Please write 15 pages including the title and references page
Java Programming
Please read the instruction from these pictures.
You can use these codes below.
game.java (The codes of the picture below) :
https://drive.google.com/file/d/1vggE2dDlb9d7PdE1vB6_AIa2bxytc3Um/view?usp=sharing
Game.java :
https://drive.google.com/file/d/1Ax_n-lW65wCPXgelFctKGnx93i1KNFdc/view?usp=sharing
GameObject.java :
https://drive.google.com/file/d/1M3nbQUVt9FjY_aco5YtAN_g-moXgfYhk/view?usp=sharing
Enemy.java :
https://drive.google.com/file/d/12ZmBwbsH5ltgSI18gWcZJX5DHwgEqYoi/view?usp=sharing
Player.java
https://drive.google.com/file/d/1Kn1PAXE3NONPyYPaeHBBH3gCdjcwaN6l/view?usp=sharing
Deadlocking in Concurrent and Distributed system
There are 5 resources, A, B, F, G, I, each of which can be acquired and released. There are two resource-user (or thread) types S and T.
Each instance of S repeatedly executes this code sequence: It acquires I, then A, and then G. It releases A and G. It acquires B. It releases I and then B.
Each instance of T repeatedly executes this code sequence: It acquires G and then F It releases G It acquires A It releases F and then A
a) How many instances of S does it take to create deadlock if there are no instances of T?
b) How many instances of T does it take to create deadlock if there are no instance of S?
c) There are instances of S and of T. How many instances of S and how many instances of T does it take to create deadlock? Note: In some cases, no deadlock is possible no matter how many instances/threads there are.
cs & ns
(4Q’s, NO PLAGIARISM, by Saturday(10/10)
1/4 – A digital forensics professional must know basic IT skills, understand computer architecture and networking, and have analytical and investigative skills, as well as strong attention to detail. Why do think all of these skills are necessary? Please explain. (Min 250 words)
2/4 – Law enforcement professionals and investigators use digital forensic methods to solve crimes every day. Locate one current news article that explains how investigators may have used these techniques to solve a crime. Explain the crime that was solved and the methods used to determine how the crime was committed. Some examples of crimes solved may include locating missing children, finding criminals who have fled the scene of a crime, or unsolved crimes from the past that have been solved due to the use of new techniques (such as DNA testing).
Your written assignment should be 3-4 paragraphs in your own words and should include a reference citation for your source of information. (Min 250 words)
3/4 – Essay on Packet Sniffing and Wireshark (Min 250 words)
4/4 – In this module, you learned that random numbers (or, at least, pseudorandom numbers) are essential in cryptography, but it is extremely difficult even for powerful hardware and software to generate them. Go online and conduct research on random number generators. What are the different uses of these tools besides cryptography? How do they work? Explain your answer using your own words in 2-3 paragraphs. (Min 250 words)
PL W2
Answer each these questions in a paragraph with at least 2-3 lines. Provide a citation for each answer.
1. What kind of speech was the First Amendment written to protect?
2. Does the First Amendment apply only to spoken words?
3. What does it mean that laws regulating speech must be content neutral?
4. Why are common carriers prohibited from controlling the content of the material they carry?
5. How does the Supreme Court determine whether material is obscene?
6. Why have attempts to censor the Internet failed in the US?
7. Why not just ban spam?
8. Why did Facebook ban Alex Jones and Louis Farrakan?
9. Should websites that show how to 3d print guns be banned?
10. According to the Supreme Court ‘anonymity is a shield from the tyranny of the majority’. What does that mean?
home work assignment
Submit a report that discusses the techniques used by malware developers to disguise their code and prevent it from being analyzed. Give suggestions on how these techniques should be classified and ranked in the disaster recovery documentation.
minimum 300 – 400 words
Assignment should follow all APA rules and include a min. of (1) citation/reference.
no plagiarism
Assignment 07/08
Week 2 Paper – IT Strategy
Individual Effort Only!
APA format is required – Your paper must be supported with appropriate APA-formatted citations that match full references at the end of the paper. Include headings in your paper for each question–DO NOT just restate the question as your heading–use unique headings identifying the content topic. Each section should be at least 2-3 paragraphs in length.
Referring to chapters 2 and 3 of the Langer (2018) text specifically regarding IT organization and strategy, review and compare the two sources below and then address the following questions in your paper:
Overby, S. (2017, October 27). Anatomy of an IT strategic plan in the era of digital disruption. Retrieved from https://www.cio.com/article/2437285/anatomy-of-an-it-strategic-plan.html
Lindros, K. (2017, July 31). What is IT governance? A formal way to align IT & business strategy. Retrieved from https://www.cio.com/article/2438931/governanceit-governance-definition-and-solutions.html
- Identify and discuss 2 key issues identified in the articles regarding IT strategy in today’s business world
- Discuss the need for alignment between business and IT strategy
- Discuss the challenges in aligning business and IT strategy
- Provide a concluding statement addressing your views on the value of IT strategic management and business alignment
Assignment
Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references. Minimum of 400 words
What does a peer review process look like? When does an assessment require peer review? Who should perform the peer review?
Enterprise Risk Management
Chapter 18 presented special risk management issues with Blue Wood Chocolates, and chapter 19 presented various financial risks at Kilgore Custom Milling. If Blue Wood Chocolate and Kilgore Custom Milling are to develop a risk management framework, who should lead the process at each company? Should a Chief Risk Officer (CRO) be appointed? If so, to whom should he/she report and have access to? How could smaller companies without the resources for a dedicated CRO deal with ERM? What is the role for the board in such a process?
To complete this assignment, you must do the following:
A) Create a new thread. As indicated above, if Blue Wood Chocolate and Kilgore Custom Milling are to develop a risk management framework, who should lead the process at each company? Should a Chief Risk Officer (CRO) be appointed? If so, to whom should he/she report and have access to? How could smaller companies without the resources for a dedicated CRO deal with ERM? What is the role for the board in such a process?
700 Words