Annual Report FY [Year] [Add a quote here from one of your company executiv

Annual Report
FY [Year]
[Add a quote here from one of your company executiv

Annual Report
FY [Year]
[Add a quote here from one of your company executives or use this space for a brief summary of the document content.]

Business Computer Languages
IT401

Instructions:

You must submit two separate copies (one Word file and one PDF file) using the Assignment Template on Blackboard via the allocated folder. These files must not be in compressed format.
It is your responsibility to check and make sure that you have uploaded both the correct files.
Zero mark will be given if you try to bypass the SafeAssign (e.g. misspell words, remove spaces between words, hide characters, use different character sets, convert text into image or languages other than English or any kind of manipulation).
Email submission will not be accepted.
You are advised to make your work clear and well-presented. This includes filling your information on the cover page.
You must use this template, failing which will result in zero mark.
You MUST show all your work, and text must not be converted into an image, unless specified otherwise by the question.
Late submission will result in ZERO mark.
The work should be your own, copying from students or other resources will result in ZERO mark.
Use Times New Roman font for all your answers.

Name: ###

CRN: ###
ID: ###

2 Marks

Learning Outcome(s): CLO1
Explain the basic principles of programming, concept of language, and universal constructs of programming languages.

Question One
Explain two roles of the java virtual machine as part of java runtime environment?
Describe the intermediate representation of a Java program that allows a JVM to translate a program into machine-level assembly instructions.
2 Marks

Learning Outcome(s): CLO4
Develop a program based on specification using programming language elements including syntax, data types, conditional statement, control structures, procedures, arrays, objects and classes.

Question Two Create a Java program that does the following:
Prompt the user for an input.
Enter your first and last names as the input.
Read the entered input into two variables (one variable stores the first name while the other stores the last name).
Using the printf function, print the variables in upper-case characters and each in a separate line.
Use parentheses to rewrite the java representation.
(include screenshots of all program execution steps)
2 Marks

Learning Outcome(s): CLO4
Develop a program based on specification using programming language elements including syntax, data types, conditional statement, control structures, procedures, arrays, objects and classes.

Question Three The cubic polynomial function of the third degree can be represented as:
y = ax3 + bx2 + cx + d
Write the correct Java representation of the function without using parentheses using the Rules of Operator Precedence.
Evaluate the java representation of the function and find the value of y when,
x=3, a=1, b=2, c=3, d=4
Make sure that you show all the steps in detail.
2 Marks

Learning Outcome(s): CLO4
Develop a program based on specification using programming language elements including syntax, data types, conditional statement, control structures, procedures, arrays, objects and classes.

Question Four Write a java program that asks the user to enter his/her name. Print a welcome message and ask the user to enter a number. Then, tell the user the type of the number (positive, negative, or zero).
Note: you must take a screenshot of the output that shows your name in the run.
Sample of the run:

I need assistance with a statement of purpose for admission to Georgia Institute

I need assistance with a statement of purpose for admission to Georgia Institute

I need assistance with a statement of purpose for admission to Georgia Institute of Technology for Cyber Security online masters Program (Information Security Track)I have been involved in research projects on vulnerability assessment methods and threat intelligence analysis that address real-world cybersecurity challenges. Additionally, I participated in an industrial internship where I applied theoretical concepts to practical scenarios such as: conducting penetration tests, implementing security controls, and evaluating compliance frameworks.
Structure of this paper in 1050 words: Your statement of purpose should be a concise, well-written document about your academic and research background, as well as your career goals. Be sure to discuss special areas of research or interest. Additionally, it can communicate how Georgia Tech’s graduate program will help you meet your career and educational objectives.

