dis 8

  

1.
Using the Internet as a resource, research multiple file systems for hard disks supported in Windows, such as MS DOS’s FAT file system, the 32-bit FAT file system, and the NTFS file management system. Submit your findings in a report.

2. Compile a list of various data-compression techniques that are commonly employed in today’s computer systems. Which of these techniques is the most efficient? That is, which of these techniques has the maximum gain in storage space with the least effect on processing time?

Write a paper of 2 pages each and answer all the sub-question 

Policy

 

Answer each these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.  

1. What is privacy?

2. What risks, if any, does facial recognition software raise?

3. How much information about you can be found on-line with a simple google search? 

4. How much information about you can be found by searching government and commercial databases?

5. Describe informed consent. 

6. Should secondary use of consumer provided data be available without notice to the consumer?

7. How do data mining and predictive analytics work? 

8. Watch this Science Friday video by Ira Flatow. And, offer your opinion – Are advancing algorithms taking our free will? 

9. Should Facebook be regulated, at least as far as it’s privacy and data policies? 

10. How many public cameras is too many? 

IT Software in business

i have assignment for IT software in business its only 3 questions and it should be submit as excel file. i need to get 100% in this assignment and its super easy but im not good at IT

General essay

The Year Up Washington DC site offers four career tracks: 1. Sales/Customer Service 2. IT/Helpdesk 3. Business/Project Management 4. Software Development Please answer the following questions for your essay: 1) What is your first choice for your specialty track? Why? What previous experience (if any) do you have that would make you successful in this track? Discuss any previous school or work experience, certifications you have, or self-learning you’ve done. (Write 1-2 paragraphs) 2) What positions are you interested in within this field? Why? 3) What research have you done on your own to learn more about this career field? 4.) If you don’t get your first choice for your specialty track, how would your second choice fit into your career goals. Essay must be no more than 2 pages, double spaced.

My first choice will be IT/Helpdesk, second choice is software Development.  I am currently 19 years of age I have always enjoyed the IT field because technology is intriguing.

Cross-Site Scripting

  • Cross-Site Scripting attack
  • XSS worm and self-propagation
  • Session cookies
  • HTTP GET and POST requests
  • JavaScript and Ajax

Note: Since May 5 2019, the Firefox Add-on “HTTP Header Live” has been disabled by Firefox. Mozilla verifies and signs add-ons that follow a set of security guidelines. The version of HTTP Header Live (v 0.6 – Last Updated April 9, 2018) installed on the VM does not comply with this security guideline, so it was automatically disabled. The issue can be easily resolved by installing the latest version of HTTP Header Live.

Video to help:

https://www.youtube.com/watch?v=sFSq6dsDGzA&feature=youtu.be

COMPUTER SCIENCE

 Read the Orlando Marathon Case Study , found in this week’s module. Then respond to the following questions by due date listed in the syllabus:

  1. Consider  the responsibilities of risk management programs and risk in volunteer  management. What steps should be taken to prepare for the event in  compliance with the responsibilities of risk management programs and in  the aftermath of the Boston Marathon events. Assume that terrorism  threats on this event would be extremely heightened.
  2. What are all of the risks that you need to consider for the organization and for volunteers?
  3. In  what ways would you approach each of these risks? (Think about  elimination, reduction, assumption, transfer, etc). Explain your  rationale.

By the Saturday following the due date listed on  the syllabus at 11:59pm, respond to at least 1 other student. Do you  agree with the steps they selected to prepare for the event? Are there  risks they did not identify that should be included? 

Discussion 5 Cryptography

 

Question: Analyze the structure of advanced encryption standards and why it makes it so strong.  

  -You must use at least one scholarly resource.

  -Every discussion posting must be properly APA formatted.

– No Plagiarism

– 400 Words

-References 

new tech bus leaders

 Many enterprise organizations believe that cloud computing is essential to their business operations. There are some; however, that argue it is not cost efficient and operationally appropriate. Provide a use case where cloud computing is not appropriate and explain why you feel this is an appropriate decision for the enterprise.  

Web Development Help

I have a web project in HTML & CSS but It has some issues which I need some help in fixing. The project is complete so it is just a minor fix.