identify what type of critical infrastructure data collection is needed for pavement and storm water management facilities.

Week 6 discussion – CollectionAn agency has focused its system development and critical infrastructure data collection efforts on separate engineering management systems for different types of assets and is working on the integration of these systems. In this case, the agency focused on the data collection for two types of assets: water treatment and natural gas delivery management facilities. Please identify what type of critical infrastructure data collection is needed for pavement and storm water management facilities.Chapter 6 discusses the concept of correlation. Assume that An agency has focused its system development and critical infrastructure data collection efforts on separate engineering management systems for different types of assets and is working on the integration of these systems. In this case, the agency focused on the data collection for two types of assets: water treatment and natural gas delivery management facilities. Please identify what type of critical infrastructure data collection is needed for pavement and storm water management facilities.To complete this assignment, you must do the following:A) Create a new thread. As indicated above, identify what type of critical infrastructure data collection is needed for pavement and storm water management facilities.B) Select AT LEAST 3 other students’ threads and post substantive comments on those threads. Your comments should extend the conversation started with the thread.ALL original posts and comments must be substantive. (I’m looking for about a paragraph – not just “I agree.”)

What insight about the historical development of these two cultures did you gain from the comparison?

Early Medieval Cultures Essay This assignment provides you with an opportunity to discuss an insight you gained in this unit by comparing the development of one specific Islamic and one specific Christian region in 600–1000 C.E. Using examples of significant leaders, political and social structures, beliefs, and cultural products (stories, philosophies, theologies, artifacts, art, and architecture), note similarities and differences in the two cultures, and also indicate influences they share. What insight about the historical development of these two cultures did you gain from the comparison? Step 1: Review the section of the Unit V Study Guide entitled, “Be Careful When Making Historical Assumptions.” Step 2: Choose two appropriate sources, not including the textbook. At least one source must come from the CSU Online Library. The Academic Search Complete and eBook Academic Collection databases in the CSU Online Library would be good places to start your search. Resources from outside of the library should be credible and peer-reviewed by historians and cannot include Wikipedia, Biography.com, History.com, or any other .com site; resources should also not be taken from any type of message board or other encyclopedia-type sites, including those listed in the CSU Online Library research guides, which are provided for quick reference only and not for paper research. If you need additional help with using or locating information in the CSU Online Library, there are library video tutorials available on the main page of the online library under the heading “Research Guides.” Step 3: Complete your research. Choose one interesting comparison that illustrates the main point that you want to make about these cultures during this period. Gather details about your choice. Compare similar features (known as “comparing like terms”). For example, compare cities to cities, education systems to education systems, technologies to technologies, stories to stories, ideas about the nature of God to ideas about the nature of God, and other features. Make sure you complete the comparison for all features, or note why you think there is not a like term for some features. Comparison includes consideration of both similarities and differences. Here are some examples to consider: ? the promotion and use of learning by leading figures; ?the relationship between religious and political authority; ?the shaping of artifacts (leader, idea, practice, or structure) by time period and environment; ?the shaping of societies by artifacts and whether different people were affected differently; and ?the way that different elements of culture reflect power arrangements, goals, hierarchies, and/or challenges. Step 4: Prepare your introduction, including your thesis statement. A thesis is prepared after you have completed your research and includes the comparison of what you found. It should be a one- or two-sentence statement of the conclusions you drew from the comparison. Step 5: Write your essay. Your essay must be at least 500 words in length. Step 6: Reflect on how this comparison paper shaped your understanding of how to practice cultural history ethically, as discussed in the “Be Careful When Making Historical Assumptions” section of the Unit V Lesson. Write one paragraph to be placed after the concluding paragraph of your essay, reflecting on how the guidelines in the unit lesson shaped your understanding of how to use historical evidence, including artifacts, to practice cultural history ethically.

Develop a strategy proposal using the “Ends, Ways and Means” model.

Word count: minimum 1,500, maximum 2,000 (approximately 5-7 pages).2021 Iran Nuclear Test: Ends, ways and meansYou are a member of the National Security Council staff asked to recommend an appropriate United States response to the notional 2021 Iranian nuclear test crisis. Develop a strategy proposal using the “Ends, Ways and Means” model. Ensure that your actions are consistent with US policy and the state of international affairs in the notional 2021 scenario. Keep in mind that you are writing recommendations, not directions. Write from the perspective of a staff official presenting a report to the President.The paper must also have these elements accomplished:· Have I demonstrated adequate justification for each recommendation?· Have I integrated my recommendations?· Have I integrated the instruments of national power in my recommendations?

