Please describe the reasons for having a totally anonymous means of accessing the internet. Please also discuss the dangers of that same internet. Minimum 450 words. Please add references in APA format.
Algorithm
Design and write an algorithm to find all the common elements in two sorted lists of numbers. For example, for the lists 2, 5, 5, 5 and 2, 2, 3, 5, 5, 7, the output should be 2, 5, 5. What is the maximum number of comparisons your algorithm makes if the lengths of the two given lists are m and n, respectively?
Lists, Sets, Stacks and Queues
retainAll
Write a method called retainAll
that takes two sets of integers as parameters and that removes any values in the first set that are not found in the second set.
For example, given sets:
s1: [0, 19, 8, 9, 12, 13, 14, 15]
s2: [0, 19, 2, 4, 5, 9, 10, 11]
If the following call is made:
retainAll(s1, s2);
after the call, the sets would store the following values:
s1: [0, 19, 9]
s2: [0, 19, 2, 4, 5, 9, 10, 11]
You are implementing a two-argument alternative to the standard Set method called retainAll, so you are not allowed to call that method to solve this problem.
You are also not allowed to construct any structured objects to solve the problem (no set, list, stack, queue, string, etc) although you can construct iterators.
Your method should not change the second set passed as a parameter.
Discussion question
Several Big Data Visualization tools have been evaluated in this weeks paper. While the focus was primarily on R and Python with GUI tools, new tools are being introduced every day. Compare and contrast the use of R vs Python and identify the pros and cons of each. Provide an example of both programming languages with coding examples as well as your experience in using one or both programming languages in professional or personal work. If you have no experience with either language, please discuss how you foresee using either/both of these languages in visualizing data when analyzing big data.
Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:
- Ask an interesting, thoughtful question pertaining to the topic
- Answer a question (in detail) posted by another student or the instructor
- Provide extensive additional information on the topic
- Explain, define, or analyze the topic in detail
- Share an applicable personal experience
- Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
- Make an argument concerning the topic.
At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.
Ethical Hacking
Select one network scanning software tool (there is a list in your required reading slides) and explain in detail how it works and how detects network vulnerabilities. Provide the site where you obtained your information and include that in your assignment write-up.
Please see instruction below.
Need to complete both 3 & 4 assignments.
- Read the Final Assignment direction to understand the scope of your final assignment.
- Use FAIR Basic Risk Assessment Guide to follow the steps as a guideline.
- Complete the Risk Management Plan document to attach/include in your final paper.
- Complete the Business Impact Analysis document to work on your business impact analysis.
short answer
- An array is a method used for storing information on multiple devices. Give an example of when you would use an array instead of a collection of variables. Give an example of when you would use a collection of variables instead of an array.
- Flesh out your thoughts and interact with your classmates. Post your initial response by Wednesday each week and then return on a couple of other days to see what’s going on with the discussions. The more you interact, the more you learn from your peers, and the more you share with them about what you know. You will also be showing your instructor what you have picked up.
Cloud Based Storage
Jamsa (2013) listed four advantages and two disadvantages of cloud-based database solutions. List each as a Level 1 Heading and explain IN YOUR OWN words, how each affects the success of organizations.
The following requirements should be met:
- Minimum 500 words
- Use Jamsa (2013) as your only source
- Use proper APA 7 formatting
Discussion1
Answer the following the question:
We live in a world of data, perhaps too much data. Organizations continue to store data indefinitely. In fact, about 90% of the data stored on todays databases is deemed worthless within 3 months. Think about your email. How often do you ever go back to an email from six months ago. But you still keep it for what? How should organizations government personal data in a data warehouse? What are some best practices you might suggest to your organization if you were the CIO to ensure that the data in the system was maintained properly?
Instructions
- This is a required assignment, worth 15 points. The assignment must be submitted by the due date. Late assignment are not allowed.
- You are required to submit a minimum of two postings. Points will be deducted for not fulfilling this minimum requirement.
- Apply and use the basic citation styles of APA is required. Points are deducted per the rubric for this behavior.
- Do not claim credit for the words, ideas, and concepts of others. Use in-text citation and list the reference of your supporting source following APA’s style and formatting. Points are deducted per the rubric for this behavior.
- Do not copy and paste information or concepts from the Internet and claim that is your work. It will be considered Plagiarism and you will receive zero for your work. A second offense results in a zero for the course. A third is termination from the university.
EH week15 DB2
Hello,
i need this paper by 01/06 afternoon.
Strictly No plagiarism please use your own words.
Zero Trust is a security concept centered on the belief that organizations should not automatically trust anything inside or outside its perimeters and instead must verify anything and everything trying to connect to its systems before granting access.
The strategy around Zero Trust means that you should not trust anyone. This means cutting off all access until the network knows who you are. Don’t allow access to IP addresses, machines, etc. until you know who that user is and whether they’re authorized.
Discussion/Research Questions (300 words)
- Briefly explain your views on what the zero trust architecture is attempting to solve?
- How do you build a Zero Trust Architecture?
Make sure Strictly No plagiarism content should not match and even the reference should not match in plagiarism