Python help

In this assignment you will use PLY, a scanner and parser generator tool to create a scanner and parser for a grammar that is a slight modification to the one in last week’s homework (shown below). PLY is a Python version of the popular C tools lex and yacc. Note that using a generator is a simplified way of creating a scanner or parser and is much easier than writing either one manually. Begin by reading the following sections of the PLY documentation (found here). The docs for PLY are very well-written and easy-to-understand. I recommend reading the material closely and tracing through the examples as this will help immensely when you write your scanner/parser generator.

cloud computing

  1.  Examine cloud service and regulation requirements and an organizational strategy when using cloud provides. Additionally, students  will examine the risk and reward trade-offs of using cloud computing services and some of the security risks with moving to the cloud.
  2. Examine regulatory requirements needed to be applied to the cloud service provider.
  3. Define the risks and rewards of cloud computing.
  4. Discover the importance of a strategic approach to cloud computing adoption.
  5. Recognize cloud governance components and mitigating cloud security risks.

please read the question

 

1). Using the Web or other resources, write a brief paper about RSA, its history, its methodology, and where it is used.

2). Send a brief message (ten words minimum) using the Caesar Cypher.

Note your safe assign score. Score should be less than 25

Computer forensics

  

Option 1: Preparing for a Forensic Investigation

Scenario

You are an employee at D&B Investigations, a firm that contracts with individuals, companies, and government agencies to conduct computer forensics investigations. D&B employees are expected to observe the following tenets, which the company views as the foundation for its success:

· Give concerted attention to clients’ needs and concerns.

· Follow proper procedures and stay informed about legal issues.

· Maintain the necessary skill set to apply effective investigative techniques using the latest technologies.

Your manager has just scheduled a meeting with an important prospective client, and she has asked you to be part of the team that is preparing for the meeting. The prospective client is Brendan Oliver, a well-known celebrity. Last night, Mr. Oliver’s public relations team discovered that someone obtained three photos that were shot on his smartphone, and tried to sell the photos to the media. Due to the sensitive nature of the photos, Mr. Oliver and his team have not yet contacted law enforcement. They would like to know if D&B can provide any guidance or support related to the investigation—or, at the very least, if D&B can help them prevent similar incidents from occurring in the future. At this time, they do not know how the photos were acquired. The public relations team is wondering if a friend, family member, or employee could have gained direct access to Mr. Oliver’s phone and obtained the photos that way, although the phone is usually locked with a passcode when Mr. Oliver is not using it. In addition, Mr. Oliver e-mailed the photos to one other person several months ago; he has not spoken with that person in the last few weeks, but he does not believe that person would have shared the photos with anyone else.

Your manager plans to use this initial meeting with Mr. Oliver and his public relations team to establish rapport, learn more about the case, and demonstrate the firm’s expertise. The company sees this as an opportunity to build future business, regardless of whether they are retained to help with the investigation of this case.

Tasks

To help the team prepare for the meeting, your manager asks you (and your colleagues) to consider and record your responses the following questions:

· What is the nature of the alleged crime, and how does the nature of the crime influence a prospective investigation?

· Based on the limited information provided in the scenario, what is the rationale for launching an investigation that uses computer forensic activities? Would D&B and/or law enforcement need additional information in order to determine if they should proceed with an investigation? Why or why not?

· What would you share with the client about how investigators prepare for and conduct a computer forensics investigation? Identify three to five key points that are most relevant to this case.

· What sources of evidence would investigators likely examine in this case? Provide concrete examples and explain your rationale.

· What should the client, investigators, and others do—or not do—to ensure that evidence could be used in a court of law? Using layman’s terms, explain laws and legal concepts that should be taken into account during the collection, analysis, and presentation of evidence.

· What questions and concerns do you think the client will have?

· What questions should the team ask the client to learn more about the case and determine the next steps?

Must be 3 pages

12 page font

double space 

Emerging threats and counter measures 1

 After this weeks readings and your own research, describe and discuss ways, if any, we can safely share security data.Are there precautions we can take, technical solutions we can use, e.g., like using the CIA triad, or should we just not share these kinds of data? Feel free to argue for and against, just make sure to back up your statements with scholarly support 

Homework

What is the relationship between Naïve Bayes and Bayesian networks? What is the process of developing a Bayesian networks model?

Find Textbook in this link —

https://drive.google.com/file/d/1EKt8c8XhBJaedxzTkaFyihSTTcubTEQI/view?usp=sharing

Also Textbook PDF Attached below and also use outside references as well.

