grading rubric Criteria Meets Does Not Meet Criterion Score Design 50 points Includes generic Interval class that implements Comparable Essay

grading rubric
Criteria
Meets
Does Not Meet
Criterion Score
Design
50 points
Includes generic Interval class that implements Comparable and all its required methods (15)
Includes Time class that implements Comparable and all its required methods (15)
Includes InvalidTime class that implements a checked exception and all its required methods (5)
Includes Project4 class (15)

0 points
Does not include generic Interval class that implements Comparable and all its required methods (0)
Does not include Time class that implements Comparable and all its required methods (0)
Does not include InvalidTime class that implements a checked exception and all its required methods (0)
Does not include Project4 class (0)

Score of Design,/ 50
Functionality
100 points
Generates correct GUI (25)
Generates correct output when Compare Intervals button is clicked (25)
Generates correct output when Check Time button is clicked (25)
Correctly throws exception on invalid times (25)

0 points
Does not generate correct GUI (0)
Does not generate correct output when Compare Intervals button is clicked (0)
Does not generate correct output when Check Time button is clicked (0)
Does not correctly throw exception on invalid times (0)

Score of Functionality,/ 100
Documentation
50 points
Discussion of approach included (10)
Includes correct UML diagram (10)
Includes test plan with sufficient test cases (10)
Lessons learned included (10)
Comment blocks with student name, project, date and code description included in each file (10)

0 points
Discussion of approach not included (0)
Does not include correct UML diagram (0)
Does not include test plan with sufficient test cases (0)
Lessons learned not included (0)
Comment blocks with student name, project, date and code description not included in each file (0)

Score of Documentation,/ 50

Power Point 7 slides presentation

PowerPoint Assignment
CMP101 – Saad Alharthi
Please provide all of the following information in a short 7 slide PowerPoint.
1. This PowerPoint is about you! Please provide the following information on separate
slides.
2. Make sure that you think about your design principles while making this PowerPoint
3. Please have at least 3 pictures that pertains to the subject on 3 slide of your
presentation! Use Clip art or a picture from the web. If you use a picture from the
web, please cite it on the last slide of your PowerPoint presentation. (Put the links to
the websites on the last slide)
4. The presentation should have 7 slides, the information that should be on the slides are
listed below with bullets.  What is your name?  Where were you born?  What is your favorite color?  What is your birthday? Please research and see if anyone famous has your same
birthday. Also, put if there was any historical events that took place on your
birthday.  What is your favorite subject at college? Please explain the subject and what you
mostly learn about in the class.  What is your favorite fast food Restaurant and why? List 3 of your favorite foods
on the menu.  Have an Ending Slide. It can say “The End”
Save the Assignment as “About Me” then submit it through Google Classroom only
What is your name? my name is Sultan AlabdulhayWhat is your favorite color? blue
Where were you born? Khobar city Saudi Arabi What is your birthday? Please research and see if anyone famous has your same birthday. Also, put if there was any historical events that took place on your birthday. my birth date is nov/12/2000
What is your favorite subject at college? Math
What is your favorite fast food Restaurant and why? macdonalds big mac spicy mac cheken chease burger fries

SOCR8006 Online Research Methods

Just one question.
Please help me modify the codes and give me a comparison cloud.
I have shown below the question some codes I wrote for the previous questions, but it is not the answer to this question.
This problem requires the ”Use of a context variable“. Please help me if you are familia with R and voson!

CS340 Computer Ethics

For this assignment you will do some research to (probably) expose how websites are currently tracking you and then making use of that data. Then you’ll write up and turn in a “lab report” about your findings. Follow these steps to complete the assignment.

