Statement of Purpose on Academic and Research Goals
Please give a Statement of Purpose detailing your academic and research goals as well as career plans. Include your reasons for choosing the College of Computing as opposed to other programs and/or other universities. Limited to 4000 characters.
Below are some areas of what I would like to include:
What do you want to study at graduate school?
Computer Science
Why do you want to study?
To expand my current knowledge of the computing world to a scholarly level and competitive level.
Java and Creation of Class DijkstraAlgorithm Using the array-list implementation for directed graphs in the class Graph, write a class Dijkstra with a method findShortestPath(int vertexIndex) that finds shortest paths from the vertex with the given index (i.e., this vertex is the source vertex).
Java and Creation of Class Dijkstra Algorithm
To make this efficient for sparse graphs, you will need to use a min-heap. For this assignment, submit a zip file for a folder containing all of the classes you used in this assignment.
Using the three classes of the graph (Graph, GraphMaker, GraphTester) and create class Dijkstra with a method findShortestPath(int vertexIndex) to find the shortest path of the values in the (GraphData.txt) by using the methods in graph classes. That means just create one class more.
Cybersecurity Risks and Recommendation Policy Cybersecurity risk can arise from several vectors and include hardware, software, networks, and personnel.
Cybersecurity Risks and Recommendation
Which vector is the most important to address with policy, and why? Locate a least 2 journal articles that provide recommendations for cybersecurity policy. Identify and explain at least 5 measures to address the risk. Cite sources using APA format.
(400-500 words).
The Chicago-area deaths of people who unwittingly took “Extra-Strength Tylenol” capsules tainted with cyanide poison dealt the first serious setback to a product that had been one of the most spectacular success stories in the history of marketing.
Cloud Computing and A Litany of Basic Requirements Cloud computing has a litany of necessary requirements.
Cloud Computing and A Litany of Basic Requirements
The business case needs to showcase the necessity for moving to the cloud as well as an understanding of the cost-benefit analysis. You should showcase a positive outcome for such a move outlining the overall inception and systems lifecycle process. As such, discuss the following questions in order to define what sufficient means and how to interpret a cost-benefit analysis:
What is required for the business need to be identified and who makes the decision to move forward with a course of action?
What is a cost/benefit analysis and how does that factor into the decision to migrate into the cloud?
What sort of risks exist and how might those be mitigated?
A minimum of 200 words is required for each discussion question, and they must be your own words. Including figures and quotes is value-added, but they will not count against your 200 word requirement. Be sure to examine the discussion grading rubric.
Discussion Question 1:
You are an administrator of a Windows Network Infrastructure that has 200 servers running Windows Server 2016 and you need to deploy another 100 servers over the next few months. You want to ensure that each server has the following configuration performed:
Certain server roles and features need to be installed.
A set of default users and groups needs to be created on each server.
Describe how to ensure that your current servers and any servers that you install will have this base configuration. Also, describe how to ensure that when these settings are changed, the system is automatically reconfigured.
Discussion Question 2:
Pick a PowerShell command and elaborate on how it can be used in a Server 2016 environment. Explain if there is a comparable way to do the same thing at the Command Line in Windows or by using the GUI.
We can write this or a similar paper for you! Simply fill the order form!
Law School; J.D., Yale Law School. Thanks to Chris Hoofnagle, Adam Moore, and Michael Sullivan for helpful comments, and to my research assistant Sheerin Shahinpoor. I develop some of the ideas in this essay in significantly more depth in my forthcoming book, Understanding Privacy, to be published by Harvard University Press in May 2008.
James Risen & Eric Lichtblau, Bush Lets U.S. Spy on Callers Without Courts: Secret Order to Widen Domestic Monitoring, N.Y. TIMES, Dec. 16, 2005, at A
746 personal data for patterns of suspicious behavior, the government has begun numerous programs. In 2002, the media revealed that the Department of Defense was constructing a data mining project, called Total Information
Awareness (TIA), under the leadership of Admiral John Poindexter.
The vision for TIA was to gather a variety of information about people, including financial, educational, health, and other data. The information would then be analyzed for suspicious behavior patterns. According to Poindexter: the only way to detect . . . terrorists are to look for patterns of activity that are based on observations from past terrorist attacks as well as estimates about how terrorists will adapt to our measures to avoid detection
When the program came to light, a public outcry erupted, and the U.S. Senate subsequently voted to deny the program funding, ultimately leading to its demise.
