PY1 Write a program that asks the user to input the cost of their meal as a deci

PY1 Write a program that asks the user to input the cost of their meal as a deci

PY1 Write a program that asks the user to input the cost of their meal as a decimal amount and the tip as a percent as a whole number. Use a standard tip percent of your choice. The program should use a tax rate of 7 percent that is stored in a properly named constant as decimal. The program should then calculate the dollar amounts of the tip and tax and add these to the original cost to calculate the grand total. The program should then display these amounts (the tax, the tip, and the grand total) to the user. Review the Python math operators on page 54 to help with this task and use f_string printing. The program’s prompts and output should be formatted as in the Example Input/Output below. Example for PY1 What is the total cost of the meal? 20 What is the tip percentage? 20 A $20.00 meal with a 20% tip of $4.00 and 7% tax has a grand total cost of $25.40 PY2 Write a Python program named program2_2.py. The program should prompt the user to input a number of hours as an integer. The program should then convert this number into the equivalent number of days and hours. These converted values should be reported as integers. The program should output this conversion in the format “X hours is equivalent to Y days and Z hours”, where X is the original number of hours, Y is the number of days, and Z is the remaining number of hours. Review the Python math operators on page 54 to help with this task and use f_string printing. The program’s prompts and output should be formatted as in the Example Input/Output below. Example PY2 What is the number of hours to convert to days and hours? 26 26 hours is equivalent to 1 days and 2 hours

Objective: Create a comprehensive security plan for a hypothetical cloud-based i

Objective:
Create a comprehensive security plan for a hypothetical cloud-based i

Objective:
Create a comprehensive security plan for a hypothetical cloud-based infrastructure.
Resources Needed:
A personal computer with internet access.
Access to documentation on public cloud providers such as Amazon Web Services (AWS), Google Cloud Platform (GCP), or Microsoft Azure.
Knowledge of cloud security best practices and tools.
Your Role:
Define the Scenario: (this will be provided below)
Choose a Cloud Model: Decide which cloud service model (IaaS, PaaS, or SaaS) and deployment model (Public, Private, Hybrid, or Multi-cloud) is most suitable for your scenario.
Develop the Security Plan: Develop a detailed security plan considering the following aspects:
Identity and Access Management: How will you manage identities and enforce the principle of least privilege?
Data Protection: What measures will be taken to protect data at rest and in transit?
Network Security: How will you isolate resources and protect the network perimeter?
Incident Response: What’s your plan to respond to security incidents?
Compliance and Governance: How will you ensure compliance with relevant regulations and standards?
Security Monitoring: What tools and procedures will be in place for logging, monitoring, and auditing?
Document your Plan: Prepare a document outlining your security plan. The document should be clear, organized, and detailed.
Grading Criteria:
Scenario Definition (10%): Is the company scenario defined with enough detail?
Cloud Model Selection (20%): Did you properly justify your choice of cloud model and deployment model?
Security Plan (50%): Depth and completeness of the security plan. Each aspect should be thoughtfully considered and explained.
Documentation (20%): Is the security plan well-documented and easy to follow?
Note: The goal of this project is to develop an understanding of cloud security challenges and solutions. The exact measures and tools mentioned in the security plan can be hypothetical or based on real-world solutions, but they should be realistic and appropriate for the chosen scenario.
Hypothetical Company Scenario:
Company Name: HealthNet Solutions
Industry: Healthcare
Size: Medium-sized company with about 500 employees
Company Description:
HealthNet Solutions is a healthcare technology company that focuses on developing and managing a cloud-based Electronic Health Record (EHR) system. This system is used by healthcare providers of various sizes, from small private practices to large hospitals, to store, retrieve, and manage patients’ healthcare records.
HealthNet’s cloud-based system allows healthcare providers to securely access the EHR system from various locations, promoting efficient and coordinated care. As such, the system handles a large volume of sensitive data, including personal identification information and medical records.
Given the nature of the data it handles, HealthNet Solutions is subject to various regulatory requirements, including the Health Insurance Portability and Accountability Act (HIPAA).
Business Needs and Challenges:
HealthNet Solutions has been operating on an on-premises data center. However, due to the growing need for scalability, cost efficiency, and easier access for healthcare providers, the company is planning to move its EHR system to the cloud.
The company needs to ensure that the transition to the cloud doesn’t compromise the security and privacy of the sensitive data it handles. They need to meet HIPAA regulations for data protection, and they must also put measures in place to prevent cyber threats, which are increasingly targeting healthcare institutions.
The company is looking to develop a comprehensive cloud security plan to mitigate these risks, ensure regulatory compliance, and instill trust among its clients.
Cloud Requirements:
Given the nature of its services, HealthNet Solutions is considering a Hybrid Cloud model where they can keep sensitive data on a private cloud while utilizing public cloud resources for less sensitive operations for cost efficiency and scalability. They are primarily considering an IaaS model to maintain a level of control over their applications, middleware, and runtime.

Research various Type-1 and Type-2 hypervisors commonly available and some of th

Research various Type-1 and Type-2 hypervisors commonly available and some of th

Research various Type-1 and Type-2 hypervisors commonly available and some of the benefits and uses of each one. A hypervisor is a software that you can use to run multiple virtual machines on a single physical machine.
• Tell us what you will tell us:
o Introduce the concept or topic in general terms
• Tell us what you are telling us:
o Elaborate on details, both technical- and business-related
o Cite third-party sources to build your case or enhance your outcome
• Tell us what you told us:
o Summarize your findings based on the details provided
o Provide any final justification or closing comments to demonstrate your position or outcome

Develop an understanding of the complexities of policy creation in a “bicameral” legislature by performing a legislative tracing and policy analysis on a law.

