Draft compliance matrix and compliant proposal to rfp

Assignment Help Computer Network Security
Reference no: EM13940213

Assignment: Draft Compliance Matrix and Compliant Proposal to RFP

Note: The assignments are a series of papers that build upon one another.

Refer to the following resources to complete this assignment:
FAR § 15.2 (Solicitation and Receipt of Proposals and Information)

As the Contract Officer (CO) of your newly formed company, you will create a compliance matrix, and then draft a proposal in response to the RFP from Assignment 2.

Write a five to seven (5) page Compliance Matrix and Compliant Proposal to your RFP paper in which you:
Create a compliance matrix and prepare a FAR-compliant proposal in response to the RFP from Assignment 2. Note: You may create and /or assume all necessary assumptions needed for the completion of this assignment.

Apply the appropriate FAR clauses in order to meet compliance in contract formulation and award.
Apply the knowledge gained from your analysis of Government Accountability Office reports / decisions to identify and account for FAR compliance issues and contributing factors.
Apply the knowledge of planned actions in soliciting and awarding contracts and make recommendations to ensure the government agency is in compliance with the FAR requirements.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
  • The specific course learning outcomes associated with this assignment are:
  • Identify and apply the appropriate Federal Acquisition Regulation (FAR) clauses to meet compliance in contract formulation and award.
  • Analyze Government Accountability Office reports / decisions to identify FAR compliance issues and contributing factors.
  • Analyze the planned actions in soliciting and awarding contracts and make recommendations to ensure the government agency is in compliance with the FAR requirements.
  • Given a contract disputes situation, evaluate the various options and select the appropriate administrative and judicial processes available to resolve the dispute.
  • Use technology and information resources to research issues in government contract law.
  • Write clearly and concisely about government contract law using proper writing mechanics.

Reference no: EM13940213

Questions Cloud

Create a spreadsheet model : Your task is to create a spreadsheet model (using Microsoft Excel) showing your friend which alternative is to prefer. In particular your friend wants you to show her the following in the spreadsheet model: Show by calculation what would be the p..
The dividend projected to be growing : Shares of SoHot Donuts common stock are currently selling for $15. Next year’s dividend is expected to be $1.50 per share and the market rate of return is 10%. At what rate is the dividend projected to be growing?
Explain concept of decoupled organization as it relates : Large organizations face the threat of becoming decoupled. Explain the concept of a decoupled organization as it relates to a criminal justice agency. Discuss some of the challenges that decoupling presents and strategies utilized by criminal just..
Equity prior to the announcement is expected gain or loss : FARO Technologies, whose products include portable 3D measurement equipment, recently had 17 million shares outstanding trading at $42 a share. Suppose the company announces its intention to raise $200 million by sell new shares. What do market signa..
Draft compliance matrix and compliant proposal to rfp : Create a compliance matrix and prepare a FAR-compliant proposal in response to the RFP from Assignment 2. Note: You may create and /or assume all necessary assumptions needed for the completion of this assignment.
Calculate the variable cost and contribution margin per unit : Calculate the variable cost per unit and the contribution margin per unit. Calculate the contribution margin ratio and the variable cost ratio.
Determine and print the weekly rate. : Write the Java Statements that retrieve the age of the child and the number of days the child will be at the day care center.
Estimate of the the call options value-stock price model : You are attempting to value a call option with an exercise price of $90 and one year to expiration. The underlying stock pays no dividends, its current price is $90, and you believe it has a 50% chance of increasing to $125 and a 50% chance of decrea..
Calculate the net present value for the two options : Show by calculation the net present value for the two options (selling cars, mileage fees). Also, according to NPV suggest which alternative you advise your friend to choose

Reviews

Write a Review

Computer Network Security Questions & Answers

  Describe diffie-hellman algorithm to exchange shared key

User A and B use Diffie-Hellman algorithm to exchange a shared key and generate public keys of their own. Consider a common prime number q=71If user A has private key=5, what is A's public key?

  Create random secret one-time pad key ka and xors

Creates random secret one-time pad key KA and XORs it with K. She sends M1 = KA K to Bob. Bob creates random secret one-time pad key KB, XORs what he gets with it to compute M2 = M1 KB.

  Calculate the value of the symmetric key

Explain your solutions for avoiding such attacks. Calculate the value of the symmetric key and the values of R1 and R2 in the Diffie-Helman Protocol for the set of given values.

  Improve the security of business

What can be done to improve the security of business uses of the Internet? Give several examples of security measures and technologies you would use.

  Strategies for developing secure software

You want to convince your software development manager that the team needs to include strategies for developing secure software. Your first step is to help your manager understand the common sources of risks in software. 1. Write a ½ to 1 page memo t..

  How do clients receive updates in the absence of wsus

Why might READ WRITE and READ CREATE rights pose a security threat? How do clients receive updates in the absence of WSUS

  Your company has assigned you the task

Your company has assigned you the task of evaluating its computer networks. You are to write a memo covering 15 points on which you will evaluate the technology, connectivity, and functioning of the company's computer networks

  Protect the system from these procedural attacks

Summarise the procedures and tools hackers use for information gathering, target systems scanning, back-door opening and log-file clean-up. Alternatively, give an account of a hacker story from a technical perspective, including the tools employed..

  What is cryptanalysis

What is cryptanalysis. Give an example of a cryptanalytic problem. Describe the components of a digital stream cipher.

  Explain the purpose of the law

Also, don't forget to keep up with references to include on the powerpoint. note: I'm a member in group of the persons .My part is 6 slides.So. the slides must just have info about the topic . could you please help me with that ?

  Drafting a security policy plan

Research and discuss the items that you would place in such a plan, and justify your reasoning for the items that you have decided to include. Research and discuss 3 items that you believe are the most important when drafting a security policy plan..

  Describe the legal and ethical issues inherent

Describe the legal and ethical issues inherent in information security

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd