Need C++ Help
Need practical connection in 1 and half hour
Dissertation seminar
Students are provided with strong educational programs and courses that allow them to be servant-leaders in their disciplines and communities, linking research with practice and knowledge with ethical decision-making. This assignment is a written assignment where you will demonstrate how this course research has connected and put into practice within your own career.
Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. (Include references).
Questionnaire on Computer Security
- 4.1 List ways in which secret keys can be distributed to two communicating parties.
- 4.2 What is the difference between a session key and a master key?
- 4.3 What is a key distribution center?
- 4.4 What entities constitute a full-service Kerberos environment?
- 4.5 In the context of Kerberos, what is a realm?
- 4.6 What are the principal differences between version 4 and version 5 of Kerberos?
- 4.7 What is a nonce?
- 4.8 What are two different uses of public-key cryptography related to key distribution?
- 4.9 What are the essential ingredients of a public-key directory?
- 4.10 What is a public-key certificate?
- 4.11 What are the requirements for the use of a public-key certificate scheme?
- 4.12 What is the purpose of the X.509 standard?
- 4.13 What is a chain of certificates?
- 4.14 How is an X.509 certificate revoked?
250 words Abstract
Abstract
Citizen Rights Vs Security
Follow this link
https://www.scribbr.com/apa-style/apa-abstract/
Exp19_Excel_AppCapstone_Intro_Collection
Exp19_Excel_AppCapstone_Intro_Collection
Project Description:
You are the financial manager for Judi’s Art Gallery. One of your clients, Raymond Chancellor, has a large collection of limited edition signed art by James C. Christensen (1942-2017). Over the years, you have helped Raymond maintain a list of his collection, including the title of the art, medium, issue date, issue price, the price he paid, and current market values. Most of the art is sold out from the publisher, which increases the value of the art. Other art is still readily available or is available in limited quantities. You want to update the list so that he can properly insure his collection.
Steps to Perform:
Step
Instructions
Points Possible
1
Start Excel. Download and open the file named Exp19_Excel_AppCapstone_Intro_Collection.xlsx. Grader has automatically added your last name to the beginning of the filename.
0
2
Select the range A1:A6 on the Christensen worksheet, merge the cells, and apply Middle Align vertical alignment.
2
3
Change the width of column K to 17.00, select the range K1:K3, and apply Thick Outside Borders.
2
4
Click cell C9, and freeze panes so that rows 1 through 8 and columns A and B are frozen.
1
5
Select the range E9:E54 and apply the Mar-12 date format.
2
6
Find all occurrences of Retired and replace them with Sold Out.
2
7
Click cell H9 on the Christensen worksheet, and insert a formula that calculates the percentage Raymond paid of the issue price by dividing the amount Paid by the Issue Price. Copy the formula from cell H9 to the range H10:H54.
3
8
Click cell J9, and insert a formula that calculates the percentage change in value by subtracting the Issue Price from the Current Value and then dividing that result by the Issue Price. Copy the formula from cell J9 to the range J10:J54.
3
9
Apply Percent Style with one decimal place to the ranges H9:H54 and J9:J54.
2
10
Insert in the Current Values section at the top of the worksheet summary functions that use the range I9:I54. In cell I2, calculate the total of all the Current Values. In cell I3, calculate the average current value. in cell I4, calculate the lowest current value. In cell I5, calculate the highest current value.
12
11
Click cell C9 and insert a VLOOKUP function that looks up the code in cell B9, compares it to the codes and types of art in the range B2:C6, and returns the type of art. Copy the function in cell C9 to the range C9:C54. Hide column B that contains the codes.
5
12
Click cell K9 and insert an IF function that determines if the Issue Price is equal to the Current Value. If the values are the same, display Same as Issue (using the cell reference K2); otherwise, display Increased in Value (using the cell reference K3). Copy the function from cell K9 to the range K10:K54.
4
13
Display the Purchase worksheet, insert a row above Monthly Payment. Type Monthly Payments in 1 Year in cell A5 and type 12 in cell B5.
2
14
In cell B6 in the Purchasing sheet, insert the payment function to calculate the monthly payment using cell references, not numbers, in the function, and make sure the function displays a positive result. Apply Accounting Number Format and the Output cell style to cell B6.
5
15
Display the Christensen worksheet, select the range C1:E6, and create a clustered column chart.
4
16
Cut the chart and paste it in cell A57, change the height to 4″, and change the width to 6.5″. Add Alt Text The column chart compares total issue prices to total current values by type of art. (include the period).
4
17
Type Raymond’s Art Collection for the chart title, apply bold, and Black, Text 1 font color. Place the legend at the top of the chart. Add Primary Minor Horizontal gridlines.
4
18
Create a pie chart using the ranges C2:C6 and E2:E6, and then move the chart to a new chart sheet named Current Values. Move the Current Values sheet to the right of the Purchase sheet.
