For this assignment, you will define ethics within the context of digital forensics. You will then apply what you learned to your life, developing an ethical code-of-conduct document.

Scenario:

Your manager has asked you to create a code-of-conduct document for your organization to give to employees during their new-hire orientation. In the code-of-conduct document, you are asked to focus on the sharing of personal or professional data and the ethics involved in sharing data.

Tasks:

  • Create a code-of-conduct document with the following:
    • Define ethics. Explain what it is and how it applies to digital forensics, while also describing ethical and unethical handling of forensic information.
  • Evaluate current or past news events related to each of the four branches of digital forensics: Computer forensics, mobile device forensics, network forensics, and database forensics.
    • Consider topics such as identity theft, the Patriot Act, or Wikileaks. Share your thoughts on the major themes and ethical concerns and give some insight into how it impacts you personally and professionally.
  • Analyze current ethical considerations and issues.
  • Create a code-of-conduct document you can use in professional situations as it relates to accessing or sharing data. This can be a checklist or bulleted list of "Do and Do Not Tasks." Consider the examples and resources below when creating your code-of-conduct document:
    • The International Society of Forensic Computer Examiners. (n.d.). Code of ethics and professional responsibility. Retrieved from http://www.isfce.com/ethics2.htm
    • Barbara, J. (2008). Ethical practices in digital forensics: Part 2. Retrieved from http://www.forensicmag.com/article/ethical-practices-digital-forensics-part-2
    • The American Society of Digital Forensics and eDiscovery. (n.d.). Domain 3 – Ethics and code of conduct. Retrieved from https://sites.google.com/site/asdfedorg/domain-3

Note: Your final product should be a Microsoft Word document, approximately seven to nine pages in length, incorporating five to seven scholarly sources. Write in a clear, concise, and organized manner; demonstrate ethical scholarship in the accurate representation and attribution of sources (APA); and display accurate spelling, grammar, and punctuation.

Is this the question you were looking for? Place your Order Here

 

Virtualization is perceived as the holy grail of IT because of the benefits that it offers to an organization.  It minimize or even eliminate duplicate data, and provides no conflict. I would think it would save a company money because would no longer have to build data warehouse or outsource data to a third party and less equipment would be purchased.

Virtualization can help Verbania with increasing productivity. Having fewer physical servers would save time, because the company would have less to maintain and manage. The staff would have more available time to work on other projects such as founding ways to increase revenues and cutting any expenses. The biggest thing is disaster recovery. In the event of a disaster it would be faster and much safer to move a virtual machine from one server to another. Normally virtualization platforms will contain software that would help automate failure during a disaster. (Top 5 Ways Businesses Benefit from Server Virtualization, 2017)

Some security considerations regarding virtualization would be virtual sprawl and virtual configuration setups. Virtual sprawl is a term associated with an expandable environment. With this type of technology, virtual machines can be available within minutes. As there are more machines available virtually it’s harder to keep the machines secure. It would be much easier to miss simple things such as security patches. Virtual configuration setups has to be monitored and watch closely. If the initial setup is full of security risks such as unnecessary ports, risky services or any other vulnerabilities, each virtual machine after will take on some risks. (Brown, 2016)

Virtualization enables multiple operating systems and applications to run at the same time on the same server. Cloud computing enables a network to a shared pool of configurable computing resources that can be provision and release with minimal management. Cloud computing has more scalability and can be extended as much as needed, where virtual machines has limitations. The setup is more tedious to do with cloud computing yet simple with virtualization. User access is flexible with cloud computing and virtualization will require proper authentication. (Difference between Cloud Computing and Virtualization, 2018)

I wouldn’t recommend virtualization, I believe cloud computing would be a better options just based on the benefits of being flexible and scalable. With a social networking company such as Verbania, it needs to be accessible across the world and cloud computing is best platform to showcase applications and software worldwide. Lastly back-up is more reliable to with cloud computing. With the amount of data being accepted and use, there should be an easy/quick platform to back up the sensitive information.