Compute gross profit using three inventory valuation methods.

Complete two accounting exercises in which you prepare adjusting journal entries and income statements and compute financial ratios, inventory costs, and gross profit using a provided worksheet.IntroductionThis assessment extends your analysis of merchandising activities by focusing on the valuation of the organization’s inventory that is available for sale to wholesalers and point-of-sale consumers. An understanding of inventory accounting helps in the analysis and interpretation of financial statements prepared by large retailers and small owner-operated specialty retailers.Merchandise Business AccountingThe first assessment dealt with accounting and reporting activities for businesses that provide services to their customers. In contrast to this business type, merchandisers earn their revenues through the purchase and resale of goods. The two most common types of merchandisers are wholesalers and retailers. A wholesaler generally purchases goods from a manufacturer and sells them to retailers or other intermediaries. A retailer buys direct from either the manufacturer or a wholesaler and resells these goods to consumers. There are some fundamental differences between accounting for merchandise and service operations.Merchandise InventoryAccounting for inventory affects both the balance sheet and the income statement. The major goal in accounting for inventory is to properly match costs with sales and, as such, use the matching principle to decide how much of the cost of goods available for sale is deducted from sales and how much is carried forward as inventory and matched against future sales.OverviewThis assessment consists of two accounting exercises. The exercises are provided in the Adjusting Entries, Inventory, and Cost of Goods Sold Worksheet. Use this worksheet to record and submit your solutions for Exercises 2-1 and 2-2.PreparationIn addition, practice problems for each exercise are provided in the Assessment 2 Practice Problems Worksheet. The worksheet and answer key can be foundin the Capella Resources activity of this assessment and are optional.The following resourceisrequired to complete the assessment.CAPELLA RESOURCESClick the link provided to view the following resource:Submission GuidelinesSubmit your completed Adjusting Entries, Inventory, and Cost of Goods Sold Worksheet for faculty evaluation. Please do not submit completed practice problems with your assessment.Competencies MeasuredBy successfully completing this assessment, you will demonstrate your proficiency in the following course competencies and assessment criteria:Competency 2: Apply accounting principles as the language of business.Prepare adjusting journal entries for merchandising operations.Competency 3: Communicate the effects of business events on an organization’s financial structure.Prepare a multiple- or single-step income statement for merchandizing operations.Compute current and acid test financial ratios.Compute inventory costs using three inventory valuation methods.Compute gross profit using three inventory valuation methods.

Identify archiving procedures

Plagiarism is not allowedInstructions: See this Web Site: http://www.faulkner.com.ezproxy2.apus.edu/products/securitymgt and read the Geoff Keston article titled “Developing A Security Communications Plan”.According to Keston (2013), “A mark of a mature security communications program is the shift away from one-time messages, such as ad hoc emails. Such messages are easily forgotten and are often hard to find after a few weeks. A good security communications plan will include sending updates and alerts as well as maintaining a repository of documentation. Creating such a repository (or a consolidated document) makes information easier to find, and it helps to link together disparate elements into a unified plan.”For the purpose of this assignment, you are tasked as the Cybersecurity Director to prepare a Security Communications Plan for execution at the program level. You are to develop a security communications plan for your organization that addresses the handling of all communications related to security. Follow the requirements below:Develop a comprehensive security plan that does the following:1. Identify archiving procedures2. Establish approval processes for sending communications3. Describe legal and regulatory requirements4. Define key terms5. Define severity levels and message types6. Using the definitions of severity levels and message types, diagram who receives messages and through what means they receive them (e.g., text messages)7. The plan will address the concerns of many constituents, including executives, IT staff members, and end users, as well as customers and partners. Each group has somewhat different needs, so it is helpful to structure a plan to protect sensitive information from the entire group and to make targeted information easy for its audience to find.Number of Pages: 4 PagesAcademic Level: CollegePaper Format: APA

Formulate, validate and document business requirements for a medium-scale information system development project and effectively communicate these requirements to the stakeholders.

