Before answering the questions, please review the three powerpoint files I give below, and follow to use the notation which presented in class. Provide a pdf and a word file of the written HW solutions for all questions and JFLAP files for 3 a) and b). The questions is in the attachment which I give below.

Looking for solution of this Assignment?

WHY CHOOSE US?

We deliver quality original papers

Our experts write quality original papers using academic databases.  

Free revisions

We offer our clients multiple free revisions just to ensure you get what you want.

Discounted prices

All our prices are discounted which makes it affordable to you. Use code FIRST15 to get your discount

100% originality

We deliver papers that are written from scratch to deliver 100% originality. Our papers are free from plagiarism and NO similarity

On-time delivery

We will deliver your paper on time even on short notice or  short deadline, overnight essay or even an urgent essay
 

PLEASE READ ALL ASSIGNMENT REQUIREMENTS INCLUDING THE ATTACHED GRADING RUBRIC BEFORE AGREEING TO DO THE WORK. THANK YOU. Advanced persistent threats (APTs) have been thrust into the spotlight due to their advanced tactics, techniques, procedures, and tools. These APTs are resourced unlike other types of cyber threat actors. Your chief technology officer (CTO) has formed teams to each develop a detailed analysis and presentation of a specific APT, which she will assign to the team. This is a team assignment, and the team members that were selected by the instructor in the previous assignment will work together. It is up to the team members to decide who is responsible for contributing to the sections of the paper. Remember, if a member fails to complete his or her part of the work, the team is still responsible for all sections. Note that you are required to complete a peer review for yourself and for each member of the team. The peer review template is provided in the Activities folder. Your team’s report should use the Week 5 and 6 Assignment Template to cover the following five areas: Part 1: Threat Landscape Analysis o Provide a detailed analysis of the threat landscape in 2018. o What has changed since 2017? o Describe common tactics, techniques, and procedures to include threat actor types. o What are the exploit vectors and vulnerabilities threat actors are predicted to take advantage of? Part 2: APT Analysis o Provide a detailed analysis and description of the APT your group was assigned. Describe the specific tactics used to gain access to the target(s). o Describe the tools used. Describe what the objective of the APT was/is. Was it successful? Part 3: Cybersecurity Tools, Tactics, and Procedures o Describe current hardware- and software-based cybersecurity tools, tactics, and procedures. o Consider the hardware and software solutions deployed today in the context of defense-in-depth. o Elaborate on why these devices are not successful against the APTs. Part 4: Machine Learning and Data Analytics o Describe the concepts of machine learning and data analytics and how applying them to cybersecurity will evolve the field. o Are there companies providing innovative defensive cybersecurity measures based on these technologies? If so, what are they? Would you recommend any of these to the CTO? Part 5: Using Machine Learning and Data Analytics to Prevent APT o Describe how machine learning and data analytics could have detected and/or prevented the APT you analyzed had the victim organization deployed these technologies at the time of the event. Be specific. Notes · Use additional sources of information but also describe the concept in layman’s terms. · Use visuals where appropriate.

Looking for solution of this Assignment?

WHY CHOOSE US?

We deliver quality original papers

Our experts write quality original papers using academic databases.  

Free revisions

We offer our clients multiple free revisions just to ensure you get what you want.

Discounted prices

All our prices are discounted which makes it affordable to you. Use code FIRST15 to get your discount

100% originality

We deliver papers that are written from scratch to deliver 100% originality. Our papers are free from plagiarism and NO similarity

On-time delivery

We will deliver your paper on time even on short notice or  short deadline, overnight essay or even an urgent essay
 

Select and Update Data in Related Tables Instructions: Running reports on existing data and updating data records are very common tasks in the industry. For this assignment, you will begin with a database containing several pre-populated tables. Download and unzip the Microsoft® Access® database (ZIP file) available on the Cengage’s website. (You may need to convert the database depending on the version of Microsoft® Access® you are using. To convert the database, follow Microsoft®’s Convert a Database to the .accdb File Format instructions.) Open the database in Microsoft® Access® and explore the tables it contains by following this path: /folderYouNameWhenYouUnzip/1305627482_526407/Student/Ch07- Intro-to-SQL/Databases/Ch07_SaleCo.mdb Note: If you have chosen not to use Microsoft® Access® in this course, you will need to download the SQL statements for MySQL, Oracle®, or SQLserver and run those statements against your RDBMS to create a populated database. Download the Select and Update Data in Related Tables document and follow the instructions. Your completed assignment will consist of one document and two screenshots placed in one document (one screenshot showing the results of the “before” SELECT statement and a second showing the results of the “after” SELECT statement). Submit your assignment.