References

Brown, S. (2016). 4 Considerations for Securing Your Virtual Environments. Retrieved from https://www.rutter-net.com/blog/4-considerations-for-securing-your-virtual-environments

Difference Between Cloud Computing and Virtualization. (2018). Retrieved from EWDUCBA: https://www.educba.com/cloud-computing-vs-virtualization/

Top 5 Ways Businesses Benefit from Server Virtualization. (2017). Retrieved from New Horizons: https://blog.nhlearningsolutions.com/blog/top-5-ways-businesses-benefit-from-server-virtualization

Is this the question you were looking for? Place your Order Here

For this project, you will use all four of the Microsoft Office applications to create a unified project on a single topic.

 

Project Topic

You may select any topic that is of interest to you. The course instructor must approve your topic before you begin working on it–be sure to obtain his/her permission sooner rather than later. Remember that your project will cover ONE topic. You will use ALL of the Office applications to create content related to your chosen topic. 

 Some examples of past project topics include:

• develop a business
• highlight attending HCC
• your favorite sports team
• your favorite sport
• dream car
• moving out on your own
• researching your planned career
• planning a vacation
• planning a wedding
• highlight your native country or culture
• your passion in life, etc.

Project Minimum Requirements

The minimum requirements for each of the four applications are detailed in the checklists below.

1. Each application component is valued at 65pts.
2.There are 40 points (10 pts each application) allocated for professionalism, effort, and creativity.

  • Professionalism is assessed in evaluation of proper use of the required skills (e.g. competent in tables), grammar, spelling, and overall appearance.
  • Effort is assessed in whether or not the presentation exceeded the minimum requirements
    • Students who meet only the minimum requirements for each software application may not receive the 40 points for professionalism, effort, and creativity.
  • Creativity is demonstrated by applying the software skills acquired during the term.
  • Creativity is measured in various ways, including:
    • applying additional skills covered in the course but not listed as a minimum requirement,
    • adding additional graphics or pictures,
    • applying varying color schemes,
    • creative formatting of the Excel chart,
    • using various design backgrounds with presentation slides,
    • creating your own slide background instead of using a design template,
    • adding a border to the Microsoft Word document component,
    • graphically editing pictures and other graphics,
    • adding external sounds or movie clip in the PowerPoint component, etc.

3. This project must be an original creation, not a copy ‘n paste from this semester's assignments. All rules concerning Academic Dishonesty and Plagiarism will be strictly enforced.

4. The project must be based on your original work.

For the Face pictures, Insert a black picture in that section, and i'll change it once done. And for lastname titles,  just type "lastname" so that i know and change it aswell when done.

Please open the file i attached, and follow the steps numbers for each Microsoft (Access, Excel, Powerpoint, Word)

Is this the question you were looking for? Place your Order Here

10-1 Final Project Two Submission: Memo Task: Submit to complete this assignment

To complete this assignment, review the prompt and grading rubric in the Final Project Two Guidelines and Rubric document. Be sure to use the memo template to help structure this assignment. When you have finished your work, submit the assignment here for grading and instructor feedback.

                          

ISE 640 Final Project Two Guidelines and Rubric 

Overview Final Project Two is the creation of a memo to non-technical stakeholders. While these stakeholders will have access to the report you created, they are looking for your expertise in extracting the most salient information for their purposes. They are coordinating with the legal team on next steps for the company and the creation of a press release that will position this incident for the public.  

In this assignment, you will demonstrate your mastery of the following course outcome:  

 ISE-640-03: Demonstrate the use of appropriate reporting techniques in communicating the results of forensic investigations to non-expert stakeholders 

Prompt Write an audience-appropriate internal memo to non-technical stakeholders to communicate findings of a forensic investigation (reported on in the technical report from Final Project One, submitted in Module Nine). 

