Contrasting local and public test blockchains

Minimum 500 words. 

In chapter 4, the author discusses different options for testing blockchain applications. For our course, we have chosen to use Ganache, a local test blockchain. Explore some of the advantages and disadvantages of using local and public blockchains to test apps and contrast the two options.  

  • Create a new thread (by the FIRST DUE DATE)
    • Contract the advantages and disadvantages of using local and public blockchains to test applications.
    • Explain how each advantage and disadvantage impacts blockchain application development, and why each is important to a successful blockchain implementation.

I’m interested to read what YOU learned from this week’s reading. Do NOT submit a research paper. Tell me what you think.

  • Think of three questions you’d like to ask other students and add these to the end of your thread.
    • The questions must be taken from material you read in Chapter 1 or 2, and each question should start a discussion topic.
    • You’re not trying to test each other, but you are trying to start a discussion.
  • Finally, go to three other students’ threads and post comments, answering at least one of their questions.
    • For EACH comment you post, use the 3CQ approach (described above.)
    • When someone asks you a question, answer it!

ALL threads and comments must be substantive AND ORIGINAL. (I’m looking for about a paragraph – not just a short answer.) Do not plagiarize!! Use your own words.

The discussions in this class exist to simulate face-to-face discussions. To reach that goal, we will adhere to the 3CQ model. After posting each thread, you will post at least 3 comments on other students’ threads, and each comment must conform to the 3CQ model (Compliment, Comment, Connect, Question). This model encourages discussions that extend class learning and participation.

Here is a description of the 3CQ model:

1.            Compliment – Start off positive. Compliment the person on something specific you have read or observed in the person’s blog post.  For example:

  • Thanks for sharing your thoughts! I really liked …

2.            Comment – Comment on something relevant and meaningful about what the person wrote. Be specific! Remember your comment might not always be agreement. You can “politely” disagree.  For example:   

  • I agree with you about …
  • I respect your opinion, but I think …

3.            Connect – Connect with something the person wrote (Text-to-Self, Text-to-Text, Text-to-World). Explain your connection with details giving your audience a clear idea of what you’re talking about by using sensory details.   For example:

  • I can connect with you about …
  • I once read a story about …
  • I had the same thing happen to me…

4.            Question – Ask a specific question about something written or the writer. Keep the conversation going!

discussion help minimum 300 words

Discuss a particular type of Malware and how has it been used in “todays news” and the respective impact on cyber security. Add to your discussion ways the Malware could have been detected and potentially avoided.

Read Chapter 1 of the assigned textbook.

Book reference:

Computer Security: Principles and Practice

Fourth Edition By:  William Stallings and Lawrie Brown

Order # 13448

Title: Information Technology Ethical Issues in Organizations

Paper type Essay

Paper format APA

Course level Undergraduate

Subject Area Ethics

# pages 2   ( or 600 words Minimum)

Spacing Double Spacing

# sources 4

Paper Details

Use the Capella library and other sources to research ethics issues and concerns specific to information technology in organizations. You may wish to start with the books and articles included in the Resources.

Given your personal experience with IT ethics issues and the research you have done, write 3–5 pages in which you address the following points:

1.Describe at least three types of ethical problems that organizations commonly face that are specific to information technology and how they should be handled.

2.Evaluate the need for information technology professionals to have a clear understanding of cyberethics.

3.Describe how various ethical systems have evolved in the information technology field.

4.Recommend a method for informing employees about the company’s IT ethics policy.

5.Conclude by describing the relationship between information technology and ethics in the workplace.

You are welcome and encouraged to use real-world scenarios as examples where relevant.

Additional Requirements

•Include a title page and a references page.

•Include an introductory paragraph and a concluding paragraph.

•Include a minimum of three research resources in your paper.

•Be sure to follow APA guidelines for style and formatting.

•Your finished assessment should be approximately 3–5 pages in length, excluding the title page and references page.

