IT 380 Milestone One Guidelines and Rubric
Overview: For the final project in this course, you will assume the role of a training manager at a cybersecurity firm needing to create a training manual for new
information security analyst hires. For Milestone One, complete the introduction and core tenets of cybersecurity sections of the manual.
Prompt: You will submit the introduction and core tenets of cybersecurity sections of the training manual. The training manual will include a discussion of the
purpose and value of cybersecurity, illuminate core tenets of cybersecurity, and illustrate best practices for addressing common threat scenarios.
Specifically, the following critical elements must be addressed:
I. Introduction: In this part of the training manual, you will explain the value of CyberLeet Technologies as a provider of services to their clients. Describe
the organization of the business, the new hire’s role, and the overall purpose of the manual. Review the directions in each section of the manual
template to guide your response. Be sure you delete all of the directions in each section prior to finalizing the information.
A. Explain the value of CyberLeet Technologies as a provider of cybersecurity services to its client businesses. Why is there demand for information
security in a business environment? How do cybersecurity issues impact business resources, including finances, people, and time?
B. Describe the overall role of the new hire as an information security analyst. What are the main functions of the job? What should be their
ultimate goal once they are assigned to clients?
C. Finally, explain the purpose for this manual. Why is it important that information security analysts apply the principles and practices outlined in
this manual? What is at stake if they do not appropriately apply their training and provide high-quality services to the client businesses?
II. Core Tenets of Cybersecurity: In this part of the training manual, you will address the three core tenets of cybersecurity: confidentiality, integrity, and
availability. For each of these areas, you will explain the significance as a core tenet and define each term, giving specific details and examples to
illustrate its meaning in a business context.
A. Explain the significance of confidentiality as a core tenet of cybersecurity. Be sure to define the term and use specific details and examples to
illustrate its meaning in a business context.
B. Explain the significance of integrity as a core tenet of cybersecurity. Be sure to define the term and use specific details and examples to illustrate
its meaning in a business context.
C. Explain the significance of availability as a core tenet of cybersecurity. Be sure to define the term and use specific details and examples to
illustrate its meaning in a business context.
Rubric
Guidelines for Submission: Use the template provided to complete this assignment. Review each section and follow the prompts accordingly. All prompts should
be deleted. Remember, you are responsible for every section of a completed training manual.
Instructor Feedback: This activity uses an integrated rubric in Blackboard. Students can view instructor feedback in the Grade Center. For more information,
review these instructions.
Critical Elements Exemplary (100%) Proficient (85%) Needs Improvement (55%) Not Evident (0%) Value
Introduction:
Value of
Cybersecurity
Meets “Proficient” criteria and
demonstrates deep appreciation
for the value of cybersecurity
within business environments
Explains the value of cybersecurity
services for businesses using
specific supporting examples
Explains the value of cybersecurity
services for businesses but is
lacking in necessary detail or fails
to use specific supporting
examples
Does not explain the value of
cybersecurity services for
businesses
20
Introduction:
Role of the New
Hire
Meets “Proficient” criteria and
demonstrates keen insight into
the role of cybersecurity within
business environments
Describes the role and ultimate
goals of an information security
analyst, using specific detail
Describes the role and goals of an
information security analyst but
with gaps in accuracy or necessary
detail
Does not describe the role and
goals of an information security
analyst
15
Introduction:
Purpose of the
Manual
Meets “Proficient” criteria and
demonstrates deep appreciation
for the value of cybersecurity
within business environments
Explains the purpose of the
training manual in terms of what is
at stake for a business if it does
not have appropriate
cybersecurity policies and
practices
Explains the purpose of the
training manual but fails to clearly
illustrate what is at stake for a
business if it does not have
appropriate cybersecurity policies
and practices
Does not explain the purpose of
the training manual
15
Core Tenets:
Confidentiality,
Integrity, and
Availability
Meets “Proficient” criteria and
demonstrates nuanced
understanding of the core tenets
of cybersecurity
Defines and explains the
significance of confidentiality,
integrity, and availability as core
tenets of cybersecurity, including
specific details and examples to
illustrate
Defines and explains the
significance of confidentiality,
