Build a C program that has two functions: one for encryption and one for decryption.

 Procedure

 Implement one program that has two functions: one for encryption and one for decryption. 

Encryption: 1. Read keys from user input. Prompt the user to enter a character for each key. 2. Read the plain text (“data”) from the input file. The name of the input file is one of the command line argument. 3. Implement your encryption algorithm. 4. Encrypt “data” and write to a file. (The name of the file is chosen by the programmer.) 

Decryption: 1. Read keys from user input. Prompt the user to enter a character for each key. 5. Read the file that encrypted data was saved and extract the encrypted “data”. The name of the encrypted file is one of the command line argument. 2. Implement your decryption algorithm. 3. Decrypt the “data” and write to a file. 

MIS Discussion 9

 

There are three levels of management hierarchy: strategic, managerial and operational.

Discuss how the three levels of management hierarchy: strategic, management, and operational relates to the mission of a business.

As an IT professional, how would you use information technology to improve the efficiency the three levels of management hierarchy?

Your main discussion should be at least 300 words or more. Please use your own words. Need minimum 2 references

Assignment

 

Peer Review on security architecture and design  What does a peer review process look like? When does an assessment require peer review? Who should perform the peer review?

Answer those question using real life example 

  This assignment should be in APA format and have to include at least two references. Minimum of 400 words 

Cloud computing and digital forensics – Week 10

Week 10 Discussion: (500 words)

Describe in 500 words discuss the scope of a cloud computing audit for your business.

Use at least three sources. Use the Research Databases available from the Danforth Library not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Write in essay format not in bulleted, numbered or other list format. 

Do not use attachments as a submission.  

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your post and that you reply to two classmates in a substantive way (not ‘nice post’ or the like).  Your goal is to help your colleagues write better. Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. . I will not spend a lot of my time trying to decipher nonsense. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about.  Please do not submit attachments unless requested.

Week Ten Assignment

Define several forms of metadata that can be useful to an investigation. How are valuable to an investigator?

Post between 200 and 300 words.

Use your own words

Assignment

Discussion #2: Discuss the financial benefits of chatbots. Discussion 

#4: Discuss the limitation of chatbots and how to overcome them.

#5 Discussion Examine Alexa’s skill in ordering drinks from Starbucks.

OE W 4 D

 This week we focus on the productivity paradox.  Please define the productivity paradox and explain current thinking on this topic. 

1-TELECOMM NETWORK- Practical connection Assignment and 2-RISK MANAGEMENT IN BUSINESS MODEL 3- Google Project(Wan, Remote and system Application).

1. Practical connection Assignment- TELECOMM NETWORK-

Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment.  

2. Assignment-  Risk Management in a Business Model-

Assignment Requirements(300 words)

Research templates, and look for risk outcome examples from organizations of a similar type as your organization. Write a report identifying the risks associated with the current position your organization is in, and how your organization can mitigate risk by using information security systems policies. Include an introduction explaining the following: Who? What? When? Why? Be sure to add a conclusion with a rationale detailing how risks can be mitigated. Reference your research so that Sean may add or refine this report before submission to senior management.

Required Resources – Access to the Internet

3.  Google Project: Policies, Standards and Controls (WAN, Remote Access , System Application Domains )  400 words

15_Imoprtance of strategic IT planning

The final portfolio project is a three-part activity. You will respond to three separate prompts but prepare your paper as one research paper. Be sure to include at least one UC library source per prompt, in addition to your textbook (which means you’ll have at least 4 scholarly sources cited). 

Note: Please refer to the attachments for UC library sources, so use them to prepare the answer

Start your paper with an introductory paragraph.

Prompt 1 “Data Warehouse Architecture” (2-3 pages): Explain the major components of a data warehouse architecture, including the various forms of data transformations needed to prepare data for a data warehouse. Also, describe in your own words current key trends in data warehousing. 

Prompt 2 “Big Data” (1-2 pages): Describe your understanding of big data and give an example of how you’ve seen big data used either personally or professionally. In your view, what demands is big data placing on organizations and data management technology? 

Prompt 3 “Green Computing” (1-2 pages):  One of our topics in Chapter 13 surrounds IT Green Computing. The need for green computing is becoming more obvious considering the amount of power needed to drive our computers, servers, routers, switches, and data centers. Discuss ways in which organizations can make their data centers “green”. In your discussion, find an example of an organization that has already implemented IT green computing strategies successfully. Discuss that organization and share your link. You can find examples in the UC Library.

Conclude your paper with a detailed conclusion section. 

The paper needs to be approximately 5-6 pages long, including both a title page and a references page (for a total of 7-10 pages). Be sure to use proper APA formatting and citations to avoid plagiarism.

Your paper should meet the following requirements:

  • Be approximately 5-6 pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course, the course textbook, and at least three scholarly journal articles from the UC library to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Important Note: This Answer should be checked for the plagiarism across the internet and University student records, So please prepare the unique answer and don’t copy the answer