Description
- Define a preliminary scope statement for a project to build a simple interactive web site for this class. The web site should be accessible only by current students and instructors. The web site should allow students access to all the material presented in the class, including lecture slides and notes, extra reading, the course schedule, a chat room, a frequently asked questions section, grades, informative links, and the syllabus.
DONT BID IF YOU DONT UNDERSTAND THE QUESTION, OR ELSE I WILL WITHDRAW IMMEDIATELY
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Explanation & Answer
Review
Review
Anonymous
Just what I was looking for! Super helpful.
Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Most Popular Content
University of Cumberlands Security Architecture and Design Course Question
Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have t ...
University of Cumberlands Security Architecture and Design Course Question
Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references. Question:Given multivariate, multidimensional events generated by adaptive human agents, perhaps it would not be too far a stretch to claim that no two events are precisely the same. Given the absence of actuarial data, what can a poor security architect do?
ITST 1136 CSCC Terminal Window Home Directory & Command Opens Lab Report
General Instructions -Follow all of the instructions exactly and answer the questions along the way. -Perform only the t ...
ITST 1136 CSCC Terminal Window Home Directory & Command Opens Lab Report
General Instructions -Follow all of the instructions exactly and answer the questions along the way. -Perform only the tasks that are indicated.Doing anything more or anything less may cause subsequent answers to be incorrect. -Submit this lab to the appropriate area on Blackboard when you are done. -If a question asks you what command you typed, provide the command exactly as you entered it in the terminal window. -If you are prompted to type an underlined expression into a text file, type exactly that expression, including capitalization, punctuation, spacing, etc. -Record your answers in a different color font.Upload in a .docx or .doc format Section 1 In this section, you’ll learn how to do the following things in vi: ocreate a new file or open an existing one oinsert text using the i key oundo actions with the u and U keys oappend text with the a key osave and quit. 1.Open a terminal window on your Pi and navigate to your home directory. 2.Type the following into the terminal and press Enter: mkdir ITST_1136_Lab_10 3.Navigate into the directory you just created. 4.Type the following into the terminal and press Enter: vi stuff.txt This command opens stuff.txt in the vi editor.You should see a cursor, a bunch of stacked tildes (~) underneath it, and at the bottom of the terminal you should see “stuff.txt” [New File].The tildes represent empty lines (lines with nothing on them, not even whitespace). 5.Press the lowercase i key. Nothing should look different on the screen yet, but this is an absolutely necessary and critical step you just did. 6.Type the following expression: Hello! 7.Look closely at what you just typed and hit the Esc key.What happened? 8.Press the lowercase i key and type the following expression:This is line 1, correct? 9.What exactly does the full line of text say now? 10.If done correctly so far, the text displaying on the screen will not be what we intended. Press the Esc key. 11.Press the lowercase u key.What happened? 12.Look closely at the text displaying near the top and press the lowercase a key.What happened? 13.Type the following expression (notice the blank space before the “S”): So, is this line 1? 14.Press the Esc key.What does the text file say now? 15.Press the uppercase U key.What happened? 16.Type a colon character followed by a lowercase q.:q Press Enter.What happened? 17.It looks like vi is forcing you to save your work.At this point you have three options: a.Type :q! and press Enter.This will quit without saving anything. b.Type :w and press Enter to save, then type :q and press Enter to quit. c.Type :wq and press Enter to save and quit using only one command. Pick one of the options and do it.It doesn’t matter which one. Section 2 In this section, you’ll learn how to: omove the cursor around the vi editor oinsert new lines of text odelete individual and multiple characters odelete individual and multiple words odelete individual and multiple lines odelete all text from the cursor to the end of the line odelete all text from the beginning of the line to the cursor 18.You should be back in your ITST_1136_Lab_10 directory after finishing the final step in Section 1.If you are not in that directory for whatever reason, navigate to it before proceeding. 19.Download the file block.txt, which contains a large block of uninspired text, from Blackboard if you haven’t already.Move the file into the ITST_1136_Lab_10 directory if it isn’t already there. 