Nevertheless, many components of TIA continue on in various government agencies, though in a less systematic and more clandestine fashion.
In May 2006, USA Today broke the story that the NSA had obtained customer records from several major phone companies and was analyzing them to identify potential terrorists.
The telephone call database is reported to be the largest database ever assembled in the world
In June 2006, the New York Times stated that the U.S. government had been accessing bank records from the Society for Worldwide Interbank Financial
Transactions (SWIFT), which handles financial transactions for thousands of banks around the world.
Many people responded with outrage at these announcements, but many others did not perceive much of a problem.
The reason for their lack of concern, they explained, was because: life got nothing to hide
The argument that no privacy problem exists if a person has nothing to hide is frequently made in connection with many privacy issues. When the government engages in surveillance, many people believe that there is no threat to privacy unless the government uncovers unlawful activity, in which case a person has no legitimate justification to claim that it
John Markoff, Pentagon Plans a Computer System That Would Peek at
Personal Data of Americans, N.Y. TIMES, Nov. 9, 2002, at A12.
John M. Poindexter, Finding the Face of Terror in Data, N.Y. TIMES, Sept. 10,
2003, at A25.
DANIEL J. SOLOVE, THE DIGITAL PERSON: TECHNOLOGY AND PRIVACY IN THE
INFORMATION AGE 169 (2004).
Shane Harris, TIA Lives On, NATíL J., Feb. 25, 2006, at 66.
Leslie Cauley, NSA Has Massive Database of Americansí Phone Calls, USA
Today, May 11, 2006, at A1; Susan Page, Lawmakers: NSA Database Incomplete, USA
Today, June 30, 2006, at A1.
Cauley, supra note 6, at A1.
Eric Lichtblau & James Risen, Bank Data Sifted in Secret by the U.S. to Block
remain private. Thus, if an individual engages only in legal activity, she
has nothing to worry about. When it comes to the government collecting
and analyzing personal information, many people contend that privacy
harm exists only if skeletons in the closet are revealed. For example,
suppose the government examines oneís telephone records and finds out
that a person made calls to her parents, a friend in Canada, a video store,
and a pizza delivery place. ìSo what?,î that person might say. ìIím not
embarrassed or humiliated by this information. If anybody asks me, Iíll
gladly tells them where I shop. I have nothing to hide.î
The ìnothing to hideî argument and its variants are quite prevalent in
popular discourse about privacy. Data security expert Bruce Schneier
calls it the ìmost common retort against privacy advocates.î10 Legal
scholar Geoffrey Stone refers to it as the all-too-common refrain.î11 The
nothing to hide argument is one of the primary arguments made when
balancing privacy against security. In its most compelling form, it is an
argument that the privacy interest is generally minimal to trivial, thus
making the balance against security concerns a foreordained victory for
security. Sometimes the nothing to hide argument is posed as a question:
ìIf you have nothing to hide, then what do you have to fear? Others ask: ìIf you arenít doing anything wrong, then what do you have to hide?
In this essay, I will explore the nothing to hide argument and its variants in more depth. Grappling with the nothing to hide argument is important because the argument reflects the sentiments of a wide percentage of the population. In popular discourse, the nothing to hide argument’s superficial incantations can readily be refuted. But when the argument is made in its strongest form, it is far more formidable.
In order to respond to the nothing to hide argument, it is imperative that we have a theory about what privacy is and why it is valuable. At its core, the nothing to hide argument emerges from a conception of privacy and its value. What exactly is ìprivacyî? How valuable is privacy and how do we assess its value? How do we weigh privacy against countervailing values? These questions have long plagued those seeking to develop a theory of privacy and justifications for its legal protection.
Bruce Schneier, Commentary, The Eternal Value of Privacy, WIRED, May 18, 2006, http://www.wired.com/news/columns/1,70886-0.html.
Geoffrey R. Stone, Commentary, Freedom and Public Responsibility, CHI.
This essay begins in Part II by discussing the nothing to hide argument.
First, I introduce the argument as it often exists in popular discourse and examines frequent ways of responding to the argument. Second, I present
the argument in what I believe to be its strongest form. In Part III, I briefly discuss my work thus far on conceptualizing privacy. I explain why existing theories of privacy have been unsatisfactory, have led to confusion, and have impeded the development of effective legal and policy responses to privacy problems. In Part IV, I argue that nothing to hide argumentó even in its strongest formóstems from certain faulty assumptions about
privacy and its value. The problem, in short, is not with finding an answer to the question: ìIf youíve got nothing to hide, then what do you have to fear? The problem is in the very question itself.
