Dark Web

Need below questions in a word document in APA format with no less than 500 words along with 2 references & citations

  1. In your own words, describe the Dark Web.
  2. What type of content is generally found on the Darknet?
  3. What kind of information can be found using the hidden wiki?

Case Study 6.1

A mother calls you to report that her 15-year-old daughter has run away from home. She has access to her daughter’s e-mail account and says her daughter has a number of emails in her inbox suggesting she has run away to be with a 35-year-old woman. Write a 2 to 3 page paper/report (not including title or reference page) explaining how you should proceed. 

HW

https://mail.yahoo.com/d/folders/1/messages/159956#:~:text=Imagine%20that%20you,the%20topic(s).

Cyber security discussions and research report

Need to present a Discussion with a word count of above 120+ words and each discussion need a separate reference link for sure.

1) Pros/Cons of Apples airtag Anti- stalker features = Need this same topic in 4 different formats and 4 different URL links as well needed) 120*4 = 480 words

2)Risk management framework training = Need this same topic in 3 different formats and 3 different URL links as well needed) 120*3 = 360 words

3) Key skills for COMSEC manager = 120 words  Need link reference as well

Need to present a research report related to CYBER SECURITY on with a word count no more than 70-110 words(not more than the count provided) and should provide a separate 

URL reference link too

1) Pros/Cons of Apples airtag Anti- stalker features = Need this same topic in 4 different formats and 4 different URL reference links as well needed) 70*4= 280 words

2)Risk management framework training =  Need this same topic in 3 different formats and 3 different URL reference links as well needed) 70*3 = 210 words

3) Key skills for COSMEC manager = 70+ words Need link reference as well

It is suggested you use a Research Theme to help you stay focused, and to provide continuity throughout your research.  Here is a list of ideas, but this list is not all-inclusive: 

Current technologies available to support management functions,

Best Practices,

Future improvements/technologies, or

Other standards related to your specific field.

Note: The content should be in a general words with no technical jargons.

This question is from a cyber security subject so that the matter should relate to cyber security for sure and should connect to readers.

 NO PLAGIARISM STRICTLY  and do not use AI to get the copy paste information lik Chatgpt

Each one should be different and no each topic information should be similar to the other topic strictly.

Content should be unique and in a simple understanding way.

Deadline: 04/13/2023 11:59AM CST

Also provide me the separate files for discussion and the research reports instead of submitting in a single file.

Week 2 Journal

 

Each week you are to enter content into an online journal provided in Blackboard that briefly summarizes (1) the tasks you performed during your internship that week and (2) total hours worked with days/times. The content can be brief and in outline form and use bullet or another list styling, but keep in mind that this content will form the basis of the two major papers that you will write for this course. Therefore, the more detailed you are in your weekly journal, the easier it will be to finish the two papers. Specifically, your weekly journal should contain: 

• The days and times you worked that week, as well as the total hours, worked. (Provide this information at the top of each weekly section so this will act as a de facto heading to separate each weekly entry that you make.) 

• The skills or skillsets used/required to complete each task 

• Each task you performed along with a brief description of what you did.

 • A brief explanation of why the task needed to be done.

 • Was there an outcome? If so, what was that outcome?

 • What new terminology did you learn this week? Provide the term and its definition.

Portfolio Assignment

 Question:

 

It’s nearly 6 pm and you’re anxious to get out. It’s time to catch up on the latest episodes on the Game of Thrones show. Curiously, you feel like that show is a reflection of your life in the law practice. 

This is not what you expected when you took that LSAT seminar in your last year of college. Plus, you’re not too sure about this city especially with the rumors of a large Bat that comes out at night. Then what about this character called the Joker; is this guy for real? This city just oozes weirdness. You miss Central City.

Then Dent walks in your office waving an article about Metropolis. 

