Write a method that computes future investment value  at a given interest rate for a specified number of years. The future  investment is determined using the formula in Programming Exercise 2.21.  Use the following method header: public static double  futureInvestmentValue(double investmentAmount, double  monthlyInterestRate, int years)

6.7 (Financial application: compute the future  investment value) Write a method that computes future investment value  at a given interest rate for a specified number of years. The future  investment is determined using the formula in Programming Exercise 2.21.  Use the following method header: public static double  futureInvestmentValue(double investmentAmount, double  monthlyInterestRate, int years) For example,  futureInvestmentValue(10000, 0.05/12, 5) returns 12833.59. Write a  program that prompts the user to enter the investment amount (e.g.,  1000) and the interest rate (e.g., 9%) and prints a table that displays  future value for the years from 1 to 30, as shown below. First, truncate  the future value values to two decimals (See Chapter 2). Then use the  System.out.printf() method to format the output (See Chapter 4).
Program name:
Lab06.java
Sample Runs:
The amount invested: 1000
Annual interest rate: 5
Years      Future Value
1              1051.16
2             1104.94
3             1161.47
4             1220.89
5             1283.35
6             1349.01
7             1418.03
8             1490.58
9             1566.84
10            1647.00
11            1731.27
12            1819.84
13            1912.95
14            2010.82
15            2113.70
16            2221.84
17            2335.51
18            2455.00
19            2580.61
20            2712.64
21            2851.42
22            2997.30
23            3150.65
24            3311.84
25            3481.29
26            3659.39
27            3846.62
28            4043.42
29            4250.29
30            4467.74

Brushing our  teeth, getting dressed, driving to work, making dinner. These daily  tasks which we complete are all composed of a set of instructions that  starts with a certain action and ends with a certain action

Respond to the discussion about algorithms and their roles below using 150 words or more.
At  the most basic level, an algorithm is simply a set of step-by-step  instructions that we utilize to accomplish a specific task. We use  algorithms every single day in our day-to-day activities: Brushing our  teeth, getting dressed, driving to work, making dinner. These daily  tasks which we complete are all composed of a set of instructions that  starts with a certain action and ends with a certain action.
In  the realm of computer programming, algorithms are utilized to enhance  the efficiency, effectiveness, and functionality of the programs we  create. Two such types of algorithms are searching algorithms and  sorting algorithms.
Sorting  algorithms are designed to sort an array of objects into a specific  order. Searching algorithms are designed to compare the elements of an  array to find a particular value within an array of objects. Just a few  examples are search engines, the sorting of a business’ online item  inventory, and sorting/searching a database of students who attend a  university.
There  are multiple approaches which people have taken to solve the issue of  sorting and searching an array of items. Two frequently used searching  algorithms are linear search and binary search. Three frequently used  sorting algorithms are insertion sort, selection sort, and bubble sort.
Each  of these types of algorithms have both pros and cons associated with  them. The main properties that we want to keep an eye on when choosing  an algorithm are memory usage, maintainability, and time complexity. It  is always best to assess the situation and to use discretion when  choosing which algorithm that we want to implement into our program.

Part 1) Project Management: What is a project, and what are its main attributes?

Part 1) Project Management: What is a project, and what are its main attributes? How is a project  different from what most people do in their day-to-day jobs? Discuss the  importance of top management commitment and the development of standards for successful project management. Provide examples to  illustrate the importance of these items based on your experience on any  type of project. Discuss the unique challenges that an IT project  presents.
Min 300 words 2 references
Part 2a “Data Warehouse Architecture”  (2 pages): Explain the major components of a data warehouse  architecture, including the various forms of data transformations needed to prepare data for a data warehouse. Also, describe in your own words current key trends in data warehousing. 
part 2b “Big Data” (2 pages):  Describe your understanding of big data and give an example of how you’ve seen big data used either personally or professionally. In your view, what demands is big data placing on organizations and data management technology? 
part 2c “Green Computing” (3 pages):   One of our topics in Chapter 13 surrounds IT Green Computing. The need  for green computing is becoming more obvious considering the amount of power needed to drive our computers, servers, routers, switches, and data centers. Discuss ways in which organizations can make their data centers “green”. In your discussion, find an example of an organization that has already implemented IT green computing strategies successfully.  Discuss that organization and share your link.
3 scholarly references. APA formatting.
Part1 and part2 need to be separately attached.

