Options Menu: Forum

Information Governance week 5-2

 Discussion Week 5 – The Role of Blockchain in Information Governance Options Menu: Forum

While blockchain is successful with cryptocurrencies, it is also beneficial for information governance in businesses. After reading this article  (https://www.everteam.com/en/role-of-blockchain-in-information-governance/), discuss at least two ways you foresee blockchain transforming information governance in businesses. Be sure to utilize sources and provide at least one detailed example of your findings.

— 600 words

Presentaion 7

 

Class Discussion Topics
  1. What are the different types of direct access storage devices?
  2. Which type of DASD do you prefer for storing records and why?  
  3. Discuss the different types of device handler seek strategies. Which strategy do you think is the best? Why?   

prepare the PowerPoint slide with few diagram and explain on the note with the link that is used

2 page each 

flash card program python

the aim of this first assignment is to implement a Linked List that is able to hold and operate on more complex data (than just one number, string, etc.). 

Specifically, the task is to create a set of flash cards. The “deck” of flash cards can be thought of as a linked list. Each flash card should have a hint (e.g. “an ADT that typically has push and pop operations”), and then will prompt for an answer from the user. The program should go through the deck of flash cards (i.e. traverse the linked list). 

See the video here for a short demonstration of what the program should look like when it is run:

What to hand in?

A single *.py file should be submitted here on Canvas. Do *not* put your name anywhere in the *.py file since this will be anonymously reviewed. 

The example of how the ouput should is the first screen shot i’ve added. the next 2 screen shots are how the assignment is graded.

Additional requirements/specs:

  • the program should have at least 3 flash cards
  • you should choose hints and answers other than those that are shown in the demonstration video
  • your cards (the hints and answers) should be hard-coded inside of your program (you do not want to have to input the cards in your program each time it is run, and, when someone else runs your program they will be able to see new flash cards that they have not seen before)

Hints/Tips:

The flow of the program is that we iterate through the deck of flash cards (i.e. the linked list), and remove a card (i.e. node) when it has been answered correctly twice. Thus, iterating over the linked list, keeping track of correct answers, and stopping when the list is empty, is 90% of the task here. Try to push as much functionality into your flash cards (nodes), and deck (list) as possible. That way the main part of your program can be very short and simple. 

The python function, “input()” will be helpful. Here is how it could be used in this program:

answer = input("ENTER 'S' FOR STACK, 'Q' FOR QUEUE', OR 'L' FOR LIST")

answer the question by reading articles.

Stage 1: Your initial post should contain the following information:

  • What did you learn from the two readings provided in this module? Summarize your answer in no more than 6 sentences. (5 points)
  • Identify two posts from FlowingData.com (Links to an external site.). which topics are related to business management. Provide the title of the post and the direct URL to the post. (5 points)
  • What are the business problems the two posts trying to address? (10 points)
  • Explain how visualization helps you to understand the two problems. (10 points)

All stage 1 initial post must be submitted during the first week after this module is open by Sunday, in order for your classmates to read and provide feedback in the following week. 

Stage 2: Respond to TWO peer posts  starting During the second week of this module. (10 points)

  • You should provide comments on or share your thoughts about peer students’ understandings of BA and visualization. 

Coding

PROGRAM REQUIREMENTS

In this assignment you will implement three basic graph algorithms: breadth-first search, depth-

first traversal, and topological sort. We are not providing any code template, but you must follow 

the input and output formats specified below. Read carefully what you are required to do to 

receive full credit and attempt the extra credit tasks only after you are done with the 

requirements. 

First, implement a graph data structure using adjacency lists. Your code must read graphs of 

arbitrary size from a file (as long as there is enough memory available, your code must work: do 

not assume a maximum number of vertices). The input format is as follows: one line per vertex, 

the first element is the vertex id and the following numbers are the adjacent vertices. The input 

file will always be a bunch of integers and white space. For example,

1 3 4 

3 1 4 

4 1 3

is a graph with four vertices, and three undirected edges: (1, 3), (1,4) and (3,4). 

