Technology of the past

In 80 words or more answer the following. Looking back at the technologies of the past 5 years, discuss the technologies that most impress you. Elaborate some examples to show the benefits to you or your organizations. 

Cyber Security

In this module, you learned that random numbers (or, at least, pseudorandom numbers) are essential in cryptography, but it is extremely difficult even for powerful hardware and software to generate them. Go online and conduct research on random number generators. What are the different uses of these tools besides cryptography? How do they work? Explain your answer using your own words in 2-3 paragraphs.

Flow Chart/Pseudocode

 

Instructions:

Create a FLOWCHART and a PSEUDOCODE for each problem.

Use the information below to create a pseudocode (which can be a text-based description for solving the problems) and a flowchart (using flowchart symbols to illustrate how you would program) to solve each problem. You may use Microsoft Word® for your pseudocode and Microsoft PowerPoint® for your flowchart.

1. Problem:

Create a flowchart and pseudo code to do the following:-

You are going to modify week 4 assignment (2 problems) to use input() function (no hard coded values) to prompt the user to enter the values.

Make sure the prompt message is meaningful, do not say “Enter value”, say something like this “Enter hours worked” after you get all the inputs, display the results and prompt the user if wants more calculation (y/n). If no then print a message like “Thank you for …….”

The flowchart must include a loop and if-then

Term Paper

Finish the term paper using the following outline. In addition to the 4-6 pages of the paper itself, you must include a title page and a reference page. You are to follow APA Guidelines for citing and referencing sources. Your paper must be in your own words, representing original work. Paraphrases of others’ work must include attributions to the authors. Limit quotations to an average of no more than 3-5 lines, and use quotations sparingly. It is always better to write the information in your own words than to directly quote. 

Title: Penalties and adjudication for various information and technology offenses.

Thesis: Penalties and adjudication for various information and technology offenses are not playing the crucial role of securing the abolition of breaching the law, which has been set, to safely guide the key players in the platform. The law is not even ensuring that those people who temple with the originality of a given person work.

i. Introduction 

a. Thesis 

b. The role of the thesis. 

ii. Expounding on the law and some of the changes needs to make it better.

a. Background of the law

b. Some of the recommendation that has been pointed out concerning the law by different stakeholders.

c. The effects of the law on today’s information and technology industry.

iii. The main objectives of the law.

a. The success and the future of IT in the country

b. The goals of addressing the topic 

c. The significance of the law and the setbacks  

d. The significance of implement the law to the grass root.

iv. The benefit of law to the industry 

a. The key traits of  for success  

b. The goal of the law 

c. Efforts to introduce new laws and ensuring they have been followed.

i. Significance of changing some articles  in the law

ii. Incorporating of organs to ensure that the effectiveness of the law

d. Making sure that the law meets the national and international standards 

v. Recommendation from the writer’s view.

a. Some of the things that can make a difference in the information and technology sector.

vi. Conclusion 

a. Summarizing the arguments and efforts made 

Reference

Bottoms, A. (2001). Compliance and community penalties. Community penalties: Change and challenges, 87-116.

Roth, M. P. (2010). Crime and punishment: A history of the criminal justice system. Nelson Education.

EH week9 P9

 

Hello,

i need this paper by 10/21 afternoon.

Strictly No plagiarism please use your own words.

Using the following link as your reference, select TWO and explain the differences

(viruses, worms, trojans, and bots).

What Is the Difference: Viruses, Worms, Trojans, and Bots?

( https://tools.cisco.com/security/center/resources/virus_differences)

 400 words

Make sure Strictly No plagiarism content should not match and even the reference should not match in plagiarism 

SDLC Program & Programming

 Test out the Google App Engine – Quickstart for Python 2 Standard Environment

This quick start shows you how to create a small App Engine application that displays a short message. 

business continuity in IT -10

What would you tell an executive about the importance of certifications of your plans if he did not want to fund it. Please provide one page with citations and reference.

Week 7 Esay

 Examine the effectiveness of vulnerability management programs of organizations when utilizing third party vendors for threat intel or vulnerability scanning and/or device patching.  Breach or incident reports are useful for this exercise.  500 words, APA required,