Assignment Interpersonal Communication
assignment in the attached picture please check the picture
Assignment Interpersonal Communication
assignment in the attached picture please check the picture
System Design Specifications (including System Architectural [Layered, “Physical”] Design Scheme selected; Package Diagram [populated with interrelated classes]; Database Tables; EntityRelational diagrams; Window Navigation Diagrams; Drafts of User Interfaces; and Examples of System-Response Report Forms);
Using a web search tool,identify cases in which private information was disclosed when computer equipment was discarded.Recent examples have included smartphones (like blackberry) that were sold without proper data cleasing and hard drives that were sold without data cleansing after the computers that were originally used in were upgraded.
In this assignment you will decipher messages that are encrypted using two of the classical ciphers. You are encouraged to do them by hand first and resort to the tool available at the link provided below or other tools you find on the Internet to automate the process.
A Substitution Cipher: What does the text say?
Exercise 1:/
IA TK MIMFL OIJK JKFLUBYUDOR ZOUNHIFS LCK TIOM SYXL GR LCK GKXBM XFM LBKWGOIFS YJKB ZBKNIZINKD TK DCYUOM FKJKB GK MKZBKDDKM IJK FY MYUGL GUL XOBKXMR DCYUOM GK AXMKM AXLXOIDLIN XFM XSKM JIBSIFIX TYYOA
Exercise 2:/
WG EGI JZZB IFZ UNURUAIZM RGT GX DGLM XMOZEWAFOB AZUNZW LB LEION DGLM XMOZEWA UMZ WZUW XONN IFZOM NOQZA COIF ACZZIEZAA ABZUJ UBBMGQOEP SFZZMOEP CGMWA CFONZ IFZOM ZUMA SUE FZUM IFZY UEW CFONZ IFZOM FZUMIA SUE RZ IFMONNZW UEW YUWZ FUBBOZM IFZ JOEW GX IFOEPA DGL YZUE IG AUD CFZE IFZD UMZ PGEZ AUD RZXGMZ IFZD PG
Exercise 3:/
LTKHNMEVKG KE CVH VRTMHEC CVKNB KN CVH WXTFM CX HAGFRKN KCE NXC EXQHCVKNB YXP FHRTN KN EZVXXF OPC KL YXP VRIHNC FHRTNHM CVH QHRNKNB XL LTKHNMEVKG YXP THRFFY VRIHNC FHRTNHM RNYCVKNB QPVRQQRM RFK
Exercise 4:/
BMBU SUWKMNMOUN LXS VXBOUBOUH TMYMBR DUQTOD UBXKRD OX FQZU GXSZ Q ITUQNKSU GUQTOD UBXKRD OX NKIIXSO EXKS BUUHN NOSUBROD OX JQOOTU GMOD HMLLMVKTOMUN QBH XYUSVXFU ODUF RSQVU UBXKRD OX VXBLUNN EXKS NMBN QBH LXSNQZU ODUF IQOMUBVU UBXKRD OX OXMT KBOMT NXFU RXXH MN QVVXFITMNDUH VDQSMOE UBXKRD OX NUU NXFU RXXH MB EXKS BUMRDJXKS TXYU UBXKRD OX FXYU EXK OX JU KNULKT QBH DUTILKT OX XODUSN LQMOD UBXKRD OX FQZU SUQT ODU ODMBRN XL RXH DXIU UBXKRD OX SUFXYU QTT QBAMXKN LUQSN VXBVUSBMBR ODU LKOKSU
You can use the tool at:
WHAT to submit
For each cipher:
Also provide answers to the following questions, reflecting on your experience with this assignment:
Write at least 500 words on fractional ownership and it’s relation to cloud computing. Use at least one example from another industry.
Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list. Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs. Stand alone quotes will not count toward the 3 required quotes.
Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0.
Write in essay format not in bulleted, numbered or other list format.
Describe social bandwidth and share an experience you’ve had with this concept within your previous interactions.
Need 300 word content. Excluding references
sxwececdxsxq
Discuss the Windows Registry System Hive: 1) What information is retained in the hive? 2) Specifically, what security incident information could be gleaned from the System Hive?
Write a paper on the following topics:
– Who is MITRE? What are their origins? Are they still around?
– Who is NIST? What role does NIST play in cybersecurity?
The paper must be at least 300 words. It must be in APA format. You must include a title and reference page.
Consider the following problems, design and submit the algorithm, along with the source code, and snapshots of the running programs.
Write a program that initializes an array with ten random integers and then prints out the following:
Write a program that reads a sequence of input values and displays a bar chart of the values in data, using asterisks, like this:
*********************
*************************
*********
**************************
You may assume that all values are positive. First figure out the maximum value in data. That value’s bar should be drawn with 40 asterisks. Shorter bars should use proportionally fewer asterisks. Improve your program by adding caption to your bar. Prompt the user for the captions and data values. The output should look like this:
Egypt *********************
France *************************
Norway *********
Germany **************************
Design and implement an application that reads a sequence of up to 25 pairs of names and postal (ZIP) codes for individuals. Store the data in an object designed to store a first name (string), last name (string), and postal code (integer). Assume each line of input will contain two strings followed by an integer value, each separated by a tab character. Then, after the input has been read in, print the list in an appropriate format to the screen.
A theater seating chart is implemented as a two-dimensional array of ticket prices like presented below. Write a program that prompts the users to pick either a seat or a price. Mark sold seats by changing the price to zero. When a user specifies a seat, make sure it is available. When a user specifies a price, find any seat with that price. Verify that the price is among those offered by the theater.
10 10 10 10 10 10 10 10 10 10
10 10 10 10 10 10 10 10 10 10
10 10 10 10 10 10 10 10 10 10
10 10 20 20 20 20 20 20 10 10
10 10 20 20 20 20 20 20 10 10
10 10 20 20 20 20 20 20 10 10
20 20 30 30 40 40 30 30 20 20
20 30 30 40 50 50 40 30 30 20
30 40 50 50 50 50 50 50 40 30
Write a program that creates a two-dimensional array initialized with test data. Use any primitive data type that you wish. The program should have the following methods:
Demonstrate each of the methods in this program.
You are required to submit the following files for this assignment by clicking the Submit Assignment button above.