integrity, and availability as core
tenets of cybersecurity but fails to
illustrate with specific details and
examples or contains inaccuracies
Does not define and explain the
significance of confidentiality,
integrity, and availability as core
tenets of cybersecurity
50
Total 100%
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"
https://coursesolver.com/wp-content/uploads/2020/04/csesolpxel-300x52.png00adminhttps://coursesolver.com/wp-content/uploads/2020/04/csesolpxel-300x52.pngadmin2019-06-30 21:41:362019-06-30 21:41:36IT 380 Milestone One Guidelines and Rubric Overview:
IT 380 Final Project Guidelines and Rubric
Overview
The world we live in is increasingly networked. So much of our vital information exists in digital networks—from financial transactions to social media, criminal
records to private emails—that we cannot consider protecting them optional. The Global Risks 2015 report, published by the World Economic Forum, gives this
unsettling observation: “Ninety percent of companies worldwide recognize they are insufficiently prepared to protect themselves against [cyberattacks].” With
this in mind, it is not surprising that businesses and governments alike are continuing to seek better cyberdefense strategies, including hiring cybersecurity
specialists. In this course, you learned the foundational principles and practices applied by these in-demand professionals to keep networked information secure.
For this project, you will assume the role of a training manager at a cybersecurity firm who decides to create a new-hire training manual for current and future
information security analysts. The training manual will include a discussion of the purpose and value of cybersecurity, illuminate core tenets of cybersecurity,
and illustrate best practices for addressing common cyberthreats.
The project is divided into two milestones, which will be submitted at various points throughout the course to scaffold learning and ensure quality final
submissions. These milestones will be submitted in Modules Two and Five. The final product will be submitted in Module Seven.
In this assignment, you will demonstrate your mastery of the following course outcomes:
Articulate the value of cybersecurity principles for effectively assessing and mitigating risk within business environments
Illustrate the core tenets of cybersecurity as they relate to balancing information security needs with functional business requirements
Select general network defense policies and practices for safeguarding the confidentiality, integrity, and availability of information for users and
organizations
Compare and contrast methods for detecting, controlling, and mitigating specific types of malicious cyberattacks
Prompt
Scenario: You are the training manager at CyberLeet Technologies, a midsized firm that provides cybersecurity services to other businesses. CyberLeet’s core
customer base is sole proprietorships and other mom-and-pop shops that are too small to have their own IT departments and budgets. Generally speaking, your
clients have a reasonably high risk tolerance, and put a premium on the functionality of their IT systems over stringent security measures. However, you also
have clients that must protect highly sensitive information in order to continue operating successfully. For example, CyberLeet supports a few small publicaccounting firms that need to maintain important tax-related information, as well as several day-care businesses that must keep children’s health records
private while allowing necessary access for certain caregivers. In the past year, CyberLeet has experienced rapid growth, which means you can no longer
personally provide one-on-one training to every new information security analyst as they are hired. Therefore, you have decided to create a training manual that
will explain to the current and future cohorts of new hires the essential principles and practices that they must understand in order to be successful in their role
as information security analysts at CyberLeet.
Your training manual should address the following prompt: What are the essential cybersecurity principles and practices that an information security analyst
must know and apply in order to be successful in their role? Make sure to use your Final Project Template for your milestones and final submission.
Specifically, the following critical elements must be addressed:
I. Introduction: Welcome to CyberLeet
A. Explain the value of CyberLeet Technologies as a provider of cybersecurity services to its client businesses. Why is there demand for information
security in a business environment? How do cybersecurity issues impact business resources, including finances, people, and time?
B. Describe the overall role of the new hire as an information security analyst. What are the main functions of the job? What should be their
ultimate goal once they are assigned to clients?
C. Finally, explain the purpose for this manual. Why is it important that information security analysts apply the principles and practices outlined in
this manual? What is at stake if they do not appropriately apply their training and provide high-quality services to the client businesses?
