Computer Foundations I – Dicussion 4

Discuss the advantages and disadvantages of both Java and Ruby

Include, in your description, an analysis of what might have caused the problems and potential solutions to them. Be sure to provide supporting evidence, with citations from the literature

450 Words.

Authenticity, Integrity, Computer Data

 Discuss how might someone challenge the authenticity of computer records?

 More specifically, if you were presenting or providing evidence in a cyber crime case based on computer records, how would you defend a challenge and prove that your evidence was authentic and contained full data integrity. 

You will need to give examples of different scenarios either fictional and/or non-fictional. 

5/1 Devotional

The Bible contains truths that impact our lives every day. Grace is a common human trait that can be found in many worldviews. One of the most clear statements of God’s concern for man’s sinful heart is found in Proverbs 6:16–19, where we read:

There are six things that the Lord hates, seven that are an abomination to him: haughty eyes, a lying tongue, and hands that shed innocent blood, a heart that devises wicked plans, feet that make haste to run to evil, a false witness who breathes out lies, and one who sows discord among brothers. (English Standard Version)

Malicious plans and the evil plans of man God dislikes in no uncertain terms. In Mark 7:21–22 we again see God’s deep concern for the sin of humankind: “For from within, out of the heart of man, come evil thoughts, sexual immorality, theft, murder, adultery, coveting, wickedness, deceit, sensuality, envy, slander, pride, foolishness.” In the verses from Mark, we see just about every malicious issue that we observe on the internet. Apart from God’s grace of salvation from sin, we strive to provide a means of protecting those that use cyberspace.

  1. Be sure to address the following prompts in your paper:
    1. How would we apply God’s grace for the sin in our lives? What does God offer to deal with the sin in our lives?
    2. How does God’s love and redemption for our sin apply to policies and practices as a society?
    3. What are some ways we can model God’s love and redemption to policies and practices in the society within your cultural or religious background?
  2. Your paper should be at least 250 words in length.

data mining and neutral networks using python

 

 For this task, you need to download 4-time series from Yahoo! Finance website: Any student should have their own unique set of time series!  

Please collect available data for three years 2018-2020  

Please pay attention that for your analysis the time moments should be sorted from oldest to newest.  Use the daily closing price. 

DQ

interactive design is a combination of many businesses, technical, psychological, educational, artistic, and engineering disciplines. Which of the disciplines presented (see diagram in Preece text for full scope) do you feel is most important to HCI?

SIEMENS SIMATIC

I need to write a term paper on the topic Siemens Simatic- PCS7/WINCC (SCADA) 

There are all the requirements for the term paper alongside the template for the term paper.
Please help and thank you 

Write a program that generates n random integers between 0 and 9 and displays the count for each number

 

Write a program that generates n random  integers between 0 and 9 and displays the count for each number. (Hint:  Use an array of ten integers, say count, to store the counts for the  number of 0s, 1s, . . . , 9s.)

A modular program is expected – use Methods. The program specifications are as below. 

  1. In the main() method, declare an int array of size 10, named count.
  2. Implement a method populateCount(int[] cnt) that initializes the array to zero.
  3.  Implement a method countNums(int[] cnt, int n) that accepts  the count array and an integer n. The method should generate n random  numbers in the range of 0 to 9. It should keep a count of how many times  each number, 0 to 9; is generated in the array count. 
  4. Implement a method printNums(int[] cnt) to print the count  array.  Note, print “time” or “times” – which ever is appropriate. 
  5. Use basic structured programming and procedural programming.
  6.  Write a main() method that declares the count array. Invokes  the countNums() method with n = 10 followed by invoking the printNums().  Then invokes the countNums() method with n = 100 followed  by printNums(). And again, invokes the countNums() method with n =  1000 followed by printNums(). 
  7. Make sure you invoke  the populateCount(int[] cnt) method at appropriate times. And write out  the heading for each set, n = 10, 100, and 1000.
  8. Documentation. Includes your name, create date and purpose of lab.

LIT101 week 8 B

Discussion 8B: Symbolism in Business

No unread replies.No replies.

Businesses use symbols to help consumers identify with their brand. Review the following two articles about how symbols relate to a company’s brand.

Hidden symbols in common food logos: https://www.businessinsider.com/hidden-symbols-in-common-food-logos-2017-3 (Links to an external site.)

Make your brand iconic: The power of symbols in branding: https://stickybranding.com/make-your-brand-iconic-the-power-of-symbols-in-branding/ (Links to an external site.)

Initial Post:

If you started a company today, what would your logo look like?

What symbols would you use to convey your brand? Explain why you would choose that symbol and what that would convey about you or your business.

Responses to Others

Respond to at least two other posts. How was their use of symbolism similar to or different from what you chose to convey your brand?

Research Project

  

Scenario

After the recent security breach, Always Fresh decided to form a computer security incident response team (CSIRT). As a security administrator, you have been assigned the responsibility of developing a CSIRT policy that addresses incident evidence collection and handling. The goal is to ensure all evidence collected during investigations is valid and admissible in court.

Consider the following questions for collecting and handling evidence:

1. What are the main concerns when collecting evidence?

2. What precautions are necessary to preserve evidence state?

3. How do you ensure evidence remains in its initial state?

4. What information and procedures are necessary to ensure evidence is admissible in court?

Tasks

Create a policy that ensures all evidence is collected and handled in a secure and efficient manner. Remember, you are writing a policy, not procedures. Focus on the high-level tasks, not the individual steps.

Address the following in your policy:

§ Description of information required for items of evidence

§ Documentation required in addition to item details (personnel, description of circumstances, and so on)

§ Description of measures required to preserve initial evidence integrity

§ Description of measures required to preserve ongoing evidence integrity

§ Controls necessary to maintain evidence integrity in storage

§ Documentation required to demonstrate evidence integrity

Required Resources

§ Internet access

§ Course textbook

Submission Requirements

§ Format: Microsoft Word (or compatible)

§ Font: Times New Roman, size 12, double-space

§ Citation Style: APA

§ Length: 2 to 4 pages