principles of database systems 4

Use Oracle SQL Developer Data Modeler to do this assignment, follow instructions in PDF

 
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code "Newclient" for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.

designing compliance within the lan to wan domain 11

Imagine you are an Information Systems Security Officer for a medium-sized financial services firm that has operations in four (4) states (Virginia, Florida, Arizona, and California). Due to the highly sensitive data created, stored, and transported by your organization, the CIO is concerned with implementing proper security controls for the LAN-to-WAN domain. Specifically, the CIO is concerned with the following areas:

  • Protecting data privacy across the WAN
  • Filtering undesirable network traffic from the Internet
  • Filtering the traffic to the Internet that does not adhere to the organizational acceptable use policy (AUP) for the Web
  • Having a zone that allows access for anonymous users but aggressively controls information exchange with internal resources
  • Having an area designed to trap attackers in order to monitor attacker activities
  • Allowing a means to monitor network traffic in real time as a means to identify and block unusual activity
  • Hiding internal IP addresses
  • Allowing operating system and application patch management

The CIO has tasked you with proposing a series of hardware and software controls designed to provide security for the LAN-to-WAN domain. The CIO anticipates receiving both a written report and diagram(s) to support your recommendations.

Write a three to five page paper in which you:

  1. Use MS Visio or an open source equivalent to graphically depict a solution for the provided scenario that will:
    1. filter undesirable network traffic from the Internet
    2. filter Web traffic to the Internet that does not adhere to the organizational AUP for the Web
    3. allow for a zone for anonymous users but aggressively controls information exchange with internal resources
    4. allow for an area designed to trap attackers in order to monitor attacker activities
    5. offer a means to monitor network traffic in real time as a means to identify and block unusual activity
    6. hide internal IP addresses
  2. Identify the fundamentals of public key infrastructure (PKI).
  3. Describe the manner in which your solution will protect the privacy of data transmitted across the WAN.
  4. Analyze the requirements necessary to allow for proper operating system and application patch management and describe a solution that would be effective.
  5. Use at least three quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Note: The graphically depicted solution is not included in the required page length.

Your assignment must follow these formatting requirements:

  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
  • Include charts or diagrams created in Visio or an equivalent such as Dia or OpenOffice. The completed diagrams / charts must be imported into the Word document before the paper is submitted.

The specific course learning outcomes associated with this assignment are:

  • Analyze information security systems compliance requirements within the Workstation and LAN Domains.
  • Use technology and information resources to research issues in security strategy and policy formation.
  • Write clearly and concisely about topics related to information technology audit and control using proper writing mechanics and technical style conventions.

.

 
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code "Newclient" for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.

linear regression problem set with using programming r 1

This is the Linear Regression problem set with using Programming R.

In problem set, there are 5 problems, which are solving with r problems and ordinary problems about linear regression.

Problem 2 3 and 4 need a date set so I attached file. hw4 problem set2txt is for problem2 and 3 4 and so on.

The due date is 11/22/ 10pm in est time.

I prefer to get the solution before the dead line so plz do your work and give me the solution asap.

Also, can you write specific question number and solution below.

for example, question 2 has 7 small questions. can you write the each number in solution?

Thank you.

 
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code "Newclient" for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.

financial research 4

Part 2 Due Week 9 (6 to 8 pages including #1 and #2 from Part 1)

  1. Include your rationale, primary reasons for stock selection, and client’s profile from Part 1, making any revisions based upon Part 1 feedback if applicable.
  2. Select any five financial ratios that you have learned about in the text. Analyze the past 3 years of the selected financial ratios for the company; you may obtain this information from the company’s financial statements. Determine the company’s financial health. (Note: Suggested ratios include, but are not limited to, current ratio, quick ratio, earnings per share, and price earnings ratio.)
  3. Based on your financial review, determine the risk level of the stock from your investor’s point of view. Indicate key strategies that you may use in order to minimize these perceived risks.
  4. Provide your recommendations of this stock as an investment opportunity. Support your rationale with resources, such as peer-reviewed articles, material from the Strayer University Library, and reviews by market analysts.
  5. Conduct a literature review and list at least five quality academic resources. Note: Wikipedia and other similar websites do not qualify as academic resources.

