CC Week 8 D

 Select from the following list four (4) topics and discuss. Use only 50-words max per topic to discuss and present your answer.  The discussion questions this week are from Chapter 9  (Jamsa, 2013).

Chapter 9 topics:

  • List the security advantages of cloud-based solutions.
  • List the security disadvantages of cloud-based solutions.
  • Define and discuss the data wiping process.
  • Discuss how a cloud-based solution provider may reduce the risk of a DDoS attack.
  • Define and discuss hyperjacking attacks.
  • Define and discuss guest-hopping attacks.

NOTE: You are required to use at least two-peer reviewed sources (besides your textbook) to answer the above questions.   

Physical Security

 Complete a Physical Security Assessment (internal and external) of your  place of work or living area.  If you use your work area make sure you  inform the Security Manager to get permission as to what you are doing.  If you live in a gated community inform the security guard of your  activities. Refer to your text on the importance of Lighting and Access  Control and be sure to cover the salient issues discussed in the text.   

Computer Science Project Documentation

 Document a banking Application is a software majorly for controlling and managing financial transaction and a group activities ?

 It will focus on the major operation of the group that is; adding members, updating the group information, facilitate borrowing and returning of loans. 

Questions

 1. Cloud Computing usage for Ecommerce developer (500 words)

In a Word document, write a paper describing how the knowledge, skills, or theories of Cloud Computing have been applied or could be applied, in a practical manner to your current work environment. If you are not currently working, share how you could leverage the knowledge gained working as an IT consultant working for an organization of your choice.

Requirements

  • The reflection paper should be 2pages in length 
  • Page count does not include title and reference pages
  • The paper should include a title page and reference page
  • Correct use of APA 7th edition guidelines is required
  • Save as a Word document (not Pdf)

2.  4 pages (Please Find Attached For this Question)

This week’s journal article focus on the how positive team culture can correct the impact of lagging leadership creativity. Additionally, we discussed how digital transformation leaders in regard to artificial intelligence (AI).  After reviewing the reading, please answer the following questions:

  1. What is your definition of AI?  Please explain.
  2. What is your opinion of AI, is the technology currently available? Why or why not?
  3. Please note at least four AI technologies, explain if they are truly AI or something else.  Thoroughly explain your answer.
  4. How is AI perceived as different in various industries and locations? Please explain

ETCM-Research-6

Need this research paper by Thursday USA time. (5 days from now).

5 pages without references and Title page. Follow APA 7 format and citations.

Penetration testing is a simulated cyberattack against a computer or network that checks for exploitable vulnerabilities. Pen tests can involve attempting to breach application systems, APIs, servers, inputs, and code injection attacks to reveal vulnerabilities. In a well-written, highly-detailed research paper, discuss the following:

  • What is penetration testing
  • Testing Stages
  • Testing Methods
  • Testing, web applications and firewalls

Your paper should meet the following requirements:

  • Be approximately 4-6 pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 
  • Be clear and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Computer science and algorithms

Question 1: Let G = (V,E) be an undirected graph and s and t be the source and target nodes. Give an efficient algorithm to determine whether the number of minimum s − t cuts in G is at most two. Analyse your algorithm and provide its complexity.

Question 2: Suppose that X is a 2×1 matrix and Y is a 1×2 matrix. Prove that XY is not invertible.

Question 3: Let G = (V,E) be an undirected bipartite graph with parts AandB(V =A∪B,A∩B=∅)andthereisnoedgewithbothendpointsin A or both endpoints in B). Also, let X and Y be two sets of vertices such that X ⊆ A and Y ⊆ B. Suppose that G has two matchings M1 and M2 such that M1 covers all vertices in X and M2 covers all vertices in Y . Prove that G has a matching M such that M covers all vertices in X and Y . (A matching covers a vertex if one of the edges of the matching has that vertex as an endpoint.)

Question 4: Provide a linear program for the following problem:

A factory produces Aluminium plates of a standard width 3meters. But cus- tomers want to buy plates of shorter widths. So, the factory has to cut original 3m plates. One 3m plate can be cut, for instance, into two plates of 93cm width, one plate of width 108cm, and a rest of 6cm (which goes to waste). Suppose that we have the following orders:

• 97 plates of width 135cm • 610 plates of width 108cm

• 395 plates of width 94cm

• 211 plates of width 43cm.

What is the smallest number of 3m plates that have to be cut in order to satisfy this order? how should they be cut? (Hint: there are 12 different ways of cutting a plate into useful subpieces; you’ll need to figure them all out.)

Hexadecimal Calculator

Please check the attached file.

Hexadecimal Calculator Implement a hexadecimal calculator for iOS. Requirements: • The calculator should support 4 basic arithmetic operations: + – * and / • The calculator will operate on hexadecimal numbers, not decimal numbers • The calculator only needs to operate on unsigned integers (i.e. UInt). You do not need to consider negative numbers or fractions. • The calculator should support the 16-digit hexadecimal numbers (i.e. The range of the numbers is from 0 to FFFF FFFF FFFF FFFF). Prevent the user from entering a number that is greater than FFFF FFFF FFFF FFFF. • The calculator should handle overflow and underflow gracefully. The app must not crash. • The calculator should handle division-by-zero error gracefully. The app must not crash. • The calculator should be able to support most of the devices and orientations. If it does not support the old devices earlier than iPhone 6, it is okay. Hint: • To convert a string to a hex number, use “radix: 16” as an argument. For example: var s:String? s = “1A” var intHex:UInt = 0 intHex = UInt(s!, radix: 16)! print(intHex) // shows 26 intHex = 90 s = String(intHex, radix: 16).uppercased() print(s!) // shows 5A • It is recommended that you use a UI label instead of a text field, so that the user will not type directly by using a keyboard. You will need to provide a button for each digit. • Strings may be concatenated by using + operator. E.g. var s1 = “1234” var s2 = “5” print(s1 + s2) // shows 12345 You may want to do string concatenation in the action of each digit button. • To prevent the user from entering a number exceeding the size of 16 digits, you may verify the length of the string associated with the UI label. • To handle overflow and underflow, use &+, &-, and &* instead of +, -, and *. • To support different devices and orientations, use stack view, scroll view, or both. • Design your algorithm first! Think about the status of the calculator: when to take the first operand, when to take the second operand, when to append digits to the current number, and when to refresh the current number, etc. The functionality of your hex calculator worth 60% of the credit, while the appearance of the user interfaces worth 40%. When you submit the assignment, please compress the entire project folder into a single zip file, and upload it to D2L. In addition, please provide 4 to 5 screenshots of your app in different devices and orientations. If your app doesn’t work on every device/orientation, please specify why. The screenshots of a sample program are shown below. Your UI does not have to be the same as the sample program. As long as it has a pleasing-looking, it should be fine.