Check Attachment
security architecture 15 .2
Read the attached paper carefully and write a research summary ,in two sections
1- Overall summary
2- What you would like to add or change to the conclusion section
This assignment should be in APA format, plagiarism free and have to include at least two references other than the paper. 1000 words minimum
End product 3
- Distinguish between due care and due diligence.
- Based on your experience, provide examples of due care and due diligence.
2000 words
security measures
Many business environments have both visible and invisible physical security controls. You see them at the post office, at the corner store, and in certain areas of your own computing environment. They are so pervasive that some people choose where they live based on their presence, as in gated access communities or secure apartment complexes. Alison is a security analyst for a major technology corporation that specializes in data management. This company includes an in house security staff (guards, administrators, and so on) that is capable of handling physical security breaches. Brad experienced an intrusion—into his personal vehicle in the company parking lot. He asks Alison whether she observed or recorded anyone breaking into and entering his vehicle, but this is a personal item and not a company possession, and she has no control or regulation over damage to employee assets. This is understandably unnerving for Brad, but he understands that she’s protecting the business and not his belongings.
When or where would you think it would be necessary to implement security measures for both?
Convert the following C++ program into an x86 assembly language program. Make sure to use your “Chapter 8” understanding of advanced functions, parameter passing, and local variables. Post ONLY your ASM file here to Blackboard when complete
#include
using namespace std;
int IsSemifauxtrifactored(int value)
{
// Return 1 if a number’s factors/divisors from (value – 1) to 1 sum up to a quarter of the number value
// Return 0 otherwise
// A number is called “semifauxtrifactored” if its summed factors/divisors equal a quarter of the number itself
// Integer division is used, so remainders on the halving can be lost
// That’s why…
// 7 is a semifauxtrifactored number
// 7 divided by 4 with integer division is (7 / 4) = 1
// 7 % 6 -> 1
// 7 % 5 -> 2
// 7 % 4 -> 3
// 7 % 3 -> 1
// 7 % 2 -> 1
// 7 % 1 -> 0 FACTOR!
// 7 is a semifauxtrifactored number since its factors (1) equal a quarter of the number (1)
// 6 is a normal number
// 6 divided by 4 with integer division is (6 / 4) = 1
// 6 % 5 -> 1
// 6 % 4 -> 2
// 6 % 3 -> 0 FACTOR!
// 6 % 2 -> 0 FACTOR!
// 6 % 1 -> 0 FACTOR!
// 6 is a normal number since its factors (1 + 2 + 3) do not equal a quarter of the number (1)
}
int main()
{
cout << "Enter a value: ";
int value;
cin >> value;
value = IsSemifauxtrifactored(value);
if (value == 1)
{
cout << "The number is semifauxtrifactored!";
}
else
{
cout << "The number is normal";
}
cout << endl;
system(“PAUSE”);
}
analysis
Key Terms:
- Building Rapport in Negotiation
- Integrative Negotiation
- Distributive Negotiation
- Concessions in Relation to Negotiation
DEFINITION: a brief definition of the key term followed by the APA reference for the term; this does not count in the word requirement.
SUMMARY: Summarize the article in your own words- this should be in the 150-200 word range. Be sure to note the article’s author, note their credentials and why we should put any weight behind his/her opinions, research or findings regarding the key term.
ANALYSIS: Using 300-350 words, write a brief analysis, in your own words of how the article relates to the selected chapter Key Term. An analysis is not rehashing what was already stated in the article, but the opportunity for you to add value by sharing your experiences, thoughts and opinions. This is the most important part of the assignment.
REFERENCES: All references must be listed at the bottom of the submission–in APA format.
security vulnerablities
Discuss, in your own words using 500 words or more, how virtualization may create it’s own security vulnerabilities.
Use at least three sources. Use the Research Databases available from the Danforth Library not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list. Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs. Stand alone quotes will not count toward the 3 required quotes.
Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0.
Write in essay format not in bulleted, numbered or other list format.
Do not use attachments as a submission.
Reply to two classmates’ posting in a paragraph of at least five sentences by asking questions, reflecting on your own experience, challenging assumptions, pointing out something new you learned, offering suggestions. These peer responses are not ‘attaboys’. You should make your initial post by Thursday evening so your classmates have an opportunity to respond before Sunday.at midnight when all three posts are due.
It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your post and that you reply to two classmates in a substantive way (not ‘nice post’ or the like). Your goal is to help your colleagues write better. Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. . I will not spend a lot of my time trying to decipher nonsense. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about. Please do not submit attachments unless requested.
Research on statistical methods
Need the paper in 8 hours. ASAP
Discussion OE
Please go through the attached documents completely before providing the answer
DAta mining week 2 assignment
Youtube link:
Watch video of Ted Talk about Social Media Analytics
stop the video at 4:27 and try to come up with the answer Dr. Golbeck is asking:
“How come liking a picture of curly fries could be the indicative of how smart you are?”
First, try to come up with your own predictions and post it here. Also add overall your reflection on what you learned about Social Media Analytics after watching this video.