Recursion and iteration discussion

 Write a response to the discussion below about recursion and iteration with a minimum of 150 words.

   In both recursion and iteration, a set of instructions is executed  repeatedly. In recursion, the method making the call and the method  being called is the same method (GeeksforGeeks, 2019). In iteration, a  loop repeats until a certain set condition is met (GeeksforGeeks, 2019).  Conditional statements terminate recursion and set values control  iteration termination. Recursion may utilize less code, but it has the  potential to create a lot of overhead because it is constantly calling  methods (Recursion (computer science), 2021). Because Iteration relies  on loops, it is much easier to find the time complexity of using  iteration versus recursion (GeeksforGeeks, 2019). Because the time  complexity of recursion due to overhead can be very large, it can lead  to system crash. There is no danger of this with iteration since it  relies on loops exclusively, which do not use as much overhead to  operate. Keeping this in mind, if the number of calls will be large and  speedy operation is essential, then iteration would be a better method  to use. If time and overhead are not an issue but tidy code is,  recursion is the better choice. Recursion involves breaking complex  problems down into increasingly smaller subproblems to make them easily  solvable (Recursion (computer science), 2021). In other words, the  solution to the bigger problem can be found in the solution to the  smaller problem. As such, it is suited for finding solutions to complex  programming problems. If you know how many times you will need to loop a  block of code, or the problem is a simplistic one, then iteration is a  straightforward and easy way to solve the problem. Certain data  structures work better using recursion or iteration, so it is important  to take this into consideration when choosing which data structure to  use.

4/1 Devotional

We are moving through the capstone quickly. There are a lot of things to complete for this course. One thing we should remember is to do our best. Colossians 3:17(new tab) says, “And whatever you do, in word or deed, do everything in the name of the Lord Jesus, giving thanks to God the Father through him” (English Standard Version, 2001/2016). The Apostle Paul encouraged the church at Colossae to put their whole being into their work and give thanks in all they do. We should be stimulated to do the same in this endeavor.

Reference

English Standard Version. (2016). Bible Gateway. https://www.biblegateway.com/versions/English-Standard-Version-ESV-Bible/(new tab) (Original work published 2001)

Instructions

  1. Be sure to address the following prompts in your paper:
    1. The Apostle Paul encouraged the church in Colossae by showing them that Jesus Christ was everything they needed in their lives. How does the sufficiency of Christ in everything we do translate to our modern 21st-century lives?
    2. As you near the end of this program, how does thankfulness play into your progress in the program and your associated experiences? Reflect upon how gratitude and faith have played a role in your studies and life.
  2. Your paper should be at least 250 words in length.

Discussion 250 words

 If you could, what would you do to help create a national “security culture,” in which everyone is more knowledgeable and proactive about threats to information security? 

Computer Networking

How does allowing all session cookies in your browser strike the right balance between meeting security needs and providing adequate Web access?

COMPUTER SECURITY FUNDAMENTALS – 9

 In 350 words please explain the security implications For each of the following terms:  Of the cloud, Software definition network (SDN) , Internet of things(IoT),  and NFV.  Please explain the security threats and best practices for each term and provide examples and good supporting rationale. 

COSO Framework

The COSO framework of internal controls is practiced within companies around the world. The objectives of the COSO framework are closely related to its five components. For this week’s activity, please discuss these five components of the COSO framework. Be sure to include each components’ impact on each of the COSO framework objectives. What do you feel an auditor would most be concerned with during an IT audit? Lastly, discuss suggestions for integrating COSO framework compliance into a company in which you are familiar. 

Your paper should meet the following requirements:

• Be approximately four to six pages in length, not including the required cover page and reference page.

• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook.

Defining Enterprise Architecture

 

Prompt

The field of enterprise architecture has no single, standard agreed-upon definition for what the study of it entails. In a general sense, we know that an enterprise is the highest level of an organization and that architecture is a plan for implementation. However, enterprise architecture is more than the simple combination of these words. Using what you have read so far and experienced, consider the following:

  • What is a good definition for enterprise architecture?
  • How would you explain it to a layperson?
  • What experience have you had in the past with software system design?
  • How does software systems design relate to enterprise architecture?
  • Why is EA a crucial area of study?
  • Why is EA so hard to define, explain, and get right?

Response Parameters

  • Posts should be 200 words minimum in length
  • Use APA formatting to cite all of your sources

Internet Research Assignment #3

 

2 pages

Read the Equifax Data Breach case and write a paper answering the following the following three questions:

  1. Discuss the moral issues in this case and whether Equifax’s actions constitute a moral failing.
  2. Should companies like Equifax be compelled to announce data breaches to the public within a certain time frame (e.g., 72 hours after discovery)? What would be the downside of legalizing such a requirement?
  3. In your opinion, why was security so lax at Equifax and how can this laxity be remedied?