II. Core Tenets of Cybersecurity
A. Explain the significance of confidentiality as a core tenet of cybersecurity. Be sure to define the term and use specific details and examples to
illustrate its meaning in a business context.
B. Explain the significance of integrity as a core tenet of cybersecurity. Be sure to define the term and use specific details and examples to illustrate
its meaning in a business context.
C. Explain the significance of availability as a core tenet of cybersecurity. Be sure to define the term and use specific details and examples to
illustrate its meaning in a business context.
III. How to Develop Cybersecurity Policies
A. What principles should the information security analyst apply in order to develop appropriate password policies for their clients? Make sure you
address confidentiality, integrity, and availability of information, as well as each of the following aspects:
i. Password length and composition of the password (e.g., uppercase, numbers, special characters)
ii. Time period between resets and ability to reuse a prior password
iii. Differentiated policies for different types of users (e.g., administrator vs. regular user)
B. What principles should the information security analyst apply in order to develop appropriate acceptable use policies for the client? Make sure
you address confidentiality, integrity, and availability of information, as well as each of the following questions:
i. What should users generally be allowed to do with their computing and network resources? When and why would each example be
allowable?
ii. What should users generally be prohibited from doing with their computing and network resources? When and why would each
example require prohibition?
iii. When and why should users be aware of acceptable use policies and how can organizations keep track of these policies?
C. What principles should the information security analyst apply in order to develop appropriate user training policies for the client? Make sure
you address confidentiality, integrity, and availability of information, as well as each of the following:
i. How to determine who would be trained
ii. How to determine how often trainings would occur
iii. How to determine whether certain staff receive additional training or whether they should be held to higher standards
D. What principles should the information security analyst apply in order to develop appropriate basic user policies for the client? Make sure you
address confidentiality, integrity, and availability of information, as well as each of the following questions:
i. When and why should users have to display some type of identification while in the workplace?
ii. What types of physical access (with or without ID) to company areas is acceptable? Why?
iii. When and why should employees with identification be allowed access to all areas of the company?
iv. When and why should employees be allowed to take work home or bring guests into the workplace?
IV. Threat Mitigation Scenarios: For each of the hypothetical scenarios listed below, illustrate for the new hires the strengths and weaknesses of the
different approaches. This will help new hires gain a more practical understanding of how to deal with these types of issues that they are likely to face in
their day-to-day job.
A. Theft: In the last month, two break-ins have occurred at a client’s office, which resulted in the theft of employee laptops during both incidents.
The first incident occurred in the evening when the thieves broke through a ground-floor window. The second incident occurred during the day
when the thieves walked right into the business area and removed two laptops. What physical and technical controls would be helpful to
address the issue and prevent this type of vulnerability in the future? Compare and contrast the different methods that could be used to
mitigate the given threat.
B. Malware: Recently, one of your client’s staff has been inundated with phishing emails that are targeted at individuals and related to current
business opportunities for the company. These messages are linked to malware and sent by known threat actors. What physical and technical
controls would be helpful to address the issue and prevent this type of vulnerability in the future? Compare and contrast the different methods
that could be used to mitigate the given threat.
C. Your choice: Create your own illustrative scenario of a common threat that an information security analyst may face. Explain what physical and
technical controls would be helpful to address your chosen issue and prevent that type of vulnerability in the future, and compare and contrast
the different methods that could be used to mitigate the given threat.
Milestones
Milestone One: Training Manual Introduction
In Module Two, you will assume the role of a training manager at a cybersecurity firm needing to create a training manual for new information security analyst
hires. You will complete the introduction and core tenets of cybersecurity sections of the manual. This milestone will be graded with the Milestone One Rubric.
Milestone Two: Policy Development
In Module Five, you will complete the cybersecurity policy section of the manual. Remember, use the same template you used to complete Milestone One. This
milestone will be graded with the Milestone Two Rubric.
Final Submission: CyberLeet Training Manual
In Module Seven, you will submit your final project. It should be a complete, polished artifact containing all of the critical elements of the final product. It should
reflect the incorporation of feedback gained throughout the course. This submission will be graded with the Final Project Rubric.
