due in 6 hours
attached
due in 6 hours
attached
Answer each these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.
1. What kind of speech was the First Amendment written to protect?
2. Does the First Amendment apply only to spoken words?
3. What does it mean that laws regulating speech must be content neutral?
4. Why are common carriers prohibited from controlling the content of the material they carry?
5. How does the Supreme Court determine whether material is obscene?
6. Why have attempts to censor the Internet failed in the US?
7. Why not just ban spam?
8. Why did Facebook ban Alex Jones and Louis Farrakan?
9. Should websites that show how to 3d print guns be banned?
10. According to the Supreme Court ‘anonymity is a shield from the tyranny of the majority’. What does that mean?
26. How do you create an object of a class, in COBOL?
27. Write the code to test if ITEM contains both letters and numbers.
28. . Given the following code:
05 IMPATIENS-COLOR PIC 9.
88 RED VALUE 1.
88 PINK VALUE 2.
88 ORANGE VALUE 3.
Write the EVALUATE statement to validate this input.
29. The weekly payroll program for an Internet start-up company contains an input field, HOURS-IN with PIC 999. Employees routinely work long hours, but no one is permitted to work more than 150 hours in a week. Write the PROCEDURE DIVISION code to validate the data input. Use EVALUATE.
30. Write the code to count the number of occurrences of the digit 6 until the first space is encountered in ITEM. Use A-COUNT as the storage parameter.
31. Write the PROCEDURE DIVISION code segment to sum all the numbers from 1 through 100. Use an in-line PERFORM UNTIL.
32. . Write the PROCEDURE DIVISION code segment to sum all the numbers from 1 through 100. Use a PERFORM paragraph-name ..TIMES.
33. Given the following code:
MOVE 10 TO NUM
MOVE 1 TO TOTAL
a) Recode this using an in-line PERFORM N TIMES.
b) What is output?
Algorithms power the biggest web companies and the most promising startups. Interviews at tech companies start with questions that probe for good algorithm thinking.
In this computer science course, you will learn how to think about algorithms and create them using sorting techniques such as quick sort and merge sort, and searching algorithms, median finding, and order statistics.
1. Discuss two reasons why software systems tend to degrade over time. For each reason, identify a strategy a team could take to fight entropy.
2. Suggest two contexts where ethnography might be a challenging method of requirements engineering. For each context, how would you recommend that your team elicit requirements? why ? and how ?
Assignment 1:
Analyze the history of Caesar Cypher and its impact on cryptography.
Requirement:
· ****Separate word document for each assignment****
· Minimum 300-350 words. Cover sheet, abstract, graphs, and references does not count.
· Add reference separately for each assignment question.
· Strictly follow APA style. Length – 2 to 3 paragraphs.
· Sources: 2 References to Support your answer
· No plagiarized content please! Attach a plagiarized report.
· Check for spelling and grammar mistakes!
· $5 max. Please bid if you agree.
Discussion
Today’s Global Economy is very top-down driven with the government making all the decisions and regulations as it relates to doing business globally. What are some advantages and disadvantages to this approach? Is there another approach that might work better?
Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:
At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.
Research Pape
Find a peer-reviewed scholarly journal article discussing electronic innovation and the government. Complete a review of the article by writing a 2-3 page overview of the article. This will be a detailed summary of the journal article, including concepts discussed and findings. Additionally, find one other source (it does not have to be a peer-reviewed journal article) that substantiates the findings in the article you are reviewing. You should use the UC library ( https://www.ucumberlands.edu/library) and/or Google Scholar to find these types of articles ( https://scholar.google.com/ )Once you find the article, you will read it and write a review of it. This is considered a research article review.Your paper should meet these requirements:
Acme Corporation has taken your suggestions and created ethical guidelines as well as established organizational policies.
It is now 12 months later. How could you measure if your plan was a success? What metrics could you use to determine if your changes made an impact at Acme?
Create a 2-3 page memo asking the CEO and Board of Directors for time and money to investigate if the project was a success. Be persuasive with your writing.
Be sure to cite your sources according to APA formatting guidelines. For more information about APA formatting, please visit the Rasmussen Library Resources section on the Resources tab.
Be sure to review the content on the Course Project Overview page to gather all necessary informati
on.