MIS605_Assessment_2_Brief_Design Specification Page 1 of 8 Task Summary Based on your responses to Assessment 1 – Written assessment, perform process and data modelling and develop and document a number of design diagrams using UML (including Context Diagram, Level 0 and Level 1 Data Flow Diagram, Entity Relationship Diagram). Context In Assessment 1, you performed a comprehensive requirement analysis for the online student enrolment system at the ABC University. With an in-depth understanding of the functional requirements of the System, you are now required to perform further analysis through process and data modelling. In doing so, you also need to provide a preliminary data storage design for the System. Both process modelling and data modelling can be used to provide deeper understanding of a new System. Thus, they are an integral part of System Analysis. Process modelling describe business processes – i.e. the sequence of activities that people do; while data modelling seeks to describe the ASSESSMENT 2 BRIEF Subject Code and Title MIS605 Systems Analysis and Design Assessment Design specification Individual/Group Individual Length 2500 words Learning Outcomes The Subject Learning Outcomes demonstrated by successful completion of the task below include: a) Identify, critically evaluate and recommend information systems solutions for inefficiencies in business processes, procedures and work practices using data and process modelling techniques. b) Formulate, validate and document business requirements for a medium-scale information system development project and effectively communicate these requirements to the stakeholders. c) Demonstrate the ability to effectively analyse, design and develop information systems using Unified Modelling Language (UML) models. Submission Due by 11:55pm AEST Sunday end of Module 4.2. Weighting 40% Total Marks 100 marks MIS605_Assessment_2_Brief_Design Specification Page 2 of 8 data flows through those processes. Data flow diagrams (including context diagrams) and entity relationship diagrams are the most common process and data modelling techniques used in industry. Instructions 1. Please read MIS605_Assessment 1_Case Study. Please note that every piece of information provided in this case study serves a purpose. 2. Once you have completed reading the case study, please read the attached MIS605_Assessment 2_Additional case information document. 3. Please complete the following tasks: Task 1. Create and document a Context Diagram for the System. (15 marks) Task 2. Create and document a Level 0 Data Flow Diagram (DFD). The Level 0 DFD should contain all the major high-level processes of the System and how these processes are interrelated. (20 marks) Task 3. Select three major and non-trivial processes from Level 0 DFD, decompose each of the processes into a more explicit Level 1 DFD. (24 marks) Task 4. Using your own experience with similar online student enrolment systems and the information provided in the case study: (i) Identify all the entities and their relationships in the System (ii) Create and document an Entity Relationship Diagram (ERD) for the System. Note: the case study has not and does not intend to provide a comprehensive description of entities in the System. You are expected to use your own experience with information systems in general and online student enrolment systems in particular to develop this ERD. For MIS605_Assessment_2_Brief_Design Specification Page 3 of 8 example, would Subject Name be an attribute for a Subject? Would Date of Birth be an attribute for Students? (20 marks) Task 5. Should data be stored in files in a file system or in a database for the System? Justify your answer. (5 marks) Task 6. Translate the ERD you developed in Task 4 into a physical relational database design. Document database tables and their relationship in MSWord file. Normalise your database design to the Third Normal Form (3NF). (16 marks) 4. Please note that your responses to the tasks above must relate to the case study provided. Word Count and Layout ? The total word count for the written assessment should be no more than 2500 words. ? Please provide all your answers in a MS word document. ? All diagrams must be drawn using Lucidchart and copied into the MSWord document. ? Please note that you are NOT required to copy the task description over to the MS Word document. Use the task number to indicate which task your response relates to. ? The recommended font size is 12 with 1.5 spacing. Referencing It is essential that you use appropriate APA style for citing and referencing research. Please see more information on referencing here http://library.laureate.net.au/research_skills/referencing Submission Instructions ? Please submit the written assessment via the Assessment link within Assessment 2. The Learning Facilitator will provide feedback via the Grade Centre in the LMS portal. Feedback can be viewed in My Grades. MIS605_Assessment_2_Brief_DesignSpecification Page 4 of 8 Marking Criteria F P C D HD Subject Learning Outcome: a) Identify, critically evaluate and recommend information systems solutions for inefficiencies in business processes, procedures and work practices using data and process modelling techniques. Create and document a Context Diagram for the System. ? Use of correct notions. ? Include all major entities. ? Label arrows with data. ? Use verbs for data label. ? Appropriate use of arrows. ? The diagram clearly shows the interaction of the system with its external entities. 