20.Open block.txt in the vi editor.What command did you type to do this? 21.Press the lowercase j key a few times.What happens when you do this? 22.Now press the lowercase l, k, and h keys until you figure out what they do.What do they do?(Be specific about which one does what!) 23.Move the cursor near the middle of any line of text. 24.Press the $ key (Shift+4).Where did the cursor go? 25.Press the ^ key (Shift+6).Where did the cursor go? 26.You should now know how to move the cursor around in the vi editor. NOTE:In some vi installations, most likely also including the one on your Pi, the arrow keys also allow you to move the cursor around the editor.But you must be in command mode for it to work! 27.Move the cursor to line 4 (“Thhe first word…”), then move the cursor so that it is positioned under one of the “h” characters in the word “Thhe” at the beginning of the line.It doesn’t matter which one. 28.Press the lowercase x key.What happened? 29.Move the cursor to line 6 (“And another line…”) and then move the cursor so that it is directly under the “l” character of the first occurrence of the word “line”. 30.Press the lowercase d key, followed immediately by the lowercase w key.What happened? 31.Move the cursor so that it is anywhere on the line of text that says “I am a line of text to be deleted!” 32.Press the lowercase d key twice in a row.What happened? 33.Now press the lowercase p key.What happened?(Be specific about location!) 34.Play around with the following commands in the text file and state what each one of them does.You should already know the first two.Be specific in your answers.For example, instead of saying “deletes a few things,” be specific about which things and how many.(Hint #1: Scroll up and look at the list of things you’ll learn in Section 2.)(Hint #2: Each time you run one of the below commands, undo it [lowercase u] to make this easier on yourself.) a.dw b.dd c.d^ d.2dd (also d2d) e.d$ f.3dw (also d3w) g.5x h.Based on what you learned in this exercise, give a command you could use to delete 4 lines at once: 35.Move the cursor as far down as you’re able to. 36.Press the uppercase O key and start typing anything you want.Where is this new text being placed in relation to where the cursor was before you pressed O? 37.Press the Esc key and move the cursor as far down as you’re able to. 38.Press the lowercase o key and start typing anything you want.Where is this new text being placed in relation to where the cursor was before you pressed o? Turn this lab in to the designated area on Blackboard by the deadline in order to get credit! This lab barely scratched the surface of what’s available in vi.For more vi/vim resources: oman vi oCheck the cheat sheet and quick reference documents on Blackboard ohttps://www.openvim.com/ ohttps://course.ccs.neu.edu/cs3650/parent/help/vitutor.vi
23 pages
Updated File
Purpose: In this lab, you will use PowerShell to create a virtual machine in our Azure environment. At the start of the la ...
Updated File
Purpose: In this lab, you will use PowerShell to create a virtual machine in our Azure environment. At the start of the lab, you are given a single ...
CSIA 300 UMGC W7 PCI Mobile Payment Acceptance Discussion
This week your rotation assignment takes you to the Office of the Chief Financial Officer (CFO).An external audit of the c ...
CSIA 300 UMGC W7 PCI Mobile Payment Acceptance Discussion
This week your rotation assignment takes you to the Office of the Chief Financial Officer (CFO).An external audit of the company's financial operations has just been completed. Last week, an "early look" copy of the audit was sent to the CFO with a request for a formal written response for each of the findings. Some of the problem areas were known to the CFO's staff and they were already working on the required responses. But, there is one set of findings that came as a complete surprise -- Shadow IT -- the unauthorized / unapproved use of cashless payment technologies by certain locations and offices within the company. These technologies included:1. Micro payments using a payment card issued by guest services to hotel guests and via unattended vending machines to visitors. These payment cards are loaded with a cash value deposited to the card's account via a credit card charge. Guest services also credits some of these payment card accounts with "reward dollars" for guests who belong to the hotel's affinity program. The payment cards are used at service locations which do not have a cashier station. e.g. game arcade, self-service laundry or sales kiosk, etc. The payments are processed by a third party service provider which then uses an electronic funds transfer to pay the hotel its share of the income.2. Mobile Payments for services booked through the concierge desk with an authorized but independent provider (not a hotel employee). These services include: private lessons with a tennis or golf pro, childcare, tours and tour guides, interpreters, etc. These payments