Exp19_Word_Ch04_HOEAssessment_Security
Exp19 Word Ch04 HOEAssessment Security
Word Chapter 4 Hands-On Exercise Assessment – Security
You are enrolled in a cyber security course at your local university. One of the assignments is to write a group paper with another student about password security. You and your partner conducted research on the topic and wrote a final draft of the report. Your partner has provided some feedback and suggestions, and you will review the feedback and make corrections to the paper where needed. You will also need to document the sources of the information used for the paper. You will use track changes, accepting and rejecting them as necessary, credit sources used in the preparation of the report, address your partner’s comments, include a table of contents and an index.
Start Word. Download and open the file named Exp19_Word_Ch04_HOEAssessment_Security.docx. Grader has automatically added your last name to the beginning of the filename.
Apply the following formatting to the whole document:
• Document is double-spaced.
• The font is Times New Roman.
• There is no paragraph spacing before or after any paragraph.
• Margins are 1” at the top, bottom, left, and right.
• Alignment is left.
Ensure that All Markup view is displayed. On the first page, reject the replacement of the three words used, i.e., recognize, choices, and employed. Accept all other changes in the document and stop tracking.
Modify the Title style to reflect the first comment left by your partner. Reply to the first comment by typing Adjusted Title style. (include the period.) and mark the comment as Resolved.
Find the second comment which is in the Poor Password Practices section, and italicize the passwords as instructed in the comment, but not the commas. Mark the comment as Resolved.
Create a new paragraph before the word Password as indicated by the third comment on page 3. Delete the comment.
Change the Bibliography Style to APA Sixth Edition. Click before the period in the last sentence in the first paragraph in the Poor Password Practices and Their Consequences section, with the sentence ending with and other well-known passwords. Insert the following article citation:
Author: Storm, Darlene
Title: Worst, Most Common Passwords for the Last 5 Years
Periodical Title: ComputerWorld
Year: 2016
Month: January
Day: 20
URL: http://www.computerworld.com/article/3024404
Note: Mac users do not need to add the URL.
Insert a citation to the same source before the period in the last sentence in the third paragraph on page 3, with the sentence ending with offline password managers are even free.
Click before the period at the end of the last sentence in the first paragraph of the Recommended Password Practices section, with the sentence ending with should not just be added to the end. Insert the following website citation:
Author: Schneier, Bruce
Name of Web Page: Choosing Secure Passwords
Name of Web Site: Schneier on Security
Year: 2014
Month: March
Day: 3
URL: https://www.schneier.com/blog/archives/2014/03/choosing_secure_1.html
Insert a footnote after the last password example in the Poor Password Practices section. Type the text: Common passwords as obtained from data breaches. (include the period.) Change the number format for footnotes to 1, 2, 3 in the Footnotes dialog box. (Click Apply, not Insert.)
Insert a blank page at the end of the report and insert a bibliography in APA style on the blank page with the title Works Cited. The bibliography should be double-spaced with no paragraph spacing before or after.
Ensure that bibliography is formatted with the Times New Roman font and 12 pt size, and that all text in the bibliography should be Black, Text 1 font color. Center the Works Cited title.
Insert the Ion (Light) cover page. Change the Year to 2020. Type Password Recommendations as the Document title. Type your first and last name as the Author. Delete the Document subtitle placeholder.
Create a table of contents, using the Classic style format with a dot leader, on a new page positioned between the cover page and the current page 2.
Insert a footer with a centered page number, using Banded format. Do not display the page number footer on the first page. Numbering begins with page 1 on the Table of Contents page.
Mark the following words as index entries, selecting Mark All for each: access control, rainbow tables, password manager, and phishing. Select the first occurrence of Offline password managers and set a cross-reference as See online password managers.
Note, please be sure to search your document to ensure that all occurrences are marked as specified; press CTRL+F and use the Navigation Pane to locate each one.
Add an index on a blank page at the end of the document. Use Classic format with 2 columns and accept all other default settings.
Save and close Exp19_Word_Ch04_HOEAssessment_Security.docx. Exit Word. Submit the file as directed.
During job interviews, employers often ask if you are familiar with cybersecurity software. For this reason, it is a good idea to become familiar with commonly used software, including capabilities and limitations. These software products are the tools for conducting your day-to-day duties.
For the first six weeks of this course, you have been exposed to many different tools that an analyst should become familiar with: analyst tools, exploitation tools, and forensics tools. Provide a response in which you:
1. Describe a lab or a software tool that you used that has helped you to better understand the role of an analyst within an organization, such as:
2. Describe the process to install, set up, and configure the tool you selected above. Did you find the tool easy to use? Did you encounter challenges?
3. Highlight some of the benefits of the tool you selected above. Provide some examples of where you think using the tool would benefit you as a cybersecurity threat analyst. Why do you think the tool would be best?