how to check if two string are anagram
Operating Seccurity
Organizations of any size can have millions of transactions occurring every day between customers, employees, and suppliers. Today, many systems are automated. They generate their own transactions in the form of online product queries, searches, inventory checks, authorization checks, and log entries. Chapter 4 introduces the IT environment segregated into seven domains.
- Explain the concept of defense-n-depth.
- How does the use of security policies mitigate risks within the seven domains of a typical IT infrastructure? Explain
- Discuss two methods for developing access control.
ERP
Please see attachment for assignment.
DM W 12 A
Please check the attached document for questions
Discussion – Assignment
task-1,2,3
ITISP W 3 D
Given the growth in telecommuting and other mobile work arrangements, how might offices physically change in the coming years? Will offices as we think of them today exist in the next ten years? Why or why not?
DQ
analyze.
Disaster recovery-3
Topic: Assume that you have been tasked by your employer to develop an incident response plan. Create a list of stakeholders for the IR planning committee. For each type of stakeholder, provide the reasons for inclusion and the unique aspects or vision that you believe each of these stakeholders will bring to the committee.[500 words]
200 words
Describe each of the DNS zone types that are available in Windows Server 2016. Explain why you would use each type of zone. For example, when would you use a Standard Zone versus an Active Directory Integrated Zone? Make sure you include Stub Zones in your answer. Also, include in your answer methods for securing and protecting DNS servers and clients.
py
In this assignment you will compare two implementations of storing text files:
(1) One continuous string (newline char as separator).
(2) List of strings where each string represents a line
Each of these representations has to be implemented as a separate set of functions and, of course, with separate Python file For each implementation, you will write editor functions to move the “cursor”. In each representation, you use a cursor to represent the current position. For example, for (1) the cursor is just the position (index). For (2), the cursor is a pair: the index of the line and the position within the corresponding line string. Finally, for (3) the cursor is a pointer to the node (containing the line) and the position within that line.
Write (and test) the following 10 functions (names are taken from old vi editor) for each implementation
(1) cmd_h: move cursor one character to the left
a. string implementation for text editor
b. list implementation for text editor
c. double linked list implementation for text editor
(2) cmd_I: move cursor one character to the right
a. string implementation for text editor
b. list implementation for text editor
c. double linked list implementation for text editor
(3) cmd_j: move cursor vertically up one line
a. string implementation for text editor
b. list implementation for text editor
c. double linked list implementation for text editor
(4) cmd_k: move cursor vertically down one line
a. string implementation for text editor
b. list implementation for text editor
c. double linked list implementation for text editor
(5) cmd_X: delete the character to the left of the cursor
a. string implementation for text editor
b. list implementation for text editor
c. double linked list implementation for text editor
(6) cmd_D: remove on current line from cursor to the end
a. string implementation for text editor
b. list implementation for text editor
c. double linked list implementation for text editor
(7) cmd_dd: delete current line and move cursor to the
a. string implementation for text editor
b. list implementation for text editor
c. double linked list implementation for text editor
beginning of next line
(8) cmd_ddp: transpose two adjacent lines
a. string implementation for text editor
b. list implementation for text editor
c. double linked list implementation for text editor
(9) cmd_n: search for next occurrence of a string (assume that string to be searched is fully in one line.
a. string implementation for text editor
b. list implementation for text editor
c. double linked list implementation for text editor
(10) cmd_wq: write your representation as text file and save it
a. string implementation for text editor
b. list implementation for text editor
c. double linked list implementation for text editor
Think of and implement any other 5 functions (your choice)
(11)~(15)
a. string implementation for text editor
b. list implementation for text editor
c. double linked list implementation for text editor
For testing, you will read the following “nerdy” poem (from the “Zen of Python”) into your “file representation”.
Beautiful is better than ugly.
Explicit is better than implicit.
Simple is better than complex.
Complex is better than complicated.
After each command, print the contents of your file with character ‘^’ as cursor.
Example: your initial configuration is
^Beautiful is better than ugly.
Explicit is better than implicit.
Simple is better than complex.
Complex is better than complicated.
After executing cmd_n(‘better”), your representation should print:
Beautiful is ^better than ugly.
Explicit is better than implicit.
Simple is better than complex.
Complex is better than complicated.