Cloud computing

 

Write at least 500 words on fractional ownership and it’s relation to cloud computing. Use at least one example from another industry.    

Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs. Stand alone quotes will not count toward the 3 required quotes.

Write in essay format not in bulleted, numbered or other list format. 

week research paper

 

This week’s journal article was focused on the Complexity of Information Systems Research in the Digital World.  Complexity is increasing as new technologies are emerging every day.  This complexity impacts human experiences.  Organizations are turning to digitally enabled solutions to assist with the emergence of digitalization. 

Please review the article and define the various technologies that are emerging as noted in the article.  Note how these emerging technologies are impacting organizations and what organizations can to do to reduce the burden of digitalization.

Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research.  Please be sure that journal articles are peer-reviewed and are published within the last five years.

The paper should meet the following requirements:

  • 3-5 pages in length (not including title page or references)
  • APA guidelines must be followed.  The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.
  • A minimum of five peer-reviewed journal articles.

 

Chapter 1 Journal articles

BSW W9

In 200 words,

Do a bit  if research into File Inclusion Vulnerability.

  • What is it?
  • Why is it dangerous?
  • What is the difference of low and remote inclusion?
  • What methods can me employed to prevent a security breach?
  • What programming languages are vulnerable to this type of attack.

Digital Certificates and Encrypted Messages

 

You have recently been hired as a Tier 1 cybersecurity specialist working on the Network Administration Team at HU Investment Firm.

During the course of your work week, you are often called upon to present technical information to non-technical people in your Firm.

This week assignment has 2 parts, a presentation and an additional step-by-step guide for the incoming tier 1 support staff.

Digital Certificate Presentation 

  • Create a slide presentation on Digital Certificates with a minimum of 12 slides. 
    • Use screenshots or graphics when appropriate, minimum of 2
  • Define digital certificates and explain how they are used
  • Describe the reasons for using digital certificates and why they are important to HU Investment Firm
  • Demonstrate how to create certificates and apply them to messages using MS Outlook
  • Provide at least 2 references on your last slide in APA format

Instructional Guide

  • Write a help document including step-by-step instructions for the Support Team’s Knowledge Base wiki
    • Include at least 2 screenshots as references
  • Describe the process that encrypted MS Outlook message go through and explain why
  • Explain the problems that  can arise from encryption and how to troubleshoot for those problems
  • Include at least 2 external resources that technicians can use for more information  

linked lists

In this assignment, you will expand on the information provided in the course to answer the following questions in a 2- to 3-page paper:

What is the difference between a singly-linked list and a doubly-linked list?

  • In what situation would you use a singly-linked list over a doubly-linked list?
  • In what situation would you use a doubly-linked list over a singly-linked list?

If a node is in a linked list with N nodes, how many nodes will be traversed during a search for the node?

  • Explain the best- and worst-case search scenarios.
  • Explain why a singly-linked list defines a RemoveAfter() function, while a doubly-linked list defines a Remove() function.
  • Could a RemoveAfter() function also be defined for a doubly-linked list? Explain why or why not.
  • Could a Remove() function also be defined for a singly-linked list? Explain why or why not.

arduino code/ code+design required

Functional Requirements

You are required to recreate one of the Arduino functions.

  • You must be able to set an arbitrary delay (in milliseconds) using your own function, mimicking the behavior of delay().
  • You must be able to turn on and off an LED attached to pin 13. Each second you must toggle the state of the LED.

Technical Requirements

This section will serve as a guideline of what is necessary for the program to behave correctly.

You need to implement the following functions:

  • void delay_one_ms(): This function uses Timer0 to implement a one millisecond delay. Follow the steps below to get this function working properly:
    • Choose a prescaler for the desired delay
    • Disable the I-Flag in the SREG. Alternatively, save a copy of SREG to restore later.
    • Set the proper value in TCNT0.
    • Set Timer0 to Normal Mode.
    • Set the prescaler bits.
    • Wait until the overflow flag TOV0 is set.
    • Stop the clock.
    • Clear the TOV0 flag by setting it.
    • Restore the interrupts by setting the I-Flag in the SREG. Or load SREG from the copy you made before.
void delay_one_ms(){
 ...
}
  • void delay_generic(unsigned long ms): This function calls the delay_one_ms() function to implement a delay for an arbitrary amount of milliseconds. This function recreates the behavior of the Arduino delay() function.
void delay_generic(unsigned long ms){
 ...
 // call delay_one_ms()
 ...
}

finance

 Please find at least 5 sites with useful and relevant information that focus on some aspect of blockchain in finance. Include a short summary of the sites and the applicable citations/reference information