Need the answer in APA format.
software engineer “about me”
Topic: software engineer “about me”
Type of paper: Essay (any type)
Discipline: Computer science : Information Technology (IT)
Format or citation style: APA
Discussion Emerging threats
There are a variety of ways that a cyber-attack can cause economic damage. In many cases, attackers try to “penetrate” systems in order to steal technology or other sensitive information. When do you think an attack can be classified as cyber terrorism?
Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:
- Ask an interesting, thoughtful question pertaining to the topic
- Answer a question (in detail) posted by another student or the instructor
- Provide extensive additional information on the topic
- Explain, define, or analyze the topic in detail
- Share an applicable personal experience
- Make an argument concerning the topic.
At least two scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources Use proper citations and references in your post.
CPU Utilization,Overloads
- Transient Overloads: One drawback of RM algorithm is that task priorities are defined by their periods. Sometimes, we must change the task priorities to ensure that all critical tasks get completed. With average execution times, all the critical and non-critical tasks may be RM-schedulable. But, if we consider worst-case execution time we wish to schedule so that all critical tasks meet the deadline and the non-critical task may miss the dead line. The solution is to boost the priority of some critical tasks higher than the non-critical tasks. This is done by altering the “Period” of some critical tasks so that their priorities increase. For example: If we reduce the period of a task by k and have k number of tasks each small sub task will have period divided by K, and execution time divided by k. When the period is smaller, the tasks automatically get higher priority. We can also lengthen the period of non-critical tasks and make it larger than the largest critical task and increase the non-critical task’s execution time also.Carry out a period transformation for this task set to ensure that all the critical tasks will meet the dead line even with worst case execution timing.
Draw for your modified table of tasks, timing diagram to show schedulability for average execution time and another diagram to show for worst-case execution time. Identify if any tasks miss the dead line. - Give explanation of your period transformations and solution.
- What is CPU Utilization for average and worst-case execution times.
- Considering Context switch time to be 1 ms, redraw the execution time line for this system for both average and worst case timing.
- What is the system time-loading (CPU utilization) factor with the context switching included?
Discusssion
Read chapters 1 and 2 describe and discuss ways, if any, we can safely share security data.Are there precautions we can take, technical solutions we can use, e.g., like using the CIA triad, or should we just not share these kinds of data? Feel free to argue for and against, just make sure to back up your statements with scholarly support.
At least one scholarly source should be used in the initial discussion thread.
ERD vaariables
There is a use case associated with the assignment. You need to incorporate ALL requirements into the ERD, not just some components into the ERD Diagram. There are various examples that I have provided throughout the semester. I have pointed to another one so you know what I am explicitly expecting to see.
About the ERD Diagram
- I expect to see a diagram such as this: Database Development: Entity Relationship Diagram (impacttechnology.co.uk).
- If I see a diagram that looks like this: entity-relationship-diagram.pdf (texample.net), the assignment will fair poorly for you and/or your team. That is NOT an ERD. (I always get one or two every semester).
- I have provided numerous hints through all the lectures on how to build the diagram out (i.e. the use case is a collection of many textbook examples).
Deliverables
- An ERD Diagram (PDF File ONLY)
- A Word / PDF Document that describes exactly what is in your ERD. This helps me make sure you know what you modeled! Also, on that document, please tell me who did what for the assignment.
- Please provide me example screen shots to a working prototype of your database and/or access to the database. Make the dataset realistic, not scrap data. I will need to have access to the database if that is your preferred option until December 11, 2020 at 11:59pm EST unless I ask otherwise.
Discussion-4 ME
1. Read the short explanation of the 4 basic types of economies. Research two of these types further.
Here is the link for 4 types of economies
https://www.intelligenteconomist.com/economic-systems/
2. Locate one journal article for each of your two chosen economic types. You need to focus on the Abstract, Introduction, Results, and Conclusion. For our purposes, you are not expected to fully understand the Data and Methodology.
3. Summarize these journal articles. Please use your own words. No copy-and-paste. Cite your sources.
2-3 pages
Explain how Cloud Service Models (IaaS, SaaS, PaaS) and How Microsoft Office 365, Azure Fit In?
Explain the AWS?
Read SP 1800-4 DRAFT Mobile Device Security: Cloud and Hybrid Builds then write a summary for this publication
bi assignment 9
1. How does prescriptive analytics relate to descriptive
and predictive analytics?
2. Explain the differences between static and dynamic
models. How can one evolve into the other?
3. What is the difference between an optimistic approach
and a pessimistic approach to decision making under
assumed uncertainty?
4. Explain why solving problems under uncertainty sometimes
involves assuming that the problem is to be solved
under conditions of risk.
5. Investigate via a Web search how models and their
solutions are used by the U.S. Department of Homeland
Security in the “war against terrorism.” Also investigate
how other governments or government agencies are
using models in their missions.
2 pages
be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations)
qa
you will analyze asymmetric and symmetric encryption. Evaluate the differences between the two of them and which one that you would determine is the most secure. The writing assignment requires a minimum of two written pages to evaluate the history. You must use a minimum of three scholarly articles to complete the assignment. The assignment must be properly APA formatted with a separate title and reference page.