Last week you took on the role of the developer of an application that outputs t

Last week you took on the role of the developer of an application that outputs t

Last week you took on the role of the developer of an application that outputs the data back to the EZTechMovie administrator. As you recall, the development of this program is very urgent and your manager suggested using an agile method of development. As part of this method (SCRUM environment), you are required to take the feedback received from last week and apply that feedback to your code. You will then resubmit it for the next code review meeting. In your initial post, invite the reviewers to complete a second review of your code. Explain how you have improved your code based on the feedback you received. In addition, if you believe that any of the feedback you received last week was incorrect or should not apply, state why you chose not to apply it. Attach a zip file to the post, which must include:
The revised version of your C++ program (.cpp file/s)
Screen shots of: executed program, functionality information, tests that were run on the program and the outcomes.
I have provided the code I am working with. I am struggling to get it in 25 or less lines as well as it crashing when something is inputted that is not a number when asked for the cast. I only received one peer feedback, but I am struggling to implement it.
This was the peer feedback:
“Good work on your project this week! One thing you could include next week is input validation for the number of cast members. If the user enters a non-numeric value or a negative number, it could lead to the program crashing or unexpected results. You could also use a header file to separate the declaration of the EZTechMovie struct and the function prototypes from the main source file. Your header file would include struct EZTechMovie {}, int inputMovieDetails, and void displayMovieDetails. Then you would just need to add the #include “eztech_movie.h” or whatever you decide to name the file in the main.cpp file. “

Need to add something to your grocery list? Want to listen to your favorite song

Need to add something to your grocery list? Want to listen to your favorite song

Need to add something to your grocery list? Want to listen to your favorite song or see who is knocking at your door while you are taking a shower? You can do all of these by simply asking one of the various IoT devices many of us have welcomed into our homes. As stated in the Shapiro Library article Internet of Things in the Vanguard but Vulnerable to Hacks, “IoT is quickly touching every facet of daily life and it’s becoming bigger and bigger business” (Fanelli, 2019). Should we be concerned with trading convenience for confidentiality? The article goes on to describe service attacks and various ways hackers have gained access to not just our information, but in some cases our homes.
For your initial post:
Consider the confidentiality, availability, and integrity (CIA) triad mentioned in the module resources.
Then determine whether you believe that the manufacturers of these IoT devices should be responsible for ensuring the security of their devices or that consumers are responsible for taking appropriate actions to protect themselves?
Support your choice by describing the measures either the manufacturer or consumer should take and how those measures would ensure confidentiality, privacy, or security.

IMPORTANT: THERE SHOULD NO CODING NEEDED/DONE f Look over the CSC216 Project 1 p

IMPORTANT: THERE SHOULD NO CODING NEEDED/DONE
f Look over the CSC216 Project 1 p

IMPORTANT: THERE SHOULD NO CODING NEEDED/DONE
f Look over the CSC216 Project 1 pdf and read everything from the Problem Overview, Requirements, and Design sections, ESPECIALLY the “What You Must Do: Design Rationale And UML Diagram”
Design a UML and explain the Design Rationale behind it
I’ve added a sample template doc with a rubric where you will insert your UML image and write the design rationale behind it. I will also give a sample design proposal pdf

Applying for Master of Business Administration Technology, Innovation and Entrep

Applying for Master of Business Administration Technology, Innovation and Entrep

Applying for Master of Business Administration Technology, Innovation and Entrepreneurship at International Business University
A Statement of Purpose of
approximately 1000 words, outlining your reasons for pursuing an MBA, your career objectives, and how your previous studies and experience have prepared you for the program

In this powerpoint i have to prepare a systematic litterateur review , i have at

In this powerpoint i have to prepare a systematic litterateur review , i have at

In this powerpoint i have to prepare a systematic litterateur review , i have attached an example the work should be similar to the example in the attachment it including how data is presented , use the same kind of charts in the ppt. In addition, references should be only from journals and conferences using google scholar only.
Find below the rubric:
Describes the procedure in own words, steps to use, when it is appropriate, how data is analysed, limitations of use)
Literature reviewed = 25 Points
• Links and arguments provided, presenter explained how the method was defined and employed by the authors (articles selected), and in his or her own research
• A summary of the literature analysed is provided, and there is a specific, clear descriiption of what is missing from this literature or what researchers do not yet know.
• A clear explanation of how the research method answers a research question or fill this research gap is included. Specific issues, variables, populations, or methods are that are underlying to research method are mentioned and explained.

It appears as though you’re requesting explanation or more insights concerning a

It appears as though you’re requesting explanation or more insights concerning a

It appears as though you’re requesting explanation or more insights concerning a particular PC. Might you at some point kindly give more data or indicate which PC you’re alluding to?