“”””””””There must be at least one APA formatted reference (and APA in-text citation) to support the thoughts in the post.  Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations. “””””””” 

Please FOLLOW all the INSTRUCTIONS

Computer Science Computer Science IT505 assignment

Follow the instructions and answer the questions as asked 

No plagiarism and no copy 

QUESTION 1:   

Your computer received the following digital, binary signal sequence. Now, your computer should cover the binary data to the text so you would read it on your computer screen. Assume, the received binary code was generated based on ASCII.

Received binary data:

01001001 01010100 00110101 00110000 00110101 00100000 01010111 01101001 01101110 01110100 01100101 01110010 00100000 00110010 00110000 00110010 00110011 00100000 01010111 01010101 01010011 01010100 00100000

You should write the text that will appear on your computer screen. Simply convert the binary data to text.

HNIT:  Do your web search and find (Binary to Text Translator) to convert the binary to back to text.

QUESTION 2:  

The user would like to save the incoming binary that you decoded in question 1. Therefore, the user would like to make sure there is enough memory space in his/her computer. What would be the minimum memory space (in Bytes) required to save the incoming data?  

QUESTION 3:  

Develop the Manchester Code for the first character of the digital data stream in question 1.  You should develop Manchester Code for 01001001

Your name must be on the digital signal code diagram 

QUESTION 4:  

In an airport, two computers in two different terminals will be in communication-based on the requirements below;

The user in terminal 1 and the receiver terminal 2 can operate on different clock frequencies.

The speed of the communication is not a concern; however, the quality of the communication is important.

The terminals are more than 100 meters apart. There is a heavy external electrical noise which would impact and disrupt the communication and cause miscommunication (corrupted message) between terminals

4a) 

What would be your preferred data transmission technique? Synchronous or Asynchronous transmission. Explain your answer

4b) 

What kind of Error Detection method you would use to make sure you will detect most of the communication errors? Explain your answer

QUESTION 5:  

There are three given different communication cases. Where a user would like to access a database.  

CASE 5-1: The user computer is on a transatlantic cruise ship and the receiver (the database) is in NYC.  

  1. a) What type of communication (digital or analog) would you use between given to communication points?
  2. b) If it is digital then write the cable type you would use, if it is analog then write the wireless communication type you would use.

CASE 5-2: The computers are in different cities. The user computer is in Los Angeles and the receiver (the database) is in NYC.  This has to be a fast and secure communication  

  1. a) What type of communication (digital or analog) would you use between given to communication points?
  2. b) If it is digital then write the cable type you would use, if it is analog then write the wireless communication type you would use.

CASE 5-3: Both computers are in the same building. The user computer is on the second floor and the database is on the third floor.

  1. a) What type of communication (digital or analog) would you use between given to communication points?
  2. b) If it is digital then write the cable type you would use, if it is analog then write the wireless communication type you would use.

Exp19_Access_Ch02_Capstone – International Foodies 1.0

  

International Foodies is an importer of exotic foods from all over the world. You landed a summer internship with the company and discovered that their product lists and the suppliers they buy from are stored in Excel workbooks. You offer to help by using your newly gained knowledge of Access to create a relational database for them. You will begin by importing the workbooks from Excel into a new Access database. Your manager mentions that she would also like a table that specifies food categories so that you can relate the products you sell to specific categories in the database. You will create a table from scratch to track categories, create relationships between the tables, and create some baseline queries.

     

Start Access. Open the downloaded   Access file named Exp19_Access_Ch2_Cap_Foodies. Grader has automatically added   your last name to the beginning of the filename. Save the file to the   location where you are storing your files.

 

You   will examine the data in the downloaded Excel worksheets to determine which   fields will become the primary keys in each table and which fields will   become the foreign keys so that you can join them in the database.
 

  Open the Suppliers.xlsx Excel   workbook, examine the data, and close the workbook. Open the Products.xlsx Excel workbook, examine   the data, and close the workbook.
 

  You will import two Excel workbooks that contain supplier and product   information into the database.
 

  Click the External Data tab, click   New Data Source, point to From File in the Import & Link   group, and then select Excel.   Navigate to and select the Suppliers.xlsx   workbook to be imported as a new table in the current database. Select First Row Contains Column Headings.   Set the SupplierID field Indexed option to Yes (No Duplicates). Select SupplierID   as the primary key when prompted and accept the table name Suppliers. Do not save the import   steps.

 

Import   the Products.xlsx workbook, set the   ProductID Indexed option to Yes (No   Duplicates), and select ProductID   as the primary key. Accept the table name Products.

 

Change   the Field Size of the QuantityPerUnit field to 25   in Design view of the Products table. Set the Field Size of ProductID and   CategoryID to Long Integer. Save   the changes and open the table in Datasheet view. Open the Suppliers table in   Datasheet view to examine the data. Close the tables.