are made by cell phone either as a mobile payment using a contactless payment system such as Apple Pay or by swiping a credit card through a magnetic stripe reader connected to the provider's cell phone. The payment accounts which receive the guests' payments are connected to the hotel's merchant card accounts. The hotel pays the providers monthly via electronic deposit and issues an IRS Form 1099 to record the income.The CFO must make a presentation to the IT Governance board about these payment systems as a first step towards either getting approval for continued use or issuing a "cease and desist" directive to force the rogue offices and locations to stop using the unapproved payment systems. The presentation must include information about known or suspected compliance issues for PCI-DSS. The IT Governance board has previously asked project sponsors for information about potential privacy and security issues.Due to the size and complexity of the problem, the CFO has split the available staff into two teams. Team #1 will focus on the micro payment cards. Team #2 will focus on the mobile payment systems. You have been asked to join one of these two teams and assist with their research. (Note: you *must* pick one and only one of the two technologies to focus on for your discussion paper this week.)Your team leader has asked you to read the provided background information (see the Week 7 readings) and then put together a 2 page summary of the important points from your readings. You have also been asked to help identify and describe / explain 5 or more privacy and security issues that could arise in conjunction with the use of the technology being studied by your team. Remember to keep your focus on the financial aspects of the technology implementation since you are contributing to the CFO's effort. (Financial aspects include how payments are made, what types of information are exchanged and with whom, how that information is protected, etc.)Provide in-text citations and a reference list at the end of your summary paper (APA format recommended).Use the following links for the references:Corporate Financial Operations1. https://www.toptal.com/finance/interim-cfos/role-of-the-cfo2. https://www.myaccountingcourse.com/accounting-dictionary/income3. https://www.inc.com/young-entrepreneur-council/the-importance-of-placing-cash-flow-first.html4. https://corporatefinanceinstitute.com/resources/knowledge/accounting/credit-sales/5. https://ecommerceguide.com/guides/what-is-ecommerce/6. https://www.accountingedu.org/accounting-information-systems/7. https://www.oracle.com/applications/erp/what-is-financial-management-system/8. https://digitalguardian.com/blog/what-sox-complianceCredit Cards & PCI DSS9. https://www.usa.gov/credit-cards10. https://www.creditcards.com/credit-card-news/emv-faq-chip-cards-answers-1264/11. https://www.pcicomplianceguide.org/2019-pci-compliance-annual-plan/12. https://www.americanbar.org/groups/litigation/committees/minority-trial-lawyer/practice/2019/the-payment-card-industry-data-security-standard/Mobile Payments13. https://squareup.com/guides/mobile-payments14. Attached pdf file(Customer acceptance)15. Attached pdf file(Mobile payments)16. https://www.creditcards.com/credit-card-news/mobile-payment-security-risks/17. https://squareup.com/us/en/point-of-sale18. https://squareup.com/us/en/payments/payment-platform19. https://www.cardfellow.com/blog/pci-compliance-for-mobile-devices/20. Attached pdf file (pci mobile payments)RFID Wristbands & Nearfield Communications Devices21. https://www.gettoken.com/beginners-guide-rfid-technology-events/22. https://www.idcband.com/en-us/blog-us/8-benefits-of-using-rfid-wristbands-resorts-attractions/23. https://tappit.com/rfid-wristband-safety/24. https://www.techradar.com/news/world-of-tech/rfid-wristbands-vs-nfc-smartphones-what-s-winning-the-contactless-battle-116713525. https://www.universalrfid.com/rfid-trade-shows26. https://blog.printsome.com/rfid-wristbands-good-bad/
Assignment
SQL StatementsIn this assignment, you will practice writing SQL statements.Create scripts of SQL statements for the follow ...
Assignment
SQL StatementsIn this assignment, you will practice writing SQL statements.Create scripts of SQL statements for the following situations:Add a minimum of five clients, three sales people, ten contacts, and at least one contact summary for each client to your database that you created in W3 Assignment 2. Every sales person must have at least one client.Query your database to produce all the clients for one of the sales people that are assigned to multiple clients.Produce a full client list by sales person.Add a contact summary to one of your clients, then modify it, and then delete it.In a Microsoft Word document, create a report that outlines the steps you took to create these scripts. Include the scripts in the report along with a description of the results that you achieved. With your results, include screen shots showing your results.
