ITS

After reading through Chapter 1, please answer the following question. The points earned from answering this question adds up to your total course grade. 

Q1: In chapter1, the focus was on targeting five communities that make up the core field for ICT-enabled policy-making. Briefly explain/name the communities involved to support your answer?

 

Looking for a Similar Assignment? Let us take care of your classwork while you enjoy your free time! All papers are written from scratch and are 100% Original. Try us today!

Emerging Threats & Countermeas

 How is the protection of critical infrastructure different from that of a typical organization? Discuss what additional considerations and challenges are involved in the protection of critical infrastructure. Ensure to provide examples and references to support your discussion. 

 

https://www.whitehouse.gov/wp-content/uploads/2018/09/National-Cyber-Strategy.pdf   (pages 1-11)

https://www.whitehouse.gov/briefings-statements/president-donald-j-trump-strengthening-americas-cybersecurity-workforce-secure-nation-promote-prosperity/

 

Looking for a Similar Assignment? Let us take care of your classwork while you enjoy your free time! All papers are written from scratch and are 100% Original. Try us today!

Decision Making

 

Chapter 5 discusses decision making using system modeling. The author briefly mentions an open source software tool, EMA Workbench, that can perform EMA and ESDMA modeling. Find EMA Workbench online and go to their main website (not the GitHub download site). Then do the following:

1) Under documentation, go to the Tutorials page.

2) Read through the Simple Model (in your chosen environment), and the Mexican Flu example. 

3) Decide how you could use this software to create a model to help in developing a policy for a Smart City. 

To complete this assignment, you must do the following:

A) Create a new thread. As indicated above, explain how you could use the EMA Workbench software to develop a model to help create a policy for a Smart City. Explain what policy you are trying to create (i.e. traffic light placement, surveillance camera coverage, taxi licenses issued, etc.), and what key features you would use in your model. Then, explain how EMA Workbench would help you. NOTE: keep your models and features simple. You don’t really need more than 2 or 3 features to make your point here. 

 

Looking for a Similar Assignment? Let us take care of your classwork while you enjoy your free time! All papers are written from scratch and are 100% Original. Try us today!

Cyber Security – Academic Journal

  

During this week you are to start working on an individual research paper. 

This will be approximately 14 pages, single spaced. and at least 15 references. 

No more than 18% can come up as plagiarized. 

Topic selection is Cyber Security in Industry 4.0: The Pitfalls of Having Hyperconnected Systems can be found at https://www.jstage.jst.go.jp/article/iasme/10/1/10_100103/_pdf.

APA citation is the following. Dawson, M. (2018). Cyber Security in Industry 4.0: The Pitfalls of Having Hyperconnected Systems. Journal of Strategic Management Studies, 10(1), 19-28. 

Final paper submission is to an academic journal.

 

Looking for a Similar Assignment? Let us take care of your classwork while you enjoy your free time! All papers are written from scratch and are 100% Original. Try us today!

JAVA ARRAY PROGRAMMING HELP

Airlines needs your help to create a program to determine bonus amounts for its pilots based on the number of miles traveled in the past year and the number of years each pilot has been flying. However, only pilots that have traveled more than the average number of miles traveled by all pilots are eligible to earn a bonus, regardless of the number of years they have been flying. For pilots that have traveled more than the average number of miles traveled by all pilots, bonuses are based on the following structure:

•Pilots who have not flown for at least two years do not earn a bonus
•Pilots who have flown for at least two years, but less than six years, earn a bonus of $515.00
•Pilots who have flown for at least six years, but less than nine years, earn a bonus of $1206.00
•Pilots who have flown for nine or more years earn a bonus of $2410.00Create a modular program that will prompt the user to input information for each pilot, up to 75 pilots, until they have indicated they are finished. If a 76thpilot is entered, the user must receive an error message, informing the user only 75 pilots may be entered. It is also important to note pilots are forced to retire after their 50thyear of employment. The program will then determine which pilots earn a bonus and the amount of the bonus. A report will be produced to include a list of each pilot’s name, number of years flown, and bonus amount ($0.00 will display if no bonus has been earned). The report will also include the average number of miles traveled by all pilots, the number of pilots earning a bonus, and the total bonus amounts earned across all pilots Other Requirements:
•Your solution must be designed as a modular solution using modules other than a mainline,with each module performing one task.
•Your solution must demonstrate the concept of arrays.
•Your solution may not ask for the number of pilots that will be entered.
•Your solution must not import any Java library other than JOptionPane, including java.util.Arrays
•Your solution must contain appropriate validation. Try to think about what might be considered appropriate as you are designing your solution beyond what has already been explicitly provided.

 

Looking for a Similar Assignment? Let us take care of your classwork while you enjoy your free time! All papers are written from scratch and are 100% Original. Try us today!

