In the attached article, Sultan, Mushtaq, & Abubakar (2019) outline several security concerns associated with the rise in IoT technology. What implications might these concerns present to the future of contract law and privacy liability?
extra credit
Prepare a 500 word APA style paper about plagiarism. In the paper be sure to (1) define plagiarism, (2) address why it is unethical, (3) discuss the four different types of plagiarism, and (4) discuss how proper research approaches and documentation styles prevent a student from plagiarizing. Use at least 2 sources in this paper (and please be sure to cite them in the paper). Include an introduction and conclusion and follow the writing guidelines for this course.
truncatabel prime
Assignment 4: Truncatable Primes
Background
A left-truncatable prime number is one where the numbers resulting from removing the left-most digits are also prime. For instance, the number 9137 is a left-truncatable prime since 9137, 137, 37 and 7 are all prime.
A right-truncatable prime number is similarly defined, but removes a digit from the right. For example, 31193 is a right-truncatable prime since 31193, 3119, 311, 31, 3 are all prime.
A truncatable prime, also known as a two-sided prime, is one that is both left-truncatable and right-truncatable simultaneously. An example of such a prime is 3797.
We will be writing a program to explore these truncatable primes.
As a side note, the property of truncatable is dependent upon the base that the number is represented in. For this program, only worry about base 10.
Analysis
First note that the property of truncatability always produces a chain of numbers that terminate in single digit prime numbers. Therefore we can identify prime numbers by starting at the end of that chain and build numbers by adding digits. That is, we should be able to identify 3797 as a truncatable prime by building it from the right as in 7, 97, 797, then 3797, all the while verifying each step is left-truncatable.
Next note that when building from the right, we can only add odd digits. If we were to add a 0, 2, 4, 6, or 8, the resulting number would be divisible by 2 and thus not prime.
Finally, all of the single digit prime numbers are 2, 3, 5, and 7. These form the basis of our search.
Approach
Based upon the analysis above, we can find truncatable primes by building primes that are right-truncatable by construction, and verify they are left truncatable as we go. This suggest the following recursive algorithm
Build Truncatable Primes(int start)
if (start is not prime)
return
if (start is left truncatable)
found one. print it out
Build Truncatable Primes (start * 10 + 1)
Build Truncatable Primes (start * 10 + 3)
Build Truncatable Primes (start * 10 + 7)
Build Truncatable Primes (start * 10 + 9)
For left-truncatable, consider testing the number 12345. We know that we need to check 12345, 2345, 345, 45, and 5. But since all must be prime, the order they are tested in does not matter. In particular, we can check them in the order 5, 45, 345, 2345, 12345. What is nice about that order is we can get those digits by modding by successive powers of 10. Therefore you can use a loop that starts at 10, and updates by multiplying by 10.
Tips
· Start by writing an is_prime function.
· Next write an is_left_truncatable function.
· Using the modulus operator with powers of 10 can cut off digits from the left side.
· Write the algorithm specified above.
· Start the algorithm with all possible single digit prime numbers.
Sample Output
The truncatable primes are:
2
23
3
313
3137
317
37
373
3797
5
53
7
73
739397
797
dba must be aware of when moving to the cloud.
Describe in 500 words the shared security responsibility model that a dba must be aware of when moving to the cloud.
Use at least three sources. Use the Research Databases available from the Danforth Library not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list. Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs. Stand alone quotes will not count toward the 3 required quotes.
Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0.
Write in essay format not in bulleted, numbered or other list format.
Do not use attachments as a submission.
Reply to two classmates’ posting in a paragraph of at least five sentences by asking questions, reflecting on your own experience, challenging assumptions, pointing out something new you learned, offering suggestions. These peer responses are not ‘attaboys’. You should make your initial post by Thursday evening so your classmates have an opportunity to respond before Sunday.at midnight when all three posts are due.
It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your post and that you reply to two classmates in a substantive way (not ‘nice post’ or the like). Your goal is to help your colleagues write better. Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. . I will not spend a lot of my time trying to decipher nonsense. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about. Please do not submit attachments unless requested.
2 D.B and 1 Assignment
I have one Assignment ( Data Mining ) + one Discussion Board (Professional Issue)
– ( I already have answers for these but I need from you to change some sentences and method and way of answers to be ZERO plagiarism , The answers with me ( Common Answers with all Students ), Please I need full mark .. ( High Quality ) .. not change the answer because the answer is correct .. just change the way for writing … by add some sentence and change some sentences..
Also, I have also Discussion Board ( Network Management ) ,, But I need from you to answer it.
Cloud Computing Paper
I need this project in very detail and no plagiarism at any point. I have attached a document with complete details(minimum 6 pages).
Assignment: IT Infrastructure Policies & Discussion
Q1.) Learning Objectives and Outcomes
- Examine IT infrastructure policies.
- Describe IT infrastructure policies based on the scenario given.
Scenario
You work for a large, private health care organization that has server, mainframe, and RSA user access. Your organization requires identification of the types of user access policies provided to its employees.
Sean, your manager, was impressed with the work you did on User Domain policies. This time, Sean is asking you to write descriptions for policies that affect server, mainframe, and RSA user access.
Assignment Requirements
Research policies for each affected IT infrastructure domain, and place them into a table with an introduction explaining the following questions: Who? What? When? Why? Be sure to add a conclusion with a rationale for your selections. Reference your research so your manager may add or refine this report before submission to senior management.
Required Resources
- None
Submission Requirements
- Format: Microsoft Word
- Font: Times New Roman, 12-Point, Double-Space
- Citation Style: Your school’s preferred style guide
- Length: 2 pages
Q2.) Discussion
Participate in a discussion on best practices for IT infrastructure security policies in domains other than the User Domain. Address the following topics:
- IT framework selection
- When to modify existing policies that belong to other organizations versus creating your own policies from scratch
- Policy flexibility
- Cohesiveness
- Coherency
- Ownership
Assignment
Discussion #1: What is Big Data? Why is it important? Where does Big Data come from?
Discussion #3: What is Big Data analytics? How does it differ from regular analytics?
Discussion help
After reading Chapter 8 discuss the importance of the personnel assigned to the Disaster Recovery Team and their role. You can use outside research, or your personal work experiences as your basis for discusson.
Note – attached text book
Cybersecurity RACI Chart
RACI charts are commonly used in business proposals to determine responsibilities amongst the team and to clarify expectations.
As a team, develop a RACI chart for a cybersecurity plan for a small start-up company in which you:
- Explain the roles/responsibilities for the organization’s staff regarding security.
- Identify expectations for a) business units, b) IT staff, c) executive staff, d) sales, and e) support staff (clerical, maintenance, etc.).