15% Subject Learning Outcome: a) Identify, critically evaluate and recommend information systems solutions for inefficiencies in business processes, procedures and work practices using data and process modelling techniques. b) Formulate, validate and document business requirements for a medium-scale information system development project and effectively communicate these requirements to the stakeholders. Create and document a Level 0 Data Flow Diagram (DFD). ? Level 0 DFD contain all the major high-level processes of the System and clearly outlines how these processes are interrelated. ? Level 0 DFD is balanced with the context diagram. ? Label arrows with data. MIS605_Assessment_2_Brief_DesignSpecification Page 5 of 8 ? Use verbs for the data label. ? Appropriate use of arrows. ? Clearly outlines all major processes and data storage critical to the System. 20% Subject Learning Outcome: a) Identify, critically evaluate and recommend information systems solutions for inefficiencies in business processes, procedures and work practices using data and process modelling techniques. b) Formulate, validate and document business requirements for a medium-scale information system development project and effectively communicate these requirements to the stakeholders. Select three major and non-trivial processes from Level 0 DFD, decompose each of the processes into a more explicit Level 1 DFD. ? Level 1 DFD is balanced with the corresponding processes in level 0 DFD. ? Label arrows with data. ? Use of appropriate verbs for the data label. ? Appropriate use of arrows. ? Identified all the major processes and data storage critical to the System. 24% Subject Learning Outcome: a) Identify, critically evaluate and recommend information systems solutions for inefficiencies in business processes, procedures and work practices using data and process modelling techniques. b) Formulate, validate and document business requirements for a medium-scale information system development project and effectively communicate these requirements to the stakeholders. MIS605_Assessment_2_Brief_DesignSpecification Page 6 of 8 c) Demonstrate the ability to effectively analyse, design and develop information systems using Unified Modelling Language (UML) models. ? Identify all the entities and their relationships in the System. ? Create and documents an Entity Relationship Diagram which demonstrate the following qualities: – Use of correct notions. – Incorporates all major entities. – Includes all critical attributes. 20% Subject Learning Outcome: a) Identify, critically evaluate and recommend information systems solutions for inefficiencies in business processes, procedures and work practices using data and process modelling techniques. b) Formulate, validate and document business requirements for a medium-scale information system development project and effectively communicate these requirements to the stakeholders. c) Demonstrate the ability to effectively analyse, design and develop information systems using Unified Modelling Language (UML) models. Storage of data ? Identify the most appropriate data storage for the System. ? Provided a convincing justification for the chosen answer. 5% MIS605_Assessment_2_Brief_DesignSpecification Page 7 of 8 Subject Learning Outcome: a) Identify, critically evaluate and recommend information systems solutions for inefficiencies in business processes, procedures and work practices using data and process modelling techniques. b) Formulate, validate and document business requirements for a medium-scale information system development project and effectively communicate these requirements to the stakeholders. c) Demonstrate the ability to effectively analyse, design and develop information systems using Unified Modelling Language (UML) models. Database design ? The tables are in 3NF. ? The design correctly reflects the relationship of the logical design. 16% MIS605_Assessment_2_Brief_DesignSpecification Page 8 of 8 Fail (Unacceptable) 0-49% Fail grade will be awarded if a student is unable to demonstrate satisfactory academic performance in the subject or has failed to complete required assessment points in accordance with the subject’s required assessment points. Pass (Functional) 50-64% Pass is awarded for work showing a satisfactory achievement of all learning outcomes and an adequate understanding of theory and application of skills. A consistent academic referencing system is used and sources are appropriately acknowledged. Credit (Proficient) 65-74% Credit is awarded for work showing a more than satisfactory achievement of all learning outcomes and a more than adequate understanding of theory and application of skills. A consistent academic referencing system is used and sources are appropriately acknowledged. Distinction (Advanced) 75 -84% Distinction is awarded for work of superior quality in achieving all learning outcomes and a superior integration and understanding of theory and application of skills. Evidence of in-depth research, reading, analysis and evaluation is demonstrated. A consistent academic referencing system is used and sources are appropriately acknowledged. High Distinction (Exceptional) 85-100% High Distinction is awarded for work of outstanding quality in achieving all learning outcomes together with outstanding integration and understanding of theory and application of skills. Evidence of in?depth research, reading, analysis, original and creative thought is demonstrated. A consistent academic referencing system is used and sources are appropriately acknowledged.

