PLECD13

 

Discuss in 500 words your opinion on what lessons should be learned from the 737 Max 8 crashes. 

Use at least three sources. Use the Research Databases available from the Danforth Library, not Google.  Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Write in essay format not in bulleted, numbered or other list format. 

Dictionary Attack in Python

  

Check the slides “OS Security II,” pg. 4-8. You are to implement a Dictionary Attack with and without Password Salt program in Python.

If you are not familiar with measuring execution time in Python, see the following website:

https://stackoverflow.com/questions/1557571/how-do-i-get-time-of-a-python-programs-execution

See the following steps.

1. Accept a user password of length N as keyboard input to your program. You can determine your own length N.

2. Compute the hash of the password from step 1.

Your hash function H() is simply the checksum. (See Assignment 2)

3. Now you become an attacker and try to find the password of length N.

Try every combination of length N password and for each combination, compute the hash and compare to the hash of the password from step 2.

Measure execution time.

4. Now let’s reinforce our password using the password salt. Accept an arbitrary non-negative integer number as keyboard input to your program.

5. Compute the hash of the concatenated password salt and password from step 4 and step 1. To compute the password salt portion of the checksum, you can treat the entire password salt as EITHER a single integer OR multiple one-byte integers.

6. Now you become an attacker and try to find the concatenated password salt and password.

Try every combination of an arbitrary non-negative integer number and length N password and for each combination, compute the hash and compare to the hash from step 5.

Measure execution time.

NOTE: your program should have separate functions for the checksum and the two dictionary attacks with and without the password salt by the attacker.

BE : JAA8

 Pick one of the following terms for your research: Balanced scorecard, ethical leadership, emotional intelligence, sustainability, or authentic leadership 

 

Journal Article Analysis : find one peer-reviewed academic journal article (within the past 3 years) that closely relates to the concept. 

DEFINITION: a brief definition of the key term followed by the APA reference for the term; this does not count in the word requirement. 

SUMMARY: Summarize the article in your own words- this should be in the 150 word range. Be sure to note the article’s author, note their credentials and why we should put any weight behind his/her opinions, research or findings regarding the key term. 

DISCUSSION: Using 300 words, write a brief discussion, in your own words of how the article relates to the selected chapter Key Term. A discussion is not rehashing what was already stated in the article, but the opportunity for you to add value by sharing your experiences, thoughts and opinions. This is the most important part of the assignment

Conflict Managment Dis 3

 In a hostage crisis, is it ethical for a government to agree to grant a terrorist immunity if he releases the hostages, even though the government has every intention of capturing and prosecuting the terrorist once his hostages are released? 

Need a 400 word content with minimum 2 references in APA 

Two C program

 In Problems 2, you will be reading input from a file; use the fscanf() function to do so. When reading input from a file, you do not need to verify its validity. You can assume that it has the expected type and the expected value(s). In Problem 1, you will be reading input from stdin; input verification requirements for Problem 2 are described therein. 

In each of the three problems in this lab, you will be required to declare and define certain functions. Doing so is essential: code that compiles and runs correctly, but does not implement all the required functions will not receive full credit. You are also welcome to implement additional functions. While this is not required, it can make your code easier to write. 

And you should not use any functions from the C standard library, except for those functions that are declared in the file , such as printf (or fprintf), scanf (or fscanf), fopen, fclose, etc. In Problem 1, you can also use the functions rand and srand declared in and the function time declared in    

Written Assignment

 

This week’s journal article was focused on the Complexity of Information Systems Research in the Digital World. Complexity is increasing as new technologies are emerging every day. This complexity impacts human experiences. Organizations are turning to digitally enabled solutions to assist with the emergence of digitalization. 

Please review the article and define the various technologies that are emerging as noted in the article. Note how these emerging technologies are impacting organizations and what organizations can to do to reduce the burden of digitalization.

Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research. Please be sure that journal articles are peer-reviewed and are published within the last five years.

The paper should meet the following requirements:

3-5 pages in length (not including title page or references)

APA guidelines must be followed. The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.

A minimum of five peer-reviewed journal articles.

The writing should be clear and concise. Headings should be used to transition thoughts. Don’t forget that the grade also includes the quality of writing.

Note: This written assignment is a REQUIRED ASSIGNMENT it is worth one-hundred (100) points. You are required to answer the questions as stated in the assignment question in order to obtain credit for the assignment by the due date. If you do not complete the assignment by the due date, you will receive a zero (0) for this assignment. There is a grading criterion associated with this assignment. Your work will be compared to other’s work, using SafeAssign for plagiarism, so please note that copying other people’s responses will not be tolerated.

Discussion 5 – Info tech import strat plan

Discuss an organization’s need for physical security. What methods, approaches, and models can be used by organizations when designing physical security needs? Lastly, explain how these security measures will safeguard the organization.

Please make your initial post of 500 to 600 words .

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

Visual Studio Coding (R)

   In this exercise, you will work with rivers data. The data pertain to the length of major North American rivers, and it is built-in data in R. You can access the data by typing: 

> rivers 

Your task is to build a function that returns descriptive statistics for different inputs. The function is named descriptive_function and has three arguments (i.e., another name of inputs). 

descriptive_function(list, char, num) 

The requirements of the function are as follows: 

· The function has three arguments. The first argument is a list of numbers in doubles. The second argument is a character, and the last argument is a number. 

· If char is ‘m ’, the function prints the arithmetic mean of the list. 

· If char is ‘v’, the function prints the variance of the list. 

· If char is ‘s’, the function prints the standard deviation of the list. 

· If char is ‘z’, the function prints the z-score of num with respect to the list. 

· You can use built-in R functions including mean(), var() and sd(). 

Sample test cases: 

> descriptive_function(rivers, ‘m’, 7) 

[1] 591.1844 

> descriptive_function(rivers, ‘m’) 

[1] 591.1844 

> descriptive_function(rivers, ‘s’) 

[1] 493.8708 

> descriptive_function(rivers, ‘v’, 8) 

[1] 243908.4 

> descriptive_function(rivers, ‘z’, 8) 

[1] -1.180844

200-250 words

 

Welcome to your sixth week discussion.

The chart you select to represent your data will be influenced by many factors. Kirk (2016) has put each chart into the five main families below:

•             Categorical: Comparing categories and distributions of quantities values

•             Hierarchical: Charting part-to-whole relationships and hierarchies

•             Relational: Graphing relationships to explore correlations and connections

•             Temporal: Showing trends and activities over time

•             Spatial: Mapping spatial patterns through overlays and distortions

Select a chart type from the text and discuss what the chart is used for and why you selected it. (The author has included a lot of different chart types in our course book)

Please make sure you have an initial post (about 200 words) and a comment/post to one of your friends’ posts.

BI: Week 12 Assignment

Chapter 11- discussion question #1-4 & exercise 4

When submitting work, be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) to support the work this week. All work must be original (not copied from any source).

Discussion Question 1. Explain why it is useful to describe group work in terms of the time/place framework.

Discussion Question 2. Describe the kinds of support that groupware can provide to decision makers.

Discussion Question 3. Explain why most groupware is deployed today over the Web.

Discussion Question 4. Explain in what ways physical meetings can be inefficient. Explain how technology can make meetings more effective.

Exercise Question 4. Compare Simon’s four-phase decision-making model to the steps in using GDSS.