Essay

 

Write an essay of at least 500 words discussing discussing how a blockchain implementation would improve data security in a military, education, or other context. 

Do not copy without providing proper attribution. This paper will be evaluated through SafeAssign. 

Write in essay format not in outline, bulleted, numbered or other list format.  

Use the five paragraph format. Each paragraph must have at least five sentences. Include 3 quotes with quotation marks and cited in-line and in a list of references. Include an interesting meaninful title.

Include at least one quote from each of 3 different articles. Use the Research Databases available from the Danforth Library, not Google.  Place the words you copied (do not alter or paraphrase the words) in quotation marks and cite in-line (as all work copied from another should be handled). The quotes should be full sentences (no more, less) and should be incorporated in your discussion (they do not replace your discussion) to illustrate or emphasize your ideas.

Cyber security mini project proposal and materials needed

Topic: Home Automation Security and Vulnerabilities (need 3 word copies)

1) Submit mini project Topic with brief explanation. ( Home Automation Security and Vulnerabilities ) due today

2) Submit a brief abstract describing your mini project. (2nd copy) 

3) Subit minsi project materials.(3rd copy)

600-800 words, double spaced, written in APA format, showing sources and a biblography

Windows Server Project

 

There are specific requirements for the assignment: The final submission should contain at least 6 pages worth of text written by the student (not counting title page, images, diagrams, tables, or quotations), but may be longer, not to exceed approximately 10 pages worth of student-supplied text. (With the required diagram, and other images, title page, etc., the final submission may end up being more than 10 pages in length.) It must be double-spaced, have 1-inch margins, and use 12-point Times New Roman or 10-point Arial/Helvetica font. A title page is required; APA format for the title page is optional.

· At least one diagram must be included (not counted towards the minimum length described above); this could be a diagram describing Active Directory components, DHCP/DNS design, file share hierarchy, or anything else that is worth displaying graphically to enhance the reader’s understanding of the proposal. Additional diagrams, images, or tables are welcome.

· The submission must cover all of the 6 major topics outlined above. Each choice should be explained with technical and business reasoning. The solution should be reasonably detailed. Additional topics may be covered as desired.

· The structure of the final submission is flexible. There is no specific format required, although it should be organized logically and represent a single, unified solution. It is likely that the format will include separate sections for each of the 6 topics required, as well as a summary.

· At least two non-textbook, non-LabSim, non-Wikipedia reference is required; preferably, this would be a “best practice” guide or similar content from Microsoft or an experienced provider of Microsoft solutions.

Be sure to properly quote or cite any sources used. APA format is required for in-text citations and the list of works cited at the end. 

wk 13 fn

What future developments will we see for blockchain applications? Provide at least 2-3 examples.

Strategic IT Exam

 

Question 1 of 20 5.0 Points
Viruses that attach themselves to files with certain extensions, such as .doc or .exe., are __________ viruses.
 

A. boot sector
B. file infector
C. file destroyer
D. file command
 

Question 2 of 20 5.0 Points
According to the CSI/FBI Cyber Crime Survey, __________ of organizations conduct routine and ongoing security audits.
A. 25 percent or less
B. 50 percent
C. 75 percent
D. nearly 90 percent
 

Question 3 of 20 5.0 Points
 __________ invented the movable-type printing press that accelerated  the amount and kind of information that was available to populations.
A. Johann Gutenberg
B. Phil Zimmerman
C. William (Bill) Gates
D. Tim Burners-Lee
 

Question 4 of 20 5.0 Points
Which of the following is NOT an example of a computer crime as listed in the textbook?
A. Data diddling
B. Salami slicing
C. Piggybacking
D. Cold calling
 

Question 5 of 20 5.0 Points
One common way to gain access to a password-protected system is to use a __________ approach.
A. back-door
B. “sneak peek”
C. brute-force
D. social engineering
 

Question 6 of 20 5.0 Points
Persons who plant viruses are called:
A. computer hackers.
B. cyberterrorists.
C. vandals.
D. predators.
 

Question 7 of 20 5.0 Points
A mechanism using a digital signature to prove that a message did, in fact, originate from the claimed sender is called:
A. authentication.
B. privacy/confidentiality.
C. nonrepudiation.
D. integrity.
 

