Indexed Files

 Part I. Research: 1. 

Insertion sort, which is one of the other sorting techniques introduced in this chapter. Create an algorithm to implement an insertion sort. 2. Methods for sorting data files. You should produce a brief report discussing the different sorting options that can be used.

 Part II. 1.

Discuss the issues involved in sorting large data files. Explain how indexing is used to overcome this issue. 2. Explain the difference between physical order and logical order. 

Discussion Board Forum

  

After reading the related articles, explain whether you believe the 7-layer model is a complete and perfect representation of the way in which networks must be constructed. If you believe the model is a complete representation, support your position. If you believe the model could be improved upon, as suggested in the assigned reading, describe the new model and support your position. You may even have a different model in mind than either the 7-layer or 10-layer models presented. If so, describe your new model and support your position. 

The title of your thread must reflect your opinion. If you agree that the model is complete and perfect “as is,” title your thread “Keep the 7-Layer OSI Model.” If you believe the model could be improved upon, title your thread “Change the 7-Layer OSI Model.” In either case, support your position with 2 references. One reference may be the Bible. If you choose to support the 10-layer model in the assigned reading, your other reference may be the assigned article. Feel free to include as many references as needed. Note that, due to the nature of this topic, your references do not need to come from peer-reviewed journals. Much valuable information can be obtained from other sources, such as cisco.com, technet.com, etc.

Your thread must be at least 300 words and contain 2 references.

Execute a

  

1 – Execute a chained UNIX command to display ONLY the TOTAL amount of disk space available on either your personal Linux environment. (Hint: You will use a pipe | and another command from Chapter 6.)

2 – Write a chained UNIX command that displays the number of PDF files contained within a specified directory. Note that you are not being asked to perform this command on the system, but to simply write the command you would use to accomplish the task. (Hint: You will use one command from Chapter 7, two pipes, and one command from Chapter 6.)

3 – Explain the difference between the finger, who, and w commands. Why would you use one over the other?

1. a. Change your bash shell prompt to display as follows, using your own actual user id, please userid currentDate currentTime $

b. Make the change permanent, so the new prompt displays every time you log in.

2. In your home directory, create a new directory called “bin”. Add the path to this new “bin” subdirectory to the PATH variable, permanently.

3. Create the following aliases. Make these changes permanent so the aliases exist the next time you log in.

4. Add a line to your config file that displays a welcome message similar to the following (using your own name, of course). Hint: perform a man lookup on the “echo” command. Welcome, Michael! NOTE: It is probably a good idea to log out and then back into your shell and double-check that the changes above work as expected.

File

Ethical Hacking week 13

Attached Files:

Securing IoT Devices: What are the Challenges?Security practitioners suggest that key IoT security steps include:1) Make people aware that there is a threat to security;2) Design a technical solution to reduce security vulnerabilities;3) Align the legal and regulatory frameworks; and4) Develop a workforce with the skills to handle IoT security.Final Assignment – Project Plan (Deliverables):Address each of the FOUR IoT security steps listed above in terms of IoT devices.Explain in detail, in a step-by-step guide, how to make people more aware of the problems associated with the use of IoT devices. 

CMIS 102 6383 Introduction to Problem Solving and Algorithm Design

 The sixth assignment involves writing a Python program to read in the temperatures, as user input, for ten consecutive days in Celsius and store them into an array. The entire array should then be displayed. Next each temperature in the array should be converted to Fahrenheit and the entire array should be again be displayed. The formula for converting Celsius to Fahrenheit is °F = (°C × 1.8) + 32. Finally, the number of cool, warm and hot days should be counted and the number of each type of days should be displayed. You should decide on the thresholds for determining whether a day is cool, warm or hot..

Your program should include the pseudocode used for your design in the comments. Document the values you chose for the thresholds in your comments as well.