Specifically, you must address the critical elements listed below. Most of the critical elements align with a particular course outcome (shown in brackets).  

Your memo should include: 

I. Key Details: Describe how the results from the forensic investigation assisted you with resolving the incident and identifying security impacts. [ISE-64003] II. Implications for Legal Action: Describe the accuracy, validity, and defensibility of the investigative steps that were taken. [ISE-640-03] III. Audience Appropriate: Your entire internal memo should employ brevity and consumable language while presenting the necessary information. [ISE640-03] 

Milestones You have one milestone activity prior to the final submission of this memo. Additionally, several of the activities you have completed throughout the duration of this course will assist you in creating the memo. In particular, your notes from your non-graded investigative journal will be a valuable resource when formulating this memo to non-technical stakeholders. 

Milestone Two: Memo Draft In Module Seven, you will submit a complete draft of this memo. This milestone will be graded with the Milestone Two Rubric.  

Final Submission: Memo to Non-Technical Stakeholders In Module Ten, you will submit your final project. It should be a complete, polished artifact containing all of the critical elements of the final product. It should reflect the incorporation of feedback gained throughout the course. This submission will be graded with the Final Project Two Rubric. 

Final Project Two Rubric Guidelines for Submission: Your memo must be 3- 5 pages in length including a cover page and references and must be written in APA format. Use double-spacing, 12-point Times New Roman font, and one-inch margins. Include at least three references cited in APA format.  

Is this the question you were looking for? Place your Order Here

C++ Programming.

Create an inheritance hierarchy that a bank might use to represent customers’ bank accounts. All customers at this bank can deposit (i.e., credit) money into their accounts and withdraw (i.e., debit) money from their accounts. More specific types of accounts also exist. Savings accounts, for instance, earn interest on the money they hold. Checking accounts, on the other hand, charge a fee per transaction (i.e., credit or debit).

A.  Create a base class Account. Base class Account should include

·  One data member of type double to represent the account balance.

·  A constructor that receives an initial balance and uses it to initialize the data member. The constructor should validate the initial balance to ensure that it is greater than or equal to 0.0. If not, the balance should be set to 0.0 and the constructor should display an error message, indicating that the initial balance was invalid.

·  Member function Credit should add an amount to the current balance.

·  Member function Debit should withdraw money from the Account and ensure that the debit amount does not exceed the Account’s balance. If it does, the balance should be left unchanged and the function should print the message "Debit amount exceeded account balance."

·  Member function getBalance should return the current balance.

A.  Derived class SavingsAccount should inherit the functionality of an Account, but also include

·  One data member of type double indicating the interest rate (percentage) assigned to the Account.

·  A constructor that receives the initial balance, as well as an initial value for the interest rate.

·  Member function calculateInterest that returns a double indicating the amount of interest earned by an account. Member function calculateInterest should determine this amount by multiplying the interest rate by the account balance.

A.  Derived class CheckingAccount should inherit from base class Account and  also include

·  One data member of type double that represents the fee charged per transaction.

·  A constructor that receives the initial balance, as well as a parameter indicating a fee amount.

·  Class CheckingAccount should redefine member functions credit and debit so that they subtract the fee from the account balance whenever either transaction is performed successfully. CheckingAccount’s versions of these functions should invoke the base-class Account version to perform the updates to an account balance. CheckingAccount’s debit function should charge a fee only if money is actually withdrawn (i.e., the debit amount does not exceed the account balance).

[Hint: Define Account’s debit function so that it returns a bool indicating whether money was withdrawn. Then use the return value to determine whether a fee should be charged.]

After defining the classes in this hierarchy, write a program that creates objects of each class and tests their member functions. Add interest to the SavingsAccount object by first invoking its calculateInterest function, then passing the returned interest amount to the object’s credit function.