 

You   will create a new table that will enable International Foodies to associate   each product with a food category in the database.
 

  Create a new table in Design view. Add the following fields in Design view   and set the properties as specified:
 

  Add the primary key field as CategoryID   with the Number Data Type and Number assigned to a new category.   (type the period) as the Description. Set the Caption property to Category ID.
 

  Save the table as Categories.

 

 

   Add CategoryName with the Short Text Data Type and Name of food   category.   (type the period) as the Description. Change the field size to 15. Set the Caption property to Category Name and the Required property to Yes.

 

Add   CategoryDescription with the Long Text Data Type. Set the Caption property to Category Description. Switch to Datasheet view and save the   table when prompted. You will enter Category data into the table in the next step.

 

   You will add 8 records to the Categories table so that you have some sample   data to test in the database.
 

  Add the following records to the Categories table:

Category   ID Category Name   Category Description 

1 BEVERAGES  SOFT DRINKS, COFFEES, TEAS 

2 CONDIMENTS  SAUCES, RELISHES, SEASONINGS

3 CONFECTIONS   DESSERTS,   CANDIES, SWEET BREADS

4 DAIRY   PRODUCTS  CHEESES

5 GRAINS/CEREALS  BREADS, PASTA, CEREAL

6  MEAT/POULTRY  PREPARED   MEATS

7 PRODUCE  DRIED FRUIT, BEAN CURD

8 SEAFOOD  SEAWEED AND FISH

  Close the table.

 

 

You will create   the relationships between the tables using the Relationships window.
 

  Add all three tables to the Relationships window. Identify the primary key   fields in the Categories table and the Suppliers table and join them with   their foreign key counterparts in the related Products table. Select the Enforce Referential Integrity and Cascade Update Related Fields check boxes.   Save and close the Relationships window.

 

You   will use the Simple Query Wizard to create a query of all products that you   import in the seafood category.
 

  Add the ProductName, SupplierID, and CategoryID fields from Products (in that order). Save the query   as Seafood Products.

 

Add   a criterion in Design view, to include only products with 8 as the CategoryID.

 

Sort   the query results in ascending order by ProductName. Run, save, and close the   query.

 

You   want to create a query that displays actual category names rather than the   CategoryIDs. You are interested to know which meat and poultry products are   imported. You will copy the Seafood Products query and modify it to delete a   field, then add an additional table and field.
 

  Copy the Seafood Products query   and paste it using Seafood Or Meat/Poultry   as the query name.

 

Open   the Seafood Or Meat/Poultry query   in Design view and delete the CategoryID   column.

 

Add   the Categories table to the top   pane of the query design window. Add the CategoryName   field to the last column of the design grid and set the criterion as “Seafood” Or “Meat/Poultry”.   Run, save, and close the query.

 

You   will create a query that identifies suppliers and their associated products.   Because there is a relationship between the two tables, you can now pull data   from each of them together as usable information.
 

  Create a query in Design view that includes the Suppliers and Products   tables. The query should list the company name, contact name, phone (in that   order), then the product name and the product cost (in that order).

 

Sort   the query by company name in ascending order, then by product cost in   descending order. Run, close, and save the query as Company by Product List.

 

You   determine that the data in the Company by Product List query could be   summarized with a Total row. You will group the records by company name, and   then count the number of products you buy from each of them.
 

  Copy the Company by Product List query   and paste it using Summary of Company by   Product   as the query name.

 

Open   the Summary of Company by Product   query in Design view and delete the ContactName, Phone, and ProductCost columns.

 

Click   Totals in the Show/Hide group on   the Query Tools Design tab. Click in the Total   row of the ProductName field, click the arrow, and then select Count.   The records will be grouped by the company’s name and the products for each   company will be summarized.

 

Modify   the field name of the ProductName column as Product Count:   ProductName to make the field name more   identifiable. Click Run in the   Results group (20 records display in the Datasheet). The results display the   product count for each company that supplies your organization. Save and   close the query.

Search and seizure as it applies to digital crime

 In order to complete Assignment #4 you will need to answer the below questions. Please complete the questions in a Word document and then upload the assignment for grading. When assigning a name to your document please use the following format (last name_Assignment #4). Use examples from the readings, lecture notes and outside research to support your answers. The assignment must be a minimum of 1-full page in length with a minimum of 2 outside sources. Please be sure to follow APA guidelines for citing and referencing sources. Assignments are due by 11:59 pm Eastern Time on Sunday.

1. Explain the intent and fundamental concepts of search and seizure law as it applies to digital crime.

2. Identify and explain situations where search and seizure are possible without a warrant. Please describe the limitations.