Create a MIPs program to simulate playing multiple games of “Craps” (a popular casino game) to determine an approximate winning percentage.: To simulate throwing two independent dice, you need to get two random numbers in the range of 1 to 6 and add them together. Do not get a single random number in the range of 2 to 12, as each value will not reflect the odds of rolling a particular number
report the course is computer orgnaization
I attached the format of the report, follow the guidelines
Physical security 6
Subject name: Physical Security
Provide a reflection of at least 500 words (or 2 pages double-spaced) of how the knowledge, skills, or theories of this course have been applied or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories, and knowledge could be applied to an employment opportunity in your field of study.
REQUIREMENTS:
Provide a 2 page double spaced minimum reflection (i.e. no less than 2 full pages of content). This does not include the required APA Cover Page and reference page.
Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.
Share a personal connection that identifies specific knowledge and theories from this course.
Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment.
discussion 09/22
Topic: Assume that you have been tasked by your employer to develop an incident response plan. Create a list of stakeholders for the IR planning committee. For each type of stakeholder, provide the reasons for inclusion and the unique aspects of vision that you believe each of these stakeholders will bring to the committee.
300 words. 100 words conclusion.
Data Gathering Instrument
Data Gathering Instrument
Task: Create one (1) instrument that could be used to gather data for your mock dissertation topic. (cyber secuirty)
The instrument should be designed to be exactly how it would be deployed to collect data. Since instrumentation usually goes through several steps of field testing, for purposes of this assignment you can submit a deployment-ready draft of your instrument without field testing it. Be sure the instrument collects data appropriately to measure your research question. If your study will not use an instrument to collect data because your data is archival and already exists, you will discuss your process for data retrieval.
week 4 log
add to progress log for week 4
SQL DATABASE SECURITY (CYBERSECURITY)
For this week’s discussion, talk about why a database needs to be secured. In your initial post, answer at least two of the items in the bulleted list below:
- Identify three actions that can be applied to a database environment to manage user access.
- Is there such a thing as “overkill” with security? If so, how? (Provide an example)
- Explain who should be in charge of making the security decisions for an organization’s database? Why?
- Define and explain the difference between the authentication modes of at least two of the three database vendors mentioned in the chapter (SQL Server, MySQL, and Oracle).
- Identify at least five best practices when adding and removing users.
- Explain the principle of least privilege and how it should be applied within a database environment.
Big Data and Cloud Computing
This week’s reading centered around Bitcoin Economics. For this week’s research paper, search the Internet and explain why some organizations are accepting and other organizations are rejecting the use of Bitcoins as a standard form of currency. Your paper needs to identify two major companies that have adopted Bitcoin technology as well as one that has refused accepting Bitcoin as a form of currency. Be sure to discuss each organization, how they adopted (or why they won’t adopt) Bitcoin, and what recommendations you have for them to continue to support Bitcoin (or why they should support Bitcoin).
Your paper should meet the following requirements:
- Be approximately four to six pages in length, not including the required cover page and reference page.
- Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
- Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
- Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing
Discussion-8
In the final discussion posting please describe what components of cryptography impacted you the most.
Use the web or other resources to research at least two criminal or civil cases in which recovered files played a significant role in how the case was resolved.
Use the web or other resources to research at least two criminal or civil cases in which recovered files played a significant role in how the case was resolved.
Use your own words and do not copy the work of another student.