Web Assignment on Cyber Security and Crime

Web Assignment on Cyber Security and Crime Unit III Web Assignment

Web Assignment on Cyber Security and Crime Instructions

In this assignment, you will research and identify one of the laws that govern computer access and trespass. Begin by selecting ONE of the following governances, laws, or standards:

Web Assignment on Cyber Security and Crime
Web Assignment on Cyber Security and Crime
  1. The USA Patriot Act of 2001:
  2. http://www.justice.gov/archive/ll/highlights.htm
  3. The Computer Fraud and Abuse Act:
  4. http://www.pbs.org/wgbh/pages/frontline/shows/hackers/blame/crimelaws.html
  5. The Electronic Communications Privacy Act:
  6. https://it.ojp.gov/default.aspx?area=privacy&page=1285
  7. The Payment Card Industry Data Security Standard:
  8. https://www.pcisecuritystandards.org/security_standards/index.php
  9. Health Insurance Portability and Accountability Act:
  10. http://www.dol.gov/ebsa/publications/yhphipaa.html
  11. Another governance, law, or standard of your choosing.

After conducting research online, write a 500-word paper. Within the paper, including each of the following:

1 Provide an overview of the governance, law, or standard explaining how it is intended to protect civilians.

2 Does adhere to the governance, law, or standard includes any nuisances? Does it place a hardship on users or organizations? List them.

3 Describe an example scenario where the governance, law, or standard is violated (this can be real or fictitious).

4 Provide your own thoughts about the effectiveness of governance, law, or standard. Does it actually accomplish its intentions?

5 Two references (websites, the CSU Online Library, or books)

Cyber Security and Crime Unit VII Assignment

Cyber Security and Crime Unit VII Assignment QUESTION 1 Wardriving is a wireless attack.

Cyber Security and Crime Unit VII Assignment
Cyber Security and Crime Unit VII Assignment

Describe at least four war driving tools and the purpose of each response should be at least 150 words

QUESTION 2

Briefly describe the best practices for access control, and provide an example of each response should be at least 150 words

QUESTION 3

Passwords can be attacked by many different avenues. Name and describe three attacks against passwords. What are some of the network defenses against such attacks? Provide a brief description of each response should be at least 150 words

QUESTION 4

List the account management procedures for securing passwords. Group policy settings allow administrators to set password restrictions on an entire group at the same time. List the attributes, including a description, and recommended settings for this procedure response should be at least 150 words

Best IPC Essay Assignment Available Here

Best IPC Essay
                              Best IPC Essay

Best IPC Essay

BEST OF IPC ESSAY INSTRUCTIONS

Write a 750 word count (approx. 3pg) essay in current APA format that focuses on an interpersonal communication theory. You must choose an interpersonal communication theory to focus on, (such as Social Penetration theory, Uncertainty Reduction theory, Knapp and Staircase Model, etc) but be creative choose a theory that matters to you and your life.

The paper should be organized with the following:

The first 150-250 words of the paper must provide a clear explanation of the theory and the theorists who developed the theory.

The body of the paper (250-300 words) should provide a mini-literature review (from scholarly communication journals) of how the theory has been used/applied in previous research working toward the personal application that will come in the next section.

The final page (250-300 words) of the paper should be direct application to your IPC life, whether personal or professional, with specific parameters.

The paper must include a works cited page with at least 5 references in addition to the course textbook and the Bible. Sources must include books, scholarly journals, and credible internet sources, and they must be scholarly in nature.

Submit this assignment through SafeAssign by 11:59 p.m. (ET) on Sunday of Module/Week 7.

We can write this or a similar paper for you! Simply fill the order form!

  JavaScript programming Assignment

  JavaScript programming
          JavaScript programming

JavaScript programming

Create a web page that allows the user to enter as many numbers as desired and separates them into even and odd. Then find and display the sum and average of all the even numbers and the sum and average of all the odd numbers. Save your page as odd_even.html and be sure to include an appropriate page title.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

We can write this or a similar paper for you! Simply fill the order form!

Java Script Discussion Board Paper Available

Java Script Discussion Board
              Java Script Discussion Board 

Java Script Discussion Board

I’ve provided 2 discussions that need to be responded separately. Discussion topic is the following: “explain why JavaScript is a case-sensitive language? And why is it important for a programmer to know that?”.

1-)Java script is case sensitive because browser implements strict rules while it interpretes the language. As the variable creation and function creation is dynamic and the developer has the liberty to create the variables and functions, it is much convenient for both the interpretor and the developer to write scripts conveniently.

It is important for the programmer to know this because it facilitates the developer in writing a well read, debuggable, easy to understand instructions.