THE ìNOTHING TO HIDEî ARGUMENT
When discussing whether government surveillance and data mining pose a threat to privacy, many people respond that they have nothing to hide. This argument permeates the popular discourse about privacy and security issues. In Britain, for example, the government has installed millions of public surveillance cameras in cities and towns, which are watched by officials via closed-circuit television.12 In a campaign slogan for the program, the government declares: ìIf youíve got nothing to hide, youíve got nothing to fear.î13 In the United States, one anonymous individual from the Department of Justice comments: ìIf [government
officials] need to read my e-mails . . . so be it. I have nothing to hide.
Do you?î14 One blogger, in reference to profiling people for national security purposes, declares: ìGo ahead and profile me, I have nothing to hide.î15 Another blogger proclaims: ìSo I donít mind people wanting to find out things about me, Iíve got nothing to hide! Which is why I support President Bushís efforts to find terrorists by monitoring our
phone calls!î16 Variations of nothing to hide arguments frequently appear in blogs, letters to the editor, television news interviews, and other forums.
Some examples include:
JEFFREY ROSEN, THE NAKED CROWD: RECLAIMING SECURITY AND FREEDOM IN
AN ANXIOUS AGE (2004).
Id. at 36.
Comment of NonCryBaby to http://www.securityfocus.com/comments/articles/
2296/18105/threaded (Feb. 12, 2003).
Comment of Yoven to http://www.danielpipes.org/comments/47675 (June 14,
2006, 14:03 EST).
Reach For The Stars!, http://greatcarrieoakey.blogspot.com/2006/05/look-allyou-want-ive-got-nothing-to.html
ï I donít have anything to hide from the government. I donít think I had that much hidden from the government in the first place. I donít think they care if I talk about my ornery neighbor.17
ï Do I care if the FBI monitors my phone calls? I have nothing to hide. Neither does 99.99 percent of the population. If the wiretapping stops one of these Sept. 11 incidents, thousands of lives are saved.18
ï Like I said, I have nothing to hide. The majority of the American people have nothing to hide. And those that have something to hide should be found out, and get what they have coming
to them.19
The argument is not only of recent vintage. For example, one of the
characters in Henry Jamesís 1888 novel, The Reverberator, muses:
ì[I]f these people had done bad things they ought to be ashamed of
themselves and he couldnít pity them, and if they hadnít done them there
was no need of making such a rumpus about other people knowing.î20
I encountered the nothing to hide argument so frequently in news
interviews, discussions, and the like, that I decided to blog about the
issue. I asked the readers of my blog, Concurring Opinions, whether
there are good responses to the nothing to hide argument.21 I received a
torrent of comments to my post:
ï My response is ìSo do you have curtains?î or ìCan I see your
credit card bills for the last year?î22
ï So my response to the ìIf you have nothing to hide . . .î
argument is simply, ìI donít need to justify my position. You
need to justify yours. Come back with a warrant.î23
Comment of annegb to Concurring Opinions, http://www.concurringopinions.
Now, write no less than 24 requirements (2 for each stakeholder for each requirement category). See the StkhldrsRD to see the format.
Based on these requirements, write the systems requirements (technical translation of the stakeholder’s requirements). Here, you don’t necessarily need to end with a fixed amount of requirements, just make sure all the stakeholder’s requirements are being considered here.
I.E. :
1.0 Computer Component Requirements
1.1 Input/output Requirements for Development
1.1.1 Stakeholder 1 Req 1
1.1.2 Stakeholder 1 Req 2
1.1.3 Stakeholder 2 Req 1
1.1.6 Stakeholder 3 Req 2
1.2 System-Wide Requirements for Development
1.3 Trade-Off Requirements for Development
1.4 Qualification Requirements
2) Translate these stakeholders’ requirements into systems requirements and separate them into the corresponding level: Systems requirements, subsystems requirements & component requirements (Use a bottom-up approach for this decomposition). Decompose only subsystems and components related to your stakeholder’s requirements. Work at least in one subsystem and three components.
I.E.:
1.0 Systems Requirements
1.1 Subsystem 1 Requirements
1.1.1 Component 1 Requirements (Start Here)
Keep your assignment in order. Every single requirement must be listed as an StkhldrRD (With proper numeration and indentation regarding its level). Does this requirement list only for the Development Phase?
