Discussion 7

  • What are some of the potential risks involved with cloud computing?
  • Does the research and model in this article propose a viable solution to cloud-based risk management?

A substantive post will do at least two of the following:

  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. 

Reference article:

Mackita, M., Shin, S.-Y., & Choe, T.-Y. (2019). ERMOCTAVE: A Risk Management Framework for IT Systems Which Adopt Cloud Computing. Future Internet, 11(195), 1-21. Retrieved from https://doi.org/10.3390/fi11090195

https://www.forbes.com/sites/kalevleetaru/2018/04/03/the-cloud-is-rising-to-the-cybersecurity-challenge/#347c5a1967ba

INSTRUCTIONS.

1. No Plagiarism at any cost .

2. The submission date is Thursday (10/08/20).

3. Atleast 3 references in APA format

4. Min of 250 words (2-3 paragraphs)

java

i already done half the work i just need you to make the output like this {

Square of 1 is 1

Square of 2 is 4

Square of 3 is 9

Square of 4 is 16

Square of 5 is 25

Square of 6 is 36

Square of 7 is 49

Square of 8 is 64

Square of 9 is 81

Square of 10 is 100

The sum of the squares is 385!

}

main discussion

 

Compare and contrast the different techniques for anomaly detection that were presented in Chapter 9.

Discuss techniques for combining multiple anomaly detection techniques to improve the identification of anomalous objects.

Writing assignment

Some common biometric techniques include:

  1. Fingerprint recognition
  2. Signature dynamics
  3. Iris scanning
  4. Retina scanning
  5. Voice prints
  6. Face recognition

Select one of these biometric techniques and explain the benefits and the  vulnerabilities associated with that method in 3-4 paragraphs.

4 Week Masters' Program Cybercrime Class

Are you able to complete the remaining 4 weeks of the class?

Mid term due by 11/8/2020- In the form of discussion question for past chapters ( will provide info)

Complete a book review by November 23rd on a Specific book? (Book Review no less than 2300 words) 

3 quizzes (requires log-in and completion by central time 6:00 p.m. Saturdays?

Discussion question weekly posted on Sunday by professor to be completed by central time 10:00 a.m. Wednesday with 450 word minimum, in-text citations and proposed class question?

computer science

c++ program

Part A

use any web site and provide number of Dentists using the following format:

area codes included:

909

714

949

310

818

for each area code get 4 doctors to include the following data:

License number up to 5 digits

Name (last, first )

Specialities (General, surgeon)

Distance

write a menu to allow the user to search for

    Enter 1 to search by area code

     Enter 2 search by distance

   Enter 3 search by speciality

Store data in a text file called “indata.txt”

store the result in a text file “outfile.txt”

Read data from text file

Write a function to search by area code, when the user enter the area code, such as 909, all Dentists with area code 909 will come up ( all data).

Write another function to search by distance ( in this function display all the data and smallest distance with data belong to smallest distance)

 

Write a search function to look for dentist with specialty ( if the user searches for surgeon), all dentists  with surgeon specialty and its all data including, license number ,names, distance show up

Last function search by license number.

Write a function to display the result(s)

Use Binary search  as a backbone search Function