2-)If you are having case sensitive string troubleshooting issues Stack Overflow has a thread of posts. The programmers recommend using .localeComare() or making all === stings .toUpperCase. I could imagine refactoring international code would be challenging with ä and a being separate base letters. It is all-most funny with how forgiving the Document Object Model (DOM) elements like “ ” or ‘ ’ make no difference but any Capital vs lowercase letter will cause errors. If really want your code to run optimally at scale you need to use “strict mode” to not allow bad syntax errors that do run in regular mode. The Strict mode was added in ES5.

https://stackoverflow.com/questions/2140627/javascript-case-insensitive-string-comparison

We can write this or a similar paper for you! Simply fill the order form!

OCaml  Wiki Project Paper Available

OCaml  Wiki Project Paper
   OCaml  Wiki Project Paper

OCaml  Wiki Project Paper

the language is “OCaml

OVERVIEW: What kind of language is it? Where and when was it written? Why? What is/was the language primarily used for? What are its most notable features? Did this language mark the first appearance of some language feature? This section is a brief summary providing a high-level summary of the language.

HISTORY: Here you’ll discuss in more detail the origins of the language. What were the primary design features? What were the goals? What was the design process? What need was it intended to address? How does this language differ from what came before it? What changes were made from ancestor languages, if there were any? How widely was it used, and in what areas? Is the language still in use? Why (or why not)? Were parts of it adopted into other languages, or did it become a dead end? Why? Basically, talk about why someone thought this language was needed, what went into it, and how it worked out.

FEATURES: Describe the language in some detail. At the very least, discuss what native data types are available, and what control structures are available. Classify the language based on the various criteria we’ve been discussing (imperative, object-oriented, functional, declarative, etc). Is it strongly or weakly typed? Is typing static or dynamic? How is iteration handled? What about selection? Or are they (some languages don’t have iteration constructs)? What features does it support? Where does the language really shine? What are its biggest drawbacks? For this section, you can assume that your reader is technically literate (e.g. an upper-level computer science undergraduate) who’s not necessarily knowledgeable about this specific language. If the language has some arcane features, explain them, but it’s not necessary to explain what a compiler is.
Evaluate the language on the criteria discussed in chapter 1 and the material from Sebesta: How readable is the language? How writeable? How reliable? Is it highly orthogonal? How expressive? How well does it support abstraction? How does its execution speed compare to other languages of the same era? Support your positions on these issues.

EXAMPLES: Provide a sample of what code in the language looks like, using some simple, well-known algorithm. Adding items in a list, sorting a numeric list, or converting a string to all lower-case would be examples. Provide something big enough to give a taste of what the language is like. (If sorting a list is a one-line function call, you might want to pick something else, or perhaps show how to explicitly/manually sort a list instead.) If a language is strongly associated with a particular IDE or development environment, you may want to include a screenshot or two.

FURTHER READING: Provide a list of resources you used in assembling your report or where the reader could find more information about that language. You should have at least 5 references other than your textbook or other class materials. You may list no more than 1 Wikipedia article in this section.

We can write this or a similar paper for you! Simply fill the order form!

Scheduling algorithms Assignment Paper

Scheduling algorithms
                      Scheduling algorithms

Scheduling algorithms

HW#2:
1) Given that main memory is composed of only three page frames for public use and that a
seven-page program (with pages a, b, c, d, e, f, g) that requests pages in the following
order:
a, b, c, b, d, a, e, f, b, e, d, f

a. Using the FIFO page removal algorithm, indicate the movement of the pages into and out of the available page frames (called a page trace analysis) indicating each page fault with an asterisk (*). Then compute the failure ratio and success ratio.

b. Using FIFO again, increase the size of memory so it contains four page frames for public use. Using the same page requests as above, do another page trace analysis and compute the failure and success ratios.

2. Given the following Segment Map Tables for two jobs:
SMT for Job 1
Segment Number Memory Location
0 4096
1 6144
2 9216
3 2048
4 7168
SMT for Job 2
Segment Number Memory Location
0 2048
1 6144
2 9216
a. Which segments, if any, are shared between the two jobs?
b. If the segment now located at 7168 is swapped out and later reloaded at 8192, and the segment now at 2048 is swapped out and reloaded at 1024, what would the new segment tables look like?

3) Five jobs arrive nearly simultaneously for processing and their estimated CPU cycles are,
respectively: Job A = 2 ms, Job B = 12 ms, Job C = 15 ms, Job D = 7 ms, and Job E = 3 ms.

a. Using FCFS, in what order would they be processed? What is the total time required to
process all five jobs? What is the average turnaround time for each of these five jobs?

b. Using SJN, and assuming that all jobs are present when the algorithm begins, in what
order would they be processed? What is the total time required to process all five jobs? What is the average turnaround time for all five jobs?

c. Using SJN, and assuming that all jobs are present when the algorithm begins, what is the average turnaround time for all five jobs using these speeds: Job A = 12 ms, Job B = 2 ms, Job C = 15 ms, Job D = 7 ms, and Job E = 3 ms.