ITS 834 National University Emerging Threats and Counter Measures Discussion
For this assignment, review the article:Abomhara, M., & Koien, G.M. (2015). Cyber security and the internet of things: Vul ...
ITS 834 National University Emerging Threats and Counter Measures Discussion
For this assignment, review the article:Abomhara, M., & Koien, G.M. (2015). Cyber security and the internet of things: Vulnerabilities, threats, intruders, and attacks. Journal of Cyber Security, 4, 65-88. Doi: 10.13052/jcsm2245-1439.414and evaluate it in 3 pages (800 words), using your own words, by addressing the following:What did the authors investigate, and in general how did they do so?Identify the hypothesis or question being testedSummarize the overall article.Identify the conclusions of the authorsIndicate whether or not you think the data support their conclusions/hypothesisConsider alternative explanations for the resultsProvide any additional comments pertaining to other approaches to testing their hypothesis (logical follow-up studies to build on, confirm or refute the conclusions)The relevance or importance of the studyThe appropriateness of the experimental designWhen you write your evaluation, be brief and concise, this is not meant to be an essay but an objective evaluation that one can read very easily and quickly. Also, you should include a complete reference (title, authors, journal, issue, pages) you turn in your evaluation. This is good practice for your literature review, which you’ll be completing during the dissertation process.Your paper should meet the following requirements:Be approximately three pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.Be clear and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.
Similar Content
ITS 4011 North South University Information Technology Project Management Discussion
Training Management
An organization recently discovered that some members of its sales, accounting, and administration tea...
CIS 300 NAC Data Structure Stacks Implementation Using Array Discussion
In the ArrayStack implementation, after the first call to remove(i), the backing array, a, contains n + 1 non-null values ...
Intro to Infor system and data analysis homework help
Please see the require in the file. The homework is answer five questions. No Plagiarize....
CMP 610 UMUC Software Development Comparison Matrix
Develop and submit a one-page matrix that compares and contrasts open source, commercial, and internally developed softwar...
Problem Solving and Programming Concepts, (9th Edition), Prentice Hall Publishing Company, 2012
just 3 simple assignments about problem solving. short answer needed no need for showing all steps. CH1, only 1,2,3and 4 ...
ISOL 536 UC Wk 4 Big Data Analytics and Business Analytics Discussion
Length: Minimum of 600 wordsBriefly respond to all the following questions. Make sure to explain and backup your response...
Different Types Of Conflicts
For my situation I have experienced an value conflict. It includes inconsistency of inclinations, standards and practices ...
Cybersecurity
...
Information Assurance Ia Compliance With Government Regulations
The Employees and Organizations That Have A Deeper Level Of Information Assurance Based on the case analysis presented by ...
Related Tags
Book Guides
50 Shades of Grey
by E. L. James
The Elegant Universe
by Brian Greene
Untamed
by Glennon Doyle
The Prince
by Niccolò Machiavelli
Big Magic
by Elizabeth Gilbert
Beowulf
by Anonymous Anglo-Saxon poet
Fahrenheit 451
by Ray Bradbury
2001 A Space Odyssey
by Arthur Clarke
Cry the Beloved Country
by Alan Paton
Get 24/7
Homework help
Our tutors provide high quality explanations & answers.
Post question
Most Popular Content
University of Cumberlands Security Architecture and Design Course Question
Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have t ...
University of Cumberlands Security Architecture and Design Course Question
Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references. Question:Given multivariate, multidimensional events generated by adaptive human agents, perhaps it would not be too far a stretch to claim that no two events are precisely the same. Given the absence of actuarial data, what can a poor security architect do?
ITST 1136 CSCC Terminal Window Home Directory & Command Opens Lab Report
General Instructions -Follow all of the instructions exactly and answer the questions along the way. -Perform only the t ...