Is this the question you were looking for? Place your Order Here

1. Microsoft PowerPoint Presentation 2. As discussed in class, you are to develop a PowerPoint presentation on a Computer related topic of your own choosing, keeping in mind the guidelines we’ve discussed. 3. Your presentation should be developed to be delivered in 2 to 2.5 Minutes. 4. Within your presentation you must use the following PowerPoint features. The features may be used anywhere in your presentation that is appropriate. 1. Use good PowerPoint style—Don’t use many words and do NOT read from the slide! a. Choose a Theme other than Office 2. Title slide-W/P, including your name-A/P in Sub-Title- place holder 3. Introduction/Conclusion, 3-4 sentences, Hide Slide 4. Transitions – ALL Slides 5. Animations – ALL Objects 6. Bullets: 4 – Slides i. 6 x 6 Rule, Font Size = 28-30 points ii. Use Custom Bullets on ALL Bullets including References iii. Use Smart Art for Bullets on 1 – Slide iv. Sequence ALL Bullets – On Click  i. Fly-IN or Float-IN works well  ii. Effect Option: One at a Time  iii. Outline: fewer words 7. Pictures and/or clip art – Minimum of 4 i. Add a reflection to at least 1 picture 8. At least one slide with background of picture (to be discussed in class, Design/Format B/G, Do Not Insert and Size picture) 9. 1 – SLIDE using multiple shapes (at Least 3 shapes), from the “shapes” section. i. Group the shapes 10. At least 2 slides with Notes, pertaining to slide info 11. Place your name in the Notes Page Footer 12. Closing Slide – Conclusion & HIDE Slide 13. References listed on Last Slide, use Custom Bullets i. Use HyperLinks ii. Enter ‘Text to Display’ on HyperLink as discussed in Class iii. Sequence Bullets – A/P 14. All spelling must be CORRECT 15. FileName: LastName, First – Project Title 16. Upload your file in 'BLACKBOARD' Your presentation must be submitted in BLACKBOARD by Dec. 11, 2018. Late work will not be accepted 17. Create 8 Slides in your Presentation: Slide 1 – Title Slide Slide 2 – Introduction Slide (paragraph) – HIDE Slide Slide 3, 4, 5 & 6 – Content slides (3 w/Bullets, 1 w/Smart Art) Slide 7 – Conclusion Slide (paragraph)- HIDE, Slide 8 – Reference Slide 18. You must be present for all Presentations ON Dec. 18, 2018, to receive Credit for this Project 19. You will be Graded on your ability to use the features of PowerPoint and your creativity 20. Please decide on a topic and start collecting Info for your Presentation 21. You might also search the WWW for info on Tips for PowerPoint Presentations

Is this the question you were looking for? Place your Order Here

PROJECT

SPECIFICATIONS:

Each paper will be at least 10 full pages in length but no longer than 25 pages in length (do not number or count the title page, the pledge page, the contribution page, the abstract, table of contents or the bibliography.)

The format must be single sided; single spaced; left margin of 1.5 inches and all other margins of 1 inch on a standard 8.5 x 11 inch page; and use the Arial 12 font.

You must submit both a paper copy and a soft copy using Microsoft Word. The submission must be spell, grammar and virus checked and correctly numbered and ordered.

The paper is worth a maximum of 100 points and a maximum of 100 points for the oral presentation.  Paper due date: before the last day of class.  

You are allowed a maximum of 30 minutes for each oral presentation. No points for an oral presentation will be given if not done by the end of the last day of class.  You may use appropriate visual aids, such as video, slides, the overhead projector, PowerPoint, charts, written handouts, etc. Provision of the necessary hardware for such presentation is solely your responsibility.

The paper and oral presentation will be a group project by a maximum of 2 students.  Each student must include a description of his/her own contribution in order to receive credit for the team’s project. The instructor must approve your choice of the problem in advance. You may use the sign-up sheets to reserve your choice after approval by the instructor.

