Computer Science 2023 Data Encryption

2023 Discuss in 500 words how you would advise your current employer to use encryption to reduce | Assignment Collections

Discuss, in 500 words, how you would advise your current employer to use encryption to reduce the vulnerabilities of  their data at rest, in use, and in transit (or in motion).  Identify at what points you think their data is at the highest risk. Consider where the data is when it at rest, in transit, or in use and the potential vulnerabilities associated with each of those locations.

Cite your sources in-line and at the end. Provide a URL for your citations.  Write in essay format not in bulleted, numbered or other list format. Do not copy without providing proper attribution. Be aware of your Safeassign score. Over 30 is too high. Use quotes to indicate where you have used other’s words. 

Use the five paragraph format. Each paragraph must have at least five sentences. Include 3 quotes cited in-line and in a list of references. Include an interesting meaningful title.

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your paper. Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. Please do not use attachments unless requested

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 I need this done in 30 mins

2023 Research for an answer in a small research format Make sure you reference your writing 1 List the | Assignment Collections

Research for an answer in a small research format, Make sure you reference your writing

1)      List the security advantages of cloud-based solutions. Provide examples

2)      List the security disadvantages of cloud-based solutions. Provide examples

3)     Identify two security incidents related to cloud usage by any company

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 A. Lab # CIS CIS170C-A4

2023 Student Lab Activity A Lab CIS CIS170C A4 B Lab 4 of 7 Functions C | Assignment Collections

 

Student Lab Activity

 

 

Description: devry-u-rgb_logo-small

 

A.   Lab # CIS CIS170C-A4           

 

B.   Lab 4 of 7:  Functions

                             

C.   Lab Overview – Scenario/Summary

 

You will code, build, and execute a program that simulates the dialing of a phone using functions.

 

Learning outcomes:

 

1.    Distinguish between pass by value and by reference.

2.    Call functions using &.

3.    Write functions using value and reference.

4.    Be able to define and use global named constants.

5.    Be able to debug a program with syntax and logic errors.

6.    Be able to use the debug step-into feature to step through the logic of the program and to see how the variables change values.

 

D.   Deliverables

 

Section

Deliverable

Points

Lab 4

Step 5: Program Listing and Output

45

 

E.   Lab Steps

 

Preparation:

If you are using the Citrix remote lab, follow the login instructions located in the iLab tab in Course Home.

 

Locate the Visual Studio 2010 icon and launch the application.

 

Lab:

 

Step 1: Requirements: Phone-Dialing Program

Write a program that simulates the dialing of a phone number. 

 

A user will input an 8-place number, for example: 359-3177 (note that the hyphen is considered a digit).

The rules for entering phone numbers follow.

·         8 places

·         It may have numbers, letters, or both.

·         The phone number cannot begin with 555.

·         The phone number cannot begin with 0.

·         The hyphen must be in the 4th position.

·         No other characters (@#$%^&*()_+=|/><etc.) are allowed.

·         If a letter is entered, its output will be a number (check your phone pad).

·         Enter Q to Quit.

 

If all of the rules are met, you will output a message to the console that reads like the following.
Phone Number Dialed: UN9-3177 *the number entered

 

If all of the rules are not met, then you output one of the following error messages to the console.

  • ERROR – Phone number cannot begin with 555
  • ERROR – Phone number cannot begin with 0
  • ERROR – Hyphen is not in the correct position
  • ERROR – An invalid character was entered

 

It will then prompt the user to try again.

 

 

This should be a lot of fun!

Here are some great things to think about as you begin your program!

 

Define a function named ReadDials() that reads each digit and letter dialed into 8 separate char variables (DO NOT USE ARRAYS). All the digits are sent back through parameters by reference. 

Then, for each digit, the program will use a function named ToDigit(), which receives a single char argument (pass by reference) that may be a number or a letter of one of the digits dialed. 

If it is a number, then return 0 by value indicating that it is a valid digit. If the digit is a letter, then the number corresponding to the letter is returned by reference, and return 0 by value indicating that it is a valid digit. Here are the letters associated with each digit.