Final Project Rubric
Guidelines for Submission: Your training manual should be 4 to 6 pages in length using 12-point Times New Roman font and double spacing. While not required,
if you do use TestOut or outside sources in your training manual, cite these sources using the latest APA guidelines.
Instructor Feedback: This activity uses an integrated rubric in Blackboard. Students can view instructor feedback in the Grade Center. For more information,
review these instructions.
Critical Elements Exemplary (100%) Proficient (85%) Needs Improvement (55%) Not Evident (0%) Value
Introduction: Value of
Cybersecurity
Meets “Proficient” criteria and
demonstrates deep
appreciation for the value of
cybersecurity within business
environments
Explains the value of
cybersecurity services for
businesses using specific
supporting examples
Explains the value of
cybersecurity services for
businesses but is lacking in
necessary detail or fails to use
specific supporting examples
Does not explain the value of
cybersecurity services for
businesses
8
Introduction: Role of
the New Hire
Meets “Proficient” criteria and
demonstrates keen insight into
the role of cybersecurity within
business environments
Describes the role and ultimate
goals of an information
security analyst using specific
detail
Describes the role and goals of
an information security analyst
but with gaps in accuracy or
necessary detail
Does not describe the role and
goals of an information security
analyst
8
Introduction: Purpose
of the Manual
Meets “Proficient” criteria and
demonstrates deep
appreciation for the value of
cybersecurity within business
environments
Explains the purpose of the
training manual in terms of
what is at stake for a business
if it does not have appropriate
cybersecurity policies and
practices
Explains the purpose of the
training manual but fails to
clearly illustrate what is at
stake for a business if it does
not have appropriate
cybersecurity policies and
practices
Does not explain the purpose of the
training manual
8
Core Tenets:
Confidentiality
Meets “Proficient” criteria and
demonstrates nuanced
understanding of the core
tenets of cybersecurity
Defines and explains the
significance of confidentiality
as a core tenet of
cybersecurity, including
specific details and examples
to illustrate
Defines and explains the
significance of confidentiality
as a core tenet of cybersecurity
but fails to illustrate with
specific details and examples
or contains inaccuracies
Does not define and explain the
significance of confidentiality as a
core tenet of cybersecurity
8
Core Tenets: Integrity Meets “Proficient” criteria and
demonstrates nuanced
understanding of the core
tenets of cybersecurity
Defines and explains the
significance of integrity as a
core tenet of cybersecurity,
including specific details and
examples to illustrate
Defines and explains the
significance of integrity as a
core tenet of cybersecurity but
fails to illustrate with specific
details and examples or
contains inaccuracies
Does not define and explain the
significance of integrity as a core
tenet of cybersecurity
8
Core Tenets:
Availability
Meets “Proficient” criteria and
demonstrates nuanced
understanding of the core
tenets of cybersecurity
Defines and explains the
significance of availability as a
core tenet of cybersecurity,
including specific details and
examples to illustrate
Defines and explains the
significance of availability as a
core tenet of cybersecurity but
fails to illustrate with specific
details and examples or
contains inaccuracies
Does not define and explain the
significance of availability as a core
tenet of cybersecurity
8
How To: Password
Policies
Meets “Proficient” criteria and
demonstrates keen insight into
best practices for defending
the confidentiality, integrity,
and availability of information
Identifies specific principles for
developing appropriate
password policies that address
confidentiality, integrity, and
availability of information
Identifies principles for
developing password policies
but fails to fully address all
relevant aspects or there are
gaps in logic or accuracy
Does not identify principles for
developing password policies
6
How To: Acceptable
Use Policies
Meets “Proficient” criteria and
demonstrates keen insight into
best practices for defending
the confidentiality, integrity,
and availability of information
Identifies specific principles for
developing appropriate
acceptable use policies that
address confidentiality,
integrity, and availability of
information
Identifies principles for
developing acceptable use
policies but fails to fully
address all relevant aspects or
there are gaps in logic or
accuracy
Does not identify principles for
