IT470: Computer Security Fundamentals

Week 3 discussion topic

  1. Explain that the IT security engineer is responsible for ensuring that a coherent set of processes, procedures, and technologies are installed to support the day-to-day management of risks. 
  2. Compromising information systems is an increasingly popular method of espionage.  Discuss the challenges companies face and how can they prevent data loss?

you have to respond at least 2 students post

**JAVA** For this project, you are going to write a program to find the anagrams in a given dictionary for a given word. If two words have the same letters but in different order, they are called anagrams. For example, “listen” and “silent” are a pair of

 

For this project, you are going to write a program to find the anagrams in a given dictionary for a given word. If two words have the same letters but in different order, they are called anagrams. For example, “listen” and “silent” are a pair of anagrams.

**JAVA**

First let’s focus on “LetterInventory.java”.

Its purpose is to compute the canonical “sorted letter form” for a given word.

1. Implement the constructor, which takes the String input word. You can assume that the input word contains only valid letters (e.g. no punctuation or blanks), but it may contain letters in different cases.

2. Implement the method: public String getCanonical() It should return the canonical “sorted letter form” for the input word (given in the constructor). It should use only lower cases. For example, if the given word is “AliBaba”, then this method should return “aaabbil”.

****I have already completed all of the above tasks I am struggling with the next part****

**below is the code I have for LetterInventory.java**

import java.util.*;

public class LetterInventory {

   private String input;
 

    //stores the original word.
 

    public LetterInventory(String input) {
        this.input = input;
    }
    //uses an array of chars to hold word and sorts it into alphabetical order.
    //displays it in lower case.
    public String getCanonical() {
        input = input.toLowerCase(); // converting input to lower case
        char [] word = input.toCharArray();
        Arrays.sort(word);
        String sorted = new String (word);
        return sorted;
 

    }
}

*** this is where i am stuck ***

Once “LetterInventory.java” is working as expected, we can now focus on “AnagramFinder.java”. It will read an input “dictionary” file, which contains quite many words, to build a map. The “key” for the map is a word’s canonical form, the “value” for the map will be all the words in the given dictionary that share the same canonical form. For example, if both “listen” and “silent” are in the dictionary, one entry in the map would have key as “eilnst” and value as an ArrayList of words “listen” and “silent”.

Implement the constructor, which takes in the input dictionary file and build the map. You can assume the words in the dictionary contain only valid letters. You should take advantage of “LetterInventory”.

3. Now implement the method: public void printAnagrams(String word) It should try to search the anagrams for the given word in the map. Again, you can assume the input word contains only valid letters, and you should take advantage of “LetterInventory”.

Print out any anagrams found. For now, don’t worry about the case where the input word is the same as the word inside the dictionary, just print them out.

Here is some sample print out:

Your input is: silent. Found anagrams: listen, silent, tinsel.

Your input is: AliBaba. Sorry, didn’t find any anagrams.

A sample main method is already written for you to test various functionalities with some sample input words.

*** Below is the shell for the main method ***

import java.io.*;
import java.util.*;

public class AnagramFinder {
    public static void main(String[] args) throws FileNotFoundException {
        String[] originals = new String[] {
            “realfun”,
            “mias”,
            “EVIL”,
            “unable”,
            “Silent”,
            “AliBaba”
        };

       for(String original: originals) {
            LetterInventory inv = new LetterInventory(original);
            System.out.println(“Original: ” + original + “, Canonical: ” + inv.getCanonical());
        }

       System.out.println(“n”);

       File f = new File(“HW_sample_dict.txt”);
 

        AnagramFinder finder = new AnagramFinder(f);

       for(String original: originals) {
            finder.printAnagrams(original);
        }
    }

   public AnagramFinder(File f) throws FileNotFoundException {
       //TODO implement  
    }

   public void printAnagrams(String word) {
        //TODO implement
    }

   public void printAnagrams2(String word) {
        // Extra Credit: optional to implement
    }
}
 

** can leave out extra credit part i just need help with the first 2 methods in the main file **

** the dict.txt is 400 pages long so I did not include it (the file just contains thousands of words) **

title : Top Ten Recommendations for Securing Virtual Servers

  