You wonder if it’s about the flying guy that is apparently from another world. Now that’s the life! Flying; bulletproof; heat-vision; x-ray vision, can run faster than a speeding bullet, super-strength. And doesn’t he have some kind of a relationship with an Amazon goddess? 

No. The article is about how there is a court ruling from Metropolis has breathed new life in the social media debate. You quickly scan the article which talks about how attorneys collecting relevant social media evidence must be prepared to properly authenticate it. 

In this article, the criminal defendant argued on appeal that the government had properly failed to authenticate certain Facebook posts attributed to him because the government failed to produce any witness identifying the Facebook chat logs on the stand. He argued nothing in the contents of the message was uniquely known to the defendant and the defendant was not the only individual with access to the Facebook account issue. 

In addition, the court rejected government’s argument that Facebook posts were business records that may be “self-authenticated” by way of a certificate from a records custodian under Rule 902(11) of the Federal Rules of Evidence. Much of it can be, you suspect, attributed to the court’s inherent mistrust of social media evidence with all the “fake news” accusations flying around. 

Dent looks at you for your thoughts because he’s actually leading a case whose evidence rests on offering social media evidence for its evidentiary matter. He wants to know whether (1) authenticating social media is the same as traditional paper evidence under Federal Rule of Evidence 901; and (2) what are the various instances where social media will enjoy a strong likelihood of being deemed authenticated; and also (3) how should one consider preserving social media in the future? 

c program, bitpacker and its reverse app

Suppose a text file contains ASCII characters ‘0’ and ‘1’ representing bits in human readable form. For example, test.txt may contain 111111110000000 which means its size is 16 bytes. A simple method for compressing the file by a factor of 8 is to represent a block of 8 ‘0’ or ‘1’ ASCII characters as a single byte. Thus test.txt which is 16 bytes long can be compressed into a file that is 2 bytes long where the first byte contains all 1’s and the second byte all 0’s. The resultant compressed file is a binary file since the first byte is not an ASCII character.

Code an app, bitpacker, that reads from stdin the input filename which follows the same specification as Problem 3. However, instead of using getchar(), use the library function fgets() whose the second argument allows specifying how many bytes, at most, should be read which helps prevent array overrun. Process the data in the input file 8 characters at a time by reading them into a 1-D array, char rawdat[8]. Compact the eight ‘0’ and ‘1’ characters in rawdat[] into a single byte using the bit processing techniques discussed in class. Write the resultant byte into an output file with suffix “.P”. For the above example, test.txt.P. We will allow the size of the input file not to be a multiple of 8. Since we are compacting 8 ASCII characters ‘0’ and ‘1’ into a single byte, we will use padding to handle files whose size is not a multiple of 8. For example, if text file test1.dat contains characters 1111111100000000111 (file size is 19 bytes), we will pad the last three characters 111 with 00000 so that the byte containing bit values 11100000 is written to test1.dat.P. To note that we padded the original data with five 0 bit values, we will change the suffix of the output file to test1.dat.P5. For test.txt where no padding was needed, the output filename will be test.txt.P0. Thus the last character of the filename specifies how much padding (0-7) was added.

Code bitpacker as a single main() function in main.c . Test and verify that it works correctlyCode an app, bitunpacker, that performs the reverse operation of bitpacker. bitunpacker reads the input filename from stdin using fgets() and checks that the suffix ends with .P[0-7] where [0-7] means that the last character must one of the digits 0, 1, …, 7. Strip the suffix in the name of the output file. Implement the app as a single main() function in main.c . Test and verify that it works correctly. 

all two programs must run within its functions using mac ios terminal and Linux system. 

Assignment 350 words 3 references

 From the attached document, please review the below sections and further expand it. 

1. Problem statement:

 > Expand on this section to include a detailed explanation of the problem

supported by literature sources.

2. Relevance and significance:

 > Expand on this section to further highlight the significance of the

research.

> Who will be impacted and how will they benefit from your research

solution.

