Part 1
Quick Start Guides
write a quick start guide. This discussion topic is designed to help you become more familiar with what a quick start guide is and what its function is in technical writing.
To learn about quick start guides, please examine the three resources provided in Content in week 3:
What is a Quickstart Guide?
Quick Reference Guides Right Where You Need Them
Technical Writing Tips: The 80/20 Rule
You might also benefit from looking at the Sample Quick Start Guides in Learning Resources in week 3. While these quick start guides are longer than the one you will be writing, they present different strategies for incorporating text and images to accommodate their users.
Then answer the following questions. Your answers can be 2-3 sentences:
Most quick start guides are one page long. They have to be one page so that the user can look at them at a glance. What are some of the challenges to reducing a set of instructions of, for example, 3-4 pages into one page?
How does the 80/20 rule relate to the usefulness of quick start guides?
In your experience, when you purchase a product or a new piece of software, do you tend to use the user manual more, or do you tend to use the quick start guide more? Why?
Part 2
Preparing for WA4, the Report to the Supervisor
Please read the instructions for that assignment. Then answer the following questions:
You have just been hired as Assistant Manager at Work ‘N Suds. Please write a one-paragraph (3-4 sentences) summary of the problems you see in the company, according to the scenario.
In UMGC’s OneSearch interface, find one article on the concept of cross-training for employees in an organization. Keep in mind that some articles might spell the term with a hyphen (cross-training) and some might spell it without a hyphen (cross training). Provide the author(s) and title of the article.
From your search from task #2 above, select Resource Types, then select Articles, and then select Peer Reviewed (Scholarly) Journals.
Select one article in your search list and provide the author(s) and title of the article. If you do not see any hits, reword your search terms. If you still receive no hits after rewording your search terms, then indicate what search terms you used.
Select one of the other concepts mentioned in the writing assignment instructions (mandatory vacations, cyberscurity in video surveillance systems, handling of credit cards, or any other concept). Then, in UMGC’s OneSearch interface, find one article on this concept. Provide the author(s) and title of the article.
This question involves listening to a part of the podcast, “Cyberbit Podcast Episode 1: The Unspoken Skill-Gap in the Cybersecurity Market,” which features Mr. Adam Bricker, former co-founder of Carolina Cyber Center and Mr. Sharon Rosenman, Chief Marketing Officer at Cyberbit.
The segment of the podcast we will listen to is from the 48:00 mark to the 50:30 mark. In that segment, a participant asks a question about writing in the cybersecurity field. The following link takes you directly to that question and Mr. Bricker’s response:
The Unspoken Skill-Gap in the Cybersecurity Market, 48:00 mark(https://www.youtube.com/watch?v=1-IMz_EXcas&t=2880s)
Mr. Bricker describes the type of technical communication that individuals in the cybersecurity field need to be able to produce.
How does his description fit the scenario with Mark Carman and Work ‘N Suds? In other words, who is the audience for writing assignment #4, and how does Mr. Bricker’s explanation align with the scenario?
Category: Computer Science homework help
Create a bash script for changing root password for list of servers Input :- re
Create a bash script for changing root password for list of servers
Input :- read list of servers from a file, take password for user1, root password & new root password.
The script should loop through all the servers in the input file
login to server as user1
Then log as root (su -)
should take password directly from the inital input
Echo ” logged in as root and display server name”
Change root password with new passsword
Check if password change was successful and display output (success or failure)
sample change on one server:-
ssh user1@server01
Password of user1
[user1@server01]$su –
root password(this should directly take from input)
[root@server01 ~]# passwd
Changing password for user root.
New password:
Retype new password:
passwd: password successfully changed for root
passwd: all authentication tokens updated successfully.
A company has a potential case involving their trademark. Describe some ste
A company has a potential case involving their trademark. Describe some steps you might suggest at a meeting with the officers of the corporation to investigate a crime involving trademark infringement. What if it were a sexual harassment case? What are the similarities or differences between the two types of cases?
Describe the steps you would suggest for investigating a corporate espionage case.
When you’re searching for contractors, consultants, business partners, soft
When you’re searching for contractors, consultants, business partners, software, and hardware, what are some methods you use? Be very specific and detailed in how you research these resources and give more than one example (contractor and software search, for example).