Develop an understanding of the complexities of policy creation in a “bicameral” legislature by performing a legislative tracing and policy analysis on a law.

Your assignment is to develop an understanding of the complexities of policy creation in a “bicameral” legislature by performing a legislative tracing and policy analysis on a law. A bicameral legislature is a governing entity comprised of two houses, that is, the US Congress consists of the House of Representatives and the Senate. The introduction and passage of legislation is complex in that proposed legislation might be incorporated into another piece of legislation so that it will be passed. Tracing and analyzing the law from multiple levels helps to understand its purpose and application.
Go to http://www.house.gov/content/learn/legislative_processLinks to an external site. to review the legislative process
Go to congress.gov,Links to an external site. select “all legislation,” and enter the name of the law that you have selected. On the left side of the page, select Status of Legislation, and only select the link that states “Became Law”.
https://www.congress.gov/bill/113th-congress/senate-bill/1353?q=%7B%22search%22%3A%22Cybersecurity+Workforce+Enhancement+Act%22%7D&s=3&r=49
When you have found the law, read all of the following “informational tabs”: Summaries (all available), Text if available, Titles, Actions, Amendments, Cosponsors, Committee information, related bills, etc.
Lastly, write an essay detailing what you have learned using the information provided in the rubric! *Note that your essay must also be in APA format, NOT the format used in the rubric*
APA 7 Student format is required throughout the essay: Example link (Links to an external site.)
Suggested Essay Length: 1350-2000 words plus an APA 7 Student format reference page.

Write a report on the intersection of Artificial Intelligence and User Experience Design within the realm of treating chronic illness, specifically type 1 diabetes.

Write a report on the intersection of Artificial Intelligence and User Experience Design within the realm of treating chronic illness, specifically type 1 diabetes.

Please write a report on the intersection of Artificial Intelligence and User Experience Design within the realm of treating chronic illness, specifically type 1 diabetes. Alongside the five sources requested, please reference three of the PDF articles supplied. Your 5 sources may be industry reports, computer code, APIs, instructions, anything that helps you understand AI/ML better for your project. Here is one that I would like to use: https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10488097/
Use this report to talk about technologies like machine-learning/algorithms within insulin pumps (for example: Tandem t:slim x2 pump with ControlIQ).

Write a memo to Mr Mendez with your findings and any recommendations you might have for improving the security of the company’s software engineering practices

Write a memo to Mr Mendez with your findings and any recommendations you might have for improving the security of the company’s software engineering practices

Based on this information, write a memo to Mr Mendez with your findings and any recommendations you might have for improving the security of the company’s software engineering practices. Search internet for any information on securing company software. Does the OSSTMM address any of these issues? What improvements should you recommend to better protect this information?

Describe cybersecurity implications related to the procurement process

Describe cybersecurity implications related to the procurement process

This portion of the overall report requires a two- to three-page narrative that addresses the following supply chain concerns: must use apa 7
Describe cybersecurity implications related to the procurement process.
Provide recommendations that would address these concerns.
Include appropriate supply chain risk management practices.
Where appropriate, cite references to support the assertions in the recommendations and conclusion.
I included the lesson information as well as an example from previous semesters. Thank you

Overview For the purposes of this assignment, imagine that you are a systems arc

Overview
For the purposes of this assignment, imagine that you are a systems arc

Overview
For the purposes of this assignment, imagine that you are a systems architect at a medium-sized publishing company with 130 employees. The company primarily publishes books, both in print and online. It also produces other kinds of content, such as audiobooks, interactive reading material, and magazines. Your leadership has decided that it is time to either upgrade the current OS or adopt a new one (e.g., Windows, Linux, macOS).
As the systems architect, you have the responsibility to determine which OS the company should implement for each department. There are many aspects to consider when making this decision, including what existing applications are used by employees on a frequent basis, cost, functionality provided, performance, vendor support, and so on. To determine which OS should be implemented, you need to complete a site survey first. Later, the site survey can be used to help you make a decision as to which operating systems to implement based on what is currently used in the department. For this activity, you will conduct a site survey. This is also a step that you will need to take when you submit Project One in Module Four. The feedback that you receive after submitting this activity should be implemented as you craft your Project One submission.
Prompt
Complete a Site Survey: A site survey compares the three different operating systems that the company is planning to implement. To complete this task, use the Project One Site Survey Template linked in the Supporting Materials area. Specifically, you must address the following rubric criteria:
Operating Systems: Acknowledge what OSes are already used in your site survey. The type of OS already used and how many employees are using it can influence your decision making.
Server: Determine whether the desktops are on a hardware or cloud-based server.
Although not required in this portion of the project, you may want to think about whether or not the server should be changed. This change could be recommended in your proposal.
Standard Hardware for Operating System Types: Determine the minimum required hardware. This could include desktop and server.
Network Connection: Determine whether the network is wired or wireless.
You will want to think about whether or not the network connection should be changed. This change could be recommended in your proposal.
Applications: Identify what software applications need to be supported by the OS. Your survey of what applications desktop users use most frequently will influence your decision making, as some applications are not supported by certain OSes.
Template Provided