Security Breach

At the beginning of Chapter 4, there is a case study about Target getting breached. Find a recent example of another company that has experienced access, privacy, or security issues with their WLAN. Summarize the ramifications of their issues and discuss what infrastructure design solutions could be implemented to prevent future security issues. Write a 5-page paper (APA format) or create a 10- to 15-slide presentation. You must use a minimum of 3 sources (one can be your textbook) and you must cite at least two of your sources in the body of your document.

 

Looking for a Similar Assignment? Let us take care of your classwork while you enjoy your free time! All papers are written from scratch and are 100% Original. Try us today!

Enterprise risk management

If Blue Wood Chocolate and Kilgore Custom Milling are to develop a risk management framework, who should lead the process at each company? Should a Chief Risk Officer (CRO) be appointed? If so, to whom should he/she report and have access to? How could smaller companies without the resources for a dedicated CRO deal with ERM? What is the role of the board of directors in such a process?

Assignment Requirements:

Create a new thread. As indicated above, if Blue Wood Chocolate and Kilgore Custom Milling are to develop a risk management framework, who should lead the process at each company? Should a Chief Risk Officer (CRO) be appointed? If so, to whom should he/she report and have access to? How could smaller companies without the resources for a dedicated CRO deal with ERM? What is the role of the board of directors in such a process?

Select at least 2 other students’ threads Post substantive comments on those threads by evaluating the pros and cons of that student’s recommendations. Your comments should extend the conversation started with the thread.

 

Looking for a Similar Assignment? Let us take care of your classwork while you enjoy your free time! All papers are written from scratch and are 100% Original. Try us today!

Discussion – Multilayered Defense

 Write 200 to 300 words describing multilayed defense and why it is used.  Use at least two scholarly sources.  

 

Looking for a Similar Assignment? Let us take care of your classwork while you enjoy your free time! All papers are written from scratch and are 100% Original. Try us today!

Data Science

This research paper assignment will allow for you to select appropriate data analysis techniques and tools that are of interest to you.   Your group will submit a detailed 8-page paper focusing on the following elements:

Part 1(7-8 pages)

Based on the Data Analysis methods covered thus far, select four data analysis methods.

For each method, provide a detailed overview of the purpose, strengths, and weaknesses of the method

identify at least 3 scenarios from research papers that show case each of these elements

identify how the way the element has been used can be improved.

Part 2 (2-3 minimum)

For two of the data analysis method, provide a detailed analysis using the data set(s) of your choice.

For example, if you have selected Naive Bayesian classification, then you should select a data set to accomplish this task.  

Provide a detailed overview of your findings for each method and discuss the importance of using this method for your analysis.

Paper Requirements:

8 -10 pages at a minimum

Your paper should be in 12 point Times New Roman Font, 1.5 space

Include at least 10 scholarly references (not websites, blogs, etc)

You will be graded on correct grammatical syntax and clarity!

Please cite your references in APA format. For each reference that you use please include an in-text citation. Your reference page does not count toward your paper requirement. DO NOT PROVIDE DIRECT QUOTES!  You must summarize and synthesize in your own words.

2)  Research Paper Presentation (10% of Total Course Grade)

Goal is to summarize your research paper

Minimum of 8-10 slides content (not including title and reference pages)

Must present for at least 10 minutes but no more than 15 minutes 

All group members need to equally participate in the presentation

 

Looking for a Similar Assignment? Let us take care of your classwork while you enjoy your free time! All papers are written from scratch and are 100% Original. Try us today!

Unit VI PowerPoint Presentation

  Instructions

This assignment is designed to provide an opportunity to apply the concepts presented in the Unit VI Lesson regarding controlling ergonomic risks factors with proper tool design. Specifically, you will be evaluating a work task to identify specific control measures that can be implemented to address tool design.

goto https://youtu.be/2O6TqmKBrFI to access the video. Please note that this video does not contain audio.

For this assignment, you will evaluate the same video from Units III–V to identify opportunities to improve the task using the concepts presented in the Unit VI Lesson. You are required to develop a PowerPoint presentation that addresses the following: the impact of hand tool design on injury and musculoskeletal disorder risk for each of the ergonomic selection criteria for selecting hand tools presented in the unit lesson, and recommendations for controlling the risk factors associated with the use of the hand tools using the hierarchy of controls (you must include at least one of each of the controls: engineering control, administrative control, and PPE).

Your PowerPoint presentation must be a minimum of 10 slides in length, not counting the title and references slides. Additionally, you must include a minimum of two outside sources, one of which must be from the CSU Online Library. 

 

Looking for a Similar Assignment? Let us take care of your classwork while you enjoy your free time! All papers are written from scratch and are 100% Original. Try us today!