Recursion with the Sierpinski Gasket

This week’s discussion has introduced working with graphics programming, particularly with respect to primitives and attributes. One of these applications is the Sierpinski gasket. Discuss the Sierpinski gasket.

In your answer, specifically think of and give a real-life scenario where:

  • The Gasket can be utilized.
  • Recursion can/cannot be applied.

css215 discussion post

Consider the Millennium Health project that you have been working on throughout the course and provide answers to the following prompts based the Business Support System (BSS):

  1. Which installation strategy would you recommend? Support your answer with an explanation.
  2. List three or four testing criteria that you would use to test the BSS system to ensure it is ready for production use. Make sure that your testing criteria is adequately descriptive. If not, provide an explanation for it.
  3. Consider the four types of maintenance discussed in Chapter 14 of the textbook. Which type do you think is most likely to be needed for the BSS system? Support your answer with an explanation.
  4. Corrective maintenance is by far the most frequent form of maintenance. What can you do as a systems analyst to reduce this form of maintenance?

Bus Cont Plan&Disas Recov Plan 112

 Each student will locate and review an article relevant to the topic of the class. The review is between 400-to-550 words and should summarize the article. Please include how it applies to our topic, and why you found it interesting. 

Homework Assignment #7

Need help in implementing and modifying the missing functions within the C++ programming code tree.cpp according to the attached problem description. 

Case study

Read the Innovation at International Foods Case Study on pages 234-238 in the textbook. Answer the Discussion Questions at the end of the Case Study. Your responses must be complete, detailed and in APA format.

Discussion

Instructions

Post 1 thread of at least 300 words.  Also, reply to the thread below in of at least 150 words.

Thread Topic

Research and develop a thread that describes the concept of defense in  depth. Your thread must include: an introduction statement/paragraph,  body paragraph(s), and a conclusion statement/paragraph. Additionally,  you are required to comment on at least 1 other student’s thread

Reply

Defense in Depth or (DiD) in  cybersecurity refers to a series of defensive methods layered to protect  data and information in case of security control fails or other  vulnerabilities. DiD origins are from a military strategy which delays  the progress of an attacks rather than defeating the enemy with one  strong line of defense. In other words, if one method fails, another  steps in to combat an attack. This multi-layered tactic with its  redundancies increases security and focusses on other attack routes. A  opposite principle to defense in depth is simplicity-in-security which  states too many security measures will cause complications or holes that  attackers can exploit.

                Defense in depth security design is based on  controls used to protect the physical and administrative properties of a  network.  A layered security can be applied to all IT systems. A  desktop on a network or the network of bank cash dispensers all qualify  for defense in depth. An organization that is relying on a single layer  of security will find that hackers will find their vulnerabilities very  quickly. Using multiple defenses such as malware scanners, firewalls,  and data encryption software will close attack routes making it more  difficult for a hacker to gain access to your network.

                Security guards, attack dogs, barbed wire fences,  semi-automatic weapons and cameras cannot protect you against hackers  gaining access to private information on a network. A hacker with  physical access to your infrastructure can see your data you were trying  to hide. Defense in depth eliminates blind spots. Just like a home  security system the more sensors you have the safer your home will be.  The theory behind defense in depth shares the same principles, the more  sensors you have that monitor, detect, and eliminate would be  disruptions or data breaches the least likely a cybercriminal will try  to invade. A multi-line of defense or defense in depth is one way to  defend against enemies on all fronts.

Research Paper

Summary:

Select a topic from the following list on which you would like to conduct an in-depth investigation:

  • Information systems infrastructure: evolution and trends 
  • Strategic importance of cloud computing in business organizations 
  • Big data and its business impacts 
  • Managerial issues of a networked organization 
  • Emerging enterprise network applications 
  • Mobile computing and its business implications 

Note: The above topics are also the basis of the discussion questions. You may use up to three resources found by yourself or your peers as peers as resources for the paper. 

Research paper basics: 

  • 8-10 pages in length 
  • APA formatted 
  • Minimum six (6) sources – at least two (2) from peer reviewed journals 
  • Include an abstract, introduction, and conclusion 
  • See rubric for more detailed grading criteria 

Some good questions to ask yourself before turning in your research paper: 

  • Is the paper of optimal length? 
  • Is the paper well organized? 
  • Is the paper clear and concise? 
  • Is the title appropriate? 
  • Does the abstract summarize well? 
  • Are individual ideas assimilated well? 
  • Are wording, punctuation, etc. correct? 
  • Is the paper well motivated? 
  • Is interesting problem/issue addressed? 
  • Is knowledge of the area demonstrated? 
  • Have all key reference been cited? 
  • Are conclusions valid and appropriate?