ITST 1136 CSCC Terminal Window Home Directory & Command Opens Lab Report
General Instructions -Follow all of the instructions exactly and answer the questions along the way. -Perform only the tasks that are indicated.Doing anything more or anything less may cause subsequent answers to be incorrect. -Submit this lab to the appropriate area on Blackboard when you are done. -If a question asks you what command you typed, provide the command exactly as you entered it in the terminal window. -If you are prompted to type an underlined expression into a text file, type exactly that expression, including capitalization, punctuation, spacing, etc. -Record your answers in a different color font.Upload in a .docx or .doc format Section 1 In this section, you’ll learn how to do the following things in vi: ocreate a new file or open an existing one oinsert text using the i key oundo actions with the u and U keys oappend text with the a key osave and quit. 1.Open a terminal window on your Pi and navigate to your home directory. 2.Type the following into the terminal and press Enter: mkdir ITST_1136_Lab_10 3.Navigate into the directory you just created. 4.Type the following into the terminal and press Enter: vi stuff.txt This command opens stuff.txt in the vi editor.You should see a cursor, a bunch of stacked tildes (~) underneath it, and at the bottom of the terminal you should see “stuff.txt” [New File].The tildes represent empty lines (lines with nothing on them, not even whitespace). 5.Press the lowercase i key. Nothing should look different on the screen yet, but this is an absolutely necessary and critical step you just did. 6.Type the following expression: Hello! 7.Look closely at what you just typed and hit the Esc key.What happened? 8.Press the lowercase i key and type the following expression:This is line 1, correct? 9.What exactly does the full line of text say now? 10.If done correctly so far, the text displaying on the screen will not be what we intended. Press the Esc key. 11.Press the lowercase u key.What happened? 12.Look closely at the text displaying near the top and press the lowercase a key.What happened? 13.Type the following expression (notice the blank space before the “S”): So, is this line 1? 14.Press the Esc key.What does the text file say now? 15.Press the uppercase U key.What happened? 16.Type a colon character followed by a lowercase q.:q Press Enter.What happened? 17.It looks like vi is forcing you to save your work.At this point you have three options: a.Type :q! and press Enter.This will quit without saving anything. b.Type :w and press Enter to save, then type :q and press Enter to quit. c.Type :wq and press Enter to save and quit using only one command. Pick one of the options and do it.It doesn’t matter which one. Section 2 In this section, you’ll learn how to: omove the cursor around the vi editor oinsert new lines of text odelete individual and multiple characters odelete individual and multiple words odelete individual and multiple lines odelete all text from the cursor to the end of the line odelete all text from the beginning of the line to the cursor 18.You should be back in your ITST_1136_Lab_10 directory after finishing the final step in Section 1.If you are not in that directory for whatever reason, navigate to it before proceeding. 19.Download the file block.txt, which contains a large block of uninspired text, from Blackboard if you haven’t already.Move the file into the ITST_1136_Lab_10 directory if it isn’t already there. 20.Open block.txt in the vi editor.What command did you type to do this? 21.Press the lowercase j key a few times.What happens when you do this? 22.Now press the lowercase l, k, and h keys until you figure out what they do.What do they do?(Be specific about which one does what!) 23.Move the cursor near the middle of any line of text. 24.Press the $ key (Shift+4).Where did the cursor go? 25.Press the ^ key (Shift+6).Where did the cursor go? 26.You should now know how to move the cursor around in the vi editor. NOTE:In some vi installations, most likely also including the one on your Pi, the arrow keys also allow you to move the cursor around the editor.But you must be in command mode for it to work! 27.Move the cursor to line 4 (“Thhe first word…”), then move the cursor so that it is positioned under one of the “h” characters in the word “Thhe” at the beginning of the line.It doesn’t matter which one. 28.Press the lowercase x key.What happened? 29.Move the cursor to line 6 (“And another line…”) and then move the cursor so that it is directly under the “l” character of the first occurrence of the word “line”. 30.Press the lowercase d key, followed immediately by the lowercase w key.What happened? 31.Move the cursor so that it is anywhere on the line of text that says “I am a line of text to be deleted!” 32.Press the lowercase d key twice in a row.What happened? 33.Now press the lowercase p key.What happened?(Be specific about location!) 34.Play around with the following commands in the text file and state what each one of them does.You should already know the first two.Be specific in your answers.For example, instead of saying “deletes a few things,” be specific about which things and how many.(Hint #1: Scroll up and look at the list of things you’ll learn in Section 2.)(Hint #2: Each time you run one of the below commands, undo it [lowercase u] to make this easier on yourself.) a.dw b.dd c.d^ d.2dd (also d2d) e.d$ f.3dw (also d3w) g.5x h.Based on what you learned in this exercise, give a command you could use to delete 4 lines at once: 35.Move the cursor as far down as you’re able to. 36.Press the uppercase O key and start typing anything you want.Where is this new text being placed in relation to where the cursor was before you pressed O? 37.Press the Esc key and move the cursor as far down as you’re able to. 38.Press the lowercase o key and start typing anything you want.Where is this new text being placed in relation to where the cursor was before you pressed o? Turn this lab in to the designated area on Blackboard by the deadline in order to get credit! This lab barely scratched the surface of what’s available in vi.For more vi/vim resources: oman vi oCheck the cheat sheet and quick reference documents on Blackboard ohttps://www.openvim.com/ ohttps://course.ccs.neu.edu/cs3650/parent/help/vitutor.vi
23 pages
Updated File
Purpose: In this lab, you will use PowerShell to create a virtual machine in our Azure environment. At the start of the la ...
