Design an algorithm

 Design an algorithm that receives the letters of your first name in an array. It then finds the duplicates characters in your first name. Do the following to design the algorithm: 

 a. Write pseudo-code of algorithm 

b. Translate the pseudo-code to flowchart 

c. Translate the pseudo-code to a program 

d. Analyze algorithm asymptoticly (Determine primitive operations) 

e. Find the running time experimentally (On program above) 

Research paper for inferential statistics in decision making

Regression test for statistics:

Regression test (2 pages)

Half page introduction(article) 

Image should be like statistical graph

Analysis.

Results of the test

NOTE: – 1.     APA format and should have references to each page 

               2.     Total Document should contain minimum 2 pages

paper

Follow the doc for questions and concepts on which the questions must be answered 

Project Computer Science

Projects 200-400 words.
  1. Using the Internet as a resource, research multiple file systems for hard disks supported in Windows, such as MS DOS’s FAT file system, the 32-bit FAT file system, and the NTFS file management system. Submit your findings in a report.
  2. Compile a list of various data-compression techniques that are commonly employed in today’s computer systems. Which of these techniques is the most efficient? That is, which of these techniques has the maximum gain in storage space with the least effect on processing time?
Additional Resources
  1. MFD-Master File Directory: http://www.boogles.com/local/papers/tcfs-thesis/subsection2_7_2_2.html
  2. Data Compression: http://www.cisco.com/c/en/us/support/docs/wan/data-compression/14156-compress-overview.html
  3. Variable-length records: http://www.ibm.com/support/knowledgecenter/SSB27U_6.2.0/com.ibm.zvm.v620.dmsa5/hcsd2c10242.htm
  4. ISAM Databases: http://www.mixsoftware.com/product/db/intro1.htm
  5. International Organization for Standardization: http://www.iso.org/iso/home.html

data breach

Answer each these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.

1. With all the stories about millions and millions of bytes of personal data having been exposed, why is their still any faith at all in the Internet?

2. How has the term hacking changed meaning over the years?

3. What is the most dangerous hacker tool?

4. From the news: How were NSA’s hacker tools  compromised? 

5. What was the vulnerability in the Target Breach?

6. What do you think of hactivism?

7. How did Stuxnet work? 

8. What was the Arpanet?

9. Deep brain stimulation is a treatment for Parkinson’s disease. Medical devices such as these are now becoming accessible through the web. Consider the dangers (threat surface)?

10. What is the Red Team?

Access control Assignment 3

Discuss how information is classified and how it can be used in a competitive situation.

Length, 2 – 3 pages.

All paper are written in APA formatting, include title and references pages (not counted). Must use at least two references and citations.

Please reference the rubric for grading.

All paper are checked for plagiarism using SafeAssign, you can review your score.

Please use the attached APA template to get started.

It636week1

1.  Prepare a one page (minimum) paper on the use of Data Mining in the retail industry. You may use the internet for additional sources. Please double space your paper and cite your sources. 

2.  Prepare a one page paper on chapter 2, the Development of a Data Mining Study by briefly explaining the phases of a data mining project. You may use the internet for more information. Please double space your paper and cite your sources. 

5s week 9 assignment BS

IN 300 Words,

 Do a bit  if research into File Inclusion Vulnerability.

  • What is it?
  • Why is is dangerous?
  • What is the difference of low and remote inclusion?
  • What methods can me employed to prevent a security breach?
  • What programming languages are vulnerable to this type of attack.

Do not copy the work. 

Include references, do not copy paste strictly.