IT 423 Project Two Guidelines and Rubric Competency In this project, you will de

IT 423 Project Two Guidelines and Rubric
Competency
In this project, you will de

IT 423 Project Two Guidelines and Rubric
Competency
In this project, you will demonstrate your mastery of the following competency:
Determine the implications involved in the design of an internet of things (IoT) software application
Scenario
After you worked at YODAE as its lead solution architect for a few years (see Project One), an opportunity to become its first information security officer (ISO) appeared. You took the position because you wanted to gain experience in a different kind of role. Not only has your role changed, but the number of cloud services and products that your organization offers has increased due to market demands.
Due to increasing market demands, YODAE now offers IoT devices for K-12 teachers (such as voice-activated personal assistants, handheld student devices, IoT white boards, IoT smart speakers, and IoT cameras). With YODAE’s new products, K-12 teachers are able to integrate IoT devices into their classrooms to enhance the classroom experience for their students. The IT professionals (such as network administrators, help desk technicians, and systems support specialists), school administrators, and teachers who work in the schools are interested in learning more about these IoT devices and their implications. As YODAE’s new ISO, you have been asked to inform these users about the implications of such devices. To accomplish this task, you will create a white paper to inform the IT professionals, teachers, and school administrators about YODAE’s IoT devices. To have a better idea as to the IoT devices that YODAE offers, review the YODAE Business Case in the Supporting Materials section.
Before you were hired as YODAE’s new ISO, the chief information officer (CIO) proposed an architectural design of how the IoT devices should be implemented in schools. The CIO asked you to review the proposed architectural design to find any errors, especially in regard to the three components of information security: confidentiality, integrity, and availability. Then you concluded that you should provide some guidance on the design of the IoT devices in your white paper to help other users understand the importance of the design of IoT applications. You will also propose solutions on how common IoT design and architecture errors can be addressed.
Directions
Create a white paper using APA format with citations. You may use the White Paper Guidelines document in the Supporting Materials section. Your white paper must address the following:
IoT Devices: Select at least two of the IoT devices introduced in the scenario. Then describe the IoT devices and potential use cases. You may reflect on:
How would you explain what each IoT device does to someone who has little to no experience with the internet of things or cloud computing?
What features does each IoT device offer?
How are the IoT devices installed and configured?
How could this IoT device be used in schools and classrooms?
Background Information: By reviewing and citing the resources within the course or a previous course that you took in your program, or by using the Shapiro Library’s Information Technology library guide, explain how cloud computing is inexorably linked to IoT, explain how IoT data is stored, and describe the vulnerabilities, risks, and issues with such devices. In your explanation, you should also address:
How are cloud computing and the internet of things connected?
How is data from the IoT devices collected and stored?
What are the vulnerabilities, risks, and other issues involved?
What are the layers of an IoT architecture?
Errors in the Design of IoT: Identify 3 to 5 potential errors and issues that may occur with the design of the IoT in the context described in the scenario. As you explain potential errors in your white paper, you must consider:
Confidentiality: Are there any privacy errors in the architectural design?
Integrity: Are there errors that reduce the accuracy, consistency, or trustworthiness of the data collected and stored on any of the devices?
Availability: What are the system uptime, software updates, connection with the internet, or maintenance requirements based on the devices? How can internet providers affect systems?
Solution Diagram: Suggest appropriate preventative measures and solutions to address the issues and errors that you identified by creating a diagram. Your diagram should include improvements from the visual representation of the YODAE IoT Classroom Design document (see Supporting Materials).
Propose Solutions: Then write a paragraph explaining the solutions within your diagram and address the following questions:
Confidentiality: How do your solutions improve user privacy?
Integrity: How do your solutions improve the integrity of the data?
Availability: How do your solutions affect the availability of the system? Do they change the maintenance times?
Ethical and Societal Implications: Describe any ethical and societal implications of the design of IoT that you think should be considered by the IT professionals, administrators, or teachers who are working in the schools. You must include how IoT can positively and negatively impact society. Perhaps you may even consider the impact on parents if their child engages with the IoT at school. To help you determine these implications, you may want to reflect on:
