Paper #1 : Critique a paper

– Read the below paper and critique the paper

Format:

– Times Roman Font: Size 12, Single Space

– Title of the paper(Critique of the paper and then give Title, Author, and Publication)

– Abstract: 1/4 page

– Format of the main body of the term paper (example)

           – Section 1: Introduction – 1/3 page

           – Section 2: Discuss the approach taken by a published paper related to Big Data Security               

                              and/or Privacy – Summarize the approaches in the paper (2 pages)

           – Section 3: Discuss the Pros and Cons of the papers discussed in section 2. (1/2 page)

           – Section 4: Summary and Directions – i.e., how you could extend the papers discussed in section 2.  

                              (1/3 page) 

– References: Any paper you have examined in your term paper must be referenced

Paper link: https://pdf.sciencedirectassets.com/280203/1-s2.0-S1877050917X00124/1-s2.0-S1877050917317015/main.pdf?X-Amz-Security-Token=IQoJb3JpZ2luX2VjEDYaCXVzLWVhc3QtMSJGMEQCIHPGq6AOCQ4ATY9gIt0ytGiCqbgFoZ9IjN1cDLgXVB93AiAWCGPpAw9NJvsnOE%2BHDGYrJbYCOrznoolGIvmfCaapYyrVBAju%2F%2F%2F%2F%2F%2F%2F%2F%2F%2F8BEAUaDDA1OTAwMzU0Njg2NSIMjtnlDJUeEXVjqGDcKqkE9vEP6I14PMskgJRsR%2Bsm%2By7V5qtPgH18s8yvunO7oH0fbVZcLOI8S78px4xlI3quhLMpnVtSQbDNNCXBDGOVb%2B9%2FVr8Z%2F4Ck%2BVLxzut%2FD9kiElVpqCB8Rb5JjpsDInzj9BzJMLz4MhN1SMdEl86Bt0VLxFK1fM6g%2FFAu6v8TAZDz89kITjsncqC67K14U1Q5WM9HiRACkRqwkmGHWOlx30krudjctoB%2BzBb66ZGbLcdPMcT0efpDDFZorxV0nOKCtBGR%2FSV5HfWwIo0SlumLzlUa3mkoouemsvI4bSJyKGhs6sYV1brQcrzVZoqzxiLfJYKDTidCSVP8gm0eHnGb%2BXcgmXEWpUuKOMVVD4r5YMyzhB1Mc8adp20z9taqLRod7QBkpG99DxPEEWDAomas2etxxfhTigTH%2BA33JC5Anr8kb4BCXjMxZkG0Ql7ZWRck2IvnwOVyOnsTZyN2XQW7qyEO9RgLsfdYQ1ojenURT4iTXavMe9TFu1yCyeO%2FCm7FpF59%2FDYurijhej6pTOY%2F%2Bh6VnzIOJtU4CnAnvuQSktoLS7AgSwzRh8gN0fZ4SxfA8Vit955OU2sMjt0hNups1ZebdgjUGIYNoQu9cSQSsZPRVYhhKDRnvLsYVqfZcDIVKDdoejsTa73BRYSbTUIZNAb7GFeuTitpNrUohMMHrOmQC1iUF7bFnEXWJqsfhx3CxiM1mx71Yf2PluprAQELI01tfXMVUSUwTTCGqPuZBjqqAZIGqPysQLktjh0%2FxYiiXwhiT1Wly%2FbbcnIUFXRk8Mj1aHlwj2p1hrD38UoL7iPnQ1dWHw0PEK%2BJ4RRiYZeYH1PVYcp%2Fw0hvo%2BzD5dNT2VgAJUvFDFKieOniHJkybsIzDgPlNpYzpNgk4BqA51wlcJxfmuXWcY6gScU82fa4r%2BCeKkkbRt4JFt8CNguh%2FkeA4UjItTIQdQxLVZnpPoAsWnIuA0Ci1bD8w%2BrW&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Date=20221006T143230Z&X-Amz-SignedHeaders=host&X-Amz-Expires=300&X-Amz-Credential=ASIAQ3PHCVTY33ANJZO7%2F20221006%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Signature=6f746038c8fae1d5daecc471d55f51c40fb99ceb5a8ddae2a8a7cf45662422b5&hash=b9edb4117b408130594efca5b166af2761ddbadbac1bc34f62814d5e2cb5ace7&host=68042c943591013ac2b2430a89b270f6af2c76d8dfd086a07176afe7c76c2c61&pii=S1877050917317015&tid=spdf-73ad4472-97a4-45a4-837a-e10b341a1fc2&sid=8a1df9b1377e9344938a0810e5a699d76619gxrqa&type=client&ua=51515a01530454540100&rr=755f1b53bf8de9a9

Write an Assembly program to do the following.

