Hi Welcome to Just Answer, It will be my pleasure to help you.
How soon did you need this answered >
What all did you need ?
Did you need just Pseudocode ?
ok...I can get you the pseudocode in next 10 minutes
also this question below;
Create your own While-End (or For-End) repetition structure that includes a nested if-then selection structure. You decide the theme. You should provide the pseudocode. The corresponding the flowchart of your example is optional but recommended. Be sure to provide an overview of what your repetition structure is doing. Provide a walk-through of your code and the values at each iteration of the loop.
Is this a separate question from the multipltication table pseudocode question ?
yes separate question
So just use any example of my choice ?
yes u can
but the first question use all what is require
ok...hang on to the chat
im bout to step out of the house
ok..when will you eb back ?
i will try to respond back to ur question thru phone
i will try to respond bacl thru phone
I have the Pseudocode for Multiplication table answer ready
Let me know when you are here
i want solution to everything according to the question.
Thank u n l will contact u if l av any question tmr cuz its late now.
can u pls provide my answer in this format below:
Problem definition: Write a program that would calculate and display the results for the multiplication table for values ranging from 1 to 100.
•A. Problem Analysis - Following the directions in the assignment, clearly write up your problem analysis in this section.
•B. Program Design - Following the directions in the assignment, clearly write up your problem design in this section and comment your pseudocode.
•C. Program Comments and Test Data - Following the directions in the assignment, include your test data and expected results in this section.
Table 1. Include your test data table here
Documentation and Formatting
Appropriate APA citations/referenced sources and formats of characters/content.
Case Study Security Policy Analysis
Accurate Completion of Security Policy.
Provide an appropriate summary of the Security Policy Document.
A quality paper will meet or exceed all of the above requirements.
Documentation and formatting
At least 3 Appropriate APA citations/referenced sources and formats of characters/ content.
Included 3 references but incorrect formatting or referencing/ citation
Does not include at least 3 references
Effectively describes the security policy in a manner that will allow the Senior Management to understand the organizational security requirements and make the appropriate decisions to enforce.
Analysis is supported with documentation and evidence.
Describes the security policy in a manner that allows the Senior Management to understand the organizational security requirements but not enough to make the appropriate decisions to enforce. And/or is not sufficiently supported with documentation and evidence. And/or the description is somewhat unclear.
Describes the security policy in a manner that is unclear to the Senior Management. The analysis Is not sufficiently supported with documentation and evidence. Senior management would not have enough detail to make appropriate decisions.
Effectively summarizes the security policy analysis. Includes all key points of the analysis and allows the senior management to understand the organizational security requirements but not enough to make appropriate decisions
Describes the security policy analysis in a manner that allows the Senior Management to understand the organizational security requirements but not enough to make appropriate decisions. Key information is left out or not made clear.
Describes the security policy analysis in a manner that is unclear and/or insufficient. Summary is difficult to follow or does not include key information and details.
For those that are not familiar with the term, this project is called an Authentic Assessment Project. These projects are designed to reflect "real life" activities and will require you to perform considerable self-directed study. Like real life problems, you will not find all the answers you need in the textbook. You will, however, have the help of your instructor to resolve issues you may encounter.
The project is to write a company Security Policy Document for a fictitious company called Global Distribution, Inc. (GDI). A Security Policy Document is an absolutely essential item for any organization that is subjected to a security audit. Lack of such a document will result in an automatic failed audit. A Security Policy Document within an organization provides a high-level description of the various security controls the organization will use to protect its information and assets. A typical Security Policy Document contains a large set of specific policies and can run several hundred pages. However, for this project, you will write a brief document with a maximum of 12 specific policies for the GDI Company. Therefore, you must carefully consider and select only the most important policies from hundreds of possible specific policies. A brief description of the GDI Company is given below.
You will work individually on this project for a total of 25% of your grading for the course. You may collaborate with your classmates to share ideas and activities in preparation of the final project deliverable. However, you will be graded for your individual effort and deliverables, and you will submit the project in your individual project assignment folders. You will treat this project deliverable as if you would deliver it to your own customer or client who will be paying you for the deliverables.
