Assignment

 

  1. Now that you have R installed on your computer, you will begin to get some experience (hands-on) with the software. For this assignment, you are exposed to just 4 features of R: Arithmetic OperationsOperations on vectors; the Recycle Rule for adding/subtracting vectors; and Creating a S3 Class Object. A separate screen shot is required for execution of each feature. Open R (either command line or RStudio). Enter code that will handle the following (show all code, comment for each code line and the computed results in your screen shots). These are instructions; do NOT just write the instructions – actually show this within R and capture a readable screen shot to show that it works properly!!
    Screen shot 1: Arithmetic Operations

    • assign a value of 144 to x
    • assign a value of 6 to y
    • add x and y
    • subtract y from x
    • multiply x times y
    • divide x by y
    • find the square root of x
    • Screen shot 2: Operations on vectors
    • create a vector (afc) and assign values 2,6,3
    • create a vector (nfc) and assign values 6,4,2
    • add afc and nfc
    • Screen shot 3:  Recycle Rule for adding and subtracting vectors
    • assign values 2,1,8,3 to vector x
    • assign values 9,4 to vector y
    • add x to y
    • notice the warning message – use the Recycle Rule for adding vectors; then 
    • add x to y and show results
    • subtract 1 from x – apply the Recycle Rule for subtracting vectors; then
    • subtract y from x and show results
    • Screen shot 4: Create an S3 Class Object
    • create a list – with components: name = Your name, date = today’s date, and score = score you desire on Assignment 2.
    • name the class as “graduate student” 
    • Save the screen shots as a MS Word document (*.docx). Then, click the “Write Submission” link below and directly paste your screen shots into this forum OR add the screen shots as a Microsoft Word document attachment (Mac users, please remember to append the “.docx” extension to the filename).

Database Storage

 

In Weeks 1-5, you will be working on gathering information in a Database Management Plan that will culminate in Week 6 in a 20-minute presentation (10-12 slides) to explain how to staff and run the organization’s database administration.  

The presentation will provide recommendations to an organization regarding how to develop a plan for the maintenance of databases that store business data and use in business analytics. 

Create 700-word entry in your Database Management Plan. You will use information from this entry in your presentation due in Week 6. Ensure you:   

  • Assess the best way to organize data into your database.
  • Distinguish how organizational data can be used in the most effective way through developing a database.
  • Describe the relationship model and conceptual design to be used.  

Submit your assignment.

C++ / Python

 

Check the slides “OS Security II,” pg. 4-8. You are to implement a Dictionary Attack with and without Password Salt program in either C/C++ or Python.

If you are not familiar with measuring execution time in C++, see the following website:

https://www.geeksforgeeks.org/measure-execution-time-function-cpp/

If you are not familiar with measuring execution time in Python, see the following website:

https://stackoverflow.com/questions/1557571/how-do-i-get-time-of-a-python-programs-execution

See the following steps.

1. Accept a user password of length N as keyboard input to your program. You can determine your own length N.

2. Compute the hash of the password from step 1.

Your hash function H() is simply the checksum. (See Assignment 2)

3. Now you become an attacker and try to find the password of length N.

Try every combination of length N password and for each combination, compute the hash and compare to the hash of the password from step 2.

Measure execution time.

4. Now let’s reinforce our password using the password salt. Accept an arbitrary non-negative integer number as keyboard input to your program.

5. Compute the hash of the concatenated password salt and password from step 4 and step 1. To compute the password salt portion of the checksum, you can treat the entire password salt as EITHER a single integer OR multiple one-byte integers.

6. Now you become an attacker and try to find the concatenated password salt and password.

Try every combination of an arbitrary non-negative integer number and length N password and for each combination, compute the hash and compare to the hash from step 5.

Measure execution time.

NOTE: your program should have separate functions for the checksum and the two dictionary attacks with and without the password salt by the attacker.

LOOKING FOR NATIVE WRITERS

Looking For Native Writers

I am Looking for  *EXPERIENCED* Writers that can be able to handle 10-20 pages a day with, Top notch Grammar. Well constructed Paragraphs with Topic Sentences. They should be familiar with Spss and Data analysis tools will be an advantage

If you know you can’t meet High grammatical standards don’t engage me. 

Email your samples to firstlanedollarshumanresource at g.m.a.i.l c.o.m indicating your name in the subject of your email and phone number

Call 0700152748

Ethics – Discussion Post Due 10/18/20 by 5PM Eastern Time

Please answer the below and submit in a word document. Be careful, make sure to avoid plagiarism and to use quotation marks and proper citation as required. Length should be 130 to 160 words and double-spaced. Use APA format for citations and the required References page. Remember that the significant portion of your analysis should be in your own words.

1)  Stepping back a little, International Labor and Employment Issues can be a very sticky area.  The question will arise EVERY time.  “Human Treatment vs. Better Profits.”  I am looking forward to seeing how this group will approach this very sensitive necessarily important issue.  When the topic of International Business is raised the issue of employment treatment and over all labor issues must be addressed.  It can be done openly and with an intent of good will or it can be addressed as it has many times in the past as a “letter-of-the-law” issue managed by the “locals” with graft and disdain as the guiding parameters.

2) Some authors have stated that “…compliance with the law is a fundamental component of responsible management” (Baron).  International Businesses must act responsibly in all respects as they do have social and moral responsibilities.  Business management must not only have the appearance of legal compliance, but must actually be in compliance with all laws.  This not only includes the obvious criminal but also a full host of international consequences caused to territorial, environmental, antitrust, securities and other applicable international legal issues. What’s your thought on this?

Baron, D.P. (2013) Business and Its Environment, Seventh Edition. Upper Saddle River, NJ; Prentice Hall.

3) Looking at how companies domestic or multinational (MNC’s) handle the benefits and disadvantages of using employees, independent contractors, foreign sales representatives, and distributors.  Do you think these findings can be considered a model for how  companies should handle these types of issue or is there room for improvement in some areas?

discussion-5

  The differences between and advantages of MAC, DAC, and RBAC. 

  Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes. 

security and data loss prevention

  1. Discuss the challenges of private security in terms of licensing, regulating, hiring, and training. 
  2. Identify and discuss the four basic steps in a risk management program.  What is risk analysis or risk assessment? Provide examples in your discussion. 
  3. Name and explain three issues that corporations may be held civilly liable for regarding security matters. 
  4. Identify and discuss some of the changes in security brought about as a result of the 9/11 terrorist attacks against the United States. 
  5. Describe how cruise ships have responded to security-related issues since 9/11. 
  • Turn in the Paper to SMARTHINKING.com before submitting your final paper.
  • Turn in a final paper and the paper with the SMARTHINKING.com tutor comments.
  • Complete the project in APA format
  • Paper should include at least 3 references
  • Paper should be a minimum of 4 pages in length

paper2

 

What are baseline security requirements that should be applied to the design and implementation of applications, databases, systems, network infrastructure, and information processing when considering cloud computing within an enterprise risk management framework?

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.