Python

4.Probability of Doubles. In the mid-1600s, a French nobleman (Antoine Gombaud, Chevalier de Méré) frequently gambled using six-sided dice. One of his favorite games of chance involved an attempt to roll at least one “double six” within 24 attempts (or rolls of the 2 dice). He knew the probability to roll a double six on any given roll of two dice is 1/36 (6 possible outcomes for each die; 2 dice; 6 * 6 = 36). He falsely assumed that the probability of rolling double sixes in 24 attempts would be 1/36 * 24 or approximately 67%. Due to the financial losses he experienced over time, he determined his probability logic must be false. He subsequently sought expertise from Blaise Pascal (a contemporary mathematician) to assist him in determining the correct probability as closer to 49%.1Write a “simulation” program that repeats the 24 rolls 10,000 times. Check to see if your simulated data provides supporting evidence of the 49% probability of rolling double sixes at least once in 24 rolls of 2 dice. Create two separate data files from your simulation. Your program should: a.(5 points) Use a “markdown” cell in your Jupyter Notebook to introduce your solution for this problem and describe any difficulties/issues your team encountered while solving the problemb.(5 points) Use a main function to control overall program flowc.(15 points) Store the outcome of each pair of dice roll as a .csv file (add text delimiters as necessary). At a minimum, fields should include: i.Round (1 to 10,000)ii.Roll (1 to 24)iii.Die-1 (roll of one die 1 to 6) iv.Die-2 (roll of second die 1 to 6) v.Doubles (1 if result of roll is doubles or 0 if the result is not doubles)vi.Double sixes (1 if result is double sixes or 0 if the result is not double sixes)d.(15 points) Store the outcome of each round of 24 rolls as a .csv file (add text delimiters as necessary). At a minimum, fields should include:i.Round (1 to 10,000)1 See Ma, Dan, “One Gambling Problem that Launched Modern Probability Theory”, Introductory Statistics blog, available at https://introductorystats.wordpress.com/2010/11/12/one-gambling-problem-that-launched-modern-probability-theory/,  last accessed September 28, 2021 and “de Méré’s Problem,” Wolfram MathWorld, available at http://mathworld.wolfram.com/deMeresProblem.html, last accessed September 28, 2021 for more information.

Last modified: September 28, 2021Page 6   of 6 ii.Double sixes (True if double sixes occurred at least once during 24 rolls; otherwise, False)iii.Winner (House or Gambler). The gambler wins if double sixes are rolled at least one out of 24 rolls.  iv.Number of Double Sixes Rolled (count of the number of double sixes in the 24 rolls)e.(25 points) Conduct an analysis of your simulation results and report to the user what you learned. For this part of the problem, you should use the data files you created in parts   (a) and (b) as input data for your analysis. You should display the results of your analysis on the screen and save the same output to a .txt file. Some suggestions include: i.Check to see if your data supports the 49% probability as described aboveii.Validation checks to ensure that the dice are “fair” (i.e., each number 1 to 6 has equal chance of occurring)iii.Summary statistics such as the number of times double sixes occurred in 24 rolls, number of doubles rolled in 24 rollsiv.Other interesting statisticsv.Use your creativity here! f.(5 points) Include a program header and appropriate comments to document your code

Create IT Security Policy

 

create a step-by-step IT security policy for handling user accounts/rights for a student who is leaving prematurely (drops, is expelled, and so on).

You will need to consider specialized student scenarios, such as a student who works as an assistant to a faculty member or as a lab assistant in a computer lab and may have access to resources most students do not.

Write your answer using a WORD document

Week 3 Assignment

 

Instructions 

Please watch this video: https://youtu.be/ctij93rBmsM which is an hour long video on anti-forensics.

Instructions

Now that you have watched the video – please complete this assignment. 

1. What did you learn?
2. Did you learn anything that surprised you such as “I didn’t know I could use this technique to try to hide data?!”
3. Please list at least four different ways that an bad actor may try to obfuscate their tracks.
4. Once you have identified four different ways that a bad actor may try to evade scrutiny, please identify how you might be able to uncover those techniques.

SE492 week 3 D

Read chapter 4.

You need access to Microsoft Project software. If you don’t have it installed in your computer you can at least download a trial version.

Go to Appendix on page 139 Microsoft Project and create a file as directed and enter the information from pages 139-145 on your Microsoft Project based on chapter 7.

Provide screen shots to show your work (i.e. tasks, resources, network diagram).

What did you learn from chapter 4 as you apply the concepts on chapter 4 to the Microsoft Project software?

You are encouraged to comment on student’s responses or respond to someone else’s comment to create an  interactive online class environment.

Activity to do

 Read carefully!!!

Research an article associated Information Security (e.g., breaches, scams, viruses, threats, etc.). Post a short summary of the article with a minimum of 5 complete sentences. 

Also, I need you to send me the link of the article.

Java Programming

 These files are needed for successfully completing Lab Assignment 5:

  • Address.java, Class definition for Address
  • CreditCardDemo.java, “Driver” program for CreditCard class.
  • Money.java, Class definition for Money
  • MoneyDemo.java
  • Person.java

 Submit copies of any Java source code files you create or modify:

  • Money.java
  • CreditCard.java

Submit a word processing document that contains screen shots demonstrating successful completion of this Lab Assignment.Submit copies of the Money.java file that defines the Money class and the CreditCard.java file that defines the CreditCard class as two separate files. 

Assignment 500 words 3 references

On April 18, 2016, The United States Supreme Court denied a petition for certiorari (refused to review the lower court’s ruling) in the case of Authors Guild v. Google, Inc., 804 F. 3d 202 – Court of Appeals, 2nd Circuit 2015.

Tell me what you would do if you were the Supreme Court.

That case let stand the ruling of the Court of Appeals which can be found at the following website:

https://scholar.google.com/scholar_case?case=2220742578695593916&q=Authors+Guild+v.+Google+Inc&hl=en&as_sdt=4000006  last accessed February 9, 2019.

Please write a 500-word summary of fair use as this court decision says it.

Questionnaire on cloud security

 

  • 5.1 Provide a brief definition of network access control.
  • 5.2 What is an EAP?
  • 5.3 List and briefly define four EAP authentication methods.
  • 5.4 What is EAPOL?
  • 5.5 What is the function of IEEE 802.1X?
  • 5.6 Define cloud computing.
  • 5.7 List and briefly define three cloud service models.
  • 5.8 What is the cloud computing reference architecture?
  • 5.9 Describe some of the main cloud-specific security threats.

computer Networking

 

For this assignment, explore the peer-reviewed literature and complete a 1 – page paper on the following topic: 

  • Smart sensor networks using Bluetooth