CONTENT:  

REVERSE ENGINEERING OF A “C++” PROGRAM OR WRITE A “C++” PROGRAM TO SOLVE A COMPLEX PROBLEM IN AN APPROPRIATE ENGINEERING FIELD

Each team of 1 or 2 students will choose a different “C++” program in their appropriate engineering field for a reverse engineering exercise. The “C++” program must be at least 200 lines of codes. The second option is for the students to write a "C++" program that solve a specific problem in their field. The students must get the approval from the instructor before they can start writing codes to solve the problem.

In either options, the final paper must have the following elements in this order:

1. Name(s), date, and course name/number on the title page

2. Plagiarism Pledge page

3. Group Contribution page

4. Abstract page (1 or 2 paragraph summary of the paper)

5. Table of Contents page

6. Sections a to e (listed below) which will be numbered

7. Bibliography page

Only the following sections count in the page limits:  

a. Identify the application: name, physical location, and etc.

b.  Description of the application and brief history

c.  Presentation of your reverse engineering solution: “C++” codes, outputs, pseudo  codes, and etc.

d.  Recommendations for improvement (if any)

e.   Conclusion

Is this the question you were looking for? Place your Order Here

For the following situation you need to DEFINE (produce SOR), DESIGN (Produce ERD and LDBD (RDM)), DEVELOP (DDL statements, DML data statements, and the DML information statements), DEPLOY(execute the above statements in either MS ACCESS or SQL Server), and OPERATE (run the data the Data Base System (DBS)  to create the metadata, populate the data, and produce the information required.).
The DBS should accomplish the following:
A) Scenario:
Alpha Tech is a small manufacturer of smart home devices with 10 locations across the United States. The company is organized into 5 divisions aligned by their 5 major product lines.  Each division has 4 functional departments (Marketing (determining the needs), Operations (satisfying the needs), Finance (funding the operations), and Human Resources (people performing the work).
The management of the Alpha Tech has contracted with you to create a system to track the required and elective Education and Training (E&T) courses for their employees.
The corporate HR department has identified the following categories of courses to be included:
1)      Safety
2)      Ethics
3)      Diversity
4)      Leadership
5)      Teamwork
6)      Quality Management
7)      Communications
8)      Customer Relations
9)      Supplier Relations
10)  Management
11)  Marketing
12)  Technical Training in the various positions and career fields
B) System Needs
The system should be able to allow the user to:
1)      Look up the current Education and Training (E&T) status for a given employee by their ID number or their name to show whether required courses are completed, scheduled, or not yet planned.
2)      Look up the current Education and Training (E&T) status for a given employee by their ID number or their name to show all the courses they have completed or scheduled.
3)      Produce a list of all employees who have not completed a given course by course name or course ID.
4)      Produce a list of all employees who have completed a given course by course name or course ID.
C) Deliverables:
Create the following deliverables:
1.       A Statement of Requirements (SOR)
2.       An Entity Relationship Diagram(ERD)
3.       A Logical Data Base Design (LDBD) using a Relational Data Model (RDM)
4.       The SQL Data Definition Language(DDL) statements
5.       The SQL Data Manipulation Language (DML) data statements,
6.       The SQL Data Manipulation Language (DML) information statements
7.       The Output satisfying the SOR. (NOTE: Include either the screen prints of the digital output or images of the digital output generated by running these SQL statements.)
NOTE: Not all the information given above is necessarily in scope for the requirements of this system.

Is this the question you were looking for? Place your Order Here

 

Term Paper: Website Migration Project
Due Week 10 and worth 200 points Tony’s Chips has recently been sold to a new independent company. The new company has hired you to manage a project that will move the old Website from an externally hosted solution to an internal one. The company’s leadership is very concerned about redundancy for their site, insisting that a back-up site be available as a failover in case the main site goes down. In addition, they want the site redesigned to allow customers to order products online.