Your assignment must follow these formatting requirements:

  • Be typed, double-spaced, using Times New Roman font (size 12), with 1-inch margins on all sides; citations and references must follow the Strayer Writing Standards (SWS). The format is different than other Strayer University courses. Please take a moment to review the SWS documentation for details.
  • Properly cite all sources.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
 
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code "Newclient" for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.

logistics and supply chain management reflection paper

I want 2 papers each is one page

Requirements:

A one-page double-spaced written reflection is to be submitted after an event. For the written submission comment on (1) the value received during this activity, (2) what fundamental principles, generalizations, or theories in Supply Chain/Logistics Management were you able to learn from this activity? (3) How did this activity help improve your general overview of LSCM? Also, (4) how did the activity help you apply the course material to improve your thinking, problem-solving, and decisions?

first event: (first paper)

https://www.youtube.com/watch?v=XBgx9L5FdKw

second event: ( second paper):

https://drive.google.com/file/d/1W0tXHgB5UabfIHohg_laUMZCht5a_-ls/view


 
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code "Newclient" for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.

digital media law 14

Write a summary of a case about the first Amendment. 150-200 words. And attach a link. The case of this news is within a week. This case should have occurred within a week.

The same as before

 
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code "Newclient" for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.

ethical issues for nurse practitioners 1

create a PowerPoint presentation based on ethical issues for nurse practitioners. Since this is a fully online course and we do not meet in person in a traditional classroom setting, you will need to narrate this presentation so it can be viewed electronically

Topic:

Ethical Issues for Nurse Practitioners

Research:

Conduct a search using both internet and library database resources. You must use at least 3 sources, one of which must be from the library database. include a reference slide at the end of your presentation.

Content:

Create a NARRATED PowerPoint presentation that contains between 12 to 18 slides. You must add your voice using the narration feature in PPT. Include the following:

  • Title Slide (1 slide) – includes your name and the presentation title.
  • Introduction Slide (1 slide) – should be something catchy and explain why this issue is important.
  • Body/Content Slides (8-14 slides) – must be interesting, well organized, and presented clearly. Slides should not contain full sentences/paragraphs.
  • Summary Slide (1 slide) – may also include a way for others to get involved, help, or get more information.
  • Reference Slide (1 slide) – must be in APA style and be a minimum of 3 resources. When including hyperlinks in the reference list, they must be hyperlinked.

PowerPoint Elements:

Include the following PowerPoint elements:

  • Apply a single theme or design template.
  • Apply a transition to each slide.
  • Do NOT use animation.
  • Provide at least one hyperlink to a video or useful online article.
  • Use at least 5 open or creative commons images (Clipart, photos, shapes, etc).
  • Use smart art at least one time.
  • Include an original chart. (Be sure to include a clear title for the chart and correctly label all data and units)
  • Include a footer on each slide with the slide number and your last name.

Submission:

Please upload your completed PowerPoint project with a filename formatted as:

PowerPoint_SectionProject_Cristeen_Nembhard

the links below are for different parts of the powerpoint

“milestone 2” is for the first slide

“ethical issues in nursing” is a guidance of how the first couple of slides can be done

“ethical issues for nurse practitioners” are references that can be used

“images for nurse practitioners” are imagery that can be used in the slide…you’re more than welcome to use different ones.

 
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code "Newclient" for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.

excel chapter 10

Please see attached files. There are one excel workbook and a doc file which has the instructions for the excel workbook. “Important Must Work on The Same Excel file” and Upload it back to me when it’s done. It is needed with in 5 hours.

 
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code "Newclient" for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.

summrize about investment amp real interest rates

Please Check the attachment for , Summrize about investment and Real Interest Rates , it is a Wiki Requirment , Thank You

 
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code "Newclient" for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.

major information security incident 3

Write a critical evaluation research paper, that clarify the following requirements:

Identify a major information security incident, that has occurred in the last 5 years. If possible, identify a breach that occurred in, or otherwise impacted the Middle East. Review and analyze your chosen incident along the following dimensions:

  • What went wrong?
  • Why did it occur?
  • Who was responsible?
  • How could it have been prevented?
  • What actions would you take to ensure that this security incident would not be replicated in your organization?

Directions:

  • The research paper should be 4-5 pages in length, not including the title or reference pages.
  • Must include a minimum of two credible sources, to support your critical evaluation.
  • Must follow academic writing standards and APA style guidelines.
 
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code "Newclient" for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.