Chat for me and the players

GTA Online is a multiplayer phenomenon on PS4, Xbox One and PC . And it is even more so on these dates, since the Halloween 2021 events are held in Los Santos. Not only do we have an alien invasion and Christine’s dangerous car, but there are quite a few dangerous killers in GTA Online.

Do you regularly play GTA Online ? If so, we recommend you take a look at online chatting rooms, where we discuss various news about the game. You can get an exclusive t-shirt. Four dangerous serial killers await you in GTA Online, based on well-known characters such as Jason Voorhees and Pennywise .

If you’re curious and brave, here’s how to find the killers and get a shirt in GTA Online. Will you have the courage to face them? Crime rates have increased in GTA Online, because there are four killers on the loose around the map. And each one of them honors a mythical character from popular culture.
We are talking, of course, about the clown, the driver (driven), the murderer (slasher) and the psychopath (psycho) . Each of them has a spawn zone, albeit randomly.

These evil NPCs will try to kill you as soon as they see you, but there is a great incentive to face them and defeat them: you will get an exclusive Twilight Knife t-shirt . Of course, for this you will first have to find and hunt them down. It is not easy at all, because Los Santos is very large, and each one will only appear based on some prerequisites and conditions. 

Network security thesis

Design, Analysis and Simulation of Optical Access and Wide-area Networks.

Include the abstract and 8 peer reviewed reference. About 6 to 10 pages APA format

Assignment Week 5

Instructions:

List and discuss professional certifications related to IT Controls.What are the advantages of these certifications?
What additional areas or expansion of existing certifications are needed?

Submission Instructions:

I am looking for a one to two page report with about 500 words using APA Style formatting.

 At least (2) APA reference. 100% original work. no plagiarism. 

Java Programming

  Read the attached files and submit the following files:

  • Television.java, Your definition of the Television class.
  • TelevisionDemo.java, Your final version of the file.
  •  Always include a comment line containing your full name in all Java source code files you create or modify. 

Assignment

Part 1: 

Big Data Analytics: Complete a review of the article by writing a 2-3 page overview of the article and another that substantiates the findings in(1-2) the article you are reviewing. 
Total Pages: 4
Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
Include at least 3 scholarly references

Part 2:
Discuss an organization’s need for physical security. What methods,  approaches, and models can be used by organizations when designing physical security needs? Lastly, explain how these security measures will safeguard the organization.
Total Pages: 2
APA7 guidelines with at least two references

Part3:
The job is to develop a computer and internet security policy for the organization that covers the following areas:

  • Computer and email acceptable use policy
  • Internet acceptable use policy
  • Password protection policy

Total Pages: 4
Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion. The plan should reflect the business model and corporate culture of a specific organization that you select.
Include at least 4 scholarly references

Bubble sort analysis with graph

 In this assignment, you will write a program to test bubble sort average efficiency. You  need to implement the bubble sort version which runs another pass over the numbers  ONLY if the previous pass had at least one swap. You will not do another pass over the  numbers if the last pass had no swaps. In such a case, you will return to the calling  function the number of passes used to sort the numbers.  The goal is to run bubble sort many times (1000 or 10,000) over a randomized set of  elements, then graph the results using Excel to see the likelihood of only a few passes to  sort the data. If the likelihood (probability) is very low, then the swap-based bubble sort  may not be a good performed on average. Below is my graph from 4 runs of 10,000 bubble sorts of 50 numbers. Note the average is  about 42 passes (49 passes is the maximum) Bubble Sort Analysis Graph 50 elements in array 4 program runs of 10,000 trials each 

Se491

1. Write a Visual Logic program that opens an input file and writes the file data in an array. 

2. Calculate the average from the data and display the average.

3. Think about a file exception error. Handle the exception in your program.

POS attacks

Point-of-Sale (POS) Attacks

Overview

Suppose you are an information security officer for a consulting firm that implements, secures, investigates, and supports POS for small and medium retail businesses.Read the article If You Shopped at These 16 Stores in the Last Year, Your Data Might Have Been Stolen. Choose two stores from the list and use the Strayer University Library to research the specific attack or breach.

Instructions

Write a 3–5 page paper in which you:

  1. Summarize the selected attacks, providing details on the breaches’ effects.
  2. Identify the common purpose of attacks on POS systems.
  3. Assess how and why these POS systems have become a prime target for hacking groups.
  4. Examine the forensics challenges that exist for investigations on POS systems.
  5. Integrate into the assignment at least three quality professional and/or academic resources, written within the past five years. 
    • Note: Wikipedia and similar websites do not qualify as quality resources.
    • One of your resources may be the provided article.

Formatting

This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions. Note the following:

  • The preferred method is for your paper to be typed, double-spaced, using Times New Roman font (size 12), with one-inch margins on all sides.
  • Include a cover page containing the assignment title, your name, your professor’s name, the course title, and the date. The cover page is not included in the required page length.
  • Include a source list page. Citations and references must follow SWS format. The source list page is not included in the required page length.

Learning Outcomes

The specific course learning outcome associated with this assignment is:

  • Assess the forensics challenges that exist for investigations.