As part of your job, you must complete a 10-to-15 page paper that follows this project through the system development life cycle (SDLC). This assignment will require you to do the following:

  • Discuss what it will take to build a Web architecture, move an existing Website with minimal downtime, and provide a disaster recovery solution to ensure the site is always available.
    • The Web architecture should describe and justify operating system choices (i.e., Linux, Apache, MYSQL, PHP, Windows, IIS, SQL, etc.).
  • Evaluate alternatives to the company self-hosting the site.
  • Build a Gantt chart using Microsoft Project or equivalent software, showing all tasks associated with implementing the Website.
  • The chart should include a minimum of five (5) tasks, each with three (3) sub-tasks.
  • Explain and justify the system architecture you have selected.
  • Illustrate the system architecture using Visio or equivalent software.
  • Create a use case that documents the event of a customer ordering a bag of chips from the new Website.
  • The use case should include a graphical representation using Visio or equivalent software and a text description of the events.
  • Discuss the support operations that the internally hosted Website will require after implementation.
  • Explain how you will evaluate the performance of the new site and the success of your project.

The specific Course Learning Outcomes associated with this assignment are:

  • Design high-level logical system characteristics (user interface design, design of data, and information requirements).
  • Use contemporary CASE tools in process and data modeling.
  • Use technology and information resources to research issues in systems analysis and development.
  • Write clearly and concisely about Systems Analysis and Development topics using proper writing mechanics and technical style conventions.

Grading for this assignment will be based on answer quality, logic/organization of the paper, and language and writing skills, using the following rubric. Click here to view the grading rubric.

Is this the question you were looking for? Place your Order Here

  dvanced Microcomputer Applications

If you would like to download this assignment file, please click here.

CS165W4GoogleAssignment by Grantham University on Scrib

This week you will practice using some of the helpful collaborative functionsand formatting Google Sheets offers. While Sheets is not as robust asExcel, its cooperative features allow users to quickly communicate andshare data across the world with ease. Your goal with this assignment is toedit an excerpt of a sales spreadsheet for an office supply superstore thathas a North American sales representatives in the US, Canada, andMexico so that a sales analyst can get a real-time picture of weekly salestrends by region.1)Downloadthis sample Excel file to your computer and upload it toyour Drive to convert it to Google Sheets.2)You will notice that in Columns L and M, a country and market islisted once but isn’t filled in throughout the rest of the rows. Use thecopy fill tool to extend Mexico and Mexico City down to row 25,Canada and British Columbia down to row 52, and USA and Los Angeles through row 100.3)You will also need to insert an empty row between each of your threedifferent markets (i.e. one empty row after the last row of Mexico dataand one empty row after the last row of Canada data)4)Define and name all three sets of market data.5)You will use the SUM function to display total sales and net profit incolumns F and H for EACH market. Your totals will come from usingthe cell ranges in both columns in your function.6)Format your sales and profit totals with a solid black border and boldthe text.7)Create an empty column to the right of Column F and name thecolumn “Current Exchange Rate”


 8)Use the CURRENCY function to import current exchange rates fromGoogle Finance. The syntax for this is:
=GoogleFinance("CURRENCY:<from first currency> <to second currency>")
You will need to put in the appropriate currency codes from in the correctorder. For example, if I wanted to display the exchange rate betweenBritish pounds and the Euro, I would use (“CURRENCY:GBPEUR”)Mexican currency code: MXNCanadian currency code: CAD9) Use the copy fill tool to fill in the exchange rate for the appropriate rowsin that column.10) Set conditional formatting in the Profit column to turn a cell red if theprofit is negative (i.e. less than 0)11) Set conditional formatting in the Sales column to turn a cell green if thesales exceed $2,000.12) Use the sort tool only show sales data related to the Small Businesscustomer segment.13) Share your workbook and set to “anyone with a grantham.edu addresscan EDIT”. Copy and paste the link into your W4 assignment dropbox.

Is this the question you were looking for? Place your Order Here