Overview This phase of the project completes the design phase and develops a bus

Overview
This phase of the project completes the design phase and develops a business continuity and disaster recovery plan for the final solution. This phase of the project must include the secured design diagrams that minimize risk and appropriately address the threats identified in Project 1: Problem Identification Assignment. Threats from “distributed denial of service attacks” – include semantic attacks and brute force attacks. And also Man in the middle attack from include semantic attacks and brute force attacks.
Any single points of failure must be addressed with appropriate fault-tolerant designs. Solutions must parallel the analyzed solutions. For example, if vulnerability was determined between 2 network gateways, a solution could include a virtual private network (VPN) with appropriate public key infrastructure (PKI) and certificates. If a man-in-the-middle network attack is a threat, Dynamic ARP Inspection and DHCP Snooping features on networking equipment can be indicated in the network design diagram to prevent these attacks.
Instructions
Each design must be justified by the textbook and peer-reviewed research. You will be evaluated based upon the appropriate security solutions to the identified problem. The final design must seek to construct the appropriate controls for the target given various, regularly used vulnerabilities. For example, if the target is availability and the vulnerability is connection flooding (e.g. SYN flood), appropriately designed solutions would likely include the minimum controls of an intrusion detection system (IDS), firewall, access control list (ACL) on the border gateway/router, and a honeypot to counteract unauthorized attempts. A design diagram must properly illustrate this secured solution, and the author must subsequently explain each dimension of the security strategy.
Current and proper APA formatting is required and must include a title page, proper margins, citations, organization, proper grammar and spelling, and an ending resources page.
At the minimum, this phase of the project must include:
I. Executive summary and introduction
II. Systems Design
a. Detail the final systems design, supporting the results given the original review of the literature and the analysis performed in Project 2: Methodology Development Analysis Assignment
b. Design the final solution
i. Target of the attack
ii. Vulnerability
iii. Control
c. Create the appropriate design diagrams for the secured solution
d. NOTE: Required minimum length (8 peer-reviewed sources and at least 10 double-spaced, current APA-formatted pages) in the grading rubric excludes all systems analysis and design (SAD) diagrams and any other tables and/or graphical elements
III. Business continuity and disaster recovery plan (must be supported by relevant and current research from scholarly, peer-reviewed journals)
a. Basic BCP Policy
b. Basic business impact analysis (BIA)
c. Preventative measures
d. Recovery and restoration
IV. Project conclusion
a. Summary of the solution
b. Future recommendations and implications for business
c. Final project conclusion
V. Diagram examples in this phase could include but are not limited to:
a. Secured and hardened advanced system and/or network architecture diagrams
b. Secured package, design class, system security, and system control diagrams
c. Secured CPU/Memory/OS buffer, segmenting, address, and/or data bus mappings
d. NOTE: A minimum of 5 diagrams exist that accurately analyze a secure system, network, and/or application solution. Within EACH of the 5 diagrams, a minimum of 10 elements exist that accurately detail analysis of the environment that needs securing (Note, if 10 elements are not necessary in a diagram, add diagrams as needed to sufficiently meet this requirement). Each diagram is thoroughly developed based upon existing architecture and/or applications. Each diagram meets the associated technical requirements, programming language, notations, formatting, and modeling rules of the language (e.g. UML), industry standards for the diagram, and/or literature review. Analysis and design diagrams must have an associated industry standard that is widely accepted to be recognized (e.g. UML).
Note: Your assignment will be checked for originality via the Turnitin plagiarism tool.
Project 1: Problem Identification Assignment. 
Threats from “distributed denial of service attacks” – include semantic attacks and brute force attacks. And also Man in the middle attack from include semantic attacks and brute force attacks.
Project 2: Methodology Development Analysis Assignment – Communication and interoperability with existing networks must be protected by the NGN’s security architecture NEXT GENERATION NETWORK (NGN)