What are ethical stances that both IT and educational professionals would need to consider if they integrate YODAE’s IoT devices into schools?
What seems right or wrong about these devices, and why?
Is there a specific IoT device that seems problematic for the context that it will be implemented in?
Just because these products are on the market, should you promote them and encourage the use of them?
Citations: You must use APA format to cite any source that you used to gather your information. You’ll also want to include a References page at the end of your white paper. This page is helpful in the event that the professionals reviewing your white paper want to learn more about the technology. In most companies, the readers of the white paper are likely to want to learn more about the subject, and the references allow them to research topics of interest.
What to Submit
To complete this project, you must submit the following:
White Paper
Your white paper should be 3 to 5 pages in length in APA format. References page is not included in the page count. The file you upload should be a Word .doc.
Supporting Materials
To complete this project, you must submit the following (ALL THREE IS ATTACHED BELOW):
YODAE IoT Classroom Design
This document is a visual representation of how YODAE’s IoT devices can be integrated into a classroom setting. This visual representation may assist you in understanding how YODAE’s IoT devices are set up in the classroom setting.
YODAE Business Case
This business case provides you with more organization background and the business needs.
White Paper Guidelines
These guidelines will help you format and outline your paper. You do not have to follow the guidelines to structure your paper, but they can help if you have not written a paper like this before.
Project Two Rubric
CriteriaExemplary (100%)Proficient (85%)Needs Improvement (55%)Not Evident (0%)Value
IoT DevicesExceeds proficiency in an exceptionally clear, insightful, sophisticated, or creative mannerDescribes IoT devices and their capabilities in the context of the scenarioShows progress toward proficiency, but with errors or omissions; areas for improvement may include description of the various capabilities for each IoT device and their potential use casesDoes not attempt criterion10
Background InformationExceeds proficiency in an exceptionally clear, insightful, sophisticated, or creative mannerExplains how cloud computing is linked to IoT, how IoT data is stored, common IoT vulnerabilities, and the three layers of IoT architectureShows progress toward proficiency, but with errors or omissions; areas for improvement may include addressing all of the questionDoes not attempt criterion20
Errors in Design of IoTExceeds proficiency in an exceptionally clear, insightful, sophisticated, or creative mannerIdentify errors and issues with the design of IoT in regard to confidentiality, integrity, and availabilityShows progress toward proficiency, but with errors or omissions; areas for improvement may include identifying the issues with the architectural design in regard to all three criteriaDoes not attempt criterion15
Solution DiagramExceeds proficiency in an exceptionally clear, insightful, sophisticated, or creative mannerCreates a diagram to illustrate appropriate preventative measures and solutions to address the identified errorsShows progress toward proficiency, but with errors or omissions; areas for improvement may include determining more preventative measures and solutionsDoes not attempt criterion20
Propose SolutionsExceeds proficiency in an exceptionally clear, insightful, sophisticated, or creative mannerExplains how the diagram addresses the errors, and considers confidentiality, integrity, and availabilityShows progress toward proficiency, but with errors or omissions; areas for improvement may include explanations for all three criteria of confidentiality, integrity, and availabilityDoes not attempt criterion10
Ethical and Societal ImplicationsExceeds proficiency in an exceptionally clear, insightful, sophisticated, or creative mannerDescribes the ethical and societal implications of the design of IoTShows progress toward proficiency, but with errors or omissions; areas for improvement may include describing how IoT can negatively or positively impact societyDoes not attempt criterion15
Articulation of ResponseExceeds proficiency in an exceptionally clear, insightful, sophisticated, or creative mannerClearly conveys meaning with correct grammar, sentence structure, and spelling, demonstrating an understanding of audience and purposeShows progress toward proficiency, but with errors in grammar, sentence structure, and spelling, negatively impacting readabilitySubmission has critical errors in grammar, sentence structure, and spelling, preventing understanding of ideas5
Citations and AttributionsUses citations for ideas requiring attribution, with few or no minor errorsUses citations for ideas requiring attribution, with consistent minor errorsUses citations for ideas requiring attribution, with major errorsDoes not use citations for ideas requiring attribution5
Total:100%

