How so I write an application that displays a series of at least four survey

How so I write an application that displays a series of at least four survey

questions ; the survey can be on any social or political topic you like. Each questions should have two possible numeric-choice answers. At the end of the survey, use a dialog box to ask whether a user wants to (1) enter another set of responses to the same questions, or (2) quit. Continue to accept sets of responses until the user chooses to quit. Then display the results of the survey – for each question indicate how many users chose the first option or second option. Format the output in an order way which is user-friendly and is easy to digest.

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"

Every website or application needs to be concerned about its availability,

Every website or application needs to be concerned about its availability, some more than others. The nature of an

application, its number of users, and the uptime both an organization and its users expect are a few of the factors that shape a website’s availability needs. Financial websites and applications, in particular, must make high availability a major priority, but non-financial sites and applications may be hit just as hard by unacceptable downtime.

“Acceptable downtime” and “acceptable loss” are defined as the RTO and RPO, respectively. Altering these values can dramatically affect the nature and cost of a highly available architecture, and this is perfectly reasonable. A bank with hundreds of thousands of customers is both better equipped and more motivated to ensure that its customer-facing web applications are more available than a hobbyist selling five or six collectable sports cards per week.

Choose a non-financial website/application that you think would benefit from being highly available. Then, assume that the company that manages the site/application has contracted with you to design a highly available system.

Post a response that:

  • Describes the website or application you have chosen, and include a link, if available
  • Describes an appropriate availability architecture that would address the needs of the website or application, including appropriate RTO and RPO estimates
  • Explains why the architecture you chose will recover quickly enough to meet the suggested RTO
  • Explains why the architecture will reduce data loss to satisfy the RPO
  • Includes compelling arguments that support your answer

Cite your sources, including any of the readings you reference in the Discussion.

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"

With an unlimited budget, you could provide nearly unlimited availability

With an unlimited budget, you could provide nearly unlimited availability. However, real-world businesses are

limited by financial constraints. Assume, for the moment, that you are the manager of a data center, and you have a fixed budget to improve the availability of its systems. The budget will not allow you to heavily invest in all the components of a reliable system (servers, network connectivity, storage, system administration, documentation, training, testing, etc.). Therefore, you need to determine which upgrades would result in the largest gains in availability at the lowest cost.

 

Identify the single component in which you would invest most heavily, and explain why you think this upgrade would best improve the availability of the system. Additionally, explain why you chose to invest less heavily in any two other components.

Cite sources

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"

PPI management wants a description of the customer support system (CSS) project goals, high-level plans,

PPI management wants a description of the customer support system (CSS) project goals, high-level plans, and the

membership of the project team responsible for developing the CSS.

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"

This question was created from Case Study

This question was created from Case Study https://www.coursehero.com/file/23612961/Case-Study/

23612961-123645.jpeg

23612961-123645.jpeg
 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"

This question was created from Case Study

This question was created from Case Study https://www.coursehero.com/file/23612961/Case-Study/

23612961-123646.jpeg

23612961-123646.jpeg
 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"

Financial and government organizations store a good deal of personal information

Financial and government organizations store a good deal of personal information, such as Social Security numbers,

birth dates, and addresses. As a result, they have been attractive targets for hackers. Because most of these institutions have improved their access controls, hackers may choose instead to attack organizations with similarly valuable data but lower security.

Read the Case Study at the end of Chapter 7.

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"

The probability of a risk is not the only metric in determining what risks to mitigate

The probability of a risk is not the only metric in determining what risks to mitigate. The cost and time

associated with the risk, and the overall impact to the organization are some of the factors that must be considered as well.

Think about the following four types of vulnerabilities:

  • Behavioral and attitudinal vulnerabilities
  • Misinterpretations
  • Coding problems
  • Physical vulnerabilities

Consider the IS of a large hospital and provide a specific example of each of the four types of vulnerabilities. Estimate the likelihood and cost of each risk (as low, medium, or high) and explain your reasoning. If an organization were to try to focus on the vulnerability that would be the least expensive to address while providing the most reward, which would it be? Why?

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"

Organizations need to be concerned with breaches of security from internal sources

Organizations need to be concerned with breaches of security from internal sources as much (if not more) as from

outside sources. Employees and consultants in an organization often need sensitive information. How can the organization provide access, but still protect against improper usage of this information?

Read the Case Study at the end of Chapter 10.

  • Determines what steps you would recommend for the company to ensure that their security policies are not violated.
  • One of the CEO’s goals is to keep from burdening the employees with too much overhead, so be sure to find a balance between ease of access and formal security measures.

Case Study

Case Study Part 1.png

Case Study Part 2.png

Case Study Part 1.png

CASE STUDY In March 1994, Randal Schwartz was indicted on three
felony counts under the Oregon State Computer Crime Law
and sentenced to 5 years of probation, 480 hours of commu-
nity service, 90 days of deferred jail time. $68,000 of restitu-
tion to Intel. and disclosure of full details surrounding
conviction to any future employer. The complaint against
Randal Schwartz was brought by Intel Corporation, a multi-
national microchip manufactnrer. The charges related to
altering two computer systems without authorization and accessing a computer with intent to commit theft. Randal
Schwartz is a perfect example of someone who does not fit into the stereotype of hackers. Anyone familiar with Perl
will know Schwartz as the author of the definitive Perl instruction guide, Ranting Perl. Schwartz is a frequent
columnist for such technical magazines as Unix Review and Web Techniques.
Randal Schwartz was a consultant for Intel in Oregon for three years before the indictment. Schwartz’s crimes

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"

import java.io.BufferedReader

import java.io.BufferedReader;

import

java.io.IOException;

import java.io.InputStreamReader;

import java.util.ArrayList;

public class Ex02 {

public static void main(String[] args) throws IOException {

BufferedReader userInput = new BufferedReader

(new InputStreamReader(System.in));

ArrayList<String> myArr = new ArrayList<String>();

myArr.add(“Zero”);

myArr.add(“One”);

myArr.add(“Two”);

myArr.add(“Three”);

System.out.println(myArr.get(6)_;

}

}

Starting with this provided code, add the following functionality:

1.   Use a Try/Catch block so that the exception is caught and the program exits a bit more gracefully. Save this file as TryCatch.java. (Be sure to rename the Public Class accordingly.)

Starting with the provided code again (without the Try/Catch block), fix the code so that it runs correctly. That is to say, it should display the last item in the ArrayList. Save this file as Fixed.java.

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"