Bitcoin Economics

This week’s reading centered around Bitcoin Economics.  For this week’s research paper, search the Internet and explain why some organizations are accepting and other organizations are rejecting the use of Bitcoins as a standard form of currency.  Your paper needs to identify two major companies that have adopted Bitcoin technology as well as one that has refused accepting Bitcoin as a form of currency. Be sure to discuss each organization, how they adopted (or why they won’t adopt) Bitcoin, and what recommendations you have for them to continue to support Bitcoin (or why they should support Bitcoin).Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing

Chapter Note

 Need to write about 350-word summary of EACH CHAPTER, so that it contains:

(part 1) important concepts of the chapter

(part 2) experience/application/opinions of the chapter.  

Total 4 chapters, 350 word for each

Discussion Response

Please respond to the discussion below using 150 words or more 

Good day, all! 

There are certainly a few key differences between static and dynamic data structures!

On the most basic level, as their names suggest, a dynamic data  structure is resizable whereas a static data structure is fixed.  According to geeksforgeeks.com article “Static Data Structure vs Dynamic  Data Structure”, both types of structures can modify their elements,  but a static data structure’s elements can be changed without changing  the space in memory that has been allocated to it (ShivamKD. 2018, Mar  13).

Consequently, overall performance of the code is s typically slower  when dealing with a dynamic data structure. This is because, for  instance, when an array list is utilized, the resize function of the  class must create a brand new copy of the original array and copy it to a  new one. This is much less efficient than a regular array (unless the  regular array itself needs to be resized).

Comparing the three dynamic data structures of array lists, linked  lists, and vectors, there are some notable differences as well. 

Both array lists and vectors are in the family of the List interface.  Linked lists also take part in the List interface but additionally take  part in the Queues interface. This addition adds more available methods  for the user to utilize in their code (Programcreek.com. 2013, Mar 4.  “ArrayList vs. LinkedList vs. Vector”). According to the article,  vectors double in size each time they are utilized, whereas an array  list only grows at a 50% rate. 

As far as implementation is concerned, according to the w3spoint.com  website, an array list should be utilized over a linked list if there  are more get/set operations in the code. Otherwise, for add/remove  operations the linked list is preferable (“ArrayList vs Linkedlist vs  Vector in Java”. 2018, Mar 13). There is a very noticeable difference in  their performance when comparing get/set and add/remove methods (as is  demonstrated in the article). As far as vectors go, one key component  associated with them is the fact that one can utilize and manipulate  elements in the vector utilizing index positions. This allows for  iteration over the objects within the vector similar to an array! 

Thanks class and best of wishes on your upcoming assignments!

computer forensics

 

  1. What is Computer Forensics and what are the different areas of Computer (or Digital as it is sometimes called) Forensics?
  2. What is your experience with Computer Forensics?
  3. What is Web Browser Forensics and why is it so important?
  4. What are the different types of web browsers based on use and popularity? Compare and contrast the top 5-10 web browsers.
  5. Which web browser do you use and why?
  6. What is the ranking of web browser in the top 5, in terms of security and why (compare and contrast) ?
  7. Does it matter the operating system when it comes to web browser?
  8. What are the different web browser artifacts and where can they be found?
  9. How do the top web browsers differ and how are they alike?
  10. What are the top paid and unpaid tools used for web browser forensics?

Practical Connection

Physical Security Practical Connection :

Topic: Share a personal connection that identifies specific knowledge and theories from this course. Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 
You should NOT, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace. 

Instructions: Please download the Practical Connections template (MS Word), which is already in APA 7 format, using size 12 Times New Roman font, 1-inch margins, TOC, Headings and Reference page. Provide at least a 500 word or 2 page double spaced not including the Title page, TOC or Reference page, reflection. If supporting evidence from outside resources is used those must be properly cited. If you insert images or tables in your report make sure you label them appropriately according to APA. Once completed name your file: YourName_Practical_Connections.docx and submit to the appropriate assignment folder. 

Cybersecurity Planning

Write Final Paper on “Web Application Authentication” 

500 word research  paper with at least 3 sources. There should be no lists. Include a meaningful title.

Do not double space.

You must include at least 3 quotes from your sources enclosing the copied words in quotation marks and cited in-line. 

There should be no lists – bulleted, numbered or otherwise. 

Pseudocode

  

Pseudocode 

Design a For loop that displays the following set of numbers:
0, 10, 20, 30, 40, 50….1000

MKT 8

 

Answer questions 1-4 of chapter 13, page 428 case 13.1.

1.  What additional information should Anna attempt to obtain regarding the absenteeism problem?

2.  Advise Anna on the steps she should take to control absenteeism. Include in your answer the types of standards and strategies she should use.

Discussion – Data Cleansing and De-Duplication

 

Organizations  are struggling to reduce and right-size their information footprint,  using data governance techniques like data cleansing and de-duplication.  Why is this effort necessary?  Briefly explain and support using APA  style citations. Remember to appropriately respond to two other learners  for full credit.

Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:

  • Ask an interesting, thoughtful question pertaining to the topic 
  • Answer a question (in detail) posted by another student or the instructor 
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide  an outside source (for example, an article from the UC Library) that  applies to the topic, along with additional information about the topic  or the source (please cite properly in APA)
  • Make an argument concerning the topic

 

At  least one scholarly source should be used in the initial discussion  thread. Be sure to use information from your readings and other sources  from the UC Library. Use proper citations and references in your post.