Discussion 7- Legal

Assigned Readings:Chapter 8. Business Crime.Initial Postings: Read and reflect on the assigned readings for the week. Then post what you thought was the most important concept(s), method(s), term(s), and/or any other thing that you felt was worthy of your understanding in each assigned textbook chapter.Your initial post should be based upon the assigned reading for the week, so the textbook should be a source listed in your reference section and cited within the body of the text. Other sources are not required but feel free to use them if they aid in your discussion.Also, provide a graduate-level response to each of the following questions:

  1. Explain the concepts of mens rea and actus reus and analyze how they relate to corporate criminal liability.
  2. Mike Millionaire is the CEO of Murky Mining, Inc. Mike is not involved in the day-to-day operations of Murky Mining, Inc., and the company has incurred multiple violations under 33 U.S.C. § 1319.  Could Mike Millionaire be charged or fined as an officer of the company?  Would the fact that Mike Millionaire was not involved in the day-to-day operations of Murky Mining, Inc. be considered? 
[Your post must be substantive and demonstrate insight gained from the course material. Postings must be in the student’s own words – do not provide quotes!]

Text

Title: Business 

ISBN: 9780357447642 

Authors: Marianne M. Jennings 

Publication Date: 2021-01-01 

Edition: 12th Edition

Section 26.3 – CS 112: Programming

Except where otherwise noted, this and all course materials for CS 112 are licensed under Attribution-NonCommercial-ShareAlike CC BY-NC-SA held by the Trustees of the University of Illinois (University of Illinois at Chicago).

Learning objectives:

  • Working with strings.
  • Slicing strings.
  • Basic functions.
  • Working with GenBank.
  • Understanding connection between DNA, mRNA, and proteins

Sequences in GenBank

On your computer, use a web browser to access GenBank: http://www.ncbi.nlm.nih.gov/genbank. Once there, find a nucleotide sequence for the human coagulation factor IX, sometimes called the “Christmas factor” (F9) gene. In other words, find a DNA sequence for the gene that encodes the coagulation factor IX protein. This is found by using the search area at the top of the GenBank web page. You are looking for a specific “accession”—a sequence submission record—with the accession ID: NG_007994.

To summarize, we need to find the nucleotide sequence for the human coagulation factor IX, sometimes called the “Christmas factor” (F9) gene. To do this we:

  1. Use a web browser to access GenBank: http://www.ncbi.nlm.nih.gov/genbank
  2. Use the search area at the top of the GenBank web page
  3. Make sure we are searching for a Nucleotide (select Nucleotide using the drop down menu).
  4. Enter the accession ID: NG_007994 in the search field
  5. Click search
  6. Verify the page we go to specifies NCBI Reference Sequence: NG_007994.1 just under the main title.

Structure of Eukaryotic Genes

Eukaryotic genes (like F9) are composed of messenger RNA (mRNA)-coding sequences called exons (expressed portions of DNA sequence) and intervening sequences called introns (the name emphasizes their intervening role). Intron sequences in pre-mRNA are non-coding and are removed before transcription to mRNA. The exons are then joined together (concatenated) and comprise mature mRNA. The process of removing introns and reconnecting exons is called ‘splicing.’ Mature mRNA is comprised of coding sequence (CDS) and untranslated regions (UTR) at 5′ and 3′ ends. Coding sequence is made up of codons—the portion of mRNA that codes for amino acids.

The amino acid coding portions (CDS), along with other gene features, are annotated on the left side of the description in GenBank records. For example, you will see something similar to this in the annotations for the F9 gene:

CDS         join(5030..5117,11275..11438)

The actual line on the GenBank page will be much longer (i.e. containing more than just the ranges for two exons) but the first two ranges match exactly what is given above.

