Exceptional Geek

There are many additional algorithms available. Choose 2 sorting and 2 searching algorithms, and describe them in detail.Give the pseudocode and flowchart that would show how one of the additional data structures could be implemented to search data. In addition, create a flowchart to show how to sort using one of the additional algorithms. Give the pseudocode for the flowchart as well. Please submit the following for your assignment. 2 flowcharts (1 for a searching algorithm and 1 for a sorting algorithm) 2 pseudocode examples (1 for a searching algorithm and 1 for a sorting algorithm)

A111

Technology Supporting Business ProcessesOver the twentieth century, the ability to process information in terms of labor units has improved by a factor in the order of 1 to 5 trillion. This improvement represents a compounded growth rate of between 30 to 35 percent per year for a century. At the turn of the twentieth century, the mechanical calculator offered a modest productivity increase but the number of workers required to maintain the accounts of a medium-sized business still remained very high. Many tasks would take a large investment in equipment and a significant number of accountants’ weeks to process. A hundred years later, the same tasks can be completed by a standard desktop computer in minutes. The challenge for management has transitioned from a simple reduction in labor requirements to leveraging the increased processing power to develop competitive, efficient, and profitable organizations.With this example in mind, use the assigned readings for this module and respond to the following: Explain how information systems influence businesses to be more competitive, efficient, and profitable.Provide at least one example for each factor. Write your initial response in 300 words. Your response should be thorough and address all components of the discussion question in detail, include citations of all sources, where needed, according to the APA Style, and demonstrate accurate spelling, grammar, and punctuation

2-IT Security: Auditing SAS 70 standard

Research the following:The SAS 70 standard was replaced by a new standard in June of 2011. Please research the new standard published by the Auditing Standards Board of the American Institute of Certified Public Accountants (AICPA). Write at least a two page report explaining the difference between the two standards. Submission Instructions: Please use the APA style for your report.

Final 7

Implementing Network and Personnel Security Measures The security consulting firm that you work for has been awarded a contract to implement a new IT Security Infrastructure to secure the Information Technology data assets of a local government agency.  This agency has many remote workers that are in the field and need to connect back to the agency’s system servers. The remote workers use a wireless network infrastructure to connect their electronic pads to servers located within the local government’s facility. The remote workers have needs to access property records, cite zoning violations electronically, and validate building permits. The public demand to expand IT services has grown faster than its ability to provide an adequately secured infrastructure. In fact, this government entity was previously featured on the news for having minimal security controls and methods for accessing property tax information of citizens. The inadequate security allowed many construction trade businesses to illegally access property records and zoning violations. Your role in this project is to enhance and optimize the security mechanisms for accessing these systems.Write a four to five (4-5) page paper in which you:1. Create an information flow diagram, using Visio or Dia, which:     a. Illustrates how remote users will securely connect to the government agency’s network.       b. Illustrates the patch of network devices that data packets must travel to get from server to remote user’s device and back to          server.         Note: The graphically depicted solution is not included in the required page length.2. Provide an equipment list of network security devices that would be needed to ensure the integrity and sensitivity of private     information. In this list:    a. Propose at least two (2) vendor brands per each device and the associate costs required to procure these items.    b. Identify the functionality each device serves and the expected benefits the government agency should experience upon the         successful installation of this equipment.3. Develop a maintenance plan that should be recommended to the government agency to ensure having the latest security measures    available within the network in which you:    a. Describe the risks associated with not fulfilling the activities outlined within your maintenance plan.    b. Indicate specific activities, personnel / resources required, and frequency of execution.4. Recommend at least four (4) physical security measures that could be developed to ensure the electronic perimeter of electronic     assets.5. Recommend at least two (2) physical security vendors that could achieve the four (4) security measures you identified. Justify your    recommendations with your response.6. Evaluate and consider activities that the Human Resources Department could perform in order to complement and instill security     from within the organization. Provide a rationale with your response.7. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality     resources. Your assignment must follow these formatting requirements:Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.Include charts or diagrams created in Visio or one of its equivalents such as Dia. The completed diagrams / charts must be imported into the Word document before the paper is submitted.

data back up / data revovery

Define, describe and identify the elements of (a) good Data Backup Planning, (b) good Disaster Recovery Planning, and (c) good Business Continuity Planning. Be sure to identify and describe any interdependencies in the planning.The paper must following the formatting guidelines in The Publication Manual of the American Psychological Association (2010), (6th ed., 7th printing), and contain a title page, five scholarly references, three to five pages of content, and a reference page. In addition, the paper will be submitted through the SafeAssign originality-checking tool.  More APA assistance can be found at the Purdue University Online Writing Lab

Week 4 Discussion Board SafeAssign Check Instructions: Review the discussion question below. Type your discussion post into a MS Word document (.doc or.docx) . As part of the Week 4 Discussion Board assignment, you will submit a MS Word document (.doc or

Week 4 Discussion Board SafeAssign CheckInstructions:Review the discussion question below.Type your discussion post into a MS Word document (.doc or.docx) .As part of the Week 4 Discussion Board assignment, you will submit a MS Word document (.doc or.docx) containing the exact contents of each discussion board post (e.g., if you post once, submit one document; if you post three times, submit three documents) using the provided assignment submission link.  The originality of each submitted document will be checked using the SafeAssign originality-checking tool.  The discussion board assignment will receive zero points if incomplete, inaccurate, insufficient, or no documents are uploaded to SafeAssign.Click the Week 4 SafeAssign Check Link above to submit it through SafeAssign. Revise as needed.Copy and paste the content in your MS Word document (.doc or.docx) into the discussion board using the Week 4 Discussion Board link below.  Do not attach the MS Word document to the discussion board.Discussion Question:After watching one video from the link below, create your own thread discussing at least three concepts presented in or that you learned from the video.Videos:MIT 6.858 Computer Systems Security, Fall 2014

Network CIS 175

“Command Line Tools”  Please respond to the following:Suppose you are a network administrator and your boss indicates that a budget has been set aside to upgrade the network servers for the entire company. Your boss asks you to recommend whether the company should upgrade the network servers to Windows servers, UNIX servers, or Citrix Servers. Compare and contrast these network servers and make a recommendation for your boss. Provide a rationale for your response.Per the text, the command-line utilities “ipconfig” and “ifconfig” are used to gather basic information about a computer’s network interface on Windows and UNIX respectively. Of the two (2) utilities mentioned, determine the single utility that you would prefer to use to gather and view diagnostic information. Provide a rationale for your response.

342 Discuss how BitLocker and BitLocker To Go protect data

Discuss how BitLocker and BitLocker To Go protect data  using the text Internet and/or your job as reference for full creditGrading Criteria 1. Content 50%2. Writing Conventions (Grammar and Mechanics)10%3. Organization of Ideas/Format 300 Words 30%4. Source (APA Format) 10% Words 30%4. Source (APA Format) 10% Submission Instructions: The paper must be at least 500 words.

Information technology sourcing

Find 2 peer-reviewed articles from academic journals on information technology sourcing. Summarize each article and compare and contrast the sourcing approaches in each article. Identify the factors that were important in each sourcing strategy and whether the sourcing decision was strategic for the long term or tactical for the short term. Which strategy did you think was more effective and why? Your paper should be in APA format and 3-4 pages, not counting the title page and reference pages. Make sure you have in-text citations and a reference page. The rubric for this assignment can be viewed when clicking on the assignment link.