Assignment 19608012

 

Go online and search for information about companies that have been harmed or bankrupted by a disaster. Choose one such company and create a brief case study about it. Successful narratives will focus on the manner in which the organization was impacted, including financial losses, losses of sales, or the need for layoffs. Your assignment should be 3-4 paragraphs in length.

Website Development 19547545

  

we will start the CARIT site with three static HTML pages and a CSS file. Create a dedicated folder for this project. This folder should contain all related files in this project. The future milestones are cumulative and built directly on top of your prior work.

Function/content requirements:

1. A home page named “index.html”, which include these contents at least:

· Description of the center. You may reference the example sites.

· Latest news: use list tags; make up some news items.

· Use <p>, <br />, and heading tags properly.

· Other contents you may wish to design: banner, front image, etc.

2. About us (faculty) page

· Present at least three faculty members with their information like image, positions, research interests, and contact information. Put a link on each name which links to his/her personal website. You may refer to faculty information here: http://ccse.kennesaw.edu/it/faculty-staff.php or their websites here http://facultyweb.kennesaw.edu

3. A third page which you can decide what content to be put on. Use the reference sites as examples. For example: projects, resources, events, etc. You have to use the table tag at least once for some content.

4. For all three pages, display the following common contents:

· The name of the center (site title) in a big heading

· A logo with a link to “http://ccse.kennesaw.edu/it”

· A menu which consists of three text links, linking to three pages above respectively. Apply some hovering styles. 

· These common contents should display the same in all pages.

Style requirements

1. All pages should have the same style and layout.

2. Create your own page style. Use a simple style, neat, clean; not too colorful and flashy.

3. Apply some nice styles to HTML elements like paragraphs, images, lists. 

4. All links should have some color other than the default color.

5. The menu item links style should be different from other links. Create a hover effect for menu items so their styles change when the mouse cursor is on them.

6. Please do not use any third party style frameworks or packages.

File/code organization requirements

1. Use one style sheet file (.css) for all three pages. Use class selectors wisely.

2. Organize page content sections (header, content, footer, etc.) in a number of <div> tags. This should be consistent on all pages.

3. It’s recommended to put all image files in an “img” subdirectory.

4. You should not use any wizard to generate HTML/CSS, nor should you copy and paste the HTML from other source without cleaning it.

5. All pages should work on your hosted site.

Submission

Maintain a live working website for the project on      your hosted site. Submit the URL (directly put in the Comments textbox). A milestone report in PDF, including: Proper cover page Overview: brief summary of your work, including how requirements are satisfied. The URL to your live project (milestone #1). Web page screenshots with explanations. Take a       screenshot of each webpage displayed in the browser. Clearly label and describe all screenshots. All screens must be clear, original, and show the complete browser window (only the top part of the page if the page is too long). No graphic editing or cropping is allowed.  References (styles, images, etc.) Compress all source code files into a .zip file. Do not zip the report.

Building Secure Web Application 19476241

 

You are the web master of a college website. You share a server with other school departments such as accounting and HR.

Based on this chapter, create at least five rules for staff members who are adding web pages being added to your site. Include a justification and explanation for each rule.

Write your answer using a WORD document. Do your own work and use your own words. Submit here. Note your Safe Assign score. Score must be less than 25 for full credit.

Essay Writing Data Flow Octopus

 

This assignment will be checked for plagiarism by the professor and this assignment should be a minimum of 600 words and should be in APA format and have to include at least two references. Please find the below attachment and refer to chapter 7 and chapter 8 to prepare the answer. And I need the answer by Sunday 10:00 am EST. (02/23/2020). 

Question:

Consider the data flow “octopus,” as shown in Figure 8.1. How can the analysis system gather data from all these sources that, presumably, are protected themselves? 

Note: Please find the attachment below for the answer. You need to refer to figure 8.1 for the answer.

Cybersecurity Legal 19610889

  Internet Research Assignment #3: Equifax Data Breach

Attached Files:  Equifax Breach Case.pdf (112.723 KB)

Read the Equifax Data Breach case and write a paper answering the following the following three questions: Discuss the moral issues in this case and whether Equifax’s actions constitute a moral failing. Should companies like Equifax be compelled to announce data breaches to the public within a certain time frame (e.g., 72 hours after discovery)? What would be the downside of legalizing such a requirement? In your opinion, why was security so lax at Equifax and how can this laxity be remedied?