 

0

 

5

J  K  L

1

 

6

M  N  O

2

A  B  C

7

P  Q  R  S

3

D  E  F

8

T  U  V

4

G  H  I

9

W  X  Y  Z

 

If the digit entered is not one of the valid digits or one of the valid letters, return –1 by value indicating that you have an invalid digit.

 

A phone number never begins with a 0, so the program should flag an error if such a number is entered. Make ReadDials() return –2 in this case. 

 

A phone number never begins with 555, so the program should flag an error if such a number is entered. Make ReadDials() return –3 in this case. 

 

A phone number always has a hyphen (-) in the 4th position. Make ReadDials() return –4 in this case (if it doesn’t have a hyphen in the 4th position). If a hyphen is in any other position, it is considered an invalid digit. 

 

If the phone number is valid, the main calls the AcknowledgeCall function to write the converted number to the output file.

 

All the logic of the program should be put in functions that are called from Main(): ReadDials() and AcknowledgeCall(). 

 

The ToDigits() function is called from the ReadDials() function and is used to convert each letter entered individually into a digit and to verify that the user has entered a valid phone number. Have the program work for any number of phone numbers. 

 

In the ToDigits() function uses the toupperfunction to convert any letters entered to uppercase. All the error messages are to be written to the output file from main() based on the return value from the functions.

 

Continue processing until the user enters a Q.

 

You will set up the 8 char variables to hold the digits of the phone number in main() and pass the variables to the functions by reference.

 

Sample Output from the Program

 

Enter a phone number (Q to quit): 213-2121

Phone Number Dialed: 213-2121  

 

Enter a phone number (Q to quit): asc-dfer

Phone Number Dialed: 272-3337

 

Enter a phone number (Q to quit): 555-resw

ERROR – Phone number cannot begin with 555

 

Enter a phone number (Q to quit): 098-8765

ERROR – Phone number cannot begin with 0                 

 

Enter a phone number (Q to quit): 12345678

ERROR – Hyphen is not in the correct position

 

Enter a phone number (Q to quit): @34-*uyt

ERROR – An invalid character was entered

 

Enter a phone number (Q to quit): Q

Press any key to continue . . .

 

 

Step 2: Processing Logic

Using the pseudocode below, write the code that will meet the requirements.

Main Function
    Declare the char variables for the 8 digits of the phone number

    while true
        Call the ReadDials function passing the 8 digits
        by reference.  ReadDials returns an error code by
        value.

        If the return value is -5, exit the do while loop

        If the error code is -1, display the
          error message “ERROR – An invalid character was entered”.
        If the error code is -2, display the
          error message “ERROR – Phone number cannot begin with 0”.
        If the error code is -3, display the
          error message “ERROR – Phone number cannot begin with 555”.
        If the error code is -4, display the
          error message “ERROR – Hyphen is not in the correct position”.
        Otherwise, call the AcknowledgeCall function

    End-While

ReadDials function

    Input the first digit
    If a Q was entered, return -5.
    Input the rest of the phone number

    Call the ToDigit function for each of the 7 digits
      not for digit 4
    If ToDigit returns -1, return -1
    If digit 4 is not a hyphen, return -4.
    If digit 1 is 0, return -2.
    If digits 1 – 3 are 5, return -3
    Otherwise, return 0

ToDigit function
    Convert the digit to upper case
    Use a switch statement to determine if the digit is valid
      and convert the letters to digits

    If the digit is invalid, return -1.
    If the digit is valid, return 0.

AcknowledgeCall function
    Display the Phone Number.

Step 3: Create a New Project

Create a new project and name it LAB4.

 

Write your code using the processing logic in Step 2 (above). Make sure that you save your program.

 

Step 4: Compile and Execute

a)    Compile your program. Eliminate all the syntax errors.

 

b)    Build your program and verify the results of the program. Make corrections to the program logic, if necessary, until the results of the program execution are what you expect.