Question 8 of 20 5.0 Points
The global reach of computer networks has raised concerns over:
A. copyrights.
B. privacy.
C. security.
D. All of the above
 

Question 9 of 20 5.0 Points
 __________ is a type of software for securing information systems by  allowing only specific users access to specific computers, applications,  or data.
A. Access control software
B. Computer security software
C. Application restriction software
D. Data protection software
 

Question 10 of 20 5.0 Points
encryption software allows users to ensure:
A. authentication.
B. privacy/confidentiality.
C. nonrepudiation.
D. All of the above
 

Question 11 of 20 5.0 Points
The slang term for stolen software is:
A. hackerware.
B. warez.
C. vaporware.
D. discountware.
 

Question 12 of 20 5.0 Points
__________ are the least used security technology.
A. Passwords
B. Biometrics
C. Encrypted files
D. Firewalls
 

Question 13 of 20 5.0 Points
The Computer Fraud and Abuse Act of 1986 prohibited:
A. stealing or compromising data about national defense and foreign relations.
B. breaking into any electronic communications service.
C. monitoring voice communications.
D. stealing trade secrets.
 

Question 14 of 20 5.0 Points
 A(n) __________ is an ongoing planning process involving risk  assessment, risk reduction planning, and plan implementation as well as  ongoing monitoring.
A. information systems security plan
B. disaster recovery plan
C. infrastructure management
D. risk assessment plan
 

Question 15 of 20 5.0 Points
Crimes committed against telephone company computers are an example of:
A. phreaking.
B. spoofing.
C. social engineering.
D. data diddling.
 

Question 16 of 20 5.0 Points
ECPA is an acronym that refers to the:
A. Electronic Controls Privacy Act.
B. Electronic Communications Privacy Act.
C. E-Commerce Customer Protection Association.
D. Electric Computer Protection Agency.
 

Question 17 of 20 5.0 Points
To execute denial of service attacks, intruders often use __________ computers.
A. zombie
B. monster
C. robot
D. android
 

Question 18 of 20 5.0 Points
Examples of the ethical conundrum include all EXCEPT:
A. using computer time at work to read personal e-mail.
B. organizations compiling personal information about shopping habits.
C. the government regulating computer crimes.
D. using technology to rearrange photographs.
 

Question 19 of 20 5.0 Points
Futurist author Alvin Toffler describes three “waves of change.” The third, and biggest, wave of change to occur is the:
A. Information Age.
B. Industrial Revolution.
C. Agriculture and Handwork Age.
D. Modern Age.
 

Question 20 of 20 5.0 Points
 Some spam e-mail includes __________, which are attempts to trick  financial account and credit card holders into giving away their  authorization information.
A. freaking
B. tricking
C. phishing
D. luring

Discussion

 
After reading chapter 3, analyze the history of Caesar Cypher and its impact on cryptography. You must use at least one scholarly resource.  Every discussion posting must be properly APA formatted. 

Exp19_Excel_Ch05_Cap_Apartments

  

Exp19_Excel_Ch05_Cap_Apartments

Project Description:

You manage several apartment complexes in Phoenix, Arizona. You created a dataset that lists details for each apartment complex, such as apartment number, including number of bedrooms, whether the unit is rented or vacant, the last remodel date, rent, and deposits. You will use the datasets to aggregate data to analyze the apartments at the complexes.

Steps to Perform:

   

Step

Instructions

Points    Possible

 

1

Start   Excel. Download and open the file named Exp19_Excel_Ch05_Cap_Apartments.xlsx.   Grader has automatically added your last name to the beginning of the   filename.

02Before subtotalling the data, you need to sort the   data.
 

  Select the Summary sheet. Sort the data by Apartment Complex in alphabetical   order and further sort it by # Bed (the number of bedrooms) from smallest to   largest.

3You   want to use the Subtotal feature to display the average total deposit by   number of bedrooms for each apartment complex.
 

  Use the Subtotal feature to insert subtotal rows by Apartment Complex to   calculate the average Total Deposit. Add a second subtotal (without removing   the first subtotal) by # Bed to calculate the average Total Deposit by the   number of bedrooms.

5

 

4

Use the outline symbols to display only the   subtotal rows. Create an automatic outline and collapse the outline above   Total Deposit.

2

 

5

You   want to create a PivotTable to determine the total monthly rental revenue for   occupied apartments.
 

  Display the Rentals sheet and create a blank PivotTable on a new worksheet to   the left of the Rentals sheet. Change the name of the worksheet to Rental   Revenue. Name   the PivotTable Rental Revenue

7

 

6

Display the Apartment Complex and # Bed fields in   Rows and the Rental Price field as Values.

6

 

7

Format   the Sum of Rental Price for Accounting Number Format with zero decimal places   and enter the custom name Total Rent Collected.

3

 

8

Select the Occupied field for the filter and set   the filter to Yes to display data for occupied apartments.