The answer to the first question is worth 34 points, and both questions two and three are worth 33 points each. Review the attached grading rubric to determine the requirements for answering each question.

Cyber Security Planning And Mgmt Week Two

Research Assignment – WK 2Attached Files:  Sample Article Summary Assignment.docx (13.021 KB) Select ONE ARTICLE from the following links and summarize the reading in your own words. Your summary should be 2-3 paragraphs in length and uploaded as a TEXT DOCUMENT. Click the link above to submit your work. There is an EXAMPLE attached to show you the format requirements.

What is most important is that you use YOUR OWN WORDS to summarize the news article. It is essential that you do not copy text directly from the Internet. Plagiarism is unacceptable. You can easily avoid this by rephrasing the contents and summarizing it using your own words.
http://topics.nytimes.com/top/reference/timestopics/subjects/c/computer_security/index.html
https://www.lifewire.com/learn-how-antivirus-4102748
http://www.sans.org/newsletters/
http://news.cnet.com/security/
https://www.onlinesecurity.com/news–publications-page
http://www.esecurityplanet.com/views
http://netsecurity.about.com/
https://www.techrepublic.com/

Week 2 – DiscussionEach week please link to an instructor facilitated Discussion Board forum. A Discussion Board rubric clearly communicates expectations for participation, please see the NEC Grading Matrix for Discussion Board Postings as an example.
In your own words, explain what the following terms mean to you as they apply to information security and safe computing: Confidentiality, Integrity, and Availability. Why are these factors so important to businesses?

R Vs Python Programming Languages

Several Big Data Visualization tools have been evaluated in this weeks paper.  While the focus was primarily on R and Python with GUI tools, new tools are being introduced every day.  Compare and contrast the use of R vs Python and identify the pros and cons of each. Provide an example of both programming languages with coding examples as well as your experience in using one or both programming languages in professional or personal work. If you have no experience with either language, please discuss how you foresee using either/both of these languages in visualizing data when analyzing big data. 

Research Paper Blockchain Funds

 

 Prepare an 8 page APA style paper using the resources you have read in this course and at least 5 additional peer reviewed resources. Follow the writing requirements for this course. Include an introduction and conclusion in the paper. Cite the required, this is mandatory.

This paper should address the following questions: 

(1) Does Blockchain technology have the potential to cause the paradigm shift in business practices that many experts are predicting? Explain why or why not. Support your answer with research.

 (2) Is there evidence to suggest that Blockchain technology will change the way HR is practiced? If there is, discuss that evidence. If there is not, what issues exist that impede its adoption?

 (3) Which functions of human resource management could be most impacted by Blockchain technology? How might the HR functions change? Support your answer with research. 

 Use following material only:

 Arun, J. S., Cuomo, J., & Gaur, N. (2019). Blockchain for Business. New York: Pearson Addison-Wesley. ISBN: 0-13-558135-4 

Required Harvard Couse Pack:

 https://hbsp.harvard.edu/import/688391 

Other articles, and readings as assigned by the course professor. Recommended Resource: APA Manual, 6th edition. 

Application Case 11 3

Questions for DisCussion 

1. Why is the group discussion in this case complex? 

2. Why is getting a consensus when top experts are involved more difficult than when non-experts are involved? 

3. What was the contribution of swarm AI?

4. Compare simple voting to swarm AI voting.

INSTRUCTIONS.

1. No Plagiarism at any cost as the assignment is attached to safe-assign.

2. The submission date is Saturday (4/4/20).

3. The solution document should be 1 page and entirely in APA formatting.

4. Atleast 3 references in APA format

5. Should answer the questions in different paragraphs based on the attached application case.

Some useful references:

1. Sharda, R; Delen, D; Turban, E (2020). Analytics, Data Science, & Artificial Intelligence: Systems for Decision Support (11th Edition) 11th Edition. Pearson

ISBN-13: 978-0135192016

ISBN-10: 0135192013

2. Compiled from Unanimous AI (2018), xprize.org, and xprize.org/about

3. youtube.com/watch?v=Eu-RyZt_Uas 

Benefits And Vulnerabilities Associated With Biometric Techniques

 Some common biometric techniques include: Fingerprint recognition Signature dynamics Iris scanning Retina scanning Voice prints Face recognition

Select one of these biometric techniques and explain the benefits and the vulnerabilities associated with that method in 3-4 paragraphs. No Plagiarism.