physical security

Identify and research the latest electronic technology security being used to provide the highest level of security possible. For example, you can research “wireless signals such as radio, laser, and microwave,” the project “imaging system for immersive surveillance current technologies,” or another new or emerging technology of your choice.

  1. Find a resource–a scholarly article, security organization article/whitepaper, or web article. Give the article’s APA style reference information.
  2. Summarize the article. Include all major points.
  3. Explain how this technology can and is being used. What kind of location, organization, level of needed security, etc., would need this form of technology? Justify your choice.
  4. Explain the advantages of using this new technology over the older technology options.

Be sure to use APA style in your assignment. Use your best grammar and punctuation. Expected length is 3 pages. 

Assignment

Lab 2240 ……8888

 Home>Computer Science homework help

  • Module 8 – EC Lab 1
    • Visit the following site:
    • Module 4:Problem Statement:  4.3.1.15 LAB: Character frequency histogram==============================================================================================Submit your Python solution through Blackboard (as explained below).
      Your lab will be graded on whether it’s been set up as a complete and workable solution.

      For your solution to be complete, your program must be able to

    • Set up your script based on the given specifications
    • compile (ie, no syntax error(s))
    • run (ie, no run-time error(s))
    • For your solution to be workable,
    • Your solution should be free of any type of errors (syntax, run-time, logic)
    • you may want to develop an algorithm first, using pseudocode
    • you do NOT need to turn in any algorithm
    • ==========================================================================================================================Grading rubric:
      • You’ll receive full credit, if 
        • your program
          • compiles and runs with no problems 
          • produces the expected output
      • You’ll receive partial credit, if 
        • your program
          • compiles and runs with no problems 
          • produces partial output (that is, incomplete output)
    • You’ll receive 25% of the points, if your program will not compile
    • You’ll receive 30% of the points, if your program compiles but has a run-time problem
    • You’ll receive 40% of the points, if your program produces logic error(s)
    • ==========================================================================================================================What to submit:
      • Your Python solution as a text file
      • A screenshot of a run of your program, showing the output
    • How to submit:
    1. Save your Python program (Module 8 – EC Lab 1) as a text file to your computer
    2. Save a screenshot of a run of your program, showing the output
    3. Click on the above link: Module 8 – EC Lab 1
    4. Locate your Python program (Module 8 – EC Lab 1 file) on your computer
    5. Locate your screenshot of the run of your program
    6. upload (that is, attach) BOTH files, under #4 and #5, to Blackboard
    7. Click on SUBMIT
    8. NOTE: You can make your submission just ONCE.  So, before making your submission, ensure that it does not need any additional editing/revisions.=====================================================================================================
  • AssignmentModule 8 – EC Lab 2
    • Visit the following site:
    • Module 4:Problem Statement:  4.3.1.16 LAB: Sorted character frequency hist===============================================================================================Submit your Python solution through Blackboard (as explained below).
      Your lab will be graded on whether it’s been set up as a complete and workable solution.

      For your solution to be complete, your program must be able to

    • Set up your script based on the given specifications
    • compile (ie, no syntax error(s))
    • run (ie, no run-time error(s))
    • For your solution to be workable,
    • Your solution should be free of any type of errors (syntax, run-time, logic)
    • you may want to develop an algorithm first, using pseudocode
    • you do NOT need to turn in any algorithm
    • ==========================================================================================================================Grading rubric:
      • You’ll receive full credit, if 
        • your program
          • compiles and runs with no problems 
          • produces the expected output
      • You’ll receive partial credit, if 
        • your program
          • compiles and runs with no problems 
          • produces partial output (that is, incomplete output)
    • You’ll receive 25% of the points, if your program will not compile
    • You’ll receive 30% of the points, if your program compiles but has a run-time problem
    • You’ll receive 40% of the points, if your program produces logic error(s)
    • ==========================================================================================================================What to submit:
      • Your Python solution as a text file
      • A screenshot of a run of your program, showing the output
    • How to submit:
    1. Save your Python program (Module 8 – EC Lab 2) as a text file to your computer
    2. Save a screenshot of a run of your program, showing the output
    3. Click on the above link: Module 8 – EC Lab 2
    4. Locate your Python program (Module 8 – EC Lab 2 file) on your computer
    5. Locate your screenshot of the run of your program
    6. upload (that is, attach) BOTH files, under #4 and #5, to Blackboard
    7. Click on SUBMIT
    8. NOTE: You can make your submission just ONCE.  So, before making your submission, ensure that it does not need any additional editing/revisions.

