Categories
Technology

The presentation should meet these criteria:the presentation should contain a title slide and at leat 4 content slides.the presentation should have an appropriate theme.the title slide should contain the title, barry’s landscaping service, and asubtitle, bensenville, indiana.the presentation should contain at least one or two clips or pictures on each slide.the clips and pictures should be appropriately resized.the 7 x 7 rule should be followed throughoutthe presentation.the font size of the title text sho

The presentation should meet these criteria:The presentation should contain a title slide and at leat 4 content slides.The presentation should have an appropriate theme.The title slide should contain the title, Barry’s Landscaping Service, and asubtitle, Bensenville, Indiana.The presentation should contain at least one or two clips or pictures on each slide.The clips and pictures should be appropriately resized.The 7 x 7 rule should be followed throughoutthe presentation.The font size of the title text should be larger than the content paragraph text.Important text should be italicized and/or bolded.Different font colors could be used to convey meaning.Spacing between elements in the presentation should be appropriate.The presentation, as a whole, should be visually appealing.A transitions should be applied to the all slides in the presentation.The presentation should not contain spelling or grammar errors.Submit the presentation in pptx format.

Categories
Technology

Because the final project is more complex, you can start in week 7.

ou’ve had some practice now creating servers, VPCs, subnets, and security groups. You’ve created a simple VPC. For the Final Project in the class, you are going to create a slightly more complex VPC. This VPC will include two servers and two subnets. One subnet will be private and the other public. We will assume that one server is going to be a database server (which should be protected by a private subnet) and a web server (which can be made public).
This Final Project will require you to use most of the AWS resources that you’ve worked with throughout the course.
Read the specifications in these Instructions for Completing the Final Project (docx) closely and then work through the steps as described. There is no video to accompany the project.
Because the Final Project is more complex, you can start in Week 7. It is due by Midnight on the final Wednesday of the term.
Guidelines
Make sure to submit all of the following items:
A screenshot of your VPC dashboard.
A screenshot of your EC 2 dashboard.
Submit your screenshots to this Module 8.1 Dropbox.

Categories
Technology

Recommendation of which services should be cloud native versus hybrid (if any).

I have attached the template that our instructor needs us to use along with the grading rubric.
Instructions
Support your plan with rationale for why you have made the choices that you have. To make this project easier, you can speak in generalities (cloud agnostic) or select a real CSP such as AWS or Azure to complete this plan.
Guidelines
It is recommended to use the Cloud Security Project 2 Template. In the template, you will see specific instructions. Delete the instruction text before you submit the project.
Your report should include:
Executive Summary
Introduction to the purpose of the plan, statement of need, and assumptions.
Recommendation of Cloud Service Model to use.
Recommendation of which services should be cloud native versus hybrid (if any).
Recommendation of which security services should BCO leverage from the CSP.
Recommendation for performing Incident Response.
Recommendation for Disaster Recovery Planning and high uptime.
Discussion of the cost estimate for the recommendations.
Discussion on resource plan and hiring a Managed Service Provider (MSP) versus hiring additional staff.
Discussion on the timeline for implementation of the recommendations.
Conclusion
Be between five to ten pages (plus cover page, and table of content)
When you are finished, click “add a file” to upload your work, then click the Submit button.
How Will My Work Be Evaluated?
As a cloud security architect tasked with developing a proof of concept for the companies cloud adoption, you will prepare an plan to be submitted to the company owner. By developing a well-structured report of your results and recommendations to management, you are demonstrating how you use your technical knowledge to convey your ideas to others in a professional setting. Your ability to express recommendations to decision makers with the right mix of technical detail in an accepted format is an important workplace and career skill.

Categories
Technology

Note: ( i send pictures)

Open your textbook on page PPT 1-1 and follow the step-by steps( red balls) from page PPT1-1 to PPT 1-68.
After you completed all steps, your document should look exactly like this above..
Submit your work.
Note: ( i send pictures)

Categories
Technology

The presentation should contain a title slide and at leat 4 content slides.

The presentation should meet these criteria:
The presentation should contain a title slide and at leat 4 content slides.
The presentation should have an appropriate theme.
The title slide should contain the title, Barry’s Landscaping Service, and asubtitle, Bensenville, Indiana.
The presentation should contain at least one or two clips or pictures on each slide.
The clips and pictures should be appropriately resized.
The 7 x 7 rule should be followed throughoutthe presentation.
The font size of the title text should be larger than the content paragraph text.
Important text should be italicized and/or bolded.
Different font colors could be used to convey meaning.
Spacing between elements in the presentation should be appropriate.
The presentation, as a whole, should be visually appealing.
A transitions should be applied to the all slides in the presentation.
The presentation should not contain spelling or grammar errors.
Submit the presentation in pptx format.