There are various resources where you can find information on recent cyber threa

There are various resources where you can find information on recent cyber threats, for example:
https://infosecindustry.com/news (Links to an external site.)
https://security.didici.cc/news (Links to an external site.)
https://cyware.com/cyber-security-news-articles (Links to an external site.)
(Links to an external site.)https://threatpost.com/ (Links to an external site.)
https://portswigger.net/daily-swig/europe (Links to an external site.)
Have a look at these resources, (or any other resources that you identified). Write an article discussing 5 threats that you found interesting.
The article should include the following information:
Choose 5 topics from list below, and describe one interesting threat on each topic:
Physical security
IAM
Asset (including data, operating systems, endpoints, etc)
IoT
Web application
Network
Malware
Others (you may decide yourself)
For each threat, describe:
Resources you used;
What is it about, which topic (see the list above) it covers;
Why interesting;
Which vulnerability is involved;  what is its CVSS value? use the calculator (https://www.first.org/cvss/calculator/3.0) ; motivate the CVSS values;
Describe at least one incident associated with this threat;  explain its impact on CIA; and give suggestion on possible mitigations.
Each threats should be described at about two A4 pages.  So in total, the body of this document should be about 10 pages, excluding citations.

I want you to create something based on what you’ve learned so far in this cours

I want you to create something based on what you’ve learned so far in this course
Visit https://corallanguage.org/simulator/ and write a program using:
variables
branches
loops
arrays
functions
Come up with your own program that contains your own user-defined functions and variables. Be creative. No need to be too complicated but be a useful program with a function and array.

A small enterprise has decided to implement a Customer Relationship Management (

A small enterprise has decided to implement a Customer Relationship Management (CRM) system. Your task is to introduce a system to the enterprise. Research and prepare a presentation that describes the main features of the system and how that enterprise will benefit from it.
Your presentation should:
Be 9-10 slides in length (not including title and reference slides); each slide should have four to six bullet points.
Include presenter’s notes for each slide to further detail the key text that is included on each slide.
The “Best Databases for Information Technology” (Links to an external site.) is another resource that will assist you in developing your presentation.
Requirements: 9-10 slides   |   .ppt file

Prepare a comparison study among various firewall simulation tools that are avai

Prepare a comparison study among various firewall simulation tools that are available in security research. You are required to describe tools first (features, functionalities, supported application/platform, cost, etc.) and then prepare a comparison table based on various metrics. You are required to provide references at the end of the answer to all the tools that you found. You are required to provide URL (reference) regarding how to access that tool.
You are required to compare at least three firewall rules visualization and/or simulation tools( One tool can be the software that we used in the security lab). You need to clearly mention the comparing criteria among these mentioned tools (and why you choose them) and then show the table.

Discussion: We  develop good DR plans and some of those plans will include a rem

Discussion:
We  develop good DR plans and some of those plans will include a remote  recovery site (hot or cold). How do we ensure that the remote site is  protected like we would the main location? Discuss the challenges of  maintaining information security at a remote recovery location.   ***Standard for all discussion posts:   Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:    
Ask an interesting, thoughtful question pertaining to the topic 
Answer a question (in detail) posted by another student or the instructor 
Provide extensive additional information on the topic 
Explain, define, or analyze the topic in detail 
Share an applicable personal experience 
Provide  an outside source (for example, an article from the UC Library) that  applies to the topic, along with additional information about the topic  or the source (please cite properly in APA 7) 
Make an argument concerning the topic 
At  least one scholarly source should be used in the initial discussion  thread. Be sure to use information from your readings and other sources  from the UC Library. Use proper citations and references in your post.  
Portfolio assignment:
Review  over the DR template and pick an industry such as (airlines, ecommerce,  banking, etc.).  Within that industry, pick a specific organization for  the development of the Disaster Recovery Plan such as Healthcare –  Physical Therapy Clinics – ATI.   Pick  an industry/company to focus on for this assignment.  Based upon the  given information you can find on the company and any past  issues/breaches the company has gone through, create a Disaster Recovery  plan using the template provided.   Project selection is submitted for approval.    ***Standard for all Research Assignments   Your paper should meet the following requirements:   
Be approximately four to six pages in length, not including the required cover page and reference page.
Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
Support  your answers with the readings from the course and at least two  scholarly journal articles to support your positions, claims, and  observations, in addition to your textbook. The UC Library is a great  place to find resources.
Be  clearly and well-written, concise, and logical, using excellent grammar  and style techniques. You are being graded in part on the quality of  your writing.
Assignment:
Using the attached document, research and describe a selected automated IT security policy compliance system

All posts must be a minimum of 250 words. APA reference. 100% original work. no

All posts must be a minimum of 250 words. APA reference. 100% original work. no plagiarism.
1. Briefly discuss how the concept of workstation domains figure into your organization’s security policies, please list your references
2. Briefly discuss how the concept of LAN domains figure into your organization’s security policies, please list your references