Module 8 – EC Lab 3

Module 4:Problem Statement:  4.3.1.17 LAB: Evaluating students’ results ================================================================================================Submit your Python solution through Blackboard (as explained below).
Your lab will be graded on whether it’s been set up as a complete and workable solution.

For your solution to be complete, your program must be able to

  • Set up your script based on the given specifications
  • compile (ie, no syntax error(s))
  • run (ie, no run-time error(s))

For your solution to be workable,

  • Your solution should be free of any type of errors (syntax, run-time, logic)
  • you may want to develop an algorithm first, using pseudocode
  • you do NOT need to turn in any algorithm

==========================================================================================================================Grading rubric:

  • You’ll receive full credit, if 
    • your program
      • compiles and runs with no problems 
      • produces the expected output
  • You’ll receive partial credit, if 
    • your program
      • compiles and runs with no problems 
      • produces partial output (that is, incomplete output)
  • You’ll receive 25% of the points, if your program will not compile
  • You’ll receive 30% of the points, if your program compiles but has a run-time problem
  • You’ll receive 40% of the points, if your program produces logic error(s)

==========================================================================================================================What to submit:

  • Your Python solution as a text file
  • A screenshot of a run of your program, showing the output

How to submit:

  1. Save your Python program (Module 8 – EC Lab 3) as a text file to your computer
  2. Save a screenshot of a run of your program, showing the output
  3. Click on the above link: Module 8 – EC Lab 3
  4. Locate your Python program (Module 8 – EC Lab 3 file) on your computer
  5. Locate your screenshot of the run of your program
  6. upload (that is, attach) BOTH files, under #4 and #5, to Blackboard
  7. Click on SUBMIT

NOTE: You can make your submission just ONCE.  So, before making your submission, ensure that it does not need any additional editing/revisions. 

Discussion 1

 

Introduction to Risk

Individuals, businesses and governments face risk daily. Risk is manifested in different forms and may be described as business, non-business, or financial. Irrespective of the type of risk, it’s important to remember the basic goals of security – to maintain confidentiality and integrity, while also ensuring the availability of data and systems. Organizations and governments usually employ different approaches to mitigating risks, but with a good understanding and consideration for risk elements including (i) vulnerabilities, (ii) threats & threat agents, (iii) impact, and (iv) likelihood. Other considerations include an organization or government’s appetite for risk, business goals, as well as internal and external drivers (laws, regulations, and standards). Proven strategies to deal with risk employ an enterprise risk management approach, and also rely on risk management frameworks including but not limited to: NIST’s risk management framework, ISACA’s risk IT framework, and COBIT 2019.

Overview

Follow these directions to complete the assignment:

Identify a cybersecurity-related attack:

Using scholarly sources and/or the web, research, identify, and share an example of a cybersecurity-related attack. Examples may include cyber warfare such as “Stuxnet” or the “Equifax” data breach. Feel free to use any of these. Once you’ve decided on the example you will share, “claim” it by posting it to the discussion. Do not post about the same type of attack as your classmates.

Create your post:

In a discussion post of approximately 600 to 800 words, explain risk and risk elements related to this attack, including a synopsis, attack type, characteristics, vulnerabilities, threats & threat agents, impact, and likelihood of this attack. You may need to make some assumptions as you write about the risk elements. Clearly state any assumptions that you make. Do not offer a potential solution to the attack;

 

Action Items

  1. Complete all of the reading for this module.
  2. Claim the cybersecurity-related attack you intend to discuss by posting it to the discussion.
  3. Create your discussion post according to the directions in the overview.

In a three page paper

  

In a three page paper, describe how COBIT controls can be used to increase organizations’ governance and compliance efforts.
 

What are the differences between

  

1.) What are the differences between a linked list and a stack?