 

Your program should define three arrays such that Array1 has eight values: $01, $02, $03, $04, $05, $06, $07, $08 and Array2 has eight values: $11, $12, $13, $14, $15, $16, $17, $18, and Array3 has eight bytes reserved. The program reads DIP switches, then, does the followings:

1. If the readings are %00001001 = $09, then, copy the data from Array1 to Array3 and display ‘1to3’ on 7segment units sequentially (a letter at a time)  3 times.
The interval between the letters is 0.6sec. You should use TIMER to time exactly 0.6sec. After displaying the letters, your program is done. Note: CPU speed is 24MHz

2. If the readings are %10010000 = $90, then, copy the data from Array2 to Array3 and display ‘2to3’ on 7segment units all at once 3 times.
The interval between the letters is 1msec. You should use TIMER to time exactly 1msec. After displaying the letters, your program is done.

3. If the readings are neither$09 nor $90, then, turn on all LEDs, and go back to the beginning of the program to read DIP switches repeatedly.

Discussion with 500 words and

 

Discuss in 500 words, how much redaction is necessary to anonymize an electronic health record. Is it enough to redact the name? The name and address? Is a medical record like a finger print?

Use at least three sources. Use the Research Databases available from the Danforth Library, not Google.   Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.

Write in essay format not in bulleted, numbered or other list format. 

Assignment 1

 Overview:In Chapter 2 we talked about how computer crime affects forensics and you learned about the following categories:

  1. Identify theft
  2. Hacking systems for data
  3. Cyberstalking / harassment
  4. Internet fraud
  5. Non-access computer crimes
  6. Cyberterrorism

InstructionsFor this week’s assignment, please do some external research and identify at least three actual events for each category. Detail what happened and be sure to cite your sources. The intent here is to help you understand how the world is truly internetworked and why digital forensics is an important role in our environment. 

Research paper on composition. 800 words

 

  1. Discuss the visual assets such as charts, interactive controls, and annotations that will occupy space in your work.
  2. Discuss the best way to use space in terms of position, size, and shape of every visible property.
  3. Data representation techniques that display overlapping connections also introduce the need to contemplate value sorting in the z-dimension, discuss which connections will be above and which will be below and why. Show example using any chart or diagram of your choice.

apa format with atleast two references . 800 words

Discussion

 Describe each of the elements of a Business Continuity Plan (BCP).

 An initial post must be between 250-300 words 

assignment work

 Find a company that is struggling. Where is it in the positioning matrix? Could the company be more successful if it changed any of its Ps (e.g., to head to the lo-lo-lo-lo or hi-hi-hi-hi cells)?  

Objective

  

Objective:
Review file streams and sorting (or learn this if you haven’t in 22A)
Learn about vectors (if you haven’t in 22A), string streams and sort
Assignment: Write a program that reads a text file containing a set of test scores. Each line in the file contains scores of a specific student. For example, the first line has the scores for the first student and so forth. Average the scores for each student and save them in a vector of final scores. Then sort the final scores to calculate the class average and median. Print the final scores sorted from least to greatest, the class average and median. Detailed set of requirements: File processing:
Program should try to open a file using a default file path first, then check if it was successful, if not, ask the user for a different file name/path and try again until it succeeds. Do not try to process a file that you could not open. Remember to close the file when done reading.
To make sure you process each student’s scores separately, read each line from the file using the getline function. You can find an example on how to use getline here: http://www.cplusplus.com/forum… (Links to an external site.) Links to an external site.
Convert each line, which should be a string, to a string stream, so it can be used as a source for the individual test scores:
stringstream lineStream(line) // line is the string read from the file.
Read the individual scores from the lineStream variable as you would from an ifstream.
Store all final scores in a vector (not an array!).
To add values to a vector, use function push_back.
Sort the data using the sort function (you will need this for the median)
Refer to http://www.cplusplus.com/refer… (Links to an external site.)

Links to an external site. to learn how to use sort.
Calculate the average and median of the values in the vector.
Average is calculated by adding all data points then dividing by the number of data points.
Median is the data point in the middle after you have sorted them. If there is an odd number of data points, there will be only one in the middle. If there is an even number of data points, the median is the average of the two in the middle. Your algorithm must work for both cases.
Define separate functions to calculate and return average and median.
Define a separate function to print the required info on the screen:
This function should receive the vector, the average and median as parameters.
Use a range-based for loop to print the scores in the vector.
Do not use global variables!
Document your source code following the guidelines:
Lab Documentation Guidelines