CTEC research question

The assigned topic for this semester is:Task #1 – Determine the best methods for implementing Zero Trust Network Access (ZTNA) for external to Paychex user endpoint devices
Assumption: Paychex has 100 internal web-based applications that are not directly accessible from the InternetAssumption: Paychex has a standard network perimeter with dual-firewalled DMZs Assumption: Paychex has role-based access controls implemented on the internal applications Goal: Define industry standard best practice solutions and architectures for allowing external devices to access internal resources following the Zero Trust Maturity Model. Can include paid or opensource solutions
Goal: Be sure to address micro-segmentation of resources, identity governance, and policy-based
access controlsTask #2 – Determine the best methods for implementing ZTNA between Paychex internal (non-Internet- facing) servers and endpoints
Assumption: Paychex has 100 internal web-based applications that are not directly accessible from the InternetAssumption: Paychex has a flat internal network with data, web, and application servers, and user endpoints/workstations residing in the same network segments
Assumption: Paychex has role-based access controls implemented on the internal applications Goal: Define industry standard best practice solutions and architectures for allowing communication between internal devices and resources following the Zero Trust Maturity Model. Can include paid or opensource solutions
Goal: Be sure to address micro-segmentation of resources, identity governance, and policy-based access controls
This is the topic given to us by Paychex.

Ctec Homework 4

You need to find three NEW different articles based on the topic of your research topic and list the approaches and techniques. Also, you need write a one paragraph recommendation of each article, in your own words.
Article 1: ?
Article 2: ? Article 3: ?
Part1: Grade (10 points)
1. List Approaches/Techniques
Article 1 Summary
Article II Summary
Article III Summary
Part2: Grade (5 points)
2. List of Results
Article I List
Article II List
Article III List
3. References
Article I References
Article II References
Article III References
Part3: Grade (5 points)Recommendation: You need write at least one paragraph recommendation
of the three different articles and make sure it is 100% percent your own.
The overall plagiarism level of HW should be less than 15%.
Topic is: Best Methods for Implementing a Zero Trust Network in a Financial System

Zybooks homework questions (java)

Java
2 questions. ( I will provide all the information to the prompts after the question is accepted. Once you send the code I will try, and I will see if it submits without error.
1.) Write a program that creates an array of size N filled with random values between 0 and N*2, and searches for a target value T.
2.) Write a program that prints from a list of produce (fruits, vegetables, spices) given some user-supplied interval. If the item is saffron, don’t print it. If the item is vanilla, end the printing.
Use Arrays.toString(produce) to print the initial list. Print the interval-driven list separated by commas (a comma at the end is okay). The interval must be between 1 and 26.

Regulatory and law

please write 3oo words and two replies each 150 words.
Internet-related crime occurs every minute. Cybercriminals steal millions of dollars with near impunity. For everyone that is captured nearly 10,000 or not captured. For every one successful prosecuted in a court of law, 100 get off without punishment or with a warning. Why is it so difficult to prosecute cybercriminals?

CCS 610 Cloud Service and Technology

In this step, you will expand your understanding of legal and compliance issues related to the cloud by investigating industry-specific compliance issues, geographic-specific compliance issues such as privacy, and cloud-specific compliance issues to determine which are applicable to BallotOnline.
You will also need to analyze data compliance issues applicable to companies operating in the European Union, including the recent GDPR regulations, and determine how BallotOnline can be compliant. The organization is concerned about EU compliance issues because the laws there are the most restrictive that BallotOnline will encounter.Create a high-level proposal for a compliance program for BallotOnline that enables the organization and its employees to conduct itself in a manner that is in compliance with legal and regulatory requirements. Management has asked you to model the proposal on existing compliance programs for other companies that have migrated to the cloud.
Use the Proposal for Compliance Program template to record your work and follow the submission instructions below to obtain feedback.
Create a high-level proposal for a compliance program for BallotOnline that enables the organization and its employees to conduct itself in a manner that is in compliance with legal and regulatory requirements. Management has asked you to model the proposal on existing compliance programs for other companies that have migrated to the cloud.
Use the Proposal for Compliance Program template to record your work and follow the submission instructions below to obtain feedback.
APA 7