project and discussion- kar


Nonrepudiation is the ability to have proof that a message originated from a specific party. In an email system, for example, nonrepudiation mechanisms ensure that every message can be confirmed as coming from a specific party or sender.

Answer the following question(s):

1. Do you think nonrepudiation falls under one of the tenets of the C-I-A triad (confidentiality, integrity, and availability)? Why or why not?

2. Is the C-I-A      triad adequate when selecting controls for a Windows system? Why or why not?

Security experts recommend using a multilayered defense strategy. A multilayered defense puts multiple controls in place to protect computer system, networks, and other resources.

Answer the following question(s):

1. Does a multilayered defense guarantee that attacks will not be successful? Why or why not?

Project Part 1: Active Directory Recommendations


Assume you are an entry-level security administrator working for Always Fresh. You have been asked to evaluate the option of adding Active Directory to the company’s network.


Create a summary report to management that answers the following questions to satisfy the key points of interest regarding the addition of Active Directory to the network:

1. System administrators currently create users on each computer where users need access. In Active Directory, where will system administrators create users?

2. How will the procedures for making changes to the user accounts, such as password changes, be different in Active Directory?

3. What action should administrators take for the existing workgroup user accounts after converting to Active Directory?

4. How will the administrators resolve differences between user accounts defined on different computers? In other words, if user accounts have different settings on different computers, how will Active Directory address that issue? (Hint: Consider security identifiers [SIDs].)

Required Resources

§ Internet access

§ Course textbook

Submission Requirements

§ Format: Microsoft Word (or compatible)

§ Font: Arial, size 12, double-space

§ Citation Style: Follow your school’s preferred style guide

§ Length: 2 to 4 pages

Self-Assessment Checklist

§ I addressed all questions required for the summary report.

§ I created a well-developed and formatted report with proper grammar, spelling, and punctuation.

§ I followed the submission guidelines


Semi-literate children in a remote village were given access to a computer and taught themselves molecular biology.  Discuss in 500 words what this says about governments responsibility to break the digital divide.  Include at least one quote enclosed in quotation marks and cited in-line. 

Write a short paper, 400-500 words on herasay rule

Do a bit of research on the hearsay rule in legal proceedings. In your own words, explain the hearsay rule and describe how it relates to the concept of an expert witness. 


Use References. Include quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list. 

It should be Plagiarism free.

MSWord Module 2

Complete the module tutorial

Java 3680

the assignment has more files that i can provide

C++ project

 Your goal is to implement an application that allows employees of a pizzeria to place a customer order. Your application should: 

• get customer information including name, telephone number and address (one field for each). 

• ask for the method of payment: Visa, MasterCard, or cash. 

• ask for customer credit card number if he/she selects Visa or MasterCard. 

• have four pizza sizes (Extra Large for $19.89, Large for 16.99, Medium for $12.50, and Small for $9.80) and five toppings (Pepperoni $2.99, Beef $2.45, Mushrooms $2.29, Olives $1.79, Onions $1.20). All prices are for one order. Pizza and topping prices are shown on the screen next to each item (see list of menus below). The total price should include tax at the rate of 9.5%. Assume the customers could place one order at a time. Customer should be able to select zero to all five toppings but only one of each max. Selecting same topping multiple times does not add to number of that toppings. Clear option clears all selected options. 

• Gifts – select 2 toppings: Extra topping; select 3 toppings: $3.00 coupon; select 4 or more toppings: Order of cheese sticks. Note: Maximum one gift per order; Customer may not pick a desired gift. 

• calculate the total price when the user selects “Display Order Confirmation”. When the user selects the “Display Order Confirmation” option: 

• if the input is complete, your application must generate an order confirmation shown below. 

• if the input is incomplete, your application must generate one message, listing all the fields requiring completion. 

The user should be able to input data in any order. 

Use functions (call-by-value only). Do not use global variables. Do not use arrays. Make sure to test your program completely before submission. Do not forget to add comments.  The order confirmation should look like this: 

You have placed an order for 

Large pizza ($33.33) 

With the following toppings: 

Pepperoni ($3.99) 

Olives ($2.99) 

Total price: $88.88 

Congratulations. You will get the following free gift with your order: Extra topping


Sold to: John Doe 

Telephone: 12345 

Address: 123 Nice St. 

Paid by: Visa number 998877 


1. Input Customer Information 

2. Main Selection 

3. Options 

4. Payment Method 

5. Display Order Confirmation 

6. Exit 


1. Name 

2. Phone Number 

3. Address 

4. Main Menu 


1. A ($44.44) 

2. B ($33.33) 

3. C ($22.22) 

4. D ($11.11) 

5. Main Menu


1. aa ($1.11) 

2. bb ($3.33) 

3. cc ($4.44) 

4. dd ($5.55) 

5. ee ($6.66) 

6. Clear all options 

7. Main Menu


1. Visa 

2. MasterCard 

3. Cash 

4. Main Menu 

Note: The prices in the menu are not accurate. Use the prices in the project description. 

IT incident response wk4 discusion


Week 4 Discussion

1919 unread replies.1919 replies.

With the concepts presented in this week’s reading, detail two tools you would use to effectively monitor network traffic and the type of traffic you would monitor.  Please provide your rationale for your choices.

Participate in the weekly discussion. Post your initial 250 word minimum response to the discussion question and reply with a substantial contribution to the posts of other students.

Remember to use APA citations and references if you refer to information such as statistics or information you used in your response from other sources. DO NOT directly copy from a website or other source and paste. In this course I will only accept paraphrasing not direct quotation on all work.

Research Paper on Forensics

After reading the articles of digital forensics techniques, please write a research paper that answers the following questions: 

  • What are mobile forensics and do you believe that they are different from computer forensics?
  • What is the percentage of attacks on networks that come from mobile devices?
  • What are challenges to mobile forensics?
  • What are some mobile forensic tools?
  • Should the analysis be different on iOS vs Android?

Your paper should meet the following requirements:

  • Be approximately four pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Paper should include an introduction, a body with fully developed content, and a conclusion.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques.

I attached one paper, and you need to download some more papers in order to answer these questions. 

Please read question in comment section.


Using the concepts in Chapter 12 of our textbook, describe the corporate  culture within your organization, or one that you know well. What  effects do the nature and condition of your organizational culture have  on your organization’s strategy? What would you like to see happen that  would improve its contribution to the organization’s competitive  advantage, and what mechanisms or measures would you recommend to your  organization’s leadership for promoting such changes?  Again, relate  your analysis and recommendation to our coursework (Thompson text and  other material) from this week. 

300 words required APA format

Need plagiarism report

Coding Assignment

See File. Answer the questions