data structures – response

Please respond to the following discussion with 150 words or more:

 When considering computer science then the data structure is considered  to be a data organization as well as storage format which enables  efficient access as well as a modification which would mostly depend on  data structure and meant for building relationships with those as well  as with those of function or operation which would apply to the data.
The  data structure role in programming is meant for use to storing the data  in a specific, efficient yet organized manner and some of the use of  data structure would require the array, stack, queue, linked list, tree,  etc, where a programmer could help in selecting specific data structure  and then using it as per their convenience.
Some of the basic  applications which are the candidates for the data structure are being  used for implementing the physical forms of the abstract data types  which could help in translating any kind of application like displaying  the relational database as that of the binary tree wherein the  programming language like data structure would be used for organizing  the code as well as information in digital space.
The major  advantages of that of Array List over that of an array are while the  real world is taken into consideration and this would be appended  dynamically wherein the ArrayList would not have a defined memory  allocation similar to the normal array while they have been declared  which could be appended with regards to runtime and hence this would  save any un-utilized memory usage by that of the program.
One would prefer one with respect to the working mechanism while mostly one would use an array list 

List the following briefly each question in 30 words and Explain the differences for 1.7

1.1 What is the OSI security architecture?

1.2 What is the difference between passive and active security threats?

1.3 List and briefly define categories of passive and active security attacks.

1.4 List and briefly define categories of security services.

1.5 List and briefly define categories of security mechanisms.

1.6 List and briefly define the fundamental security design principles.

1.7 Explain the difference between an attack surface and an attack tree.

Firewalls

Question A

The sphere of security shows how access controls can be implemented to defend against threats. Firewalls have been a significant control mechanism to control the flow of information. Select and discuss a firewall type from this week’s reading. Include what factors you would include in a brief to your organizational leadership in selecting this firewall for your organization’s network. 

Question B

 

Symmetric and Asymmetric Encryption

Discuss the difference between Symmetric and Asymmetric Encryption to include the process each uses to secure the information between the sender and receiver. Which is more secure?

Business intelligence

 

BE-11

1.  Based upon the current state of the art of robotics applications, which industries are most likely to embrace robotics? Why?

2.  Watch the following two videos: https://www. youtube.com/watch?v=GHc63Xgc0-8 and https://www.youtube.com/watch?v=ggN8wCWSIx4 for a different view on impact of AI on future jobs. What are your takeaways from these videos? What is the more likely scenario in your view? How can you prepare for the day when humans indeed may not need to apply for many jobs?

1.  Identify applications other than those discussed in this

3.  Identify applications other than those discussed in this chapter where Pepper is being used for commercial and Personal purposes.

4. Conduct research to identify the most recent developments in self-driving cars.

Java

1.Give an example of a while loop, then provide the equivalent do-while loop and for loop.  Then give a different example of a do-while loop, along with the equivalent while loop and for loop. Finally, give an example of a for loop, along with the equivalent while loop and do-while loop. Use your examples to illustrate the advantages and disadvantages of each looping structure, and describe those advantages and disadvantages.

Your Discussion should be at least 250 words in length, but not more than 750 words. Once you’ve completed your initial post, be sure to respond to the posts of at least 3 of your classmates.

2.attached

Practical connection assignment ( 500 word ) SUBJECT:Legal, Regulations, Investigations and Compliance.

  

Assignment: SUBJECT NAME : Legal, Regulations, Investigations and Compliance.
((Provide a reflection of at least 500 words (or 2 pages double spaced))) of how the knowledge, skills, or theories of this course have been applied or could be applied, in a practical manner to your current work environment.( MY CASE I AM NOT WORKING CURRENTLY AND I AM A FULL-TIME STUDENT ) If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Requirements:

Provide a 500 word (or 2 pages double spaced) minimum reflection.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited. 

Share a personal connection that identifies specific knowledge and theories from this course. 

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 

Need 750+ Words With No Plagiarism And 2+ Scholarly References In APA Format

We learn from our readings that the use of mobile devices in our society today has indeed become ubiquitous.  In addition, CTIA asserted that over 326 million mobile devices were in use within The United States as of December 2012 – an estimated growth of more than 100 percent penetration rate with users carrying more than one device with notable continues growth.  From this research, it’s evident that mobile computing has vastly accelerated in popularity over the last decade due to several factors noted by the authors in our chapter reading. In consideration with this revelation, identify and name these factors, and provide a brief discussion about them.

A substantive post will do at least two of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide outside schoarly sources (for example, an article from the UC Library https://www.ucumberlands.edu/library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.