Categories
Technology

The company should be a small-to-medium size company – about 200 employees – that is responsible for some sensitive data (employee information, customer information, etc.), with a need to be able to operate throughout a security incident or disaster, and an additional need to be fully operational as soon as possible following an incident (think retail outlets, software development companies, colleges, school districts, etc.)

Please refer to the Course Project Overview, located in the “Introduction and Resources” module of our course. For this project, you can either use an organization with which you are familiar, or a fictitious company that is need of an IRP, a DRP, and a BCP. The company should be a small-to-medium size company – about 200 employees – that is responsible for some sensitive data (employee information, customer information, etc.), with a need to be able to operate throughout a security incident or disaster, and an additional need to be fully operational as soon as possible following an incident (think retail outlets, software development companies, colleges, school districts, etc.) Describe and discuss the key components of a comprehensive Incident Response Plan (IRP) for any attack on an organization’s network and data. The plan starts with a brief descriiption of the company, the identification of possible trigger events and includes immediate actions that should be taken. In order to earn full credit, you should include the following:

o A brief overall descriiption of the company
o An descriiption of the components of an Incident Response Plan needed for this company
o A discussion of possible triggers that would indicate that an incident is or has taken place
o Immediate actions that should follow the detection of an incident

Categories
Technology

Introduction (include mention of the tool/methodology you used)

Purpose: Create paper or digital wireframes based on the provided scenario.
Scenario: The leadership team at Fast Readers, Inc. is interested in seeing an initial set of wireframes. As a reminder, the company wants to offer the ability for people to link to online content and have the app read the content at user-selected, variable speeds. Based on this scenario, publish four wireframes, each for a different screen. Provide an explanation for each wireframe.
Format:
Cover page
Introduction (include mention of the tool/methodology you used)
Wireframe 1
Wireframe 2
Wireframe 3
Wireframe 4
Conclusion
Your document should be formatted using current APA style and consist of 4 pages, not including the cover page.

Categories
Technology

The reading and examples are available in the reference list.

Write a value proposition for the alternative you selected. An explanation of how to write a value proposition is provided in the reading titled Value Proposition, which also gives two examples of value propositions. You can model your value proposition after the examples. The reading and examples are available in the reference list.
The due date for posting your completed Activity 9 in your Assignments Folder is the end date of Week 7.
Please post your final Activity 9 to this link.

Categories
Technology

(a) make a conditional violin plot with superimposed boxplots in ggplot2 of miles per gallon conditional on transition type (automatic or not).

Instructions.
• Use R Markdown to create a PDF document with the two tasks.
• As always, any plots should have appropriate axis and overall labels.
1. There is a data set in R called mtcars.
(a) Is mtcars a data frame or a matrix? If it is not a data frame, make it one using data.frame().
(b) Access the help file on mtcars and summarize the brief descriiption of the data set.
(c) Of the variables in mtcars all are of class numeric. That said, are there any that it would make sense to call categorical? Which ones and why?
2. Create a scatterplot of the relationship between horsepower (horizontal axis) and miles per gallon (vertical axis). Add a linear regression line to the plot and describe the relationship in words in context. Do this in both base R and ggplot2.
(a) Make a conditional violin plot with superimposed boxplots in ggplot2 of miles per gallon conditional on transition type (automatic or not). Interpret the plot in context.
(b) Use factor() to add factor versions of the variables gear and cyl. Create dodged and stacked bar charts in ggplot2. For your stacked bar charts, look up how to normalize the bars so that they equal 100% and do that. Interpret the results in context.
(c) Use mtcars data to create a scatterplot that pulls in multivariate information like we did with the state abbreviations and regions in class. Surprise me.

Categories
Technology

How have apps and social media changed the way we share photos?

In the 21st century, the smartphone camera changed the way we use and view photography. In addition, apps and social media have changed the way we share photography.
How has the invention of the smartphone camera changed photography?
How have apps and social media changed the way we share photos? Are they positive and/or negative changes? Explain.
Include a statement from a current photographer or critic to support your points.