Research Project 

1. Five sources annotated bibliography 

2. Slide presentation with 12 or more slides 

3. Summary or Abstract containing at least 750 words. 

The topic must be appropriate for the graduate level. Find a topic that we covered in the course and dig deeper or find something that will help you in your work or in a subject area of interest related to the course topic. Use the  Research Databases available from the Danforth Library, not Google. 

https://libguides.nec.edu/az.php 

Exp19_Excel_Ch03_CapAssessment_Movies

 

Exp19_Excel_Ch03_CapAssessment_Movies

 

Project Description:

You are an assistant manager at Premiere Movie Source, an online company that enables customers to download movies for a fee. You need to track movie download sales by genre. You gathered the data for April 2021 and organized it in an Excel workbook. You are ready to create charts to help represent the data so that you can make a presentation to your manager later this week.

SS 3

  • What are the core competencies of two competing companies and how are they similar / different?
  • What steps could each company take to improve and strengthen their core competencies to increase their current market share?

SIEMENS SIMATIC

I need to write a term paper on the topic Siemens Simatic- PCS7/WINCC (SCADA) 

There are all the requirements for the term paper alongside the template for the term paper.
Please help and thank you 

Cache Memory jan 21

Assignment Content

  1. Even though this class is new to you, none of you should be new to Computer Architecture as it exists in the real world…in fact, everyone who has used an iteration of computer architecture over the years and this is evidenced by the Desktop or laptop computers you own.

    For this week’s assignment, Please provide a write-up as an answer to the question below

    Why is the cache memory so important to a computer’s performance even though all systems have MAIN MEMORY (RAM)?

    As part of this assignment, make sure to answer the following sub-questions as part of your assignment

    • Explore the different types of Cache memory and how they differ from one another?
    • How the cache memory differs from the main memory (RAM) in terms of functions?
    • You should submit at least TWO FULL PAGES OF CONTENT…meaning sources, title, etc. do NOT count…be sure to include any reference material you used…

      If you have any questions about the assignment, what I am asking for or anything else, please let me know…

      Good luck…

question 1

Explain how a nonprofit organization like Doctors Without Borders might assign overhead costs to their operations in a particular refugee camp? 

Having learned different kinds of costs and the systems used to accumulate them, what kinds of costs would a social media company like Twitter or Tik-Tok, would incur? Are there labor, material, and overhead costs? Are there fixed and variable costs and direct and indirect costs? What are the types of services produced by social media companies? And how do the costs incurred relate to the services they generate? 

Assume you are the cost accountant of a company that manufactures a single product, would you advise your company to adopt an ABC system? Why or why not? Explain 

C++ language

 

you are to simulate a dispatcher using a priority queue system. 

New processes are to be entered using a GUI with priority included
(numbering should be automatic). Processes are also to be terminated
by GUI command. Context switches are to be by command with the cause of the
switch being either a blocking call, time slice exceeded or termination.
Assume only one CPU.

Priorities and numbers of processes can be kept small, just big enough
to demonstrate the required functionality. You may pre-populate the
queues initially from a data file. I am looking at the mechanism as you
are NOT creating actual processes, just simulating them.

Functionality to be provided by you:

1. Priority based Ready Queue(s).

2. Blocked list.

3. Output of complete system status after every context switch showing
  ready, blocked, and running processes.

4. GUI for operations/control/output.

Practical Connection Assignment – Infer Stats in Decision-Making

Assignment:   
Provide a reflection of at least 500 words (or 2 pages double-spaced) explaining how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when the knowledge and theories in this course could be applied to an employment opportunity in your field of study. Requirements:  

  • Provide a 500 word (or 2 pages double spaced) minimum reflection.  
  • Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.  
  • Share a personal connection that identifies specific knowledge and theories from this course.  
  • Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment.   
  • You should NOT provide an overview of the assignments assigned in the course. This assignment asks that you describe how the knowledge and skills obtained through meeting course objectives were applied or could be applied to your workplace.