assignment

 

You are the webmaster of a college website. You share a server with other school departments such as accounting and HR.

Based on this chapter, create at least five security-related rules for staff members who are adding web pages being added to your site. Include a justification and explanation for each rule. Rules should relate to college, staff, and student, and system information security.

Write your answer using a WORD document with 200 -300 words along with 3 references & Citations

Database secuirty

  In 500 words discussing discussing how a blockchain implementation would improve data security in a military, education, or other context. 

Use the five-paragraph format. Each paragraph must have at least five sentences. Include 3 quotes with quotation marks and cited in-line and in a list of references. Include an interesting meaningful title.

H2

     Download and read the document and answer all questions in the document. Please see attached document H2 & APA Criteria doc.         

Advanced Programming Languages Discussion

Computerized Operating Systems (OS) are almost everywhere. We encounter them when we use our laptop or desktop computer. We use them when we use our phone or tablet. Find peer-reviewed articles that discuss the advantages and disadvantages of at least two different programming languages that are NOT portable across different types of operating systems (Windows, Linux, Unix, Android, z/OS, z/VM, z/VSE, etc). 

 Initial Discussion: 500 words

Responses 4 : Each 200 Word

C++

Language c++ only can use (If else statment, for (while) loop, array, function,vector)

#include
#include
#include
#include
#include
#include

The first file ecoli.fa is a FASTA file which contains the DNA sequence data. Here is an excerpt from the file:

>Chromosome dna_rm:chromosome chromosome:ASM584v2:Chromosome:1:4641652:1 REF AGCTTTTCATTCTGACTGCAACGGGCAATATGTCTCTGTGTGGATTAAAAAAAGAGTGTC TGATAGCAGCTTCTGAACTGGTTACCTGCCGTGAGTAAATTAAAATTTTATTGACTTAGG TCACTAAATACTTTAACCAATATAGGCATAGCGCACAGACAGATAAAAATTACAGAGTAC ACAACATCCATGAAACGCATTAGCACCACCATTACCACCACCATCACCATTACCACAGGT AACGGTGCGGGCTGACGCGTACAGGAAACACAGAAAAAAGCCCGCACCTGACAGTGCGGG CTTTTTTTTTCGACCAAAGGTAACGAGGTAACAACCATGCGAGTGTTGAAGTTCGGCGGT ACATCAGTGGCAAATGCAGAACGTTTTCTGCGTGTTGCCGATATTCTGGAAAGCAATGCC AGGCAGGGGCAGGTGGCCACCGTCCTCTCTGCCCCCGCCAAAATCACCAACCACCTGGTG GCGATGATTGAAAAAACCATTAGCGGCCAGGATGCTTTACCCAATATCAGCGATGCCGAA CGTATTTTTGCCGAACTTTTGACGGGACTCGCCGCCGCCCAGCCGGGGTTCCCGCTGGCG CAATTGAAAACTTTCGTCGATCAGGAATTTGCCCAAATAAAACATGTCCTGCATGGCATT AGTTTGTTGGGGCAGTGCCCGGATAGCATCAACGCTGCGCTGATTTGCCGTGGCGAGAAA ATGTCGATCGCCATTATGGCCGGCGTATTAGAAGCGCGCGGTCACAACGTTACTGTTATC GATCCGGTCGAAAAACTGCTGGCAGTGGGGCATTACCTCGAATCTACCGTCGATATTGCT GAGTCCACCCGCCGTATTGCGGCAAGCCGCATTCCGGCTGATCACATGGTGCTGATGGCA GGTTTCACCGCCGGTAATGAAAAAGGCGAACTGGTGGTGCTTGGACGCAACGGTTCCGAC TACTCTGCTGCGGTGCTGGCTGCCTGTTTACGCGCCGATTGTTGCGAGATTTGGACGGAC GTTGACGGGGTCTATACCTGCGACCCGCGTCAGGTGCCCGATGCGAGGTTGTTGAAGTCG ATGTCCTACCAGGAAGCGATGGAGCTTTCCTACTTCGGCGCTAAAGTTCTTCACCCCCGC

The second file in the project folder is a CSV file named codon_table.csv which contains the codon list. Here is an excerpt from the file:

Codon

AA.Abv

<

td>AA.Code

AA.Name

UUU
Phe
   F
   Phenylalanine
UUC
   Phe

F

   Phenylalanine
UUA
   Leu
   L
   Leucine
UUG
   Leu

L

   Leucine
CUU
   Leu
   L
   Leucine

In the above table, AA.Abv represents the abbreviation of the aminoacid, AA.Code represents the code for the aminoacid and AA.Name represents the actual name of the aminoacid. There are 64 codons in the file. One aminoacid can be represented with multiple codons, they all create the same aminoacid. For example, both UUU and UUC codons are translated as phenylalanine.

Write a function transcribe(dna_string) that creates the mRNA string from the DNA string. Each base in dna_string must be matched to its corresponding mRNA base. There might be strange characters in the DNA string other than A, T, C, G. They should be ignored: A  U, T  A, G  C, C  G matchings are the only valid ones.

string transcribe(string dna_string){
//this function must take the DNA string and construct a new mRNA string

//then return the mRNA string

}

Write a function translate which accepts the mRNA string as a parameter and creates a string vector of proteins. Each item in the vector is a string that consist of the aminoacid codes of the protein. The function must return the protein vector as a result.

