Conflict Managment Dis 5

 

Describe social bandwidth and share an experience you’ve had with this concept within your previous interactions.

Need 300 word content. Excluding references

Discussion

 Discuss the Windows Registry System Hive:  1) What information is retained in the hive?  2) Specifically, what security incident information could be gleaned from the System Hive? 

Discussion

Write a paper on the following topics:

– Who is MITRE? What are their origins? Are they still around?

– Who is NIST? What role does NIST play in cybersecurity?

The paper must be at least 300 words. It must be in APA format. You must include a title and reference page. 

p8

 

Consider the following problems, design and submit the algorithm, along with the source code, and snapshots of the running programs.

Problem 1:

Write a program that initializes an array with ten random integers and then prints out the following:

  • Every element at an even index;
  • Every even element
  • All elements in reverse order;
  • Only the first and last elements;
  • The minimum and maximum element
  • The sum of all elements
  • The alternating sum of all elements, where the alternating sum contains all elements at even index added, and the elements at odd index subtracted.

Problem 2:

Write a program that reads a sequence of input values and displays a bar chart of the values in data, using asterisks, like this:

*********************
*************************
*********
**************************

You may assume that all values are positive. First figure out the maximum value in data. That value’s bar should be drawn with 40 asterisks. Shorter bars should use proportionally fewer asterisks. Improve your program by adding caption to your bar. Prompt the user for the captions and data values. The output should look like this:

Egypt *********************

France *************************

Norway *********

Germany **************************

Problem 3:

Design and implement an application that reads a sequence of up to 25 pairs of names and postal (ZIP) codes for individuals. Store the data in an object designed to store a first name (string), last name (string), and postal code (integer). Assume each line of input will contain two strings followed by an integer value, each separated by a tab character. Then, after the input has been read in, print the list in an appropriate format to the screen.

Problem 4:

A theater seating chart is implemented as a two-dimensional array of ticket prices like presented below. Write a program that prompts the users to pick either a seat or a price. Mark sold seats by changing the price to zero. When a user specifies a seat, make sure it is available. When a user specifies a price, find any seat with that price. Verify that the price is among those offered by the theater.

10 10 10 10 10 10 10 10 10 10
10 10 10 10 10 10 10 10 10 10
10 10 10 10 10 10 10 10 10 10
10 10 20 20 20 20 20 20 10 10
10 10 20 20 20 20 20 20 10 10
10 10 20 20 20 20 20 20 10 10
20 20 30 30 40 40 30 30 20 20
20 30 30 40 50 50 40 30 30 20
30 40 50 50 50 50 50 50 40 30

Problem 5: 2D Array Operations 

Write a program that creates a two-dimensional array initialized with test data. Use any primitive data type that you wish. The program should have the following methods:

  • getTotal. This method should accept a two-dimensional array as its argument and return the total of all the values in the array.
  • getAverage. This method should accept a two-dimensional array as its argument and return the average of all the values in the array.
  • getRowTotal. This method should accept a two-dimensional array as its first argument and an integer as its second argument. The second argument should be the subscript of a row in the array. The method should return the total of the values in the specified row.
  • getColumnTotal. This method should accept a two-dimensional array as its first argument and an integer as its second argument. The second argument should be the subscript of a column in the array. The method should return the total of the values in the specified column.
  • getHighestInRow. This method should accept a two-dimensional array as its first argument and an integer as its second argument. The second argument should be the subscript of a row in the array. The method should return the highest value in the specified row of the array.
  • getLowestInRow. This method should accept a two-dimensional array as its first argument and an integer as its second argument. The second argument should be the subscript of a row in the array. The method should return the lowest value in the specified row of the array.

Demonstrate each of the methods in this program.

Submission

You are required to submit the following files for this assignment by clicking the Submit Assignment button above.

  • You should create one Java file for each problem and save them all in one folder. Compress the folder as a .zip file and submit it here. Please name your .zip file as P8-Last Name-First Nam.zip. For example, P8-Smith-John.zip
  • A Word document containing the algorithms and the screenshots of the running programs for all of the five problems. Please name your Word document as P8-Last Name-First Name.docx or .doc. For example, P8-Smith-John.docx.

Database security

Write an essay of at least 500 words discussing the reasons for the two new auditing roles in Oracle 12c. Why did Oracle consider them necessary? What problems do they solve? How do they benefit companies? 

Do not copy without providing proper attribution. This paper will be evaluated through SafeAssign. 

Write in essay format not in outline, bulleted, numbered or other list format.  

Use the five paragraph format. Each paragraph must have at least five sentences. Include 3 quotes with quotation marks and cited in-line and in a list of references. Include an interesting meaninful title.

Include at least one quote from each of 3 different articles. Use the Research Databases available from the Danforth Library, not Google.  Place the words you copied (do not alter or paraphrase the words) in quotation marks and cite in-line (as all work copied from another should be handled). The quotes should be full sentences (no more, less) and should be incorporated in your discussion (they do not replace your discussion) to illustrate or emphasize your ideas.

Cite your sources in a clickable reference list at the end. Do not copy without providing proper attribution (quotation marks and in-line citations).

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your submission Do not use spinbot or other word replacement software. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about.  

wk3dis_531

 Why are the original/raw data not readily usable by analytics tasks? What are the main data preprocessing steps? List and explain their importance in analytics. 

week 5 discussion

a) 500 words of discussion 

Variance Analysis: 

Write an analytical summary of your learning outcomes from chapters 9 and 10. In addition to your analytical summary, address the following:

1.     As a manager, discuss how you would use or have used the concepts presented in chapters 9 and 10.

2.     Why might managers find a flexible-budget analysis more informative than static-budget analysis?

3.     How might a manager gain insight into the causes of flexible-budget variances for direct materials, labor, and overhead? Provide at least one numerical example to support your thoughts.

b) 3 replies for the students 

wk 10

1. How did Filecoin conduct its ICO?

2. How is Filecoin’s ICO similar to and different from:    a) an equity IPO?    b) a crowdfunding initiative on, for example, Kickstarter, Indiegogo, GoFundMe?

3. What are the pros and cons of Filecoin conducting a fundraising through an ICO?

4. Why should investors be attracted to Filecoin?

5. Why should be wary of Filecoin?

6. Why are regulators encouraging or opposing ICOs?7. What have some regulators done in response to ICOs?

Compose your essay in APA format, including the introduction and conclusion, and in-text citations for all sources used. In addition to your 3 page (minimum) essay, you must include an APA-style title page and reference page.

cloud computing to become multi-jurisdictional

 

In 500 words or more, consider this statement: For cloud computing to become multi-jurisdictional, it must be separated from politics.

Use at least three sources. Use the Research Databases available from the Danforth Library not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs.   Stand-alone quotes will not count toward the 3 required quotes. Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Write in essay format, not in bulleted, numbered, or other list formats. 

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding the length of your post, and that you reply to two classmates in a substantive way (not ‘nice post’ or the like).  Your goal is to help your colleagues write better. Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. . I will not spend a lot of my time trying to decipher nonsense. Proofread your work or have it edited. Find something interesting and/or relevant to your work to write about.  Please do not submit attachments unless requested.