What method do you use for keeping track of your contacts and leads?
Once you have a list of resources, how do you decide which to recommend to your company to select for your project? (If you have never done this, research a methodology and report on how you plan to do it.)
If you are selecting contractors, consultants, or other human resources, recommend an interview process and gather the costs.
If you are looking at software, hardware, or other non-human resources, talk about how you determine the most value to the company for the money. The company is making an investment; how do you determine the best investment for the greatest return? (Be specific on the methodology you use or would use.)
After responding to the above, write an additional paragraph on why you think your recommendation should be followed and how you can be confident that your recommendation is best for your organization.
One of your continuing clients has engaged you to conduct a wireless assessme
One of your continuing clients has engaged you to conduct a wireless assessment and penetration test of their infrastructure. Your client has asked you to brief them on the methodology you will use and the tools you would select to complete this engagement.
Briefly, lay out your proposed methodology with a brief explanation of each step and any tools you would use to support a given step.
200-250 words
Conduct an online search for an article that discusses some of the hot trends a
Conduct an online search for an article that discusses some of the hot trends and emerging aspects of networking such as IoT, machine learning, or Wi-Fi 6.
In your initial post, explain why you believe these trends are important in the ever-changing world of computer networks and business. Additionally, highlight two examples of these emerging technologies in networking that you engage with (or would like to engage with) on a frequent basis.
In response to two of your peers, discuss the possible positive and negative aspects of whatever technology your peers chose.
NO AI NO PLAGIARISM NO REFERENCES NO CHAT GPT Minimum 50 words per response:(Wh
NO AI
NO PLAGIARISM
NO REFERENCES
NO CHAT GPT
Minimum 50 words per response:(What are your thoughts)
1) A parameter and an argument are both key concepts when working with functions in programming, but they aren’t the same. The parameter is a placeholder in a function’s recipe. When you write a function, you define what parameters it needs. For example, if you have a function def add(a, b):, a and b are the parameters. They are like empty slots waiting to be filled with actual values when you use the function. An argument is the actual value you plug into the parameters when you call the function. So, if you call add(3, 5), the numbers 3 and 5 are the arguments. They fill in the placeholders (a and b) in the function’s recipe. When you call a function, the arguments you provide match the parameters defined in the function. For example, in add(3, 5), 3 fills in for a, and 5 fills in for b. Parameters are the names you set up when you define the function. Arguments are the actual values you pass in when you use the function. So, parameters are like the instructions in a recipe, telling you what kind of ingredients you need, and arguments are the specific ingredients you use when you’re making the dish. You can change what a function does by giving it different arguments. In the PrintPizzaArea the diameter is the parameter and the argument would be the number value 12.
2) A parameter and an argument, though closely related, serve different roles in the context of functions in programming.
Parameter: A parameter is a variable defined in a function’s declaration or definition. It acts as a placeholder for the value that will be passed to the function when it is called. Parameters define what kind of input the function expects to receive and are essential in determining how the function will operate on the provided data. For example, in the function definition def calculate_area(radius), the radius is the parameter.
Argument: On the other hand, an argument is the actual value or data you pass to the function when you call it. Arguments are the exact inputs that the function uses to perform its operations. Continuing the previous example, if you call the function calculate_area(5), the value 5 is the argument.
Relationship and Differences: Parameters and arguments are intrinsically linked. Parameters exist within the function’s definition, outlining the type and number of inputs the function expects. Arguments are the actual values provided to these parameters during function invocation. Without parameters, a function cannot accept arguments, and without arguments, a function with parameters cannot execute meaningfully.
When evaluating activity 4.1.3 and understanding the parameters of the function: Parameter for PrintPizzaArea: In the function definition, it might look something like def PrintPizzaArea(diameter):. Here, diameter is the parameter.
In summary, parameters are variables in the function definition that specify what kind of data the function can accept, while arguments are the actual data provided to these parameters when the function is called. This relationship enables the function to process different inputs dynamically, making programming more flexible and powerful.
Write a research paper that contains the following: 1) Define and describe the
Write a research paper that contains the following:
1) Define and describe the process of “rightsizing.”