Looking for solution of this Assignment?

WHY CHOOSE US?

We deliver quality original papers

Our experts write quality original papers using academic databases.  

Free revisions

We offer our clients multiple free revisions just to ensure you get what you want.

Discounted prices

All our prices are discounted which makes it affordable to you. Use code FIRST15 to get your discount

100% originality

We deliver papers that are written from scratch to deliver 100% originality. Our papers are free from plagiarism and NO similarity

On-time delivery

We will deliver your paper on time even on short notice or  short deadline, overnight essay or even an urgent essay
 

Programming Assignment 4 Instructions Adapted from: Deitel & Deitel (2017). Visual C# 2015 How to Program (6th ed.). Pearson Education, Inc. Create a class called SavingsAccount. Use a static variable called annualInterestRate to store the annual interest rate for all account holders. Each object of the class contains a private instance variable savingsBalance, indicating the amount the saver currently has on deposit. Provide method CalculateMonthlyInterest to calculate the monthly interest by multiplying the savingsBalance by annualInterestRate divided by 12 – this interest should be added to savingsBalance. Provide static method setAnnualInterestRate to set the annualInterestRate to a new value. Write an application to test class SavingsAccount. Create three savingsAccount objects, saver1, saver2, and saver3 with balances of $2,000.00, $3,000.00, and 0.00, respectively. Set annualInterestRate to 4%, then calculate the monthly interest and display the new balances for both savers. Then set the annualInterestRate to 5%, calculate the next month’s interest and display the new balances for both savers.

Looking for solution of this Assignment?

WHY CHOOSE US?

We deliver quality original papers

Our experts write quality original papers using academic databases.  

Free revisions

We offer our clients multiple free revisions just to ensure you get what you want.

Discounted prices

All our prices are discounted which makes it affordable to you. Use code FIRST15 to get your discount

100% originality

We deliver papers that are written from scratch to deliver 100% originality. Our papers are free from plagiarism and NO similarity

On-time delivery

We will deliver your paper on time even on short notice or  short deadline, overnight essay or even an urgent essay
 

McRoy Aerospace was a highly profitable company building cargo planes and refueling tankers for the armed forces. It had been doing this for more than fifty years and was highly successful. But because of a downturn in the government’s spending on these types of planes, McRoy decided to enter the commercial aviation aircraft business, specifically wide-body planes that would seat up to 400 passengers, and compete head on with Boeing and Airbus Industries. During the design phase, McRoy found that the majority of the commercial airlines would consider purchasing its plane provided that the costs were lower than the other aircraft manu- facturers. While the actual purchase price of the plane was a consideration for the buyers, the greater interest was in the life-cycle cost of maintaining the operational readiness of the aircraft, specifically the maintenance costs. Operations and support costs were a considerable expense and maintenance requirements were regulated by the government for safety reasons. The airlines make money when the planes are in the air rather than sitting in a maintenance hangar. Each maintenance depot maintained an inventory of spare parts so that, if a part did not function properly, the part could be removed and replaced with a new part. The damaged part would be sent to the manufacturer for repairs or replacement. Inventory costs could be significant but were considered a necessary expense to keep the planes flying. One of the issues facing McRoy was the mechanisms for the eight doors on the aircraft. Each pair of doors had their own mechanisms which appeared to be restricted by their location in the plane. If McRoy could come up with a single design mechanism for all four pairs of doors, it would significantly lower the inventory costs for the airlines as well as the necessity to train mechanics on one set of mechanisms rather than four. On the cargo planes and refuel- ing tankers, each pair of doors had a unique mechanism. For commercial aircrafts, finding one design for all doors would be challenging. Mark Wilson, One of the department managers at McRoy’s design center, assigned Jack, the best person he could think of to work on this extremely challenging project. If anyone could accomplish it, it was Jack. If Jack could not do it, Mark sincerely believed it could not be done. The successful completion of this project would be seen as a value-added opportunity for McRoy’s customers and could make a tremendous difference from a cost and efficiency stand- point. McRoy would be seen as an industry leader in life-cycle costing, and this could make the difference in getting buyers to purchase commercial planes from McRoy Aerospace. The project was to design an opening/closing mechanism that was the same for all of the doors. Until now, each door could have a different set of open/close mechanisms, which made 2. © 2010 by Harold Kerzner. Reproduced by permission. All rights reserved. Case Studies 333 the design, manufacturing, maintenance, and installation processes more complex, cumber- some, and costly. Without a doubt, Jack was the best—and probably the only—person to make this happen even though the equipment engineers and designers all agreed that it could not be done. Mark put all of his cards on the table when he presented the challenge to Jack. He told him wholeheartedly that his only hope was for Jack to take on this project and explore it from every possible, out-of- the-box angle he could think of. But Jack said right off the bat that this may not be possible. Mark was not happy hearing Jack say this right away, but he knew Jack would do his best. Jack spent two months looking at the problem and simply could not come up with the solu- tion needed. Jack decided to inform Mark that a solution was not possible. Both Jack and Mark were disappointed that a solution could not be found. “I know you’re the best, Jack,” stated Mark. “I can’t imagine anyone else even coming close to solving th…

