Computer Security

 

Instructions

In order to complete assignment #2 you will need to answer the below questions. Please complete the questions in a Word document and then upload the assignment for grading. When assigning a name to your document please use the following format (last name_Assignment #2). Use examples from the readings, lecture notes and outside research to support your answers. The assignment must be a minimum of 1-full page in length with a minimum of 2 – outside sources. Please be sure to follow APA guidelines for citing and referencing source. Assignments are due by 11:59 pm Eastern time on Sunday.

Chapter 2

  1. For apps to be featured on the iPhone, developers must build it with Apple’s software development kit and then apply for approval. Apple rejected the Google Voice iPhone App, and further stated that it would not accept any applications that incorporated Google Voice functionality. Apple reasoned that this app duplicates the phone’s core features. It also rejected Google’s location-based app Google Latitude. If you were developing a collaborative platform, do you think the best model is this collaborative model, or is the open innovation model better – if your main goal is to maximize innovation? What if your main goal is to make money?

Chapter 3
2.Plaintiffs filed a class action lawsuit against investment banks alleging that they inflated prices on more than 300 IPOs, causing IPO investors to overpay for stock, and unlawfully benefited these banks through overcompensation of banking commissions and profits made through quick sales of this stock in their own accounts before prices settled into a more realistic valuation. How would you combat such abuses going forward?

3. Read the following laws and articles:

1. The Computer Security Act of 1987

2. The Patriot Act.

3. Jaeger, P. T., McClure, C. R., Bertot, J. C., & Snead, J. T. (2004). The USA PATRIOT Act, the Foreign Intelligence Surveillance Act, and information policy research in libraries: Issues, impacts, and questions for libraries and researchers. The Library Quarterly, 74(2), 99-121.

4. Politics

Discuss the relationship and impacts of CSA, USA PATRIOT ACT, and FISA. Also discuss the current status of these laws and the replacement of these laws.

Apply Linked List (Data structures)

 

In this assignment, you will expand on the information provided in the course to answer the following questions in a 2- to 3-page paper:

What is the difference between a singly-linked list and a doubly-linked list?

  • In what situation would you use a singly-linked list over a doubly-linked list?
  • In what situation would you use a doubly-linked list over a singly-linked list?

If a node is in a linked list with N nodes, how many nodes will be traversed during a search for the node?

  • Explain the best- and worst-case search scenarios.
  • Explain why a singly-linked list defines a RemoveAfter() function, while a doubly-linked list defines a Remove() function.
  • Could a RemoveAfter() function also be defined for a doubly-linked list? Explain why or why not.
  • Could a Remove() function also be defined for a singly-linked list? Explain why or why not.

Format your paper according to appropriate course-level APA guidelines with at least three sources cited covering scholarly and industry sources.

Assignment

 

Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be include at least two references.

As you consider the reputation service and the needs of customers or individual consumers, as well as, perhaps, large organizations that are security conscious like our fictitious enterprise, Digital Diskus, what will be the expectations and requirements of the customers? Will consumers’ needs be different from those of enterprises? Who owns the data that is being served from the reputation service? In addition, what kinds of protections might a customer expect from other customers when accessing reputations?

Discussion 3

Select from the following list four (4) topics and discuss. Use only 70-words max per topic to discuss and present your answer.  The discussion questions this week are from Chapter’s 3 & 4  (Jamsa, 2013).Chapter 3 topics:

  • Define and describe PaaS.
  • List the benefits of PaaS solutions.
  • Describe potential disadvantages of PaaS.
  • Describe how a cloud-based database management system differs from an on-site database.
  • List the computing resources normally provided with a PaaS.

Chapter 4 topics:

  • Define and describe IaaS.
  • Define and describe system redundancy. Discuss how you might use IaaS to implement a redundancy plan.
  • Define and describe load balancing. Discuss how you might use IaaS to implement load balancing.
  • Define and describe NAS. Assume you must implement a shared file system within the cloud. What company would you select? Why? What costs should your client expect to pay for cloud-based data on a gigabyte (GB) basis?
  • Define and describe colocation. Discuss how you might use IaaS to implement colocation.
  • Compare and contrast a cloud-based disk storage device (with a file system) with a cloud based database.
  • Compare and contrast physical, dedicated virtual, and shared virtual servers. Search the web for companies that provide each. What cost should a customer expect to pay for each?

 NOTE: You are required to use at least two-peer reviewed sources (besides your textbook) to answer the above questions. 

Lists, Sets, Stacks and Queues

 

retainAll

Write a method called retainAll that takes two sets of integers as parameters and that removes any values in the first set that are not found in the second set. 

For example, given sets: 

s1: [0, 19, 8, 9, 12, 13, 14, 15]  

s2: [0, 19, 2, 4, 5, 9, 10, 11]  

If the following call is made: 

retainAll(s1, s2);  

after the call, the sets would store the following values: 

s1: [0, 19, 9]  

s2: [0, 19, 2, 4, 5, 9, 10, 11]  

You are implementing a two-argument alternative to the standard Set method called retainAll, so you are not allowed to call that method to solve this problem. 

You are also not allowed to construct any structured objects to solve the problem (no set, list, stack, queue, string, etc) although you can construct iterators. 

Your method should not change the second set passed as a parameter.

Python 3 – Two Python Questions

 

Hello!

There are TWO Python 3 questions that I need to be completed.

I will attach the PDF with instructions and a ZIP file with the required .py file needed to complete the home.

Thank you!

Discussion post – Qualitative research methods

 

Primary Task Response: Within the Discussion Board area, write 400-600 words that respond to the following questions with your thoughts, ideas, and comments. This will be the foundation for future discussions by your classmates. Be substantive and clear, and use examples to reinforce your ideas.

Part 1

Top management of a large company has told you that they would like to be able to determine what the impact of years of service at their company has on workers’ productivity levels, and they would like to be able to predict potential productivity based upon years of service. The company has data on all of its employees and has been using a valid productivity measure that assesses each employee’s productivity.

What is a possible way to answer management’s question, and how does the analysis work? Reference the section on bi-variate linear regression from Green & Salkind.

Part 2

After reviewing the results of the analysis in Part I, the company found they are significantly related. However, a statistician reviewed the output and said that the results really do not explain much of what is happening in the total relationship.

What information is the statistician referring to from your output, and why is it important? Reference the section on bi-variate linear regression from Green & Salkind. 

SEC 575

1. The federal government regulates labels, warranties, and consumer products. Without government regulation, what abuses are likely to occur?

2. Compare the minimum contacts test, as it is applied to the bricks-and-mortar activity of businesses, to their cyberspace activity. If you were a small business, seeking to sell to customers located in other states, what are some things you could do to avoid having states where these customers live require you to collect sales tax?

3. The EU has recently changed its trade laws and now refuses, among member nations, to enforce choice of forum clauses when a consumer is a purchaser. How might this refusal to enforce choice of forum clauses impact websites within the EU?

Videos Review why Big Data is important to field of Knowledge Management and your your current organization

Videos Review why Big Data is important to field of Knowledge Management and your your current organization

a. “Big Data, Small World: Kirk Borne at TEDxGeorgeMasonU” found at https://www.youtube.com/watch?v=Zr02fMBfuRA

b. “KM Russia 2015: Big Data and KM” found at https://www.youtube.com/watch?v=UypaQRfgkKE (by Dr. John Girard)

1. Write 4-5 page document 

2. NO Title Page

3. Minimum 3-4 references