developing acceptable use policies
6
How To: User Training
Policies
Meets “Proficient” criteria and
demonstrates keen insight into
best practices for defending
the confidentiality, integrity,
and availability of information
Identifies specific principles for
developing appropriate user
training policies that address
confidentiality, integrity, and
availability of information
Identifies principles for
developing user training
policies but fails to fully
address all relevant aspects or
there are gaps in logic or
accuracy
Does not identify principles for
developing user training policies
6
How To: Basic User
Policies
Meets “Proficient” criteria and
demonstrates keen insight into
best practices for defending
the confidentiality, integrity,
and availability of information
Identifies specific principles for
developing appropriate basic
user policies that address
confidentiality, integrity, and
availability of information
Identifies principles for
developing basic user policies
but fails to fully address all
relevant aspects or there are
gaps in logic or accuracy
Does not identify principles for
developing basic user policies
6
Threat Mitigation
Scenario: Theft
Meets “Proficient” criteria and
demonstrates nuanced
understanding of the different
methods for detecting,
controlling, and mitigating
threats
Compares and contrasts
different methods for
mitigating the given threat,
using specific examples to
illustrate
Compares and contrasts
methods for mitigating the
given threat but there are gaps
in accuracy, logic, or necessary
detail
Does not compare and contrast
methods for mitigating the given
threat
8
Threat Mitigation
Scenario: Malware
Meets “Proficient” criteria and
demonstrates nuanced
understanding of the different
methods for detecting,
controlling, and mitigating
threats
Compares and contrasts
different methods for
mitigating the given threat,
using specific examples to
illustrate
Compares and contrasts
methods for mitigating the
given threat, but there are
gaps in accuracy, logic, or
necessary detail
Does not compare and contrast
methods for mitigating the given
threat
8
Threat Mitigation
Scenario: Your Choice
Meets “Proficient” criteria and
demonstrates nuanced
understanding of the different
methods for detecting,
controlling, and mitigating
threats
Identifies a common threat and
compares and contrasts
different methods for
mitigating the chosen threat,
using specific examples to
illustrate
Identifies a common threat,
and compares and contrasts
methods for mitigating the
chosen threat but with gaps in
accuracy, logic, or necessary
detail
Does identify a common threat and
compare and contrast methods for
mitigating the chosen threat
8
Articulation of
Response
Submission is free of errors
related to citations (if
applicable), grammar, spelling,
syntax, and organization and is
presented in a professional and
easy-to-read format
Submission has no major errors
related to citations (if
applicable), grammar, spelling,
syntax, or organization
Submission has major errors
related to citations (if
applicable), grammar, spelling,
syntax, or organization that
negatively impact readability
and articulation of main ideas
Submission has critical errors
related to citations (if applicable),
grammar, spelling, syntax, or
organization that prevent
understanding of ideas
4
Total 100%
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"
https://coursesolver.com/wp-content/uploads/2020/04/csesolpxel-300x52.png00adminhttps://coursesolver.com/wp-content/uploads/2020/04/csesolpxel-300x52.pngadmin2019-06-30 21:40:312019-06-30 21:40:31IT 380 Final Project Guidelines and Rubric
I need help with this project, I have attached milestone one and two rubrics and guidelines for the first half of the project as well as the final project milestone to finish it up. There will be a attached template as well that must be used for this project. Also with the template as you scroll to the bottom there will be a place for references, could you please separate them for each section so I know what goes were with the references. Thanks
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"
Prompt: For this
milestone, you will create a risk management plan. Using the final project
scenario you chose in Module One and the plan template provided in the Module Three
resources, fill in details about risks in your project. Be sure to include a
number of different risks. Add information and details about the risks, and evaluate
the risks (as indicated in the template).
Requirements of Submission:The submission
should be an Excel document based on the downloaded template.
Instructor
Feedback: Students can find their feedback in the Grade Center.
