essay of at least 500 words discussing how a blockchain implementation would improve data security in a military, education, or other context.

Write in essay format not in outline, bulleted, numbered or other list format.  

Use the five paragraph format. Each paragraph must have at least five sentences. Include 3 quotes with quotation marks and cited in-line and in a list of references.

Include at least one quote from each of 3 different articles. Use the Research Databases available from the Danforth Library, not Google

Cite your sources in a clickable reference list at the end. Do not copy without providing proper attribution

C++

 Write a program to calculate a bowling league’s average bowling scores. You will need to read the input data from the file”BowlingScore.txt” 

  • ou must use three arrays:
    • a one-dimensional array to store the bowler’s names.
    • a (parallel) two-dimensional array to store the bowling scores.
    • a one-dimensional array to store the bowler’s average score.
  • Your program must contain at least the following functions:
    • a function called GetBowlingData to read and store data into two arrays. The function should take as input parameters the file name and both empty arrays, which it should fill from the file “BowlingScore.txt”
    • return a status of either success or failure (i.e true or false). 
    • a function called GetAverageScore that is used to calculate the average bowling score. The function should take as input the populated arrays and return the average score of each bowler in a separate array.
    • a function called PrettyPrintResults to output the results, i.e. bowler name, scores and average.
  • Don’t use Vectors or any other newfangled container, use only old school C arrays like in the book.
  • Use repetition structures (loops) in your functions to perform calculations and printing. Remember “dimensions = loops”. So a 2 dimensional array will require 2 loops to completely iterate over all of the elements in the array.
  • And as always, don’t use magic numbers. Instead use global constants at the top of the program under the includes.

Risk

1.Think carefully about how you live your life and how you go about planning for the future. How do you manage risks? What threats might you face? How do you think about them? There are health, economic, physical security, home security, and other types of risks. You will also face rewards. What is the relationship between risk and reward? You probably do not have a written plan, but there may be things you do every day with realizing it that mitigate or eliminate those risks. Discuss these and how they relate and are different from the risks businesses and other organizations may face.

2.Discuss the characteristics of security policy acceptance and enforcement and the factors that may make those processes difficult. Discuss how security policies are different from other (non-security) policies business generally have. Are they inherently more difficult to design and implement? Why or why not?

Week 4 Lab

 

Scenario/Summary

The purpose of this lab is to develop your programming skills and introduce functions.

Write a program that simulates flipping a coin and rolling a dice.

A user will input their choice of flipping a coin (C), rolling a dice (D), or exiting (E).

If the user chooses a coin toss, the program will ask how many times the coin should be tossed, then will simulate tossing the coin that many times and print the result to the user.

If the user chooses rolling a die, the program will ask how many sides the die has and how many times it should be rolled. The program will then simulate rolling a die (with the number of sides specified) that many times.

The program will continue until the user presses E.

writing from scratch

 As you consider the reputation service and the needs of customers or individual consumers, as well as, perhaps, large organizations that are security conscious like our fictitious enterprise, Digital Diskus, what will be the expectations and requirements of the customers? Will consumers’ needs be different from those of enterprises? Who owns the data that is being served from the reputation service? In addition, what kinds of protections might a customer expect from other customers when accessing reputations? (At least 3 pages).

Click for more options

analysing 4.1

 Watch:

  1. Andy Kirk: Let’s have a think about data visualization thinking. (2015).

PowerPoint: Analyzing and Visualizing Data Ch 5.pptx Analyzing and Visualizing Data Ch 5.pptx – Alternative Formats
Videos:Chapter 5 video:   Analyzing and Visualizing Data – Chapter 5.mp4  Click for more optionsLink to video 1:   Analyzing and Visualizing Data – Chapter 6.mp4Link to video 2:   Histogram Chart.mp4  Additional videos that may assist you:https://www.youtube.com/watch?v=32o0DnuRjfg  

This week we focus on establishing your editorial thinking.  What does the author mean by editorial thinking?  Also, this week there was a video of Andy Kirk (2015) noting the key concepts of data visualization thinking.  Please pick one major concept from the video and note what was said and your thoughts about the topic. 

In response to peers, add to their thoughts on the video and their topi

Chat for me and the players

GTA Online is a multiplayer phenomenon on PS4, Xbox One and PC . And it is even more so on these dates, since the Halloween 2021 events are held in Los Santos. Not only do we have an alien invasion and Christine’s dangerous car, but there are quite a few dangerous killers in GTA Online.

Do you regularly play GTA Online ? If so, we recommend you take a look at online chatting rooms, where we discuss various news about the game. You can get an exclusive t-shirt. Four dangerous serial killers await you in GTA Online, based on well-known characters such as Jason Voorhees and Pennywise .

If you’re curious and brave, here’s how to find the killers and get a shirt in GTA Online. Will you have the courage to face them? Crime rates have increased in GTA Online, because there are four killers on the loose around the map. And each one of them honors a mythical character from popular culture.
We are talking, of course, about the clown, the driver (driven), the murderer (slasher) and the psychopath (psycho) . Each of them has a spawn zone, albeit randomly.

These evil NPCs will try to kill you as soon as they see you, but there is a great incentive to face them and defeat them: you will get an exclusive Twilight Knife t-shirt . Of course, for this you will first have to find and hunt them down. It is not easy at all, because Los Santos is very large, and each one will only appear based on some prerequisites and conditions. 

In a short essay

  

1. In a short essay discuss the pros and cons of nesting organizational units within other organizational units. How does this type of structure affect GPO processing?2. In a short essay, discuss the use of PowerShell in automating account management. What is a batch file? Name and describe three commands to manage accounts.3. The policy settings on domain member computers can be affected by domain GPOs linked to the site, domain, or OU in Active Directory. The Group Policy Management Console (GPMC) stores Starter GPOs in a folder named StarterGPOs, located on the shared sysvol folder found on domain controllers. In a ½ page essay explain how you would implement GPOs on a small manufacturing company’s network.4. In a short essay, define and describe the use of the Security Configuration and Analysis snap-in.5. Research user account objects in Active Directory. What restrictions apply to user account objects? In a 1 page essay (double-spaced), discuss the format of the user account naming scheme for a global organization. How would the user account naming structure differ for a network that has an international subsidiary in Singapore? How would alphabetizing the user name list differ in Asia? What recommendations would you suggest?

Risk management

 Risk management is one of the most important components in empowering an organization to achieve its ultimate vision. With proper risk management culture and knowledge, team members will be “speaking” the same language, and they will leverage common analytical abilities to identify and mitigate potential risks as well as exploit opportunities in a timely fashion. In order to consolidate efforts, the existence of an integrated framework is crucial. This is why an ERM is necessary to the fulfillment of any organization’s goals and objectives.In your final research project for the course, your task is to write a 7 page paper discussing the following concepts:

  • Introduction
  • Why should an organization Implement an ERM application?
  • What are some key challenges and solutions to Implementing an ERM?
  • What is Important for an effective ERM?
  • Discuss at least one real organization that has been effective with implementing an ERM framework or /application.
  • Conclusion, final thoughts for future research
  • Recommendation

Your paper should meet the following requirements:

Be approximately seven to ten pages in length, not including the required cover page and reference page.

  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.