2.) What are the differences between a stack and a queue?

3.) Explain exactly why a reference variable can’t be changed once it is set.

For questions 4 – 8, write the required statements to accomplish each. Assume that all the manipulations occur in main and assume the following structure definition:

struct gradeNode {

char lastName[ 20 ];

double grade;

struct gradeNode *nextPtr;

};

4.) Create a pointer to the start of the list called startPtr. (The list is empty!)

5.) Create a new node of type struct gradeNode that is pointed to by a pointer newPtr of type struct gradeNode *. Assign the string “Jones” to member lastName and the value 91.5 to member grade. Provide any necessary declarations and statements.

6.) Assume that the list pointed to by startPtr is maintained in alphabetical order. Provide the statements necessary to insert the following node properly: “Pritchard”, 66.5 (Note: you do not know what is in the list, only that it is maintained in alphabetical order.)

Use pointers previousPtr, currentPtr and newPtr to perform the insertions. Assume that newPtr points to the new node.

7.) Write a while loop that prints the data in each node of the list. Use pointer currentPtr to move along the list.

8.) Write a while loop that deletes all the nodes in the list and frees the memory associated with each node. Use pointer currentPtr and pointer tempPtr to walk along the list and free memory, respectively.

9.) Write the code to declare a structure “myNode” that holds an integer value and a next pointer.

10.) Assume you have a linked list of “myNode” structures and the pointer “head” points to the first node of the list. Write a function that takes the head pointer as a parameter and returns a pointer to the last node in the list.

11.) Assume you have a linked list of “myNode” structures and the pointer “head” points to the first node of the list. Write a function that takes the head pointer as a parameter and a second parameter which is the number to search for. The function returns a pointer to the node if the number is found and NULL if the number is not in the list.

12.) Assuming the following structure definition write a proper push function to save a number to a list used as a stack.

struct Node

{

int number;

struct Node *next;

};

13.) Assuming the previous structure definition from problem 12, write a proper remove function to remove a number from a list used as a queue.

agile or waterfall ( software systems design) jan 26

I have mentioned several times that you will be doing a team project this semester…lots to do in the project and lots to manage…

You have all worked on team projects in the past…and some of you (okay, most of you…okay, all of you) have expressed concerns over doing a team projects…and you have talked about the many issues and problems that go along with a team project…

But we won’t let that happen this semester!…because this semester, we have the choice of managing the project as with waterfall or agile…

For this assignment, given what we have discussed about waterfall and agile development, tell me which process do you think would work better in school projects – agile or waterfall?…explain why you think one will work better, and why you think the other will not work as well…be VERY SPECIFIC regarding SPECIFIC class projects and SPECIFIC class project tasks, and how they line up to either agile or waterfall processes…use your past experience with group projects as a reference…

DO NOT GIVE ME DEFINITIONS…

Again, when you have completed this, you should have 1 to 2 pages…if you have any questions about anything, just let me know…

Practical Connection Assignment

Provide a reflection of at least 500 words of how the knowledge, skills, or theories of “Human-Computer interaction and usability” course have been applied, in a practical manner to your current work environment (As a Dot net developer). 

Provide a reflection of at least 500 words of how the knowledge, skills, or theories of “Organ leader and decision making” course have been applied, in a practical manner to your current work environment (As a Dot net developer). 

600 words – Prototypes Influence

How do prototypes influence the opinions of a potential user? Is there a method that you have studied in academic literature that neutralizes a potential users opinions of an end-product.  

Please include in-text citations

Define the following database terms

  

1) Define the following database terms: relational database, table, record, and field. 

2) What is SQL and what is it used for? Can you give some examples of SQL statements and explain what results are obtained from these statements?

3) Read the Week 7 iLab instructions and discuss the expectations you have regarding this lab. Do you see the importance of being able to access a database from a script or program? How did your actual lab experiences meet your expectations? Are there specific insights or challenges you encountered that you would like to share with the class?  
 

What did you learn about VBScript database access and SQL commands in completing this lab?

Discussion10

150 words+

What do you think Aritfical Intelligence do for: education, medicine, manufacturing or transportation. Pick one to address.