Project: Risk Management Plan

 

Purpose

This project provides an opportunity to apply the competencies gained in the lessons of this course to develop a risk management plan for a fictitious organization to replace its outdated plan.

Learning Objectives and Outcomes

You will gain an overall understanding of risk management, its importance, and critical processes required when developing a formal risk management plan for an organization.

Required Source Information and Tools

The following tools and resources that will be needed to complete this project:

  • Course textbook
  • Internet access for research

Deliverables

As discussed in this course, risk management is an important process for all organizations. This is particularly true in information systems, which provide critical support for organizational missions. The heart of risk management is a formal risk management plan. The project activities described in this document allow you to fulfill the role of an employee participating in the risk management process in a specific business situation.

The project is structured as follows:

Project Part

Deliverable

Project  Part 1

Task  1: Risk Management Plan

Task  2: Risk Assessment Plan

Task  3: Risk Mitigation Plan 

Submission Requirements

All project submissions should follow this format:

  • Format:     Microsoft Word or compatible
  • Font:     Arial, 10-point, double-space
  • Citation     Style: Your school’s preferred style guide
  • Minimum 2     pages per task

Scenario

You are an information technology (IT) intern working for Health Network, Inc. (Health Network), a fictitious health services organization headquartered in Minneapolis, Minnesota. Health Network has over 600 employees throughout the organization and generates $500 million USD in annual revenue. The company has two additional locations in Portland, Oregon and Arlington, Virginia, which support a mix of corporate operations. Each corporate facility is located near a co-location data center, where production systems are located and managed by third-party data center hosting vendors. 

Company Products 

Health Network has three main products: HNetExchange, HNetPay, and HNetConnect.

HNetExchange is the primary source of revenue for the company. The service handles secure electronic medical messages that originate from its customers, such as large hospitals, which are then routed to receiving customers such as clinics.

HNetPay is a Web portal used by many of the company’s HNetExchange customers to support the management of secure payments and billing. The HNetPay Web portal, hosted at Health Network production sites, accepts various forms of payments and interacts with credit-card processing organizations much like a Web commerce shopping cart.

HNetConnect is an online directory that lists doctors, clinics, and other medical facilities to allow Health Network customers to find the right type of care at the right locations. It contains doctors’ personal information, work addresses, medical certifications, and types of services that the doctors and clinics offer. Doctors are given credentials and are able to update the information in their profile. Health Network customers, which are the hospitals and clinics, connect to all three of the company’s products using HTTPS connections. Doctors and potential patients are able to make payments and update their profiles using Internet-accessible HTTPS Web sites.

Information Technology Infrastructure Overview

Health Network operates in three production data centers that provide high availability across the company’s products. The data centers host about 1,000 production servers, and Health Network maintains 650 corporate laptops and company-issued mobile devices for its employees.

Threats Identified

Upon review of the current risk management plan, the following threats were identified:

· Loss of company data due to hardware being removed from production systems

· Loss of company information on lost or stolen company-owned assets, such as mobile devices and laptops

· Loss of customers due to production outages caused by various events, such as natural disasters, change management, unstable software, and so on

· Internet threats due to company products being accessible on the Internet

· Insider threats

· Changes in regulatory landscape that may impact operations 

Management Request

Senior management at Health Network has determined that the existing risk management plan for the organization is out of date and a new risk management plan must be developed. Because of the importance of risk management to the organization, senior management is committed to and supportive of the project to develop a new plan. You have been assigned to develop this new plan.

Additional threats other than those described previously may be discovered when re-evaluating the current threat landscape during the risk assessment phase.

The budget for this project has not been defined due to senior management’s desire to react to any and all material risks that are identified within the new plan. Given the company’s annual revenue, reasonable expectations can be determined.