The word join in a GenBank record is analogous to a function in Python. It is an instruction to slice out and join (concatenate) the segments separated by commas within parentheses. The resulting string represents the amino acid coding sequence (CDS). Assuming we have the entire F9 gene sequence stored in a variable F9, the example above could be written in Python as:

cds = F9[5029:5117] + F9[11274:11438]

Caution: Python indexes start at 0, but GenBank annotations start at 1. Notice how the coordinates differ between the GenBank record example and the Python code above. Failure to adjust indexes correctly is a common situation in computer science and the bugs related to this are known as off-by-one errors. While seemingly trivial, these errors may have serious consequences.

Assignment Description

  1. Write a function named extract_f9_cds which has one parameter is to take the argument of F9, the F9 gene sequence. The goal of this function is to extract the coding regions from the F9 gene sequence (provided in the template), concatenate them, and return the resulting string. Hint: You can confirm your program is functioning correctly by clicking on the CDS annotation in GenBank. This will highlight the relevant parts of the sequence, it should match your output.
  2. Write a function named get_max_possible_codons which has one parameter seq and returns the maximum number of codons this DNA sequence would contain if it was wholly composed of coding regions. Remember that each codon is made up of 3 nucleotide bases.
  3. Write a function named get_gc_percent which has one parameter seq. The goal of this function is to compute the proportion of G and C bases (characters) in seq to the total number of bases (characters) in seq. The returned value should be of type float in the range between 0.0 and 100.0 (as a percentage, not a fraction). To do this, use the string method count( ) to determine the number of ‘G’ bases and the number of ‘C’ bases.
  4. Write a function named get_coding_ratio which has two parameters seq and cds. The goal of this function is to calculate the proportion of coding nucleotides to total nucleotides in the entire sequence. In other words: of the total number of nucleotides in the gene (seq), what is the proportion that codes for amino acids (cds)? Remember that a ratio will a value of type ‘float’ in the range between 0.0 and 1.0.
  5. Write a function named print_seq_info which has two parameters seq and cds. This function should use the functions you wrote for problems 1 through 4 and print a correctly formatted summary:
    Sequence length: ... Coding sequence length: ... Number of possible codons: ... Number of actual codons: ... First 4 codons of the coding sequence: ... Ratio of Coding NT to Total NT: ... GC percent of the entire sequence: ... GC percent of the coding sequence: ...

    • The Sequence length: output should use the built-in len( ) function with the ‘seq’ parameter.
    • The Coding sequence length: output should use the built-in len( ) function with the ‘cds’ parameter.
    • The Number of possible codons: output should use your get_max_possible_codons( ) function with the ‘seq’ parameter.
    • The Number of actual codons: output should use your get_max_possible_codons( ) function with the ‘cds’ parameter.
    • The First 4 codons of the coding sequence: output should use slicing with the ‘cds’ parameter.
    • The Ration of Coding NT to Total NT: output should use the get_coding_ratio( ) function with both the ‘seq’ and ‘cds’ parameters.
    • The GC percent of the entire sequence: output should use the get_gc_percent( ) function with the ‘seq’ parameter.
    • The GC percent of the coding sequence: output should use the get_gc_percent( ) function with the ‘cds’ parameter.
  6. Write a few sentences explaining what this gene is and what its protein does, state the name of a disease caused by a variant (mutation) at the F9 gene, and describe one such disease-causing variant. Hint: look in the right panel on GenBank, or use the web. (You can write your answer in the same file as your Python code by commenting out the text. The starter code for Lab 3 already has a place for this near the top of the file.)
  7. Make sure you are writing your code using Good Programming Style. Aspects of Good Program Style include (but are not limited to):
    • File Header Comment/docstring at the beginning of the file to describe the purpose of the program
    • File Header Comment/docstring at the beginning of the file to give information about the programmer/author of the program
    • Function Comments/docstrings to describe the purpose of EACH function
    • Using meaning variable names
    • In-line comments/docstrings where needed
    • Blank lines to separate sections of your code
    • Proper use of indentation and consistent depth of indentation