These are only recommendations on the general approach you might take for this project. This is your project to develop individually.
The GDI company description is deliberately brief. In all real life projects, you typically add complexity as you become smarter as you go along. State the assumptions/rationale you make to justify the selection of the particular security policies you select. Attach the assumptions/rationale to each specific security policy.
There are many information sources for Security Policy Documents on the Internet. However, one good source to start with is the SANS Security Policy Project that lists many example security policy templates.
Global Distribution, Inc. (GDI)
Global Distribution, Inc. (GDI) is a distribution company that manages thousands of accounts across Canada, the United States, and Mexico. A public company traded on the NYSE, GDI specializes in supply chain management and in coordinating the warehousing, staging, distribution, transportation, and wholesaler/VAR relationship for their customers.
GDI employs over 3,200 employees and has been experiencing consistent growth keeping pace with S&P averages (approximately 8%) for nearly six years. A well-honed management strategy built on scaling operational performance through automation and technological innovation has propelled the company into the big leagues; GDI was only recently profiled in Fortune Magazine.
The executive management team of GDI:
BACKGROUND AND YOUR ROLE
You are the Computer Security Program Manager (CSPM) educated, trained, and hired to protect the physical and operational security of GDI's corporate information system.
You were hired by COO Don Jacobson and currently report to the COO. You are responsible for a $7.25m annual budget, a staff of 17, and a sprawling and expansive data center located on the 9th floor of the corporate tower. This position is the pinnacle of your career - you are counting on your performance here to pave the way into a more strategic leadership position in IT, filling a vacancy that you feel is so significantly lacking from the executive team.
There is actually a reason for this. CEO Jamie Pierce believes that the IT problem is a known quantity - that is, she feels the IT function can be nearly entirely outsourced at fractions of the cost associated with creating and maintaining an established internal IT department; the CEO's strategy has been to prevent IT from becoming a core competency since so many services can be obtained from 3rd parties. Since the CEO has taken the reigns two years ago, the CEO has made significant headway in cutting your department's budget by 30% and reducing half of your staff through outsourcing. This has been a political fight for you: maintaining and reinforcing the relevance of an internal IT department is a constant struggle. COO Jacobson's act of hiring you was, in fact, an act of desperation: the increasing operational dependence on technology combined with a diminishing IT footprint gravely concerned Jacobson, and he begged to at least bring in a manager to whom these obligations could be delegated to. Jacobson's worst nightmare is a situation where the Confidentiality, Integrity, and Availability of the information system was compromised - bringing the company to its knees - then having to rely on vendors to pull him out of the mess.
There's no question that the company's CEO sees the strategic importance of technology in executing her business plan, and in this way you share a common basis of principle with her: that IT is a competitive differentiator. However, you believe that diminishing internal IT services risks security and strategic capability, whereas the CEO feels she can acquire that capability immediately and on the cheap through the open market. You're told that CEO Pierce reluctantly agreed to your position if only to pacify COO Jacobson's concerns.
CORPORATE OFFICE NETWORK TOPOLOGY
You are responsible for a corporate WAN spanning 81 remote facilities (warehouses) and interconnecting those facilities to the central data processing environment. Data is transmitted from suppliers and customers through an FTP bridgehead server situated in the DMZ; files are encrypted and copied to the FTP server through automated replication; remote automation or users connect with the FTP server to transmit or receive encrypted EDI files.
A bulk of the data processing for your company is handled by twin IBM System/390 mainframes; all GL and financial functions are located on the mainframe platform; a microcomputer cluster manages email routing, file storage functions, HRIS, and other value-added applications; an application-layer proxy server serves as the central gateway for Internet connectivity for the corporate office and 81 remote sites - a strict philosophy of control, centralization, and outsourced services has guided much of the design of this network; GDI' web server and e-commerce functions are hosted by an external party outside of the scope of this topology.