2) Research and discuss a lawsuit that a company has lost for failing to support web accessibility for all users.
3) Define and describe green computing. Evaluate the impact green computing issues are having on customer buying decisions.
Research Paper Requirements:
The paper should be four pages long, not including the title and reference pages.
Use Times New Roman, size 12 font throughout the paper.
Apply APA 7th edition style and include three major sections: the Title Page, Main Body, and References.
A minimum of two scholarly journal articles (besides your textbook) are required.
Writing should demonstrate a thorough understanding of the materials and address all required elements.
Writing should use exceptional language that skillfully communicates meaning to the readers with clarity and fluency and is virtually error-free.
Note: plagiarism check required, APA7 format, include References, within 8hrs
Instructions Hello Class! Welcome to Week # 3. This week’s assignment will he
Instructions
Hello Class!
Welcome to Week # 3. This week’s assignment will help you to fulfill the requirements for the third course objective (CO-3: Prepare a plan to manage functions that encompass overseeing a program or technical aspect of a security program at a high level ensuring currency with changing risk and threat environments). For this week’s assignment instructions, please see below:
Assignment Instructions:
You are tasked as the Chief Information Security Officer for a large Fortune 500 International Firm to plan, develop and manage the functions that oversee a new large scale Cybersecurity program. The large scale Cybersecurity program will be a “Digital Blackwater” type organization (see the description below of “Private or Mercenary Armies” from the textbook).
For the purpose of this assignment, you are to search the Internet and utilize course reading materials to research the types of functions, strategies and tactics this organization will use for this new program. Use your imagination and name your proposed organization and follow the requirements below:
REQUIREMENTS:
4 – 6 Pages in length in APA format (not including a cover page and reference section)
Cover Page
Introduction – Firm name and overview of its purpose
Technical organizational proposal:
Value proposition for the new organization
Functions of the organization including management
How the organization will address dynamic Cyber risk and threat environments
Strategies and tactics the organization will employ
Proposed benefits for the U.S. government
How will the organization make a profit
Reference Section
MISCELLANEOUS:
Use current and real world data to make your points, not just the textbook
Your references should not be more than 5 years old
Your assignment is due by Sunday not later than 11:59 p.m. Eastern time.
Private or Mercenary Armies
In an age where cyber warfare is more common than the physical battlefield, it may be necessary for the private sector to stop playing defense and go on offense, Gen. Michael Hayden said on August 1, 2011. Hayden, who led the National Security Administration and Central Intelligence Agency under president George W. Bush, said during a panel discussion at the Aspen Security Forum in Aspen, Colo. that the federal government may not be the sole defender of private sector companies—and that there is precedent for such action. “We may come to a point where defense is more actively and aggressively defined even for the private sector and what is permitted there is something that we would never let the private sector do in physical space,” he said. “Let me really throw out a bumper sticker for you: how about a digital Blackwater?” he asked. “I mean, we have privatized certain defense activities, even in physical space, and now you have got a new domain in which we donot have any paths trampled down in the forest in terms of what it is we expect the government—or will allow the government—to do”. Blackwater is a private military contractor that has changed its name to Academi after incidents in Iraq gave them a negative image. If companies decide to hire forces (hackers) to strike back or conduct recovery operations it could change the cyberspace battlefield dramatically (Winterfield and Andress, 2013).
Instructions Learning from a Power Grid Attack This week’s assignment we are
Instructions
Learning from a Power Grid Attack
This week’s assignment we are going to investigate an extremely detrimental attack that took place and involved SCADA and ICS systems. The incident we are going to research is the attacks against the Ukrainian Power Grid.
Assignment Guidelines
Step 1: Obviously our first step is to start researching the various attacks against the Ukrainian Power Grid. What information is out there, can we assign the source of the attacks with certainty?
Step 2: Once you have completed your research you will want to breakdown the underlying attacks, lessons that can be learned from those attacks, and how likely it is that the source of the attacks could succeed in doing the same thing to the United States.
Step 3: Once you have gathered up all the information you will compile the data into Word document of approximately 5-7 pages of content, excluding the cover page, references, etc. Make sure you address the incidents and the likelihood of the threat towards the United States.