You are to submit your Python program as a text file (.py) file. In addition, you are also to submit a test plan in a Word document or a .pdf file. 15% of your grade will be based on whether the comments in your program include the pseudocode and define the values of your constants, 70% on whether your program executes correctly on all test cases and 15% on the completeness of your test report. 

MGT311 week 7

Week 7: Discussion

33 unread replies.33 replies.In reading chapter 11, you learned an “I” message consists of (1) how someone’s behavior makes you feel, (2) what the specific behavior is, and (3) the effect of the behavior.   The following three situations show a need for an “I” message.
1. Four of your employees share a single telephone line. You are aware that one of them, Harry R., is especially long-winded on the phone and talks for as long as 15 minutes. This prevents others from placing outgoing calls and ties up the line, preventing customers from getting through. 2. It is a requirement that waiters at the upscale restaurant you manage wear white shirts and ties. One waiter has been loosening his tie, dropping the knot about two inches, and unbuttoning his shirt collar. 3. Coffee breaks for your office staff are normally 15 minutes. When someone occasionally takes a few minutes longer, it’s not a big deal. Lately, however, one staff member has had three consecutive days when the break exceeded 20 minutes. Write a hypothetical “I” message for each of the three situations.

___________________________________________________________________________________________________________

You are required to make at least two comments on the responses posted by your classmates with a minimum of 50 words. Make sure you design your response with your own words. Your responses to your classmates must be of substance; not just “I agree” or “Good Post.” The purpose of the responses is to convert the discussion forum into a quality academic environment through which you improve your knowledge and understanding. Read and review all assigned course materials and chapters before you start working on your assignments.

Research Paper – Information Governance

Important Note: Please write this topic on   Impact of Health Information Technology on Patient. Since this is my final topic.Attaching the introduction, Literature review, and annotated bibliography  which I submitted

Please read below requirement fully and write 6 or more pages.

You have recently been hired as a Chief Information Governance Officer (CIGO) at a large company (You may choose your industry).  This is a newly created position and department within the organization that was founded on the need to coordinate all areas of the business and to provide governance of the information.  You will need to hire for all positions within your new department.

The company has been in business for more than 50 years and in this time has collected vast amounts of data.  Much of this data has been stored in hard copy format in filing cabinets at an offsite location but in recent times, collected business data is in electronic format stored in file shares.  Customer data is being stored in a relational database, but the lack of administration has caused data integrity issues such as duplication.  There are currently no policies in place to address the handling of data, business or customer. The company also desires to leverage the marketing power of social media, but has no knowledge of the types of policies or legal issues they would need to consider. You will also need to propose relevant metrics that should be collected to ensure that the information governance program is effective.

The CEO and Board of Directors have tasked you to develop a proposal (paper) that will give them the knowledge needed to make informed decisions on an enterprise-wide Information Governance program, addressing (at a minimum) all of these issues, for the company.  

Requirements:

The paper should include at a minimum of the following sections:

a. Title page

b. Executive Summary (Abstract)

C. Program and technology recommendations, including:

1. Metrics

2. Data that matters to the executives in that industry, the roles for those executives, and some methods for getting this data into their hands.

3. Regulatory, security, and privacy compliance expectations for your company

4. Email and social media strategy

5. Cloud Computing strategy

d. Conclusion

Application Portfolio Management (APM)

Application Portfolio Management (APM)

After reading the Application Portfolio Management (APM) section, page 276, Chapter 18 (Book: IT Strategy: Issues and practices, McKeen, J. D., & Smith, H. A., Pearson, 2015, Third Edition) , complete and upload one to two pages your reflection on the benefits of APM.  Due by Sunday, 7/25/2021, 11:59 p.m. EST.
Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research.  Please be sure that journal articles are peer-reviewed and are published within the last five years.The paper should meet the following requirements:

  • 1-2 pages in length (not including title page or references)
  • APA guidelines must be followed.  The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.
  • A minimum of 3 peer-reviewed journal articles.

The writing should be clear and concise.  Headings should be used to transition thoughts.  Don’t forget that the grade also includes the quality of writing.