Critical Elements
Exemplary
Proficient
Needs Improvement
Not Evident
Value
Quantity of Risks
Seven or more risks are listed
(23-25)
Five to six risks are listed
(20-22)
Three to four risks are listed
(18-19)
One to two risks are listed
(0-17)
25
Quality of Risks
Each risk has a detailed explanation, operational
consequences, and business effects listed
(23-25)
Most risks have a complete explanation, operational
consequences, and business effects listed
(20-22)
Some risks have a complete explanation, operational
consequences, and business effects listed, and/or some risks have no
information listed
(18-19)
Few risks are complete with details and information
(0-17)
25
Probability, Impact, and Exposure
The probability, impact, and exposure sections are
completed with details and supporting information
(23-25)
The probability, impact, and exposure sections have
some detail and information
(20-22)
Most of the probability, impact, and exposure sections
are complete, but some may be incomplete or empty
(18-19)
There are gaps in the probability, impact, and exposure
sections, or many sections are empty
(0-17)
25
Mitigation
The mitigation, contingency, and trigger sections are
complete with details related to the risk
(23-25)
The mitigation, contingency, and trigger sections are
less than complete, and/or have details not related to the risk
(20-22)
The mitigation, contingency, and trigger sections have
few details and information
(18-19)
There are gaps or missing portions in the mitigation,
contingency, and trigger sections of the analysis
(0-17)
25
Earned TotalComments:
100%
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"
https://coursesolver.com/wp-content/uploads/2020/04/csesolpxel-300x52.png00adminhttps://coursesolver.com/wp-content/uploads/2020/04/csesolpxel-300x52.pngadmin2019-06-30 21:38:542019-06-30 21:38:54328: Milestone Three Guidelines and Rubric
I need help with creating a risk management plan. Attached you will find the rubric and guidelines for this project as well as the template that needs to be used. Please follow the rubrics and the scenario below
The scenario of this project is:
Your company is planning to upgrade four computer based training rooms. These rooms currently have 25 computers in each room, each on its own network with each network connected into the central company LAN. You have been assigned the project manager role for this project. Each of the computers in the training room has old software and an out of date operating system. Each computer will be replaced with a new physical machine that includes a new operating system and new training software. The new operating system and software must be compatible with the current company network.
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"
https://coursesolver.com/wp-content/uploads/2020/04/csesolpxel-300x52.png00adminhttps://coursesolver.com/wp-content/uploads/2020/04/csesolpxel-300x52.pngadmin2019-06-30 21:37:422019-06-30 21:37:42risk management plan
Prompt:Using
the budget template provided in the module resources and your chosen final
project scenario, build a proposed budget for your project. Consider all
aspects of your project. Be sure to add notes to the template to provide
reasons for some of the estimates, especially to explain large estimates or
very small estimates (including zero).
Requirements
of Submission: The submission should be completed using the
template provided. All numbers can be reasonable if there is an explanation
describing the reasoning for those estimates.
Instructor Feedback: Students can find
their feedback in the Grade Center.
Critical Elements
Exemplary
Proficient
Needs Improvement
Not Evident
Value
Labor Hours and Cost
Detailed, reasonable estimates of labor throughout all the
project categories
(23-25)
Some estimates reasonable, one to two project categories blank
or unreasonable
(20-22)
One to two project categories completed with reasonable
estimates
(18-19)
Project estimate unchanged or all zeros without explanation
(0-17)
25
Materials and Travel Costs
Detailed, reasonable estimates of materials and travel costs
throughout all the project categories
(23-25)
Some estimates reasonable, one to two project categories blank
or unreasonable
(20-22)
One to two project categories completed with reasonable
estimates
(18-19)
Project estimate unchanged or all zeros without explanation
(0-17)
25
Other Costs
Detailed, reasonable estimates of other costs throughout all the
project categories
(23-25)
Some estimates reasonable, one to two project categories blank
or unreasonable
(20-22)
One to two project categories completed with reasonable
estimates
(18-19)
Project estimate unchanged or all zeros without explanation
(0-17)
25
Risk (Contingency)
Detailed, reasonable estimates of risk and contingency throughout
all the project columns
(23-25)
Some estimates reasonable, one to two project categories blank
or unreasonable
(20-22)
One to two project categories completed with reasonable
estimates
(18-19)
Project estimate unchanged or all zeros without explanation
(0-17)
25
Earned TotalComments:
100%
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"
https://coursesolver.com/wp-content/uploads/2020/04/csesolpxel-300x52.png00adminhttps://coursesolver.com/wp-content/uploads/2020/04/csesolpxel-300x52.pngadmin2019-06-30 21:36:362019-06-30 21:36:36IT 328: Milestone Two Guidelines and Rubric
I need help with this project. Attached you will find the Project budget sheet, what needs to be done is the template has to be filled with numbers (what they could be if this was a real project) You will also find the Attached Rubric so you can know what’s to be done.