 

Step 5: Print Screen Shots and Program

 

1.    Capture a screen print of your output (do a print screen and paste into an MS Word document).

2.    Copy your code and paste it into the same MS Word document that contains the screen print of your output.

3.    Save the Word document as Lab04_LastName_FirstInitial.

 

 

END OF LAB

 

 

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Paper

2023 APA format is required References should be listed immediately after the question that is being answered | Assignment Collections

APA format is required. References should be listed immediately after the question that is being answered. Each question lists a minimum number of unique scholarly references; the textbook is considered one unique reference (per question) regardless of how many times it is used. All references should be from the years 2007 to present day.

Review the rubric that will be used to evaluate this paper. All work must be completed individually.

1. What is the difference between planning and control? Use at least three unique references. Length: 4-5 paragraphs. 

2. How are demand and capacity measured? Use at least three unique references. Length: 4-5 paragraphs.

3. How is the supply side and demand side managed? Use at least three unique references. Length: 4-5 paragraphs. 

4. What is enterprise resource planning and how did it develop into the most common planning and control system?  Use at least three unique references. Length: 4-5 paragraphs. 

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 C# Program

2023 The following formula gives the distance between two points x1 y1 and x2 | Assignment Collections

  

The following formula gives the distance between two points (x1, y1) and (x2, y2) in the Cartesian plane:

Given the center and a point on a circle, you can use this formula to find the radius of the circle. Write a program that allows the user to enter the center point and a point on the circle into textboxes (you can use four for the four coordinates). The program should then display in a listbox the circle’s radius, diameter, circumference, and area. Your program must have at least the following methods:

· distance: This method takes as its parameters four numbers that represent two point in the plane and returns the distance between them

· radius: This method takes as its parameters four numbers that represent the center and a point on the circle, calls the method distance to find the radius and returns the circle’s radius

· circumference: This method takes as its parameter a number that represents the radius of the circle and returns the circle’s circumference. (If r is the radius, the circumference is 2∏r.)

· area: This method takes as its parameter a number that represents the radius of the circle and returns the circle’s area. (If r is the radius, the area is ∏r2.)

· Assume that ∏ = 3.14159.

plz see the file 

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 For This Assignment, You Will Update An Existing Java Program Using The NetBeans IDE. You Will Use The NetBeans Integrated Development Environment To Make Changes To An Existing NetBeans Java Project. This Existing Program Correctly Sorts The Data Without

2023 For this Assignment you will update an existing Java program using the NetBeans IDE You will use the NetBeans Integrated | Assignment Collections

For this Assignment, you will update an existing Java program using the NetBeans IDE. You will use the NetBeans Integrated Development Environment to make changes to an existing NetBeans Java Project. This existing program correctly sorts the data without using threads and contains a method (threadedSort) that you will update to sort the data using threads.

To prepare:

  • Read this week’s Resources.
  • Download and Install NetBeans:
    Visit the NetBeans download page from this week’s Resources. Download the Java SE bundle. (Note: Select the most recent release version, not a Beta version.)
    Run the downloaded package to install it. Choose the default options for installation.
  • Unzip and open the Unthreaded Program:
    Download and unzip the file Week2_Project.zip. This will create a folder containing a NetBeans Project with the non-threaded java program. Note the location of this folder.
    Launch the NetBeans IDE. Click the Open Project… button (Or click the File drop-down menu and select Open Project…). Navigate to the project folder, select it, and click Open Project.
    The Java Project contains three class files: MergeSort.java, Sort.java, and SortTest.java. Double-click each file in the Project section (at the left of the NetBeans IDE window) to display the file’s contents. Each of the Java class files contains comments explaining the purpose of the class and the purpose of the class’ methods.

 

 Modify the Java program by adding threads, and analyze the performance of both the threaded and non-threaded versions.