Looking for solution of this Assignment?

WHY CHOOSE US?

We deliver quality original papers

Our experts write quality original papers using academic databases.  

Free revisions

We offer our clients multiple free revisions just to ensure you get what you want.

Discounted prices

All our prices are discounted which makes it affordable to you. Use code FIRST15 to get your discount

100% originality

We deliver papers that are written from scratch to deliver 100% originality. Our papers are free from plagiarism and NO similarity

On-time delivery

We will deliver your paper on time even on short notice or  short deadline, overnight essay or even an urgent essay
 

Review the impacts on the environment of your computer during its entire lifecycle. How do the production, transportation, and use of the computer affect the increase of greenhouse gas emissions? How does the selection of materials and packaging impact the environment? What restricted substances (like lead, mercury, cadmium, and PVC) are found in your machine? Could substitute materials be used? How would the ultimate “green machine” be designed? use citations

Looking for solution of this Assignment?

WHY CHOOSE US?

We deliver quality original papers

Our experts write quality original papers using academic databases.  

Free revisions

We offer our clients multiple free revisions just to ensure you get what you want.

Discounted prices

All our prices are discounted which makes it affordable to you. Use code FIRST15 to get your discount

100% originality

We deliver papers that are written from scratch to deliver 100% originality. Our papers are free from plagiarism and NO similarity

On-time delivery

We will deliver your paper on time even on short notice or  short deadline, overnight essay or even an urgent essay
 

IMPORTANT: AFTER PURCHASE, LOG IN TO YOUR ACCOUNT AND SCROLL DOWN BELOW THIS PAGE TO DOWNLOAD FILES WITH ANSWERS. ______________ stipulates the commercial cabling standards for LAN installations and is the standard most commonly used in LAN cabling environments. _______________________________occurs in fiber-optic media when the media ends are not well polished or dirt is present at the termination. Which Wi-Fi standard can simultaneously operate in the 2.4- and 5-GHz frequency bands, providing data rates up to 450 Mbps and 1.3 Gbps? A _____________________ provides wireless communication capability to each network host. _____________________ is an uncommon cable used to interconnect similar devices such as to connect a switch to a switch, a host to a host, or a router to a router. ____________________ connect a device to the network. The TCP/IP network access layer is the equivalent of the following OSI layers: What are the contents of the data field in a frame? Which of the following is not an advantage of copper media? _________________________ is a WAN version of the star topology in which a central site interconnects branch sites using point-to-point links. Which of the following is not one of the three main types of copper media used in networking? As more wireless devices access a network simultaneously, _________________ network performance might occur. The ____________________ is the upper sublayer of the data link layer that defines the software processes that provide services to the network layer protocols. The new 10-GB standard for Ethernet has a provision for the use of STP cabling, and this provision is causing a renewed interest in STP cabling. Practical bandwidth of a network is determined by a combination of which factors? According to the textbook, the longer a signal travels on a copper cable, the more it deteriorates in a phenomenon referred to as Which of the following is not a type of fiber-optic cable? IEEE rates UTP cabling according to its performance, thereby placing cables into categories according to their ability to carry higher-bandwidth rates.  Of the following categories, which one is the recommended type for data networking in new building installations? Controlled access is also known as ______. Shielded twisted-pair (STP) cabling provides better noise protection than UTP cabling. When using wireless, the signals are patterns of _________________________. The ____________________________ topology provides high availability, but requires that every end system be interconnected to every other system. In which type of industry is fiber optic being used to provide always-on broadband services to homes and small businesses? In which type of industry is fiber optic being used for backbone cabling applications and interconnecting infrastructure devices? UTP cable consists of _______ pairs of color-coded wires that have been twisted together and then encased in a flexible plastic sheath that protects them from minor physical damage. BUY MORE MATERIALS FOR THIS COURSE: CSIS 330 Quiz 1 Liberty University CSIS 330 Quiz 2 Liberty University CSIS 330 Quiz 3 Liberty University CSIS 330 Quiz 4 Liberty University CSIS 330 Quiz 5 Liberty University CSIS 330 Quiz 6 Liberty University CSIS 330 Quiz 7 Liberty University CSIS 330 Final Exam

Looking for solution of this Assignment?