The Scenario is
Your company is planning to upgrade four computer based training rooms. These rooms currently have 25 computers in each room, each on its own network,with each network connected into the central company LAN. You have been assigned the project manager role for this project. Each of the computers in the training room has old software and an out of date operating system. Each computer will be replaced with a new physical machine that includes a new operating system and new training software. The new operating system and software must be compatible with the current company network.
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"
https://coursesolver.com/wp-content/uploads/2020/04/csesolpxel-300x52.png00adminhttps://coursesolver.com/wp-content/uploads/2020/04/csesolpxel-300x52.pngadmin2019-06-30 21:35:462019-06-30 21:35:46computer based training rooms
Hope you can help. The question is – “You are planning to take an impromptu guest out for a day of walking and want to consider a potential change in weather that could impact your plans. Beginning on a clear summer morning at a location in Ohio at 42°N latitude, how might temperature, atmospheric stability, and humidity change throughout the next 24 hours, and how could this impact your day of walking? Describe the initial changes relative to temperature, humidity, and stability and determine whether a day of walking would be a good idea or whether you should change your plans.”
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"
Describe thepurposeof the training—be sure to describe the skills that basic users should possess upon completion of the training.
Apply appropriateformattingthat supports basic user skills and needs.
Create instructions for explainingoperationof product or service for basic users.
Select and include appropriate visual representations orgraphicsto support basic user needs.
*This is section two – you helped me with the first section (attached).
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"
https://coursesolver.com/wp-content/uploads/2020/04/csesolpxel-300x52.png00adminhttps://coursesolver.com/wp-content/uploads/2020/04/csesolpxel-300x52.pngadmin2019-06-30 21:34:072019-06-30 21:34:07thepurposeof the training
public class BasicInput { public static void main(String[] args) { Scanner scnr = new Scanner(System.in); int userInt = 0; double userDouble = 0.0; char ch; String s;
System.out.print(“Enter integer: “); userInt = scnr.nextInt(); System.out.print(“Enter double: “); userDouble = scnr.nextDouble(); System.out.print(“Enter character: “); ch = scnr.next().charAt(0); System.out.print(“Enter string: “); s = scnr.next(); System.out.println(userInt+” “+userDouble+” “+ch+” “+s); System.out.println(s+” “+ch+” “+userDouble+” “+userInt); System.out.println(userDouble+” cast to an integer is “+(int)userDouble); return;
}
My values are:
Enter integer: 99 Enter double: 3.77 Enter character: z Enter string: Howdy 99 3.77 z Howdy
The result I get is:
Enter integer: Exception in thread “main” java.util.NoSuchElementException at java.util.Scanner.throwFor(Scanner.java:907) at java.util.Scanner.next(Scanner.java:1530) at java.util.Scanner.nextInt(Scanner.java:2160) at java.util.Scanner.nextInt(Scanner.java:2119) at BasicInput.main(BasicInput.java:12)
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"
https://coursesolver.com/wp-content/uploads/2020/04/csesolpxel-300x52.png00adminhttps://coursesolver.com/wp-content/uploads/2020/04/csesolpxel-300x52.pngadmin2019-06-30 21:33:262019-06-30 21:33:26public class BasicInput