Then, implement three algorithms: 

• Breadth-first search. Calculate the distance from vertex 1 to all other vertices using BFS. 

Then, print all the vertices sorted by distance from vertex 1. Note that if the graph is 

unconnected, some nodes may have distance ∞.

• Depth-first traversal. Calculate discovery and finish times using DFT. Then, print all the vertices sorted by discovery time.

Topological sort. Print the topological sort of the graph. 

A few comments:

• Look carefully at the sample input and output files and follow the same format. 

• When you look through vertices, visit them in increasing order.

Extra credit: 

• Use BFS to determine whether a graph is connected. The input is a graph, and the output 

is yes or no.

• Implement an algorithm to detect whether a graph has a cycle. The input is a graph, and 

the output is yes or no.

• Design and implement an algorithm that takes as its input a graph ???? = (????, ????) and a 

permutation of ????, and outputs whether the permutation of ???? is a topological sort of ????.

Your algorithm must run in Θ(|????| + |????|).

Assignment and Discussion

 

Week 9 – Discussion

In a corporate, networked setting, should end users be allowed to install applications on their company workstations, whether the applications are on a DVD or downloaded from the Internet? Be sure to weigh security against usability. 

 

Internet Research – Wk 9

For this assignment, you are asked to locate any company privacy policy. Some of the more popular ones might include GOOGLE, APPLE, or MICROSOFT, but you may elect to review another agency. In 3- 4 paragraphs, explain what you find to be the most interesting information contained in that privacy policy. At the end of your report, please include a LINK to the policy you have reviewed. 

 

Week 9 Discussion – The Remote Worker

 In no less than 250 words, describe a solution to securely connect a remote worker from their home and connected to the Internet to their company network.  How does this solution work and what is needed on the company network and the remote worker’s network to accomplish your solution?  Respond to two other learners by the end of the week. 

   

Week 9 Assignment

  • 9.1 Give examples of applications of IPsec.
  • 9.2 What services are provided by IPsec?
  • 9.3 What parameters identify an SA and what parameters characterize the nature of a particular SA?
  • 9.4 What is the difference between transport mode and tunnel mode?
  • 9.5 What is a replay attack?
  • 9.6 Why does ESP include a padding field?
  • 9.7 What are the basic approaches to bundling SAs?
  • 9.8 What are the roles of the Oakley key determination protocol and ISAKMP in IPsec?

Final white paper project – ticketing system

 – Add images and tables that were included in previous submissions. Your current document points to figures and tables that are no longer included in your capstone project. 

  – There are still some discrepancies between the information presented in the Technology Solution and Requirements section (pages 13 – 19) and the Design section (pages 19 – 24) and the implementation section (24 – 31). For instance, the following technologies components listed in the Technology Solutions and Requirements section are not included in the design and implementation sections: Azure cloud-based service, Recoverit, Cisco Integrated Service Virtual Router (ISR), -WD My Book Duo 4TB, and SecuGen biometric scanner. 

 – Your test result doesn’t show specific examples and images (there are references to images, but the document doesn’t include these images) that support the needs that you selected such as database, network infrastructure, access control, and so on.  The test result section for each need is briefly summarized in three or four lines. You must provide specific information that demonstrate a proper test result or a failure if that is the case.  – The Assignment requires that you include the Conclusion section.  

Digital Forensics Tools&Tech

 

Week Nine Assignment

Use the web or other resources to research at least two criminal or civil cases in which  recovered files played a significant role in how the case was resolved.

Use your own words and do not copy  the work of another student.

Attach your WORD document here.

Enterprise Risk Management

 After reading the required articles this week .please write a research paper that answers the following questions: 

  • What are mobile forensics and do you believe that they are different from computer forensics?
  • What is the percentage of attacks on networks that come from mobile devices?
  • What are challenges to mobile forensics?
  • What are some mobile forensic tools?
  • Should the analysis be different on iOS vs Android?

  • Be approximately four  in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

intext citations,references,proper citations