4. Given the following information:
Job Arrival
Time
CPU
Cycle
A 0 15
B 2 2
C 3 14
D 6 10
E 10 2

a) Calculate which jobs will have arrived ready for processing by the time the first job is finished or is first interrupted. Do your calculation using each of the following scheduling algorithms.
1. FCFS
2. SJN
3. SRT
4. Round Robin (use a time quantum of 5, but ignore the time required for context switching and natural wait).

b) compute the turnaround time for every job using each of the following scheduling algorithms (ignoring context switching overhead times).
a. FCFS
b. SJN
c. SRT
d. Round robin (using a time quantum of 5)

We can write this or a similar paper for you! Simply fill the order form!

Future of Network Security in Cloud computing

Future of Network Security in Cloud computing
  Future of Network Security in Cloud                                      computing

Future of Network Security in Cloud computing

1. 10 pages double spaced.(excludes first and conclusion)

2.Must Have at Least 10 Works Cited of Which 6 Must be Peer Reviewed Works/Articles.

3.Should include ‘Social, political and legal issues’ that can be impacted with the development of technology

4. Pros and cons.

5. Need power point presentation also.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

We can write this or a similar paper for you! Simply fill the order form!

Analysis of Algorithms Essay Assignment

Analysis of Algorithms
                       Analysis of Algorithms

Analysis of Algorithms

  1. Greedy algorithms: The principle of a greedy algorithm is to find a near best solution for local conditions. For instance, a cashier gives coin changes to a customer, the best way is to give the smallest number of coins to the customer. However, it is usually hard to make such an arrangement. The cashier usually gives the largest valued coins first until could not give more, then select the second largest valued coins to the customer. And so on so forth.

For instance, for 48 cents, the cashier usually give one “25c”, two “10c”, and three”1c” coins. This algorithm is called the cashier’s algorithm that is a greedy algorithm. According to the previous research, the cashier’s algorithm is already the optimum for the US coin change system. Meaning that the cashier’s algorithm will give the best solution for US coin changes.

If a coin system is randomly assigned, for instance, there is no “5c”–nickel. The cashier’s algorithm may not reach the optimum in some cases.

(Graduate) (1) Design the cashier’s algorithm for any coin-change systems. You can assume the single coin values up to 10 different coins (m<=10). You can assume that the changes are in between 1-99 cents (1<=n<=99). (2) What is the time complexity with respect to “m” and “n?”

(Undergraduate) (1) Write a C++ or Java program to implement the cashier’s algorithm. (You can just use the US coin changes as the example.)

(2) Write an essay about the greedy algorithm (1-2 pages).

If one likes to complete the assignments for both graduate students and undergraduate students, the extra points will be given.

2. Using dynamic programming to calculate comb(n,m)=comb(n-1,m-1)+comb(n-1,m) where comb(n,m)=1 when n<=m, n=0, or m=0 .

We can write this or a similar paper for you! Simply fill the order form!

Computer science definition Essay Paper

Computer science definition
    Computer science definition

Computer science definition

One of the server operators in your organization seems to have problems accessing folders containing programs he needs to run. What tool might help diagnose the problem most quickly?

Which of the following are examples of extended attributes in NTFS? (Choose all that apply.)

Which command is used to change permissions using the Red Hat Linux 9.x command line?

Which operating system uses domain local security groups? (Choose all that apply.)

You have discovered that for some reason two groups in Red Hat Linux 9.x share the same GID. Is this a problem?

The FLAG command in NetWare 6.x can be used to _________________________________.
Generally, in an operating system, the account used to create an object, such as a folder, ____________________________________.
Which of the following are NTFS permissions that can be set in Windows 2000 Server and Windows Server 2003? (Choose all that apply.)

You are consulting for a doctor’s office consisting of 18 networked workstations and one Windows 2003 server that is used to share folders. The office has a demo of a new medical database, but the licensing requires that not more than two people access it at the same time. How can you accommodate this requirement most easily?

When you set permissions in Red Hat Linux 9.x using the command line, the _________________ option applies those permissions to users, groups, and others.

How can you control access to shared resources in Red Hat Linux 9.x when using NFS? (Choose all that apply.)

Which of the following are permissions that you can configure for a folder in Mac OS X? (Choose all that apply.)

Which type of group would typically be use primarily to house user accounts in Windows 2000 Server and Windows Server 2003 when Active Directory is installed?

In Windows XP Professional, share permissions work for which of the following file systems? (Choose all that apply.)

In Windows 2000 Server, you can hide a shared folder by _________________________.
A(n)  is associated with a folder or file to show which users or groups have what kind of permissions or rights to that folder or file.

The more /etc/group command-line command can provide information about groups in which of the following operating systems? (Choose all that apply.)

We can write this or a similar paper for you! Simply fill the order form!