1)The Common Denominator AND 2)Spiderman is Afraid of Heights

1)The Common Denominator. 

Solve the problem “Basic Programming 2”, which you can find at this web address: open.kattis.com/problems/basicprogramming2 

Although this problem has several parts, there is a common theme to all of them. Part (a) of this problem is to write down what this common theme is (one sentence max). Part (b) is to solve the problem. 

2) Spiderman is Afraid of Heights.

Solve the problem “Spiderman’s Workout”, which you can find at this web address: open.kattis.com/problems/spiderman 

home work 5

   Write short answers, uploaded as a WORD DOCUMENT (300 words) and attach references   

  • 5.1 Provide a brief definition of network access control.
  • 5.2 What is an EAP?
  • 5.3 List and briefly define four EAP authentication methods.
  • 5.4 What is EAPOL?
  • 5.5 What is the function of IEEE 802.1X?
  • 5.6 Define cloud computing.
  • 5.7 List and briefly define three cloud service models.
  • 5.8 What is the cloud computing reference architecture?
  • 5.9 Describe some of the main cloud-specific security threats.

IT 348 week 4

DISCUSSION 400 words apa format and citations 

CASE: PepsiCo
“Take PepsiCo, for example. As one of the leading soft drink makers and bottlers, PepsiCo turned to IoT for the most basic of reasons and found an efficient solution. Like many enterprises, the company had inefficient and ineffective IT and OT infrastructure, as well as limited IT and OT resources available inside its plants. It also suffered from server sprawl, where each server supported a very small portion of the production load. PepsiCo essentially incurred high costs to purchase and support an ever-expanding infrastructure of underutilized servers, operating systems, and networking assets. The result: highly inefficient use of capital—at a minimum. Even worse, its inefficient network hindered the collection of data that would ordinarily drive plant productivity.”

What were the paybacks to PepsiCo after implementing IoT? Elaborate.

MoleMash – Enhanced

The MoleMash is an important project to work on as it allows you to start working with some of new functions and components that we haven’t explored yet. This includes working through images, random settings, allowing users to have control over timing, labels and other options. Instructions: • If you haven’t already, log into the MIT App Inventor and download the AI2 Companion App if you have an Android device. If you don’t have access to an Android, you can use the online simulator. • Complete the MoleMash app as a starting point in MIT App Inventor and make sure it works correctly. You’ll now focus on customizing it as part of the assignment this week. • Once you have completed the tutorial from Chapter 3, it is now time to customize it by changing and altering the following: o Change the image that is used for the mole. o Add buttons to let the user make the mole move faster or slower. o Add a label to keep track of the number of times that the mole has moved. o Add a second ImageSprite with an image that the user should not hit. If the user touches it, the user should have their score reduced. o Change the color of the background (or use an image). o Change the font and text to make the app look more professional. o Use a new block of your choice to add some unique feature to the game. CIS290 – Mobile Application Development MoleMash – Enhanced Requirements: • Submit a zipped file that contains all your apps that you’ve created. • Include screenshots to demonstrate what your app looks like.

https://www.oreilly.com/library/view/app-inventor-2/9781491907214/ch03.html#molemash

discussion

Pick a cloud computing deployment model and explain it in detail with examples. Why is this model important? 

Reflection

1 page

Please share your experience (both educational and non-educational) at university with us in a Reflection Paper.

this class is Computer and Information Networking

Portfolio Assignment

 Question:

 

It’s nearly 6 pm and you’re anxious to get out. It’s time to catch up on the latest episodes on the Game of Thrones show. Curiously, you feel like that show is a reflection of your life in the law practice. 

This is not what you expected when you took that LSAT seminar in your last year of college. Plus, you’re not too sure about this city especially with the rumors of a large Bat that comes out at night. Then what about this character called the Joker; is this guy for real? This city just oozes weirdness. You miss Central City.

Then Dent walks in your office waving an article about Metropolis. 

You wonder if it’s about the flying guy that is apparently from another world. Now that’s the life! Flying; bulletproof; heat-vision; x-ray vision, can run faster than a speeding bullet, super-strength. And doesn’t he have some kind of a relationship with an Amazon goddess? 

No. The article is about how there is a court ruling from Metropolis has breathed new life in the social media debate. You quickly scan the article which talks about how attorneys collecting relevant social media evidence must be prepared to properly authenticate it. 

In this article, the criminal defendant argued on appeal that the government had properly failed to authenticate certain Facebook posts attributed to him because the government failed to produce any witness identifying the Facebook chat logs on the stand. He argued nothing in the contents of the message was uniquely known to the defendant and the defendant was not the only individual with access to the Facebook account issue. 

In addition, the court rejected government’s argument that Facebook posts were business records that may be “self-authenticated” by way of a certificate from a records custodian under Rule 902(11) of the Federal Rules of Evidence. Much of it can be, you suspect, attributed to the court’s inherent mistrust of social media evidence with all the “fake news” accusations flying around. 

Dent looks at you for your thoughts because he’s actually leading a case whose evidence rests on offering social media evidence for its evidentiary matter. He wants to know whether (1) authenticating social media is the same as traditional paper evidence under Federal Rule of Evidence 901; and (2) what are the various instances where social media will enjoy a strong likelihood of being deemed authenticated; and also (3) how should one consider preserving social media in the future? 

chapter 11

 Half Page .. Need in 3 hours

Search the web for online tools that will help you track an IP address. (Such tools can be valuable if your system is attacked by a hacker and if you can cull the hacker’s IP address from system logs.) Evaluate several of these tools and decide which one you think would be most useful for tracking down an intruder.