5
19
Type Percentage of Total Current Value as the chart title and change the font size to 18 pt. Choose Colorful Palette 3 for the chart colors. Add this description for Alt Text: The pie chart shows each art type by percentage of total current value. (include the period).
4
20
Hide the legend. Add data labels for categories and percentages; remove value data labels. Change the font size to 16 pt, bold, and Black, Text 1 font color for the data labels.
4
21
Explode the Masterwork Anniversary Edition slice by 15% and change the fill color to Light Blue.
1
22
Display the Christensen worksheet, click in any cell within the dataset, convert the data to a table, assign a table name Collection, and apply Green, Table Style Light 14.
4
23
Apply a conditional format to the range J9:J54 that highlights cells where the value is greater than 200% with Green Fill with Dark Green Text.
3
24
Sort the dataset by Type of Art in alphabetical order and then within Type of Art, sort by Current Value from largest to smallest.
4
25
Set a filter to display art that equals Sold Out as the status.
3
26
Add a total row to display the sum of the Issue Price, Paid, and Current Values columns. Remove the total for the Note column.
3
27
Select the Purchase sheet, set 2″ top margin, and center horizontally on page.
2
28
Select the Christensen sheet, select Landscape orientation, Legal paper size, set 0.2″ left and right margins, 0.5″ top and bottom margins, and set row 8 to repeat at the top of pages.
5
29
On the Christensen worksheet, change the width of column A to 27, the width of column D to 11, the width of column J to 12. Wrap text in cell A1 and cell J8.
3
30
Create a footer with Exploring Series on the left side, the sheet tab code in the center, and file name code on the right side on the Christensen sheet.
2
31
Save and close Exp19_Excel_AppCapstone_Intro_Collection.xlsx. Exit Excel. Submit the file as directed.
bswa week13 p13 final
Hello,
i need this paper by 4/22 afternoon 12am.
Strictly No plagiarism please use your own words.
Week 13. Submit – Topic:PHISHING CYBERCRIME.
what i initially gave description to professor :
PHISHING
Phishing is a cyber-crime conducted by fraudsters to obtain sensitive information such as
bank account numbers, passwords or PIN. Their intentions to get such information is for the sole
purpose of scamming the victim. As the criminal masquerades as legit organizations an individual
is affiliated to, they can trick a person into releasing sensitive information. My research is based on
how to detect and distinguish attacks instigated on the email platform. The study aims to identify
the different techniques employed by scammers to obtain personal information from victims. The
formulated hypothesis statement is ‘an email that prompts an individual to verify account
information by inputting both account number and pin combination is phishing’
please write 700 word explaining about above requested topic, double spaced, written in APA format, showing sources and a bibliography.
And
12 slides power point presentation on PHISHING CYBERCRIME.
reference :
https://www.youtube.com/watch?v=-JcgRyJUfZM
Make sure Strictly No plagiarism content should not match and even the reference should not match in plagiarism
Create a 3 – 4 page matrix
Refer to Devil’s Canyon, Part A in Wk 4.
Using the potential risks for Devil’s Canyon you identified in Wk 4, create a 3- to 4-page matrix to share with the team. In your matrix, you should:
- Describe briefly each of the identified risks/threats.
- Evaluate the security controls that mitigate each of the risks/threats identified.
- Provide a rationale for how each of the controls identified mitigates the risk to an acceptable level.
- Research and describe the security technologies and security design that can be used to mitigate each of the identified information security risks.
Let φ be a 3cnf formula, show that:
Let φ be a 3cnf formula. A non-identical assignment, or nid-assignment, to the variables of φ is an assignment where each clause of φ contains two literals with different truth values, i.e., there cannot be a clause with the 3 true literals. Thus, a nid-assignment satisfies φ without assigning true to the 3 literals of any of the clauses.
(a) Show that the negation of a nid-assignment to φ is also a nid-assignment to φ.
(b) Let SATnid be the collection of 3cnf formulas that have a nid-assignment. Show that it is possible to obtain a polynomial-time reduction from 3SAT to SATnid by replacing each ci clause of the form (y1 ∨ y2 ∨ y3) by two clauses (y1 ∨ y2 ∨ zi) and (zi ∨ y3 ∨ b) where zi is a new variable for each ci clause, and b is a single additional new variable.
(c) Conclude that SATnid is NP-complete.
Lab on Python
This is python work..
You need to read “Assignment 2 Hand written digit recognizer.docx” that I attached. There are the some steps to work the assignment. So you can know what you have to do. The work is to edit the digitRecognizer.py and evaluation.py codes on the zipped file (“Files_to_edit_and_sample_images”) that i attached below.
This is very very urgent and emegency. I need to turn it in after 10 hours.
Project #1: Cybersecurity Strategy & Plan of Action
DEADINE 12 HOURS
3 PAGES
ENGLISH USA
FORMAT: APA