WHY CHOOSE US?

We deliver quality original papers

Our experts write quality original papers using academic databases.  

Free revisions

We offer our clients multiple free revisions just to ensure you get what you want.

Discounted prices

All our prices are discounted which makes it affordable to you. Use code FIRST15 to get your discount

100% originality

We deliver papers that are written from scratch to deliver 100% originality. Our papers are free from plagiarism and NO similarity

On-time delivery

We will deliver your paper on time even on short notice or  short deadline, overnight essay or even an urgent essay
 

Search “scholar.google.com” for a company or school that has defined the role of end-users in the creation of a contingency plan. Discuss why it is (or is not) important to include end users in the process of creating the contingency plan? What are the possible pitfalls of end user inclusion? Disaster Recovery: 1) what are the most common downtime metrics used to express recovery criticality? 2) what is maximum tolerable downtime (mtd)? 3) what is recovery time objective (RTO) 4) what is recovery point objective rpo and how does it differ from recovery time objective 5)what are the primary means for collecting data for the bia 6) what is facilitated data gathering? 7)what are some items usually included in routine it operations budgets that can be considered part of CP requirements 8) beyond those items that are funded in the normal course of IT operations, what are the additional budgeting areas of CP needs?

Looking for solution of this Assignment?

WHY CHOOSE US?

We deliver quality original papers

Our experts write quality original papers using academic databases.  

Free revisions

We offer our clients multiple free revisions just to ensure you get what you want.

Discounted prices

All our prices are discounted which makes it affordable to you. Use code FIRST15 to get your discount

100% originality

We deliver papers that are written from scratch to deliver 100% originality. Our papers are free from plagiarism and NO similarity

On-time delivery

We will deliver your paper on time even on short notice or  short deadline, overnight essay or even an urgent essay
 

The following MUST meet the criteria below: 1. Code must work using C++ in Visual Studio 2012 or 2015 2. keep basic and simple. (adding //comments would help alot) 3. Please read attached file CAREFULLY for instructions (make it similar to the example) 4. Add loop at so user can try again with “Do you want to run the program again ?

Looking for solution of this Assignment?

WHY CHOOSE US?

We deliver quality original papers

Our experts write quality original papers using academic databases.  

Free revisions

We offer our clients multiple free revisions just to ensure you get what you want.

Discounted prices

All our prices are discounted which makes it affordable to you. Use code FIRST15 to get your discount

100% originality

We deliver papers that are written from scratch to deliver 100% originality. Our papers are free from plagiarism and NO similarity

On-time delivery

We will deliver your paper on time even on short notice or  short deadline, overnight essay or even an urgent essay
 

Individual Effort Only! APA format is required.  References should be listed immediately after the question that is being answered.  Each question lists a minimum number of unique scholarly references; the textbook is considered one unique reference (per question) regardless of how many times it is used.  All references should be from the years 2008 to present day. Review the rubric that will be used to evaluate this paper. All work must be completed individually. How are process technologies evaluated? Use at least two unique references. Length: 4-5 paragraphs. Read the case: Grace Faces (Three) Problems , available in the Operations Management textbook, Chapter 9.  What are the problems amongst the staff of each of the three teams? And, what do you think that each team leader should be doing to try to overcome their teams’ problems? Use at least two unique references. Length: 4-5 paragraphs. How do supply and demand affect planning and control? Use at least two unique references. Length: 4-5 paragraphs. What are the ways of coping with mismatches between supply and capacity? Use at least two unique references. Length: 4-5 paragraphs. 271 – 422

Looking for solution of this Assignment?

WHY CHOOSE US?

We deliver quality original papers

Our experts write quality original papers using academic databases.  

Free revisions

We offer our clients multiple free revisions just to ensure you get what you want.

Discounted prices

All our prices are discounted which makes it affordable to you. Use code FIRST15 to get your discount

100% originality

We deliver papers that are written from scratch to deliver 100% originality. Our papers are free from plagiarism and NO similarity

On-time delivery

We will deliver your paper on time even on short notice or  short deadline, overnight essay or even an urgent essay