Updated File
Purpose: In this lab, you will use PowerShell to create a virtual machine in our Azure environment. At the start of the lab, you are given a single ...
CSIA 300 UMGC W7 PCI Mobile Payment Acceptance Discussion
This week your rotation assignment takes you to the Office of the Chief Financial Officer (CFO).An external audit of the c ...
CSIA 300 UMGC W7 PCI Mobile Payment Acceptance Discussion
This week your rotation assignment takes you to the Office of the Chief Financial Officer (CFO).An external audit of the company's financial operations has just been completed. Last week, an "early look" copy of the audit was sent to the CFO with a request for a formal written response for each of the findings. Some of the problem areas were known to the CFO's staff and they were already working on the required responses. But, there is one set of findings that came as a complete surprise -- Shadow IT -- the unauthorized / unapproved use of cashless payment technologies by certain locations and offices within the company. These technologies included:1. Micro payments using a payment card issued by guest services to hotel guests and via unattended vending machines to visitors. These payment cards are loaded with a cash value deposited to the card's account via a credit card charge. Guest services also credits some of these payment card accounts with "reward dollars" for guests who belong to the hotel's affinity program. The payment cards are used at service locations which do not have a cashier station. e.g. game arcade, self-service laundry or sales kiosk, etc. The payments are processed by a third party service provider which then uses an electronic funds transfer to pay the hotel its share of the income.2. Mobile Payments for services booked through the concierge desk with an authorized but independent provider (not a hotel employee). These services include: private lessons with a tennis or golf pro, childcare, tours and tour guides, interpreters, etc. These payments are made by cell phone either as a mobile payment using a contactless payment system such as Apple Pay or by swiping a credit card through a magnetic stripe reader connected to the provider's cell phone. The payment accounts which receive the guests' payments are connected to the hotel's merchant card accounts. The hotel pays the providers monthly via electronic deposit and issues an IRS Form 1099 to record the income.The CFO must make a presentation to the IT Governance board about these payment systems as a first step towards either getting approval for continued use or issuing a "cease and desist" directive to force the rogue offices and locations to stop using the unapproved payment systems. The presentation must include information about known or suspected compliance issues for PCI-DSS. The IT Governance board has previously asked project sponsors for information about potential privacy and security issues.Due to the size and complexity of the problem, the CFO has split the available staff into two teams. Team #1 will focus on the micro payment cards. Team #2 will focus on the mobile payment systems. You have been asked to join one of these two teams and assist with their research. (Note: you *must* pick one and only one of the two technologies to focus on for your discussion paper this week.)Your team leader has asked you to read the provided background information (see the Week 7 readings) and then put together a 2 page summary of the important points from your readings. You have also been asked to help identify and describe / explain 5 or more privacy and security issues that could arise in conjunction with the use of the technology being studied by your team. Remember to keep your focus on the financial aspects of the technology implementation since you are contributing to the CFO's effort. (Financial aspects include how payments are made, what types of information are exchanged and with whom, how that information is protected, etc.)Provide in-text citations and a reference list at the end of your summary paper (APA format recommended).Use the following links for the references:Corporate Financial