Project Part 1 Task 2: Risk Assessment Plan

After creating an initial draft of the risk management plan, the second part of the assigned project requires you to create a draft of the risk assessment (RA) plan. To do so, you must:

  1. Develop an introduction to the plan explaining its purpose and importance.
  2. Create an outline for the RA plan.
  3. Define the scope and boundaries for the RA plan.
  4. Research and summarize RA approaches.
  5. Identify the key roles and responsibilities of individuals and departments within the organization as they pertain to risk assessment.
  6. Develop a proposed schedule for the RA process.
  7. Create a professional report detailing the information above as an initial draft of the RA plan.

Evaluation Criteria and Rubrics

  • Did the student demonstrate an understanding of the competencies covered in the course relating to risk assessments?
  • Did the student include all important components of a RA plan in the outline?
  • Did the student demonstrate good research, reasoning, and decision-making skills in identifying key components and methodologies?
  • Did the student create a professional, well-developed draft with proper grammar, spelling, and punctuation?

short answer

 

  • Object-oriented programming is used in all types of development projects, such as mobile development, windows development, and cloud-based service development. Explain three benefits of object-oriented programming that you have identified as essential for creating web applications. What evidence can you present that discourages the use of object-oriented programming?
  • Flesh out your thoughts and interact with your classmates. Post your initial response by Wednesday each week and then return on a couple of other days to see what’s going on with the discussions. The more you interact, the more you learn from your peers, and the more you share with them about what you know. You will also be showing your instructor what you have picked up.

I need a website built

It needs to have 6 pages to include an index page with each bike listed and picture that you can click on to get to each bike. 

A comprehensive review on E-BIKES 

There needs to be an index page along with 5 pages reviewing the pros and cons of each E-bike.

It needs to have substantial information along with CSS, multimedia, images, Pros & cons in an unordered list. 

The list of of E-bikes that need to be reviewed are:

SONDORS FOLD X https://shop.sondors.com/products/sondors-fold-x-october-2020

JETSON METRO FOLDING E-BIKE https://ridejetson.com/products/metro-folding-electric-bike

Nakto Skylark https://www.e-bikes.com/products/folding-16-black-skylark

Quitekat  750 https://www.bikeberry.com/quietkat-750-bandit-folding-frame-electric-bike.html

E-MOJO 500 https://www.bikeberry.com/electric-bikes/folding-e-bikes/e-mojo-500w-lynx-pro-fat-tire-folding-electric-bike.html

Deadlocking in Concurrent and Distributed system

 There are 5 resources, A, B, F, G, I, each of which can be acquired and released. There are two resource-user (or thread) types S and T.

 Each instance of S repeatedly executes this code sequence: It acquires I, then A, and then G. It releases A and G. It acquires B. It releases I and then B. 

Each instance of T repeatedly executes this code sequence: It acquires G and then F It releases G It acquires A It releases F and then A 

a) How many instances of S does it take to create deadlock if there are no instances of T? 

b) How many instances of T does it take to create deadlock if there are no instance of S?

c) There are instances of S and of T. How many instances of S and how many instances of T does it take to create deadlock? Note: In some cases, no deadlock is possible no matter how many instances/threads there are. 

Article summary 1

 

– Find 2-3 recent peer reviewed articles (within the past 3 years) that closely relate to ‘Managerial Issues of a Networked Organization’

– Should be a minimum of 750 words

– There should be no plagiarism. Attach a turnitin report with 0% similarity index.

5s week 11 assignment BS – Topic Description

3 Assignments needed for the below topic.

Topic: ‘Hardware and Software Security’

1) For the topic ‘Hardware and Software Security’, please include a short paragraph describing your project and how you intend to research it. (100 words)

2) For the topic ‘Hardware and Software Security’, please submit a brief abstract describing your final project. (200 words)

3) For the topic ‘Hardware and Software Security’,  In 500-600 word, double spaced, written in APA format, showing sources and a bibliography about 

          > What is Hardware and Software Security?

          > Advantages/Disadvantages

          > Coclusion

          > References.