  • Modify the Program:
    Improve the performance of the Java program by adding threads to the Sort.java file. Implement the threadedSort() method within the Sort class. Reuse any of the existing methods by calling them as necessary from your threadedSort method. You may add additional methods to the Sort class, if necessary.
  • Analyze the Program:
    When running the provided SortTest program, the output presents data to support analyzing the performance of the threaded and non-threaded sort methods. Analyze your threaded implementation by comparing its performance to the original non-threaded implementation and explain the measured behavior. Document your analysis as a short paper (1–3 pages), using APA format. Be sure to discuss the relative performance improvement you expect for your threaded implementation and how the expected performance compares to the measured performance.
  • Submit the Application:

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 IT Strat Plan – Wk5

2023 Q1 275 words Discuss an organization s need for physical security What methods | Assignment Collections

  Q1. 275 words 

 Discuss an organization’s need for physical security. What methods, approaches, and models can be used by organizations when designing physical security needs? Lastly, explain how these security measures will safeguard the organization.  

Q2. Research paper: 5 pages ——- Separate Document

You have been hired as the CSO (Chief Security Officer) for an organization. Your job is to develop a computer and internet security policy for the organization that covers the following areas:

  • Computer and email acceptable use policy
  • Internet acceptable use policy
  • Password protection policy

Make sure you are sufficiently specific in addressing each area. There are plenty of security policy and guideline templates available online for you to use as a reference or for guidance. Your plan should reflect the business model and corporate culture of a specific organization that you select. 

 Include at least 3 scholarly references in addition to the course textbook.  At least Five of the references cited need to be  peer-reviewed scholarly journal articles from the library.

 Your paper should meet the following requirements: 

  • Be approximately 5 full pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Q3: Practical Connection – 550 words ——- Separate Document

 Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. Requirements:

  • Provide a 2 full pages double spaced minimum reflection.
  • Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.
  • Share a personal connection that identifies specific knowledge and theories from this course.
  • Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Write In 500 Words, Why Institutions Might Be Reluctant To Move Their IT To The Cloud. Consider Specific Industries Like Education, Medicine, Military, Etc.

2023 Use at least three sources Include at least 3 quotes from your sources enclosed in quotation | Assignment Collections

 

Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 NIST

2023 The National Institute of Standards and Technology NIST publishes Special Publications SP to help | Assignment Collections

The National Institute of Standards and Technology (NIST) publishes Special Publications (SP) to help government agencies and private companies develop and support security programs. The SP 800 subseries deals specifically with computer security. SPs are considered guidelines for nongovernment entities whereas both NIST Federal Information Processing Standards (FIPS) documents and the SPs are required standards for government agencies. 

Prepare a 1- to 2-page table in Microsoft® Word or a Microsoft® Excel® table in which you outline how a CISO would use the NIST publications to develop security policies.

Include the following column headings: 

  • SP number 
  • SP name  
  • SP purpose

Include the following row headings: 

  • SP 800-30 
  • SP 800-34 
  • SP 800-37 
  • SP 800-39 
  • SP 800-53 
Part 2 

You were recently hired as CISO for a healthcare company that qualifies as a “Covered Entity” under HIPAA, which means it must comply with the standards of the HIPAA Security Rule. 

Using the table you created in Part 1, write a 2- to 3-page informal comparison outlining the overarching components and outcomes of your NIST-based structure as compared to a structure operating in the global marketplace. Logically explain how NIST compliance influences information security governance and is part of formulating the organization’s desired outcomes. 

Cite all sources using APA guidelines. 

Submit your assignment, including the 1- to 2-page table and the 2- to 3-page comparison.

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Information Technology In Global Economy

2023 Please identify the three 3 pillars of an open government and provide a short | Assignment Collections

 Please identify the three (3) pillars of an open government, and provide a short description for each?  

 Chapter 12 – From our weekly chapter reading, we learned that Crowdsourcing can be a very valuable tool for promoting and developing three main pillars of an open government.  According to the Executive Office of the President (2009), Open Government Directive, Crowdsourcing ideas in the public sector identifies and defines those three pillars as? 

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now