QUESTION(S): In your response posts, compare your thoughts with those of your pe

QUESTION(S): In your response posts, compare your thoughts with those of your pe

QUESTION(S): In your response posts, compare your thoughts with those of your peers.
_____________________________________________________________________________________________________
PEER POST # 1
After reading the “Supreme Court to Hear Arguments in Global Digital Privacy Case”, I would like to discuss my position on achieving a balance between making data available for legal disputes and protecting private data by moving it out of a country’s jurisdiction.
This seems like a very complicated issue. Balancing the protection of individuals’ private data and the need to access it would be a tricky one, especially when multiple governments are involved. I think there needs to be a new process created for handling such scenarios. There are so many aspects to look at, not just private data. Ethical concerns are raised too. It’s important to establish the clear purpose of the need for the access. Why they need it, what they are looking to obtain, how they are going to use or distribute it. It’s also important to discuss the possible risks of going through this process. Will anyone else be able to access this who shouldn’t have access to it? I do believe that it is important to make the data available for legal disputes but in a controlled setting where there is minimal risk.
When dealing with multiple government agencies across countries, there are different values when taking privacy into consideration. There needs to be a trust and understanding established between all parties when creating policies and regulations for sharing this data.
___________________________________
PEER POST # 2
For this scenario, I believe that internationally stored data should not be treated any differently from data stored domestically. I believe that companies should be required to share internationally stored data with law enforcement only in cases where criminal activity is suspected. A search warrant for the data must be approved by a judge to ensure compliance with privacy laws. Allowing companies to store data in countries without data-sharing requirements can lead to loopholes being exploited by malicious actors. This could lead to criminal activities and evidence going unnoticed. A healthy balance would be to allow companies to outsource their data storage as long as they are willing to cooperate with any legal disputes that require said data.

Task summary: You have been asked to submit a proposal to a client, Sara Johnson

Task summary: You have been asked to submit a proposal to a client, Sara Johnson

Task summary: You have been asked to submit a proposal to a client, Sara Johnson, who is
moving the small business to a new office location. The proposal is on the
analysis and design of the office network. In preparing the proposal, you must
decide on the architecture, topology, and network hardware and software of the
new network.
Full order description: Dear Freelancer, please write a small business proposal, 1800 words, having at least 1 diagram created in Visio. Also, have a few tables/charts/figures. Use at least 4 academic sources.
? MAIN DETAILS: GENERAL REQUIREMENT:
1. For the proposed network, present both the logical and preliminary physical designs of the network.
2. Read through the Request for Proposal document (on pp. 4-6 later) as it will give you an understanding of the background and some initial requirements of the network.1. The proposal must be typed.2. The logical network diagram must be drawn using drawing software such as Visio. Visio is easier to use for drawing network diagrams.3. State all assumptions explicitly in the proposal. The reader(s) of the proposal expect a self-contained document that addresses all their concerns. If the instructor reads the document and doesn’t understand any particular section because of a lack of explanation, then points will be taken off. The instructor will not accept any reason to the effect“…although I didn’t state it, my assumption was…so give me points.”4. Draw your own diagrams. Don’t copy them from manufacturers’ websites.
? ATTACHED:- task details.