Compare and contrast different software development methodologies (e.g., Agile v

Compare and contrast different software development methodologies (e.g., Agile v

Compare and contrast different software development methodologies (e.g., Agile vs. Waterfall).
How can software be designed to be more user-friendly and accessible?
Explore the future of programming languages and their impact on software development.

Throughout this course, you’ve learned how to interface with cloud-based databas

Throughout this course, you’ve learned how to interface with cloud-based databas

Throughout this course, you’ve learned how to interface with cloud-based databases to support organizational operations, implement a cloud-based system that meets organizational requirements, and determine the implications involved in the design of IoT software applications. This final discussion will ask you to consider how you can apply what you have learned to help you advance your career in the IT field.
In your initial discussion post, reflect on the first question, then select 2 other questions to discuss from the following:
How has cloud computing influenced the IT field?
How will the cloud computing concepts you learned in this course influence your future?
What will you do with the information and skills you learned in this course, especially as you start or advance in your career as an IT professional?
Based on what you know today, what kind of IT role do you envision yourself in, and why?
What business, personal, or social problems are you passionate about that can be solved or improved through cloud computing?

Overview Data security and data privacy protection are key aspects of the cybers

Overview
Data security and data privacy protection are key aspects of the cybers

Overview
Data security and data privacy protection are key aspects of the cybersecurity domain. To address the concerns of data security and privacy, a practitioner must account for a number of competing drivers, including regulatory compliance, operational impact, cost, as well as customer and employee satisfaction. As a practitioner, you will be called upon to identify requirements and make recommendations for technology-, policy-, and workforce-related approaches to ensure that appropriate measures are in place to adequately secure data and protect individual privacy in a constantly changing threat environment. In this project, you will recommend an approach to address the legal and ethical aspects of a security-relevant business decision.
In this assignment, you will demonstrate your mastery of the following course competency:
Make recommendations regarding legal and ethical issues in cybersecurity appropriate for the organizational environment
Scenario
Your instructor will provide you with the specific scenario for this project in an announcement. This scenario places you back in the role of an executive-level security consultant for the organization. The scenario will provide you additional details surrounding the organization’s decisions on the proposal you addressed in Project One. To complete this task, you will prepare a legal and ethical recommendation brief for the internal stakeholder board in order to identify an approach to meeting the privacy protection, data security, and ethical needs of the scenario.
Prompt
Write a brief memorandum to the internal leadership board outlining your recommendations for meeting the needs of the scenario. You must address the critical elements listed below. The codes shown in brackets indicate the course competency to which each critical element is aligned.
Recommend an approach to protecting data privacy. Support your recommendation with evidence from applicable laws or the corporate mission and values.
Recommend an approach to ensuring data security.Support your recommendation with evidence from applicable laws or the corporate mission and values.
Describe how ethical considerations about data use influenced your recommendations for security-enhancing safeguards.
What to Submit
Your submission should be 1 to 3 pages in length and should use double spacing, 12-point Times New Roman font, and one-inch margins. Sources should be cited according to APA style. Use a file name that includes the course code, the assignment title, and your name—for example, CYB_100_Project_One_Neo_Anderson.docx.
Project Two Rubric
CriteriaExemplary (100%)Proficient (85%)Needs Improvement (55%)Not Evident (0%)Value
Data PrivacyMeets “Proficient” criteria and addresses critical element in an exceptionally clear, insightful, sophisticated, or creative mannerRecommends an approach to protecting data privacy, including support from applicable laws or the corporate mission and valuesAddresses “Proficient” criteria, but there are gaps in clarity, logic, or detailDoes not address critical element, or response is irrelevant30
Data SecurityMeets “Proficient” criteria and addresses critical element in an exceptionally clear, insightful, sophisticated, or creative mannerRecommends an approach to ensuring data security, including support from applicable laws or the corporate mission and valuesAddresses “Proficient” criteria, but there are gaps in clarity, logic, or detailDoes not address critical element, or response is irrelevant30
Ethical ConsiderationsMeets “Proficient” criteria and addresses critical element in an exceptionally clear, insightful, sophisticated, or creative mannerDescribes how ethical considerations about data use influenced the recommendations for security-enhancing safeguardsAddresses “Proficient” criteria, but there are gaps in clarity, logic, or detailDoes not address critical element, or response is irrelevant30
Articulation of ResponseSubmission is free of errors related to grammar, spelling, and organization and is presented in a professional and easy-to-read formatSubmission has no major errors related to grammar, spelling, or organizationSubmission has some errors related to grammar, spelling, or organization that negatively impact readability and articulation of main ideasSubmission has critical errors related to grammar, spelling, or organization that prevent understanding of ideas10
Total: 100%

PROMPT: Before you begin this discussion, read the “Supreme Court to Hear Argume

PROMPT:
Before you begin this discussion, read the “Supreme Court to Hear Argume

PROMPT:
Before you begin this discussion, read the “Supreme Court to Hear Arguments in Global Digital Privacy Case” resource. In your initial post, discuss your position on achieving a balance between making data available for legal disputes and protecting private data by moving it out of a country’s jurisdiction.
RESOURCE: https://www.politico.com/story/2018/02/26/supreme-court-digital-privacy-case-359711
Discussion Rubric
CriteriaExemplaryProficientNeeds ImprovementNot EvidentValue
ComprehensionDevelops an initial post with an organized, clear point of view or idea using rich and significant detail (100%)Develops an initial post with a point of view or idea using adequate organization and detail (85%)Develops an initial post with a point of view or idea but with some gaps in organization and detail (55%)Does not develop an initial post with an organized point of view or idea (0%)40
TimelinessN/ASubmits initial post on time (100%)Submits initial post one day late (55%)Submits initial post two or more days late (0%)10
EngagementProvides relevant and meaningful response posts with clarifying explanation and detail (100%)Provides relevant response posts with some explanation and detail (85%)Provides somewhat relevant response posts with some explanation and detail (55%)Provides response posts that are generic with little explanation or detail (0%)30
Writing (Mechanics)Writes posts that are easily understood, clear, and concise using proper citation methods where applicable with no errors in citations (100%)Writes posts that are easily understood using proper citation methods where applicable with few errors in citations (85%)Writes posts that are understandable using proper citation methods where applicable with a number of errors in citations (55%)Writes posts that others are not able to understand and does not use proper citation methods where applicable (0%)20
Total:100%

