Help Writing this shell script
ns-d-12
explain the difference between an access control list (ACL) that is used in routers to block traffic and firewalls. What similarities do they share? 250 words
process of selecting a firewall.
Firewall Selection
IT345 9
To conclude this course, we cover professional ethics as it relates to technology. Additionally, we specifically address ethics as it relates to computer professional. This is due to the amount of private, sensitive, and proprietary information they have access to.
Pick a scenario below and post your reply by at midnight. Your response should be at least 300 words and appropriately cites your resources.
- Scenario 1
- Your company is developing a free email service that will include targeted advertising based on the content of the email messages (similar to Google’s Gmail). You are part of the team designing the system. What are your ethical responsibilities?
Design an algorithm
Design an algorithm that receives the letters of your first name in an array. It then finds the duplicates characters in your first name. Do the following to design the algorithm:
a. Write pseudo-code of algorithm
b. Translate the pseudo-code to flowchart
c. Translate the pseudo-code to a program
d. Analyze algorithm asymptoticly (Determine primitive operations)
e. Find the running time experimentally (On program above)
Datascience
Need solution to this MCQ questions in brief details.
Glb ethics
Topic:
“Ethical issues involved in the human Genome Project”
REQUIREMENTS:
Required topic headings for your paper should include the background surrounding the issue, a historical perspective, current issues that are applicable, legislation dealing with this topic, examples, global dynamics/impact (such as issues, processes, trends, and systems), personal impact from a global perspective, and a summary. These are the topics to be discussed in the term paper
Each paper should contain a reference list of at least five (5) different substantial and quality references. The references and reference citations for the term paper must be to a current event less than 3 years old (a reference with no date (n.d.) is not acceptable). This requires a reference citation in the text of the paper and a reference at the end of the paper to which the reference citation applies. You must include some information obtained from the reference in your answer. The references must be found on the internet and you must include a URL in your reference so that the reference can be verified.
You cannot use information from the text book or any book/article by the author of the text book as a current event. Make sure that your reference has a date of publication.
The body of the paper should be a minimum of six typed double spaced pages. Your cover page and reference page cannot be counted in this number. You should use the APA format for your reference citations and the reference page.
This course has been designated as a global course which includes the requirement that you must place this term paper in your ManeSync Experiences. A screen shot must be attached to your term paper that you submit for grading to prove that the paper was placed in your ManeSync Experiences. Directions for using ManeSync Experiences are provided in the following document under the Term Paper tab: ManeSync Experiences Instructions.docx
Feel free to use the Communications Skill Center (http://www.tamu-commerce.edu/litlang/CSC/located.htm), Hall of Languages, Room 103, Phone No. 903.886.5280 to assist you with this writing assignment.
meer – final project
Final Project on the surveillance state consists of two parts:
1 a Powerpoint presentation consisting of at least 12 slides not including title and references.
2. 1000 word research paper with at least 3 sources.
You must include at least 3 quotes from your sources enclosed in quotation marks and cited in-line.
There should be no lists – bulleted, numbered or otherwise.
Write in essay format with coherent paragraphs not in outline format.
read the articles and answer in 200 word.
Read two articles Legal Status of SE.pdf (published in 1995) and Push to Make SE respectable.pdf (published in 2000). Post a message of at least 200 words to meet the following requirements:
1. Tell us your understandings on software engineer’s working condition and social status in the last three decades. You can also include link(s) to article that is related to this discussion.
2. Provide constructive comment on at least one other student’s posting. “Agree with you”, “good thoughts” etc. are not counted as constructive commenting and do not count.
Security Policy
A well-written security policy will clearly define the limits of computing infrastructure to the end users. Security policies should be simple and to the point.
- Research any computer security threat or a recent attack. Select one element of the threat or attack (e.g., “Complex Passwords”).
- Write a security policy for your selected element. The scope of this policy should be issue specific.
- Your policy at a minimum should include a title, purpose of the policy, scope, details of the policy, compliance, author, and review date.
- Your policy should be no longer than 500 words and written using an industry standard policy format.