Step Instructions Points 1Open the file named Student_PowerPoint_3G_Remodels.ppt

Step
Instructions
Points
1Open the file named Student_PowerPoint_3G_Remodels.ppt

Step
Instructions
Points
1Open the file named Student_PowerPoint_3G_Remodels.pptx downloaded with this project.
0
2Change title of presentation to Backyard and Home Remodels and the subtitle to The Backyard and Home View.
2
3Change the Colors for the presentation to Median.
3
4On Slide 1, format the background with the Stationery texture, and then change the Transparency to 30%.
6
5Select Slides 2 through 4, and then apply a Solid fill to the background of the selected slides-in the fifth column, the third color.
6
6On Slide 2, hide the background graphics.
4
7On Slide 2, insert a Table with 2 columns and 4 rows. Apply table style Medium Style 3-Accent 1, and then type the information below in the inserted table.
Row 1, Col 1: Improvement Type; Col 2: Components
Row 2, Col 1: Outdoor Kitchen; Col2: Barbecue, sink, bar, covered patio
Row 3, Col 1: Swimming Pool; Col 2: Jacuzzi, pool, waterfall
Row 4, Col 1: Fire Pit; Col 2: Fire pit, seating area, gas lines
10
8Change the Font Size of all of the table text to 28. Resize the table height to 5.8″, and then distribute the table rows. Align the table text so that it is centered horizontally and vertically within the cells.
8
9In the table, change the Font Size of the first row of text to 32. Apply a Round style Cell Bevel to the first row. Note, depending on your version of PowerPoint, this may be called Circle.
6
10On Slide 3, animate the picture using the Wipe entrance animation starting After Previous. Change the Duration to 01.00. Apply the Split entrance animation to the bulleted list placeholder, and then change the Effect Options to Vertical Out.
8
11On Slide 4, insert a Clustered Column chart. In the worksheet, beginning in cell B1, type the following data.
In row 1, beginning in cell B1: Owner Installed, Contractor, Owner as Contractor
In row 2, beginning in cell A2: Patio, 8000, 12000, 9500
In row 3, beginning in cell A3: Bar, 3500, 5200, 4600
In row 4, beginning in cell A4: Infrastructure, 5000, 9750, 8100
In row 5, beginning in cell A5: Appliances, 3000, 4200, 3850
11
12Apply Chart Style 8 to the chart, and then remove the Chart Title element. Apply the Wipe entrance animation to the chart and change the Effect Options to By Series.
8
13On Slide 5, format the background using a solid fill, the first color in the fourth column, and hide the background graphics. Change the font color of the text to the first color in the first column. From your downloaded project files, insert the video p03G_Video1.mp4.
6
14Change the Video Height to 5 and use the Align Center and Align Middle options to position the video. Apply the Simple Frame, Black video style.
10
15On the Playback tab, change the Video Options to Start the video Automatically. Trim the video so that the End Time is 00:07 and then compress the media to Standard Quality. (Mac users, the Compress Media feature is not available on a Mac).
6
16On Slide 6, hide the background graphics, and then format the slide background by inserting a picture from your downloaded grader files-p03G_Backyardv2.jpg. Set the Transparency to 0%
6
17Insert a Header & Footer on the Notes and Handouts. Include the Date and time updated automatically, the Page number, and a Footer with the text 3G_Remodels
Display the document properties. As the Tags, type backyard remodels
3
18Save and close the file, and then submit for grading.
Step
Instructions
Points
1Open the file Student_PowerPoint_7E_Surveys.pptx downloaded with this project.
0
2On Slide 3, insert a 3-column x 5-row table.
8
3On Slide 3, in row 1, column 1, type Job Fair in column 2, type Location in column 3, type Minimum Employees
2
4Type the following information in the corresponding cells, beginning in row 2:
Column 1
Greater Seattle
Bellingham Technology
Shorewood Healthcare
Vancouver Paints
Column 2
Seattle
Bellingham
Shorewood
Vancouver
Column 3
500
20
100
75
5
5Center the text in the Header Row.
2
6Apply the Medium Style 3 – Accent 1 design to the table.
4
7On Slide 3, AutoFit column 2. Set the width of column 3 to 2.5″. Center the text in column 3.
4
8Set the table alignment on the slide to Align Center and Align Middle.
5
9Open the downloaded p07E_Staffing_Survey.xlsx workbook. Copy the Excel cell range A1:D9, and then paste it on Slide 4, using destination styles.
8
10In the table on Slide 4, delete column 4. Lock Aspect Ratio and change the table width to 8″.
4
11Move the table up so it is aligned on the upper half of the vertical ruler at 0.75 inch. Set the alignment to Align Center.
6
12Select the Header Row check box.
3
13Split the Advertising/Public Relations cell into two columns. In the new cell, type Public Relations In the original cell, delete /Public Relations. Split the Engineering/Architect cell into two columns. In the new cell, type Architect In the original cell, delete /Architect.
4
14Select the table, and then change the Font to Arial and Font Size to 16. Center the text in column 3. Center the text in row 1, and then increase the Font Size of the text in row 1 to 20.
10
15In Word, open p07E_New_Hires.docx. Copy the table, and then paste it on Slide 5, using destination styles.
8
16Delete the Location column. Lock the Aspect Ratio, and then increase the table width to 7.5″. Change the font size of the table to 18. AutoFit column 1 and column 2. Center the text in column 3.
6
17Move the table up so it is aligned on the upper half of the vertical ruler at 1 inch. Set the alignment to Align Center.
5
18Remove the shading from the first column.
2
19Add a Section Header slide between Slides 2 and 3. On the new Slide 3, enter the title Job Fair Data and the subtitle Seattle-Tacoma Job Fair
6
20Add a Section between Slides 2 and 3 and rename the section Job Fair Data
6
21Insert a footer on the notes and handouts that includes a fixed date and time, the page number, and 7E_Surveys. Display the document properties, and as the Tags, type survey, industry
2
22Save and close the file, and then submit for grading.

