Write a subroutine that generates random

  

Write a subroutine that generates random numbers that lie between a and b. The user calls the subroutine as my(numbers) = myrandom(n,a,b). The subroutine returns n random number between a and b. Call the program with a seed of 0, a = -3, b = 7, and n = 10. Print out your 10 random numbers after the subroutine call.

Project 6: Global Approaches to Cybersecurity Step 3: Project Practice – SIMTRAY Cyber Policy for a Small World: Day 3

 

In this step, you should continue to explore the scenarios within SIMTRAY, “Cyber Policy for a Small World.” If you have not already, you will most likely encounter the following topics in this exercise: EMP Attack, the role of state actors, and attacks using technologies such as botnets.

Document events that you experience in the exercise that might affect the global cybersecurity policy. Think about threats brought about by new technologies and how these threats are or could be handled by global policy.

The SIMTRAY will provide you with scores to give you a sense on how well you are grasping the concepts. The sections are timed for 30 minutes; however, you can run the SIMTRAY as many times as you need in order to have a firm grasp of the concepts. Compile your recorded scores, lessons learned and documented technologies and policies into a one-page report.

labs

 Respond ONLY if this in your field. Review the documents first please before bidding.

Module 01 Content

 

Module 01 Content

  1. Describe in detail and provide at least one example of what IT Risk Management is. Also discuss the necessity of risk management and disaster recovery in the context of major disasters (such as 9/11).
    Your assignment should meet the following requirements:

    • 2-4 pages, not including the cover page and reference page.
    • Conform to APA Style.
    • Support your answers with the readings from Module 01 and at least one current scholarly journal article (not more than five years old). The Rasmussen Library is a great place to find resources.
    • Clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing. If you need assistance with your writing style and APA format, start with the Writing and APA guides at the Rasmussen Library.

module 06

 

Module 06 Content

  1. Lab assignment develop a PowerPoint presentation on assessing the value for SSL decryption in an Enterprise environment. Your PowerPoint presentation will require a minimum of 8 slides and no more than 12 slides. You will need to include clear and concise work notes within your presentation slides. Be sure to cite your sources.

    Submit your completed assignment by following the directions linked below. Please check the Course Calendar for specific due dates.

    Save your assignment as a PowerPoint document. (Mac users, please remember to append the “.PPT” extension to the filename.) The name of the file should be your first initial and last name, followed by an underscore and the name of the assignment, and an underscore and the date. An example is shown below:

    Jstudent_exampleproblem_101504

Comparing Windows and Mac OS Forensic Investigations

1 page and a half

Windows and Mac OS are distinctly separate operating systems that use different boot processes, file systems, directories, and so on.  However, some of the general steps used to examine computers for digital evidence apply to both systems. Answer the following questions(s):

  1. Discuss the similarities between a Windows and a Mac OS forensic investigation
  2. Discuss the differences between a Windows and a Mac OS forensic investigation
  3. Is one operating system more challenging to analyze?  Why or why not?

PROGRAMMING

PROGRAMMING WITH C++

Figure 5-35(SEE ATTACHED) shows the Mifflin–St Jeor formulas for calculating a person’s basal  metabolic rate (BMR), which is the minimum number of calories needed to keep his or her body functioning while resting for 24 hours. A personal trainer at a local health club wants a program that displays a client’s BMR. 

a.  Create an IPO chart for the problem, and then desk-check the algorithm twice. For the first desk-check, display the BMR for a 25-year-old male whose weight and height are 175 pounds and 6 feet, respectively. For the second desk-check, display the BMR for a 31-year-old female whose weight and height are 130 pounds and 5.5 feet, respectively. 

b.  List the input, processing, and output items, as well as the algorithm, in a chart similar to the one shown earlier in Figure 5-27(SEE ATTACHED). Then code the algorithm into a program. 

c.  Desk-check the program using the same data used to desk-check the algorithm. 

d.  If necessary, create a new project named Intermediate14 Project, and save it in the Cpp8Chap05 folder. Enter your C++ instructions into a source file named Intermediate14.cpp. Also enter appropriate comments and any additional instructions required by the compiler. Display the BMR in fixed-point notation withno decimal places. Test the program using the same data used to desk-check theprogram.