Build a C program that has two functions: one for encryption and one for decryption.

 Procedure

 Implement one program that has two functions: one for encryption and one for decryption. 

Encryption: 1. Read keys from user input. Prompt the user to enter a character for each key. 2. Read the plain text (“data”) from the input file. The name of the input file is one of the command line argument. 3. Implement your encryption algorithm. 4. Encrypt “data” and write to a file. (The name of the file is chosen by the programmer.) 

Decryption: 1. Read keys from user input. Prompt the user to enter a character for each key. 5. Read the file that encrypted data was saved and extract the encrypted “data”. The name of the encrypted file is one of the command line argument. 2. Implement your decryption algorithm. 3. Decrypt the “data” and write to a file. 

HR PC

minimum 500 words 

How Blockchain helps increase the efficiency in HR operations. 

This assignment is a written assignment where students will demonstrate how this course research has connected and put into practice within their own career. Since you are specifically addressing your personal work experience, you can use first person pronouns in this paper.

Assignment: Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner. share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.

Requirements: Use of proper APA formatting and citations. Use the readings from this class as sources for your paper. Share a personal connection that identifies specific knowledge and theories from this course. Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. You should NOT, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.

week5

 

  1. Discuss what power in the context of leadership is and how it  relates to bullying within organizations. Also note how this impacts  productivity.
  2. Discuss what organizational culture is and how it impacts work  productivity. Also, note how organizational culture impacts the success  of innovation implementation.
  3. How does culture impact leadership? Can culture be seen as a constraint on leadership?

Please be sure to answer all the questions above in the initial post.

Please ensure the initial post and two response posts are substantive. Substantive posts will do at least TWO of the following:

· Ask an interesting, thoughtful question pertaining to the topic

· Expand on the topic, by adding additional thoughtful information

· Share an applicable personal experience

· Provide an outside source

· Make an argument

At least one scholarly (peer-reviewed) resource should be used in  the initial discussion thread. Please ensure to use information from  your readings and other sources from the UC Library. Use APA references  and in-text citations.

5s week 10 assignment PL

Answer each of these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.

1. Should society help workers dislocated when technology, like the Internet, eliminates their jobs in a process called ‘ Creative Destruction‘?

2. are we working more and earning less?

3. Would you want a telecommuting job? Why or why not? 

4. Does the gig economy appeal to you? Why or why not?

5. How is an employee differentiated from a contractor under US law? 

6. Why have some municipalities put restrictions on innovations in the sharing economy and in on-demand services?

7. What has been the effect on the US economy of outsourcing (or offshoring) technical and professional jobs? 

8. How much monitoring of employee activities at work is appropriate? 

9. Should an employer be able to discipline or terminate an employee for on-line behavior in his/her own time? 

10. What is the relationship between BYOD (bring your own device) and shadow IT

11. What is cyberloafing?

Include references, do not copy paste. Use your own words.

BSweek5

In 250 words 

An IT Security consultant has made three primary recommendations regarding passwords:

  1. Prohibit guessable passwords 
    • such as common names, real words, numbers only
    • require special characters and a mix of caps, lower case and numbers in passwords
  2. Reauthenticate before changing passwords 
    • user must enter old pw before creating new one
  3. Make authenticators unforgeable 
    • do not allow email or user ID as password explain each of these security recommendations.  Do you agree or disagree with these recommendations. Would you change, add or delete any of these?  Add additional criteria as you see necesarry.

Research Paper

1.  

Submit a group research proposal and topic in the area of Access Control. 

Proposal Requirements:  #######################################################################################

Make sure to follow APA style. Please be certain that your submission is 1 page in length and meet the minimum APA formatting guidelines:

•    12-pt, Times New Roman font
•    Double-spaced
•    1” margins on all sides
•    Please provide a title page including your Name, Course Number, Date of Submission, and Assignment name.
•    Paraphrasing of content – Demonstrate that you understand the topic by summarizing the issues in your own words. Direct quotes should be used minimally.
•    Reference Section (A separate page is recommended.) Please cite the source using APA formatting guidelines. If you need guidance or a refresher on this, please visit: https://owl.english.purdue.edu/owl/resource/560/10/ (link is external) Be sure to include at least three reference sources.
•    In-text citations – If you need additional guidance, please visit: https://owl.english.purdue.edu/owl/resource/560/02/ (link is external)

2. Research Paper: Please check requirements in the below document

3. Paper Presentation.

Flasher Box

  

1) Explain the use of a Flasher Box

2) Why would the investigator be considered with EEPROM?

3) Explain the important points in evaluating dates and times on a device?

· No Plagiarism 

· Each Answer Should be 350 words without References.

  !!! NEED 2  ANSWERS FOR THIS QUESTION WITH 0% PLAGIARISM !!!!