3

 

9

You   want to calculate the total monthly rental revenue if the rates increase by   5% for the occupied apartments.
 

  Insert a calculated field to multiply the Rental Price by 1.05. Change the name to New Rental   Revenue. Apply   Accounting Number Format with zero decimal places.

15

 

10

Select the range B3:C3 and apply these formats:   wrap text, Align Right horizontal alignment, and 30 row height. Select column B and set 9.29 column width. Select column C   and set 14.43 column   width.

5

 

11

Apply   Light Orange, Pivot Style Medium 10 to the PivotTable and display banded   rows.

5

 

12

Insert a slicer for # Bed so that you can filter   the dataset by number of bedrooms. Change the slicer caption to # of Bedrooms

5

 

13

Change   the slicer height to 1.4 inches and width to 1.75 inches. Apply Light Orange, Slicer Style Light 2. Cut the slicer   and paste it in cell E2.

6

 

14

Insert a timeline for the Last Remodel field.   Change the time period to YEARS. Apply Light Orange, Timeline Style Light 2.   Change the timeline height to 1.4 inches and with to 3.75 inches. 

5

 

15

The   Databases sheet contains two tables. You will create a relationship between   those tables.
 

  Display the Databases sheet. Create a relationship between the APARTMENTS   table using the Code field and the COMPLEX table using the Code field.

5

 

16You want to create a PivotTable from the related   tables.
 

  Create a PivotTable using the data model on a new sheet. Change the sheet   name to Bedrooms.   Name the PivotTable BedroomData.

5

 

17

Select   the Apartment Name field from the COMPLEX table for Rows, the # Bed field for   Columns, and the # Bed field as Values. This will display the number of   apartments with the specified number of bedrooms per apartment complex.   Display the values as a percentage of row totals.

5

 

18

Create a Clustered Column PivotChart. Cut the chart   and paste it in cell A13.

5

 

19

Select   the 3-bedroom data series and apply the Black, Text 1, Lighter 50% solid fill   color. Apply Black, Text 1 font color to the vertical axis and category axis.   Change the chart height to 3 inches and the width to 5 inches, if necessary. Hide the field   buttons in the PivotChart.

5

 

20

Create a footer on all worksheets with your name in   the left, the sheet name code in the center, and the file name code in the   right.

5

 

21

Save   and close Exp19_Excel_Ch05_Cap_Apartments.xlsx.   Exit Excel. Submit the file as directed.

0

  

Total   Points

100

ETCM DISCUSSION-6

Discussion: Should be between 250-to-300 words. 

DUE DATE: Wednesday End of Day USA time (3 days from now)

Reply: I need 2 replies. Reply is nothing but just additional 100-150 words on same topic but as a different paragraph. (I won’t send any replies to you and then you send info on that. NO) 

DUE DATE: Saturday End of Day USA time (6 days from now)

Topic:

 

There are a variety of ways that a cyber-attack can cause economic damage. In many cases, attackers try to “penetrate” systems in order to steal technology or other sensitive information. When do you think an attack can be classified as cyber terrorism?

Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience

C programming

  

Create a word count server that can do the following: converts first alphabet of every word to upper-case alphabet, counts the number of words, counts the number of alphabets, and finally counts the number of vowels in a given sentence. 

Assignment 3

 

Instructions

You introduce functions with a program that calls – or makes use of –  two functions. So, you have main(), which is included in every program,  and you have firstFunction() and secondFunction().  Each time a  function finishes, program control is returned to whatever called the  function. In this case, that is main(). The code and output are as  follows:

(PLEASE SEE THE UPDATES BELOW THE ORIGINAL PROGRAM PROVIDED.)  

UPDATES 
If you have any issues with the code as provided, please try the following updates to the program.

  1. The compiler is looking for the data types of the return values for the function prototypes.  
    In this example, the two functions do not return values, so void is used to indicate no value will be returned.  
    Example:
    Corrections for the function prototypes

     

  2. As usual this term, add a 0 to the return line.  We  discussed why we do this during Unit 3’s lecture and in Unit 2’s  discussion board.
    Example:
    Corrections for the return line in main()
  3. Since we indicated in our function prototypes that our  functions would not return values, we’ll need to indicate the same in  our function definitions.  Add void in the place of the return data type  for each function.
    Example:
    Corrections for the function definitions
     

Notice the functions are “prototyped,” that is, the function definition is written above main() and followed with a semi-colon.

The flowchart for the code is as follows:

Submission Instructions

Now, you try copying the code, and writing the flowcharts.

Upload flowgorithm file, your .c file, and a screenshot of your code output saved in a Word document