Annual Report FY [Year] [Add a quote here from one of your company executiv

Annual Report
FY [Year]
[Add a quote here from one of your company executiv

Annual Report
FY [Year]
[Add a quote here from one of your company executives or use this space for a brief summary of the document content.]

Business Computer Languages
IT401

Instructions:

You must submit two separate copies (one Word file and one PDF file) using the Assignment Template on Blackboard via the allocated folder. These files must not be in compressed format.
It is your responsibility to check and make sure that you have uploaded both the correct files.
Zero mark will be given if you try to bypass the SafeAssign (e.g. misspell words, remove spaces between words, hide characters, use different character sets, convert text into image or languages other than English or any kind of manipulation).
Email submission will not be accepted.
You are advised to make your work clear and well-presented. This includes filling your information on the cover page.
You must use this template, failing which will result in zero mark.
You MUST show all your work, and text must not be converted into an image, unless specified otherwise by the question.
Late submission will result in ZERO mark.
The work should be your own, copying from students or other resources will result in ZERO mark.
Use Times New Roman font for all your answers.

Name: ###

CRN: ###
ID: ###

2 Marks

Learning Outcome(s): CLO1
Explain the basic principles of programming, concept of language, and universal constructs of programming languages.

Question One
Explain two roles of the java virtual machine as part of java runtime environment?
Describe the intermediate representation of a Java program that allows a JVM to translate a program into machine-level assembly instructions.
2 Marks

Learning Outcome(s): CLO4
Develop a program based on specification using programming language elements including syntax, data types, conditional statement, control structures, procedures, arrays, objects and classes.

Question Two Create a Java program that does the following:
Prompt the user for an input.
Enter your first and last names as the input.
Read the entered input into two variables (one variable stores the first name while the other stores the last name).
Using the printf function, print the variables in upper-case characters and each in a separate line.
Use parentheses to rewrite the java representation.
(include screenshots of all program execution steps)
2 Marks

Learning Outcome(s): CLO4
Develop a program based on specification using programming language elements including syntax, data types, conditional statement, control structures, procedures, arrays, objects and classes.

Question Three The cubic polynomial function of the third degree can be represented as:
y = ax3 + bx2 + cx + d
Write the correct Java representation of the function without using parentheses using the Rules of Operator Precedence.
Evaluate the java representation of the function and find the value of y when,
x=3, a=1, b=2, c=3, d=4
Make sure that you show all the steps in detail.
2 Marks

Learning Outcome(s): CLO4
Develop a program based on specification using programming language elements including syntax, data types, conditional statement, control structures, procedures, arrays, objects and classes.

Question Four Write a java program that asks the user to enter his/her name. Print a welcome message and ask the user to enter a number. Then, tell the user the type of the number (positive, negative, or zero).
Note: you must take a screenshot of the output that shows your name in the run.
Sample of the run:

PROMPT: Submit a screenshot of the item that you feel is the most valuable to yo

PROMPT:
Submit a screenshot of the item that you feel is the most valuable to yo

PROMPT:
Submit a screenshot of the item that you feel is the most valuable to you (now or in the future) and explain your reasoning in two to three sentences in a Microsoft Word document or the equivalent.

Please research and provide me information on the following terms using the Ctrl

Please research and provide me information on the following terms using the Ctrl

Please research and provide me information on the following terms using the Ctrl/C, Ctrl/K, and Alt/F9 techniques discussed in class:
In the terms of Academic Success, how would you define:
Accountability
Accuracy
Adaptability
Consistency
Credibility
Honesty
Integrity
Persistency
Punctuality
Reliability
Responsibility
Validity
Each term must have a paragraph definition to the best of your knowledge. Using Google, Wikipedia or any other resources to find the answers. Save all the work and submit it in Canvas.