Operations1. https://www.toptal.com/finance/interim-cfos/role-of-the-cfo2. https://www.myaccountingcourse.com/accounting-dictionary/income3. https://www.inc.com/young-entrepreneur-council/the-importance-of-placing-cash-flow-first.html4. https://corporatefinanceinstitute.com/resources/knowledge/accounting/credit-sales/5. https://ecommerceguide.com/guides/what-is-ecommerce/6. https://www.accountingedu.org/accounting-information-systems/7. https://www.oracle.com/applications/erp/what-is-financial-management-system/8. https://digitalguardian.com/blog/what-sox-complianceCredit Cards & PCI DSS9. https://www.usa.gov/credit-cards10. https://www.creditcards.com/credit-card-news/emv-faq-chip-cards-answers-1264/11. https://www.pcicomplianceguide.org/2019-pci-compliance-annual-plan/12. https://www.americanbar.org/groups/litigation/committees/minority-trial-lawyer/practice/2019/the-payment-card-industry-data-security-standard/Mobile Payments13. https://squareup.com/guides/mobile-payments14. Attached pdf file(Customer acceptance)15. Attached pdf file(Mobile payments)16. https://www.creditcards.com/credit-card-news/mobile-payment-security-risks/17. https://squareup.com/us/en/point-of-sale18. https://squareup.com/us/en/payments/payment-platform19. https://www.cardfellow.com/blog/pci-compliance-for-mobile-devices/20. Attached pdf file (pci mobile payments)RFID Wristbands & Nearfield Communications Devices21. https://www.gettoken.com/beginners-guide-rfid-technology-events/22. https://www.idcband.com/en-us/blog-us/8-benefits-of-using-rfid-wristbands-resorts-attractions/23. https://tappit.com/rfid-wristband-safety/24. https://www.techradar.com/news/world-of-tech/rfid-wristbands-vs-nfc-smartphones-what-s-winning-the-contactless-battle-116713525. https://www.universalrfid.com/rfid-trade-shows26. https://blog.printsome.com/rfid-wristbands-good-bad/
Assignment
SQL StatementsIn this assignment, you will practice writing SQL statements.Create scripts of SQL statements for the follow ...
Assignment
SQL StatementsIn this assignment, you will practice writing SQL statements.Create scripts of SQL statements for the following situations:Add a minimum of five clients, three sales people, ten contacts, and at least one contact summary for each client to your database that you created in W3 Assignment 2. Every sales person must have at least one client.Query your database to produce all the clients for one of the sales people that are assigned to multiple clients.Produce a full client list by sales person.Add a contact summary to one of your clients, then modify it, and then delete it.In a Microsoft Word document, create a report that outlines the steps you took to create these scripts. Include the scripts in the report along with a description of the results that you achieved. With your results, include screen shots showing your results.
ITS 834 National University Emerging Threats and Counter Measures Discussion
For this assignment, review the article:Abomhara, M., & Koien, G.M. (2015). Cyber security and the internet of things: Vul ...
ITS 834 National University Emerging Threats and Counter Measures Discussion
For this assignment, review the article:Abomhara, M., & Koien, G.M. (2015). Cyber security and the internet of things: Vulnerabilities, threats, intruders, and attacks. Journal of Cyber Security, 4, 65-88. Doi: 10.13052/jcsm2245-1439.414and evaluate it in 3 pages (800 words), using your own words, by addressing the following:What did the authors investigate, and in general how did they do so?Identify the hypothesis or question being testedSummarize the overall article.Identify the conclusions of the authorsIndicate whether or not you think the data support their conclusions/hypothesisConsider alternative explanations for the resultsProvide any additional comments pertaining to other approaches to testing their hypothesis (logical follow-up studies to build on, confirm or refute the conclusions)The relevance or importance of the studyThe appropriateness of the experimental designWhen you write your evaluation, be brief and concise, this is not meant to be an essay but an objective evaluation that one can read very easily and quickly. Also, you should include a complete reference (title, authors, journal, issue, pages) you turn in your evaluation. This is good practice for your literature review, which you’ll be completing during the dissertation process.Your paper should meet the following requirements:Be approximately three pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.Be clear and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.
Earn money selling
your Study Documents