Assignment 5

   You shall write a C++ program that:

  1. Reads an arbitrary number of whitespace-delimited tokens from standard input.
  2. Determines and prints (to standard output) two decimal integer values:
    1. The number of input tokens that are valid Scrabble words (case-insensitive), i.e. those that can be found in /srv/datasets/scrabble-hybrid.
    2. The total number of points that all those words would be worth in Scrabble, according to the letter values in /srv/datasets/scrabble-letter-values.

Specific Requirements

  1. You may assume that the number of valid words and the total number of points will not exceed the range of an unsigned 64-bit integer.
  2. Open and read the contents of each relevant data file exactly once.
  3. Make sure to use STL components that will avoid any gross inefficiencies (excessive computation and/or storage) in your program. Your program should at least be able to process each of the example inputs below in no more than 5 seconds, on our server.
  4. Print the two integer values in the order specified above, and make sure your output contains no other numeric decimal values. Otherwise, the format of output is up to you.

week 2 – Security Architecture and Design

 

Briefly  respond to all the following questions.  This assignment should be in  APA format and have to include at least two references.

Defination : System  architecture is the descriptive representation of the system’s  component functions and the communication flows between those  components.

above definition immediately raises some important questions.

• What are “components”?

• Which functions are relevant?

• What is a communication flow?

minimum 400 words
   

Privacy and Security Considerations for Information Governance

According to the authors, privacy and security go hand in hand; and hence, privacy cannot be protected without implementing proper security controls and technologies. Today, organizations must make not only reasonable efforts to offer protection of privacy of data, but also must go much further as privacy breaches are damaging to its customers, reputation, and potentially could put the company out of business.  As we continue learning from our various professional areas of practice, its no doubt that breaches have become an increasing concern to many businesses and their future operations.   

For this discussion, find an example of a security breach which compromised data records at a company in the same industry as you will be using in your final paper. Summarize the breach, discuss the data that was lost and identify security controls that you would recommend be in place (be certain to remember to cite sources) that could have prevented this breach from occurring. Remember to critical respond appropriately to two other leaners for full points.

Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

Initial post due Thursday

Virtualization

Discuss the benefits of virtualization software, as described in the text. Do you agree/disagree with these benefits, or can you think of additional benefits not already presented?  Also discuss the security concerns highlighted by server sprawl and how you would propose to solve those in your (real or hypothetical) organization.

Please mention the reference.

rp2_dsdba

  Please pick an organization or two and discuss the usage of big data in RADICAL platforms including how big data analytics is used in those situations as well as with Smart Cities. Be sure to use the UC Library for scholarly research. Google Scholar is the 2nd best option to use for research. 

The computer did it! Discussion board

 1414 unread replies.1414 replies.

When human beings and computers are both involved in accomplishing a task and something goes wrong, we tend to blame the computer.

There is little question about the existence of software bugs, but can all real-world problems involving computers (such as erroneous bank transactions, military training incidents, or privacy breaches) be attributed to errors in the software program?

Today, do you think it is more likely that a computer or a human being would be responsible for a serious system problem?

Why?

Answer with complete sentences for full credit.

Computer Security Topic – Alleged industrial espionage

Consider this hypothetical situation:

David Doe is a network administrator for the ABC Company. David is  passed over for promotion three times. He is quite vocal in his  dissatisfaction with this situation. In fact, he begins to express  negative opinions about the organization in general. Eventually, David quits and begins his own consulting business. Six months after David’s  departure, it is discovered that a good deal of the ABC Company’s  research has suddenly been duplicated by a competitor. Executives at ABC  suspect that David Doe has done some consulting work for this competitor and may have passed on sensitive data. However, in the  interim since David left, his computer has been formatted and reassigned to another person. ABC has no evidence that David Doe did anything wrong.

What steps might have been taken to detect David’s alleged industrial espionage?

What steps might have been taken to prevent his perpetrating such an offense?

Requirements:

Write your answer using a WORD document with approximately 400 words

APA format 

No plagiarism 

Business Intelligence- Resume

 

Business Intelligence Manager Resume

Attached Files:

Friday: Reflective Assessment – Business Intelligence Resume

Saturday: Reflective Assessment – Characteristics of A Data Whisperer

Take a cursory look at this link on data whisperer…..

The data whisperer — Why you need one, and why it’s not your data scientist

Sunday: Reflective Assessment – Modern Data Scientist/Business Intelligence Manager

Example –

Review the business intelligence manager resume sample provided in this folder. Select and discuss 2 components of the Business Intelligence Manager resume that relates to your future or current job.

Your reflective assessment paper should be at least 100 words, double-spaced, and typed in an easy-to-read MS Word (other processors are fine to use but save it in MS Word format).

Conflict Managment Dis 7

During the course of your employment you may have experienced working for both a male and female supervisor. Discuss from your personal point of view the advantages/disadvantages and like/dislike of working for each gender. Use real life experiences if applicable. 

Need 350 word content on this.