organize human, physical, and financial resources for the effective and efficient attainment of organizational goals

Hello,I need help with the project below. I need A+! Unless you are 100% sure you can handle the project with all requirements, do not make an attempt to contact me.MartinPurposeIn this project, you will view a video and discuss the organizational culture and organizational structure of the assigned organization. Outcome Met by Completing This Assignmentorganize human, physical, and financial resources for the effective and efficient attainment of organizational goalsHow to Set Up the PaperCreate a Word or Rich Text Format (RTF) document that is double-spaced using 12-point font.The final product will be 3-4 pages in length excluding the title page and reference page. Write clearly and concisely.Provide a title page with a title, your name, course and section number and the instructor’s name.Instructions: You have been hired as an associate for a software company that offers support solutions and customer service to more than 500 businesses in the United States. The company has recently started to experience significant growth and will need to hire many new associate positions. Your manager, Jack Nyugen, has asked you to help create a recruiting video for the company that emphasizes the company as having a positive corporate culture in which employees live the company’s core values and like coming to work. Jack provides you with a recruiting video for Zendesk, a favorite company of his, and has asked you to view the video to gain an understanding of the concepts, organizational culture and organizational structure. Jack knows the value of seeing is believing but also knows the value in a person who is able to articulate what is seen.Jack has asked you to view the video on Zendesk: https://youtu.be/l0uaSU6IVN4. (You may need to right click on the link and open in a new window.)You will write a report addressed to Jack and will use only the Zendesk video and course materials. If external sources are used, the information will not be included in the grading.Use the following headings and instructions to complete the project:IntroductionWrite an Introduction paragraph. The Introduction paragraph is the first paragraph of the paper and describes to the reader the intent of the paper explaining the main points covered in the paper using a thesis statement. This intent should be understood prior to reading the remainder of the paper so the reader knows exactly what is being covered in the paper.Organizational CultureDiscuss the seven dimensions of organizational cultureDescribe what ZenDesk’s organizational culture look like by presenting examples for each dimension descriptor. Use the specific facts from the video and use the course material to support your description of ZenDesk’s organizational culture. This means you will use the video facts and make connections to organizational culture as it relates to each dimension descriptor.Competitive AdvantageDiscuss how ZenDesk uses its corporate culture to create a competitive advantage. Make sure to correctly make connections between the video information and the course materials.Organizational StructureIdentify and discuss ZenDesk’s organizational structure from what you see in the video and use the course material to support your description of the structure. Make sure to use examples from the video.ConclusionCreate a concluding paragraph. The Conclusion summarizes the main topics discussed in the paper.

What is the epidemiological triad? Describe.

Many infectious diseases are multifactorial, meaning they are caused by the interaction of several factors inside and outside the person. For an infection to occur, three key conditions, known as the epidemiological triad of disease must be met.Using approximately 600-800 words, and use APA 7th edition citations and referencing as appropriate:What is the epidemiological triad? Describe.What are pathogens and how do pathogens gain entry?Explain how your immune system protects you, what factors diminish its effectiveness and what can you do to boost its effectiveness.What can you do to reduce your risk of infectious disease?