Context: Read through this brief about cloud security from Attack Solutions, Inc

Context: Read through this brief about cloud security from Attack Solutions, Inc

Context: Read through this brief about cloud security from Attack Solutions, Inc., a provider of cybersecurity service, before proceeding to Project Submission Steps: Operating in the cloud undoubtedly delivers significant advantages and security improvements for most organizations… [However,] when scoping a move to the cloud, businesses need to assess security in the context of this environment and evaluate Cloud Service Providers (CSPs) accordingly. Moving to the cloud means adopting a partnership approach to security that requires high levels of trust and transparency between all parties. These should be established at the start of the relationship. Partnering with a CSP allows you to access the security expertise of a business whose success depends on providing the most advanced levels of protection. Cloud providers have economies of scale. This allows your company to invest far more into talent and adoption of the latest innovative infrastructure protection and defense technology than any single organization could commit financially. Due diligence around your CSP is important when entrusting core systems to a third party. Therefore, it is critical to take the time to work with them to ensure that your cloud instance is secure and well maintained. (Tombs, G. (2020, October 31). Why cloud security is more important than ever. Attack Solutions. http://attacksolutions.com/why-cloud-security-is-more-important-than-ever/. ) Project Submission Steps One of the major security concerns of cloud-based information assets is access control. Read the scenario below and perform the required task. Scenario An insurance company has a claims application used to capture data about their policyholders and any property damage they suffer. A hurricane is projected to strike the Gulf Coast region of the US, likely causing massive property damage. This will create a huge spike in claims which will in turn create an enormous load on the corporate IT infrastructure. The company’s decision is to use a public cloud provider to deliver virtual machines to handle the expected demand. The company must control access between the enterprise system and the virtual machines hosted by the cloud provider, limiting access to only authorized agents of the company. The company must securely transmit any data created by cloud-based instances of the application back inside the corporate firewall. The cloud provider must ensure that no traces of the application or its data remain whenever a virtual machine is shut down. The insurance company is based in the U.S. and only has domestic offices (there are no operations outside of the U.S.). The company is using Microsoft Active Directory (AD) for authentication, with workstations running Windows 10. The claims systems are running Oracle Database 19c on Linux. Assignment Paper (2-4 Pages) You have been tasked with implementing an access control solution based upon users’ roles. Write a 2–4 page paper on how you would go about doing this assuming that the cloud environment is either Microsoft Azure or Amazon Web Services (AWS) (pick only one). Your paper should include details on the following RBAC/access control features: ○ Roles ○ Secure remote access ○ Policies ○ Encryption ○ Federation/Single Sign-on (SSO) ○ Logging and monitoring ○ Resource permissions If you need additional guidance on how to conduct and use research in your paper, feel free to use Purdue University’s Online Writing Lab to help you figure out where to begin, how to figure out what information you need, and how to synthesize and use resources. Knowing how to professionally integrate research into your solutions and proposals will help prepare you to build a reputation on-the-job as a cybersecurity professional who knows how to use their resources in their work. Your paper should include details on the following RBAC/access control features: ○ Roles ○ Secure remote access ○ Policies ○ Encryption ○ Federation/Single Sign-on (SSO) ○ Logging and monitoring ○ Resource permissions The purpose of this assignment is to build upon the work you did in Mini-Project 17: Cloud Security Part 1. As you may recall, you wrote a paper outlining the implementation of an access control solution for an insurance company that has decided to move claims information to either Azure or AWS. You may find it helpful to refer back to part 1 for the overview of the importance of scoping a move to the cloud, and why businesses need to assess security in the context of this environment and evaluate Cloud Service Providers (CSPs) accordingly. Project Submission Steps Review the scenario in Mini-Project 17: Cloud Security Part 1, as well as the paper you wrote on how the company should implement a strong access controls solution. Paper (2–4 Pages) The company was pleased with your plan for implementing an access control solution to limit access to only authorized agents of the company. In fact, they were so impressed that they now want you to come up with a plan for securely transmitting data created by cloud-based instances of the application back inside the corporate firewall. Specifically, they want to know how they can leverage VPN technologies to accomplish this. To this end, write a 2–4 page paper on what you think the company should do. Be sure to stick with the same cloud provider you chose in Cloud Security Part 1. In other words, if your paper was based on Azure, then stay with that choice for this paper, and vice versa. Your paper should include critical items such as authentication methods and encryption protocol support, as well as any potential drawbacks. For example, authentication methods could be via Active Directory, or it could use certificates. Secure protocols could include PPTP, L2TP/IPSec, and SSL.