Assignment 1 – Question 1: Discuss the critical characteristics of communication

Assignment 1 –
Question 1:
Discuss the critical characteristics of communication

Assignment 1 –
Question 1:
Discuss the critical characteristics of communication channels in data communications. Explain how bandwidth and communication medium affect data transmission. Compare and contrast various communication media types, such as twisted-pair cables, optical fiber, and wireless. Provide real-world examples to illustrate the advantages and limitations of each.
Question 2:
Network topology plays a crucial role in data communication. Compare and contrast three different network topologies (e.g., star, bus, ring) used in data networks. Discuss the advantages and disadvantages of each topology in terms of scalability, fault tolerance, and ease of maintenance. Analyze real-world examples of network deployments that utilize these topologies and explain why a particular topology was chosen based on the organization’s requirements.
Question 3:
Examine the evolution of Ethernet technologies in data communications, focusing on Switch-Based Ethernet and Wireless Ethernet (WiFi). Describe the key features, advantages, and limitations of each technology. Provide examples of scenarios where these technologies are commonly used. Discuss the challenges related to security and network management associated with each technology. Evaluate the network security measures necessary to safeguard Ethernet-based networks, considering both wired and wireless environments.
ASSIGNMENT -2
Your discussion question response should be at least 200 Words.
Of all the standards and organizations listed in Chapter 12 in the book Fundamentals of Information Systems Security, which one did you find the most interesting. Do a little research and tell us a little more about it, in your own words.
nots attached below for assignment 2
NOTE- 1) APA format
2) NO plagiarism
3)NO AI generated text
4)write reference separately like assignment 1 and 2
5)What ever written in questions i need like same answers No extra NO missing

Annual Report FY [Year] [Add a quote here from one of your company executiv

Annual Report
FY [Year]
[Add a quote here from one of your company executiv

Annual Report
FY [Year]
[Add a quote here from one of your company executives or use this space for a brief summary of the document content.]

Business Computer Languages
IT401

Instructions:

You must submit two separate copies (one Word file and one PDF file) using the Assignment Template on Blackboard via the allocated folder. These files must not be in compressed format.
It is your responsibility to check and make sure that you have uploaded both the correct files.
Zero mark will be given if you try to bypass the SafeAssign (e.g. misspell words, remove spaces between words, hide characters, use different character sets, convert text into image or languages other than English or any kind of manipulation).
Email submission will not be accepted.
You are advised to make your work clear and well-presented. This includes filling your information on the cover page.
You must use this template, failing which will result in zero mark.
You MUST show all your work, and text must not be converted into an image, unless specified otherwise by the question.
Late submission will result in ZERO mark.
The work should be your own, copying from students or other resources will result in ZERO mark.
Use Times New Roman font for all your answers.

Name: ###

CRN: ###
ID: ###

2 Marks

Learning Outcome(s): CLO1
Explain the basic principles of programming, concept of language, and universal constructs of programming languages.

Question One
Explain two roles of the java virtual machine as part of java runtime environment?
Describe the intermediate representation of a Java program that allows a JVM to translate a program into machine-level assembly instructions.
2 Marks

Learning Outcome(s): CLO4
Develop a program based on specification using programming language elements including syntax, data types, conditional statement, control structures, procedures, arrays, objects and classes.

Question Two Create a Java program that does the following:
Prompt the user for an input.
Enter your first and last names as the input.
Read the entered input into two variables (one variable stores the first name while the other stores the last name).
Using the printf function, print the variables in upper-case characters and each in a separate line.
Use parentheses to rewrite the java representation.
(include screenshots of all program execution steps)
2 Marks

Learning Outcome(s): CLO4
Develop a program based on specification using programming language elements including syntax, data types, conditional statement, control structures, procedures, arrays, objects and classes.

Question Three The cubic polynomial function of the third degree can be represented as:
y = ax3 + bx2 + cx + d
Write the correct Java representation of the function without using parentheses using the Rules of Operator Precedence.
Evaluate the java representation of the function and find the value of y when,
x=3, a=1, b=2, c=3, d=4
Make sure that you show all the steps in detail.
2 Marks

Learning Outcome(s): CLO4
Develop a program based on specification using programming language elements including syntax, data types, conditional statement, control structures, procedures, arrays, objects and classes.

Question Four Write a java program that asks the user to enter his/her name. Print a welcome message and ask the user to enter a number. Then, tell the user the type of the number (positive, negative, or zero).
Note: you must take a screenshot of the output that shows your name in the run.
Sample of the run:

I need assistance with a statement of purpose for admission to Georgia Institute

I need assistance with a statement of purpose for admission to Georgia Institute

I need assistance with a statement of purpose for admission to Georgia Institute of Technology for Cyber Security online masters Program (Information Security Track)I have been involved in research projects on vulnerability assessment methods and threat intelligence analysis that address real-world cybersecurity challenges. Additionally, I participated in an industrial internship where I applied theoretical concepts to practical scenarios such as: conducting penetration tests, implementing security controls, and evaluating compliance frameworks.
Structure of this paper in 1050 words: Your statement of purpose should be a concise, well-written document about your academic and research background, as well as your career goals. Be sure to discuss special areas of research or interest. Additionally, it can communicate how Georgia Tech’s graduate program will help you meet your career and educational objectives.