Calculate the timing of password-guessing attacks

1. Calculate the timing of password-guessing attacks:(a) If passwords are three uppercase alphabetic characters long, how much time would it take to determine a particular password, assuming that testing an individual password requires 5 seconds? How much time if testing requires 0.001 seconds?(b) Argue for a particular amount of time as the starting point for “secure.” That is, suppose an attacker plans to use a brute-force attack to determine a password. For what value of x (the total amount of time to try as many passwords as necessary) would the attacker find this attack prohibitively long?(c) If the cutoff between “insecure” and “secure” were x amount of time, how long would a secure password have to be? State and justify your assumptions regarding the character set from which the password is selected and the amount of time required to test a single password. 2. Describe each of the following four kinds of access control mechanisms in terms of (a) ease of determining authorized access during execution, (b) ease of adding access for a new subject, (c) ease of deleting access by a subject, and (d) ease of creating a new object to which all subjects by default have access.• per-subject access control list (that is, one list for each subject tells all the objects to which that subject has access)• per-object access control list (that is, one list for each object tells all the subjects who have access to that object)• access control matrix• capability3. Design a protocol by which two mutually suspicious parties can authenticate each other. Your protocol should be usable the first time these parties try to authenticate each other.4. List three reasons people might be reluctant to use biometrics for authentication. Can you think of ways to counter those objections? 5. If you forget your password for a website and you click [Forgot my password], sometimes the company sends you a new password by email but sometimes it sends you your old password by email. Compare these two cases in terms of vulnerability of the website owner. 6. Defeating authentication follows the method–opportunity–motive paradigm described in Chapter 1. Discuss how these three factors apply to an attack on authentication. 7. Suggest a source of some very long unpredictable numbers. Your source must be something that both the sender and receiver can readily access but that is not obvious to outsiders and not transmitted directly from sender to receiver. 8. Humans are said to be the weakest link in any security system. Give an example for each of the following:(a) a situation in which human failure could lead to a compromise of encrypted data(b) a situation in which human failure could lead to a compromise of identification and authentication(c) a situation in which human failure could lead to a compromise of access control.9. Explain why hash collisions occur. That is, why must there always be two different plaintexts that have the same hash value?10. What property of a hash function means that collisions are not a security problem? That is, why can an attacker not capitalize on collisions and change the underlying plaintext to another form whose value collides with the hash value of the original plaintext?

Develop research questions that address contemporary issu es in criminal justice by applying a ppropriate criminological theories

GuidelinesandRubricOverviewYour final project in this course is the development of aresearch report.The fundamental responsibility of criminal justice personnel is based on sound decision making. Using the scientific method within the criminal justiceinvestigations process allows investigators the opportunity to base their findings on factual data and ethical reasoning. This is especially important within thefield of criminal justice because the decisions made undergo rigorous scrutiny from entities such as the media, judiciary system, and the general public. Creatingliterature reviews isa common practice when explaining trends within the criminal justice field. For example, as a criminal justice representative, you may betasked with explaining why calls of domestic violence have increased in a specific area in your jurisdiction over a certain periodof time. It is your responsibility togather and interpret data, analyze criminological theories, and make use of the scientific method to offer an explanation forthe increase, as well as an effectiveavenue of resolution. In thefinal projectyou will practically apply research methods to come to informed conclusions.For this assessment, you will play the part of an individual currently employed at a criminal justice agencysuch as a police force, a correctional institution, or acourt system. Your administrative staff holds monthly meetings to discuss trends, departmental issues, and community concerns. Your supervisor hasapproachedyou and told you that there has been a trend of increased incidents related to a specific issue, and furthermore, the community has taken notice. Your supervisormust provide an answer to the administrative staff and the community, and would like your assistance. You have been tasked with conducting initial research onthe issue to inform the direction of your supervisor’sfurther research and statement to the administrative staff and community.To begin, you will be presented with a predetermined list of issues impacting the field of criminal justice. You are to choose an issue, or select an issue outside ofthe list withinstructor approval. You will then seek out five peer–reviewed scholarly articles, two of which must use qualitative methodology, andsynthesize andcritically analyze theliteraturetodevelop a research question and createdata–informed conclusionsabout your selected issue. Additionally, you must identify themethodologyused in each article, and explain the importance of using the scientific method to practice ethical research.The project is divided intothreemilestones, which will be submittedat various points throughout the course to scaffold learning and ensure quality finalsubmissions. These milestones will be submitted inModulesTwo,Four,andFive.The finalproductwillbe submittedinModuleSeven.Additionally, throughoutthe course you will work on a series of worksheets that directly relate to elements of your final research report.These worksheets will be submittedinModulesOne, Three,andSix.In this assignment,you will demonstrateyour mastery of the following course outcomes:?Developresearch questionsthat address contemporary issues in criminal justice by applying appropriate criminological theories?Interpret criminal justiceresearchto identify patterns for drawing evidence–based conclusions

× How can I help you?