Resource assignment fri

Please find at least 5 sites with useful and relevant information that focus on some aspect of blockchain in finance. Include a short summary of the sites and the applicable citations/reference information.

Python Assignment

Instructions:

NOTE: Make sure to fully read the instructions before starting

With this file you will find a handful of files ending in .txt containing the following data:

schedule.txt:

    A table containing applications, command line flags, start times, stop times, whether the application is enabled,

    and the days of the week the application runs. Days of the week are read as follows:

    1,4-7 = Sunday, Wednesday, Thursday, Friday, Saturday

    *     = Every day of the week

apps#.txt:

    A date to consider and an unsorted list of application names

example.txt:

    Example output for apps1.txt

Create a Python 3 program that does the following:

    1.  Takes the path to a schedule file, the path to an app file, and the path to an output file as command line arguments

    2.  Writes a csv of the applications that would run on the date in the app file as well as their options,

        start times, and stop times

For example, executing the following should result in a file similar to example.txt:

    python3 script.py schedule.txt apps1.txt example.txt

You can assume the apps files will never contain an application that is not present in the schedule file and that

neither input will contain malformed or invalid data

Discussion 4

 

Preamble

In August of 1997, a Swiss couple, John 52 years old and Buntham 26 years old Graben Stetter, were arrested at the Hilton in Buffalo, New York, and accused of smuggling thousands of computerized pictures of children having sex into the United States. The couple were alleged by authorities to have sold wholesale amounts of child pornography through the internet and carried with them thousands of electronic files of child pornography to the United States from their Swiss home.

Allegations

  1. The couple were unproven to have agreed over the internet to sell child pornography to the United States (US) Customs agents posing as local US porn shop owners.
  2. The couple were suspected to have agreed to sell 250 CD-ROMs to US investigators for $10,000. According to reports, one CD-ROM had over 7,000 images.
  3. The couple were further alleged to have their 2-year-old daughter, traveling with them at the time of the arrest, who is also a victim.
  4. Authorities professed that photographs of the 2-year old daughter are on the CD-ROMs the parent were distributing.

Mitigation

Criminal’s MO is a learned behavior that continue to grow, develop, and advance tirelessly as the perpetrators turn out to be more experienced, sophisticated, and confident in the operation. Digital imaging technology and the internet allegedly help to unearth Swiss couple; John and Bentham’s prevailing MO, with intent of producing, marketing, and distributing child pornography materials to counterparts, and vulnerable innocent citizens of the world community.

          Underground communications, seizure of 250 CD-ROMs and arrest of the Swiss couple was made possible by efficient use of computer and internet technologies. The couple were targeting international buying communities, secured agreement to sell and distribute illicit materials. Furthermore, the illicit items were alleged to have been digitized for transport, ease of storage, and ease of duplication as soon as the couple arrive in the United States. Emergence of computer and internet technologies helped digital forensic investigation in process.

Questions

The Swiss couple attempted to underestimate the United States custom agents and digital forensic investigator. Provide all-inclusive description on the importance of computer and the internet technologies.

The couple were suspected to have agreed to sell 250 CD-ROMs to US investigators for $10,000. Provide comprehensive narrative on how to approach the Swiss couple with only allegation; yet, not officially charged.

Testing Project Proposal Paper on Reconnaissance Phase

Reconnaissance project need help to get done. Below is the project requirement. USA 

  • Prepare a business case justifying the need for a penetration test. Remember, the project manager is usually NOT excited about the test and is only doing it to check a box. Make sure they are aware of why it is necessary, and what benefits it brings them. In this business case, be sure to include why Penetration Testing is important from the business perspective, not just the security perspective.
  • Develop a project timeline. Use project management software such as Microsoft Project, Zoho Projects, Team Gantt, or any other similar piece of software to develop a Gantt Chart showing the timeline. This project is due to take 5 weeks (Weeks 2-6 of our course).
  • Define what deliverables the organization can expect from you. At what points in your timeline can they be expected (be sure to include these in your timeline above!), and what will they contain?
  • Discuss the difference between active and passive information gathering. What activities are conducted in each type of information gathering?
  • Discuss what OSINT is and what kinds of tasks it entails.

Paper Requirements:

  • Written Communication: Write in a professional manner using APA 6th Edition and formatting with correct grammar, usage, and mechanics.
  • Resources: Identify at least two scholarly resources (peer-reviewed. Scholarly journals, not news articles, Wikipedia, blog posts, etc…) and two industry resources (whitepapers, industry (e.g., Cisco, Palo Alto Networks, etc…) blog posts, Cybersecurity professionals (Troy Hunt, Bruce Schneier, etc…) blogs, etc…).
  • APA Formatting: Resources and citations are formatted according to APA 6th Edition.
  • Length: 3-5 Pages (not including Title Page, References, and any Abstract/Executive Summary)
  • Font and font-size: Times New Roman 12pt, double spaced

 

Resources:

2 questions – Each question needs 3 answers – with 1 APA reference for each answer – Each answer atleast 200 words

2 QUESTIONS, EACH QUESTION WITH 3 ANSWERS, EACH ANSWER 200 WORDS WITH 1 APA REFERENCE FOR EACH ANSWER

Question 1:

 There have been many books and opinion pieces written about the impact of AI on jobs and ideas for societal responses to address the issues. Two ideas were mentioned in the chapter – UBI and SIS. What are the pros and cons of these ideas? How would these be implemented? 

Question 2:

 Explain how GDSS can increase some benefits of collaboration and decision making in groups and eliminate or reduce some losses 

PCA

  

Assignment:
Provide a reflection of at least 500 words of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have observed these theories and knowledge being applied to an employment opportunity in your field of study. 

Requirements:

Provide a 500 word minimum reflection.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited. 

Share a personal connection that identifies specific knowledge and theories from this course. 

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 

You should NOT provide an overview of the assignments given in the course. Rather, reflect and write about how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace. 

Python Requests Library( Module)

Needed description of Requests Library Functions.( 1 or 2 pages)

Important point i needed, Examples for about Requests Library Functions.  In that examples if you use name one of them supposed to be BURAK. 

i needed those examples on WORD PAGE AND ORIGINAL CODING FILES.