This example of what the professor wants:
For those that are still lost and confused with u05a1 Writing Requirements assignment or just want to improve your submissions, here I’m providing a brief example:
1.1 Input/output Stakeholders’ Requirements (Think about the characteristics of inputs, outputs, functions, and relations with other systems):
1.1.1 “The system shall accept riders taller than 4’8.”
1.1.2 “The system shall let riders to pick their favorite song out of 4 categories.”
1.1.3 “The system shall let up to 6 riders per train.”
1.1.4 “The system shall come back to its initial position with all riders safe.”
1.2 System-Wide Requirements (Think about systems characteristics in terms of operability & technology):
1.2.1 The system shall maintain operational of 320 days per year.”
1.2.1 The system shall maintain an operational cost of less than $5000 per day.”
1.3 Trade-Off Requirements (Think about returns of money and time)
1.3.1″The system shall return its investment in less than a year.”
1.4 Qualifications/Testing Requirements (What’s the plan for verification & validation)
1.4.1 “The system shall verify all its components working correctly.”
1.4.2 “The system shall include a verification plan instrument to test all 1.1 & 1.2 requirements.”
There you got some examples. In the stakeholders’ requirement, you don’t need to go that technical for this assignment, but a lot of these requirements shall be translated into technical aspects for the system.
2.0 Computer Component Requirements Systems
“The system shall verify safety conditions are being met before the start.”
“The system shall provide an enjoying ride for all riders.”
2.1 Car subsystem requirements
“The car subsystem shall meet dimensions for 6 riders at a time.”
“The car subsystem shall play music at 80 decibels for all riders.”
2.1.1 Seat Component requirements
“The Seat component shall meet the dimensions for people that are 4’8″ or taller.” (Get actual dimensions if possible, but don’t stress about it)
“The computer component of the trolley shall include a collection of 48 songs that passengers can play meanwhile riding.”
You will see that some of the Stakeholders requirements will be met in only one or two systems requirements. You don’t need to write 24 more requirements in this part. The goal here is that all the components requirements are satisfying the upper levels (Both subsystem and system level).
Please give me two different answer, each answer for one paragraphs, half page.137 word.
Which operating system is more secure, Windows, Linux or MacOS? Why?
Base your answer on personal experience and research.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
We can write this or a similar paper for you! Simply fill the order form!
Consider the computer you are using to complete this homework as a system, and identify the following:
(a) Purpose
(b) Environment
(c) Input
(d) Output
(e) Interfaces
(f) Constraints
1. For each of these components, identify its:
(a) Purpose
(b) Environment
Also, for each component, explain whether or not it exhibits:
(a) Modularity
(b) High cohesion
(c) Low coupling
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
We can write this or a similar paper for you! Simply fill the order form!
Computer Image Forensics of Data and Image File The proposed topic is Computer Image Forensics this includes computer forensic of data and image file ;).
Computer Image Forensics of Data and Image File
Instructions: You are required to write a 5-8 page research paper on a topic of your choosing, related to the course concepts. Your final draft is due at the end of Week 7.
Submission Instructions: Be sure your paper meets the following requirements:
You will be required to write one research paper this semester. The specifications are as follows:
5-8 pages (double-spaced), excluding the title page, the abstract page (if included), and the references pages.
Choose any topic related to the course and write about the latest developments and issues.
Use at least five references outside of your textbook (you may use your textbook too, but are not required to).
In addition to the required number of pages for the assignment, you must also include a reference page (bibliography), written in APA style, and a title page. Be sure to give all of your papers a descriptive title.
You must get your topic approved by the end of Week 3.
You must provide a 1-page outline of your paper by the end of Week 4. Your outline must include citations to three references (other than your textbook) and a brief summary of at least three references that you will use in your paper.
At Week 6 you will be working on a PowerPoint presentation highlighting the key points of the paper you are working on.
Use APA Style formatting in Arial 11 or 12-point font or Times New Roman styles.
Page margins Top, Bottom, Left Side and Right Side = 1 inch, with reasonable accommodation being made for special situations
Your paper must be in your own words, representing original work. Paraphrases of others’ work must include attributions to the authors. Limit quotations to an average of no more than 15% of the paper, and use quotations sparingly!
This assignment has the embedded TurnItIn feature turned on. When you submit the paper, an originality report will be generated.
Refer to the Evaluation Procedures section in the syllabus for additional information on assignments.