conclusions + recommendations
references [around 50 references]

Review the article links attached in excel sheet… and omit if not relevant but need to state why omitting them.. and look for other relevant articles if not sufficient.

This topic is mixed [quan + qual] … so need to include survey questionnaire + interview questions / answers [should collect from around 150 participants + interview at least 10 experienced professionals] … SPSS will be use to analyze quantitative data

Please do send me draft each day if possible or two days for progress.

Name two referrals you would consider making to support Tanisha’s needs. What can these disciplines offer Tanisha and her family?

Assistive Technology and Emerging Practice – Spring, 2019

Mini-Case Study

30 points

Tanisha is a 22 year old woman with an intellectual disability and cerebral palsy. She lives at home with her mother, who is her primary caregiver. Tanisha does not currently work or attend school, (she graduated from a special education program at age 21) and she requires frequent cueing and physical assistance to sequence and complete ADL and IADL tasks. You have recently begun working with Tanisha, and are told by Tanisha and her mother that they would like her to be able to perform a morning routine (shower, brush teeth, dress, apply deodorant), simple shopping tasks (ie. Buy one familiar item at a familiar store), and simple meal preparation (ie. Warm up a plate of food, assemble a peanut butter and jelly sandwich, etc) with no more than distant supervision (mom/OT can watch task performance from a distance to ensure safety, but provide no direct cueing). In addition, Tanisha’s mother is aware that Tanisha’s verbal communication skills are effective with familiar people (ie. family), however she would like Tanisha to be able to communicate her wants and needs to strangers more effectively (ie. Ordering at a restaurant, requesting help in a store).

After watching the video, please identify 5 pieces of assistive technology that you would like to trial with Tanisha (you do not need to target all goal areas with this assignment). For items 1-4, include: (1) name of/type of technology, (2) why it’s appropriate for Tanisha, (3) how you would implement the technology, and (4) what outcome you would expect to achieve with the technology. Item #5 should be some form of AAC – for this item, please include the following: (1) name of/type of technology, (2) what access method would Tanisha use for this AAC/any supports to facilitate access, (3) what would you recommend in regards to positioning while using this device, (4) expected outcome.

If Tanisha and her family wished to trial some or all of the assistive technology before making a final decision, what would you suggest? What are some options for Tanisha in regard to external funding sources for her recommended technologies (include at least 3)?

Name two referrals you would consider making to support Tanisha’s needs. What can these disciplines offer Tanisha and her family?

Please answer in list or table format (not essay/narrative). Your response should fill no more than 2 sheets of paper, double sided. You are not required to double space text, but please use size 12 font.

Watch: https://www.youtube.com/watch?v=zzTCrz9Xynw to learn more about Tanisha.

Scoring Rubric

    þ Points
Tech 1 Name/type   /4
Why appropriate  
How to implement  
Expected outcome  
Tech 2 Name/type   /4
Why appropriate  
How to implement  
Expected outcome  
Tech 3 Name/type   /4
Why appropriate  
How to implement  
Expected outcome  
Tech 4 Name/type   /4
Why appropriate  
How to implement  
Expected outcome  
Tech 5: AAC Name/type   /4
Access Considerations  
Positioning Considerations  
Expected outcome  
Trials, funding AT Trial considerations   /4
Funding options  
Referrals 2 Disciplines   /4
Benefits  
Grammar/Professional Language     /2
    Total /30

 

Create a form using a wizard for your database using any format of your choice. Use all fields in the Form. Name the form with the same name as your table.

Microsoft Access Assignment CMAP120
25 Total Points/-2 each error, omission, misspelling, etc.; -5 Each Object missing or big concept not completed correctly
Create a database with the subject/category of your choice. Determine a category for your database where you can create 15 records that have multiple characteristics. (An example might be a book or music collection, sports team you follow, musician/band you like, books you’ve read or would like to read restaurants you visit, colleges you’d like to apply to, places you have or would like to visit etc.) Have it be something you can research on the Internet or have tangible items you can look at to populate your table – no personal address books.
Name the database file XXXX.accdb. Replace the XXXX with the topic of your database. The database name should be the broad name of what will be inside it. If I were creating a database on the history of the Pittsburgh Steeler Coaches I would call mine SteelerCoaches.accdb, as an example.
A. Design one table with at least:

a. 6 Fields (can have more, but not more than 10)

b. Correct datatypes for your fields

c. Make property changes as needed to each field. At the very least change the field sizes; none should be 255.

d. A primary key Field other than ID with an AutoNumber (ID with AutoNumber is a default, I’d like you to replace that with your Primary Key field; keeping AutoNumber as a Datatype might be okay with your data)

e. One field should have a drop-down box (Lookup Wizard Datatype)

f. Name the table appropriately, there should be no tables named Table1, for instance.

B. Populate the table with at least 15 records. Make sure all the data shows—adjust columns as needed. (No more than 25 records).

C. Create a form using a wizard for your database using any format of your choice. Use all fields in the Form. Name the form with the same name as your table.

D. Query the table, have at least one criteria, and name the query based on what’s in it. You can have as many of the fields showing as necessary to show what you’re trying to accomplish, but do not have all the fields in the query or showing.

E. Create a report, using a wizard, based on all fields in the Query, using any suitable format. Save the report giving it an appropriate name.

TO SUBMIT YOUR COMPLETED ACCESS ASSIGNMENT: Do not submit until you are done and database is ready to be graded; save and close your file and know where you saved it.

1) Click on Course Content on BlackBoard Course Menu.

2) Click on Access Assignment title.

3) Scroll down some and choose Browse My Computer.

4) Find your file you’d like to submit, select it and hit Open.

5) You will see file name and know file is attached. 6) Click Submit.