Each protein’s aminoacid sequence starts with M (Methionine) which is the starting aminoacid and ends with a Stop aminoacid. So the function should:

look for mRNA sequences that starts with AUG codon;
detect the end (UAG, UGA, or UAA codon);
in between, identify the corresponding aminoacids for the codons to construct the protein;

save the protein string in the vector(Use push_back function).

vector translate(string mrna_string) {

//create a protein vector and return it. }

Use the following print and main function to connect the processes and print the resulting protein vector

void print_protein_list(vector list) {

   for(string line : list)
   {
       cout << line << endl;
   }

cout << list.size() << " proteins listed" << endl; }

int main() {

string dnastring = readFastaFile(“ecoli.fa”);

readCsvFile(“codon_table.csv”);
string mrnastring = transcribe(dnastring);

vector protein_list = translate(mrnastring);

print_protein_list(protein_list);

return 0; }

The first few lines of the output should look like this:

0 -> MDGTHLILKStop
1 -> MKLVISVSRVCLFLMSHVLStop
2 -> MVVVVVMVSIATPDCACPLCLFSGVDCHARKKKLVSIAPLLVRSQLQAAMStop
3 -> MGYSRYGLHKNGLKTALSGGGSAPRATALTFESSStop
4 -> MTIARPAFStop
5 -> MELRWQLStop
6 -> MRRRHDRRTNARLTTLStop
7 -> MDAGRSPRATLQQLQLQDGPSLPRKDEAAISRSGGVVMGVAGQGLGNGLIFMAFRSSWSMRVTTVGTTSAStop 8 -> MRStop
9 -> MSStop
10 -> MDLDFLPNDLGDRHCLADRStop
11 -> MSSLRQVMASPIASQTLTAATATATRRPRStop
12 -> MHRRHNGStop

….

Choice Hotels International

Overview
Read the case study, Choice Hotels International.
Instructions
Write a fully developed paper in which you:
 

  1. Assess the two distinct networking functions. 
  2. Analyze the issues Choice is likely to experience as it expands  its network to full global reach. Provide a rationale for your answer. 
  3. Critique Choice implementing free high-speed Internet access  for all guests in its Clarion Hotels and Comfort Suites from the  security point of view. 
  4. Use at least three quality resources in this assignment. Note:  Wikipedia and similar websites do not qualify as quality resources.

  • Critique the implementation of free high-speed Internet access for an organization  from the security point of view relative to networking choices and  potential expansion.

Digital forensics

  

Digital forensics is often summarized in four phases (e.g., collection, preservation, analysis, and reporting). We have learned this already.

However, I think it’s important for you to be aware of how there are many different excellent models out there that seek to break down digital forensics in a series of flowcharts/phases / moving parts. Then Chapter 14 talks about the different trends and future directions.

So, I am attaching a couple research papers. Please check out them out in which can be found in the Supplemental Materials folder.

Some of the models out there are very specific e.g., for network forensics, triage, or cybercrime.

I would like you to read these papers – who knows you may see a model that resonates well with you. This can be helpful if you are asked to consult on what is the right model that should be followed in a particular legal matter in today’s brave new world.

Instructions

Now that you have reviewed the different models of digital forensics, what are your thoughts about the author’s proposed model? Do you agree or disagree? Do you have a preference for the other models and if so, what is your preference and why? Note – there are NO right or wrong answers here. I value your insights.

APA Format

Need 1 Page without references page

Plagiarism report

 !!! RESEARCH DOCUMENTS ATTACHED !!!! 

 !!! NEED 2 ANSWERS FOR THIS QUESTION WITH 0% PLAGIARISM!!!! 

Psychological Effects of Modern Technology on Children’s Development

  

Modern technology has permeated all domains of society and transformed lifestyles. Overuse or irresponsible use of modern technology, however, has the potential for undermining the psychological well-being of children due to elevated risk of depression and isolation. The nature and extent of the use of the technology underpin the concerns over their implications for the development of children.

The elevated risk of depression due to modern technology has serious implications for children’s development. According to Hoge et al. (2017), some modern technology such as the Internet, notably interactive social media platforms, lead to depression in children in the absence of adequate skills to regulate emotion. In this regard of assignment help service, children without sufficient social support to develop such skills are at greater risk of experiencing the negative effects of modern technology on their development than those with adequate support. Appropriate measures to equip children with relevant skills can help to avert these effects.

Like depression, isolation is a serious effect of the technology. Some modern technology applications push users closer to virtual friends, leading to social isolation (Taheri, 2013). Such users may feel that they are more valued in the realm of modern technology than outside. The resultant inclination toward communication tools encourages social isolation. In children, social isolation fosters behavior that hinders the development of skills needed for success in this stage of life (Chassin et al., 2016). This effect of modern technology can undermine the present and future wellbeing of children (writing help).

The likelihood of developing depression and social isolation reflects the psychological downsides of modern technology on children’s development. Modern technology makes important contributions to the development of children, but the negative effects on development and their serious implications for undermining the wellbeing of children are concerning. Society should adopt appropriate measures to avert these effects while exploiting the positive contributions of modern technology on children’s development.

  

References

Chassin, L., Colder, C. R., Hussong, A., & Sher, K. J. (2016). Developmental Psychopathology, Volume 3: Risk, Disorder, and Adaptation. John Wiley & Sons. https://247essayhelp.com/services/ 

Hoge, E., Bickham, D., & Cantor, J. (2017). Digital Media, Anxiety, and Depression in Children. Pediatrics, 140(Supplement 2), 76-80. https://doi.org/10.1542/peds.2016-1758G https://247essayhelp.com/assignment-help-service/get-business-assignment-help-from-expert-writers/ 

Taheri, M. (2013). The Effect of New Communication Technologies on Social Isolation of Children in Families. Journal of Behavioral Sciences in Asia, 1(1), 61-69.