Your software company was invited to provide a proposal for a company in Austr

 Your software company was invited to provide a proposal for a company in Australia. You currently have the cost in US dollars and need to convert the prices to the Australian dollar. 
Write a 2-part program using Ruby, Java®, or Python. 
Part 1: Write a function to gather the following costs from the user:

Travel Cost: $9,800
Hotel Cost: $3,500
Rental Car Cost: $1,600
Labor Cost: $15,500 

Part 2: Write a function to convert the costs from United States dollar (USD) to Australian dollar (AUD). Note: Look up the current USD to AUD exchange rate to use in your function. 
Test the program 3 times by providing different costs in USD. 
Provide the code and take a screenshot of the output, then paste the screenshot(s) into a Microsoft® Word document. 
Write a half-page response in the same Microsoft® Word document to address the following:

Provide a manual for the user explaining how to use the program.
Explain what type of user input validations you should have. What happens if the user enters a negative number?  What happens if the user puts a $ in the input? 

Review the readings for this week from Ruby on Rails Tutorial or the Pluralsight videos if you have additional questions on deploying Ruby applications. 
Submit your document.

The briefing should include each of the following items:  identification of the

The briefing should include each of the following items: identification of the the software assurance needs and expectations of the organization
 description of the key attributes of the current software development life cycle (SDLC)
 identification of any known supply chain risks
 identification of vulnerabilities in the existing software used
 identification of software options that could meet the organization’s needs
 evaluation of software options and recommendation(s) for your organization, with each supported by a rationale
 evaluation of supply chain options and recommendation(s) for your organization, with each supported by a rationale
 explanation of the costs involved in your recommendations
_ recommendations for contract language that would be used to ensure that supply chain, system, network, and operational security were met

  Create a 1- to 2-page Frequently Asked Questions (FAQ) in the form of a table

 Create a 1- to 2-page Frequently Asked Questions (FAQ) in the form of a table in Microsoft® Word including the following questions:

What is the difference between a distributed and a centralized computer system? Describe the underlying principles and issues of distributed versus centralized computer systems and how cloud-based solutions have altered current networking solutions. Refer to the network diagrams you created as an illustration of a distributed network.
What are the major network topologies? Refer to the network diagrams you created as an illustration of the logical and physical topology you employed.
Why are standards bodies essential in networking and the Internet?
Why are the OSI and TCP/IP network models important in networking? Provide an example from one of the labs that illustrates the performance of one of the protocols you used.
What are the major TCP/IP protocols in use today? Provide an example from one of the labs that illustrates troubleshooting an issue with a protocol you used.
What is the difference between a LAN and a WAN?
What is meant by the terms latency, response time, and jitter, and what tools could you use to measure these?
What is VOIP, and what older technologies does it replace?

  Create a 14- to 16-slide Microsoft® PowerPoint® presentation, including Introd

 Create a 14- to 16-slide Microsoft® PowerPoint® presentation, including Introduction, Conclusion, and Reference slides, that contains the following:

An accurate description of the “building blocks” of today’s data communication networks, such as switches, routers, and cabling. Provide examples from your network diagram of each building block.
A concise strategy to ensure the availability of network access in switched and routed networks. Provide illustrations from your improvements to the original campus networks.
An explanation of how firewalls mitigate some network attack scenarios. Give at least two examples from your solutions to the campus network that illustrates how you mitigated network attacks.
A list of at least five security concerns inherent to wired, wireless, and mobile networking.
A description of at least 3 responsibilities networking teams face in providing networking services, including security, privacy, reliability, and performance.

 Using a Web browser, search for “incident response template.” Look through the

 Using a Web browser, search for “incident response template.” Look through the first five results and choose one for further investigation. Take a look at it and determine if you think it would be useful to an organization creating a CSIRT. Why or why not?
Requirements:

Type your responses with proper headings in a word document.
Detailed and significant scholarly answers will be graded with full point value. Incomplete, inaccurate, or inadequate answers will receive less than full credit depending on the answers provided.

Instructions: 100% plagiarism free work (turnitin is used) Using Microsoft Word

Instructions: 100% plagiarism free work (turnitin is used)
Using Microsoft Word, write two paragraphs of at least 125 words (more is acceptable, but not recommended) each to address the following prompts:

***1st paragraph: In your own words, articulate the challenge of accessing, transmitting, receiving and storing protected health information while using mobile health technology.

****2nd paragraph: Describe the recommended best practices both as outlined in this video but also from your own experience and intuition.

Link to video: https://www.youtube.com/watch?v=Vz1ddGJn1PM&feature=youtu.be

At the end of each paragraph, put in parentheses the total number of words for that paragraph in parentheses, e.g.,(125)