– ESSAY TYPE QUESTION (NOT AN ESSAY) (2 QUESTIONS GIVEN )
– INSTRUCTION ARE ATTACHED.
– SHOULD STRICTLY FOLLOW THE INSTRUCTIONS.
– 200 WORDS EACH QUESTION
– NEED PLAGIARISM REPORT ALONG WITH WORK. *****
+1 (231)-518-0303 [email protected]
Home » Archives for chebby » Page 780
– ESSAY TYPE QUESTION (NOT AN ESSAY) (2 QUESTIONS GIVEN )
– INSTRUCTION ARE ATTACHED.
– SHOULD STRICTLY FOLLOW THE INSTRUCTIONS.
– 200 WORDS EACH QUESTION
– NEED PLAGIARISM REPORT ALONG WITH WORK. *****
I have a chat room page that I need help with. I have a login page that is supposed to take the users first and last name and on submit take them to the chat.html page. then when the user types a message it shows the users name above the message.
Using Chapter 10 as a reference, explain the concept of information stores. Why is an understanding of how different clients store messaging information critical to the success of an email search?
Write your answer using a WORD document. Do your own work. Submit here. Note your Safe Assign score. Score must be less than 25 for full credit.
You have three attempts.
· Chapter 9 – Review the section on Establishing a Security Culture. Review the methods to reduce the chances of a cyber threat noted in the textbook. Research other peer-reviewed source and note additional methods to reduce cyber-attacks within an organization.
· Chapter 10 – Review the section on the IT leader in the digital transformation era. Note how IT professionals and especially leaders must transform their thinking to adapt to the constantly changing organizational climate. What are some methods or resources leaders can utilize to enhance their change attitude?
(Information Technology and Organizational Learning)
The above submission should be two -pages in length (one page for each question) and adhere to APA formatting standards.
**Remember the APA cover page and the references (if required) do not count towards the page length**
Please write a post for the two documents with 150 words each substantive. A substantive post will do at least two of the following:
At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.
*** To do this assignment you are not to use any of the Collections API, or any
pre-implemented sort routines in Java. ***
In this assignment you are required to make use of the sorting routines in chapter 8 of you text book. You must ask the user to select which sorting routine he/she wants to use out of those routines implemented in the book (Insertion Sort, Shell Sort, MergeSort, or QuickSort). Based on the user input, you need to call the corresponding routine.
You are required to write one main program that will read in any number of integers and store it in an array of ints (not an ArrayList). What you need to do first is to ask the user what sorting routine he/she would like to use. Then you need to ask the user how many integers to be entered as input, and then ask the user to input that these integers.
Your program will store these integers into an array of integers first. Then your program is supposed to remove the duplicates out of this array by first sorting the array (using the user-specified sorting routine), and then removing any duplicates. Your program must not copy these elements into another array to remove the duplicates, the duplicates should be removed in place which means in the same array. Also, you must sort the array first before you start duplicate removal.
Once your array (the same array you started with) has only unique numbers, your program should print out the array followed by a list of all the numbers that were duplicated.
The numbers that were duplicated can be stored into another array.
--------
The following would be a sample scenario of running your program:
Make your choice of a sorting routine first. Then continue as follows:
Enter the number of integers: 10
Enter the 10 integers: 7 9 8 1 9 24 23 24 9 8
The resulting array is: 1 7 8 9 23 24
The numbers 8, 9, 24 were duplicated in the input.
--------
The only file that is to be submitted is a Main.java (or Assg6.java) and no other file.
Best of Luck
Topic:
After the recent security breach, Always Fresh decided to form a computer security incident response team (CSIRT). As a security administrator, you have been assigned the responsibility of developing a CSIRT policy that addresses incident evidence collection and handling. The goal is to ensure all evidence collected during investigations is valid and admissible in court.
Consider the following questions for collecting and handling evidence:
1. What are the main concerns when collecting evidence?
2. What precautions are necessary to preserve evidence state?
3. How do you ensure evidence remains in its initial state?
4. What information and procedures are necessary to ensure evidence is admissible in court?
Create a policy that ensures all evidence is collected and handled in a secure and efficient manner. Remember, you are writing a policy, not procedures. Focus on the high-level tasks, not the individual steps.
Address the following in your policy:
§ Description of information required for items of evidence
§ Documentation required in addition to item details (personnel, description of circumstances, and so on)
§ Description of measures required to preserve initial evidence integrity
§ Description of measures required to preserve ongoing evidence integrity
§ Controls necessary to maintain evidence integrity in storage
§ Documentation required to demonstrate evidence integrity
§ Internet access
§ Course textbook
§ Format: Microsoft Word (or compatible)
§ Font: Times New Roman, size 12, double-space
§ Citation Style: APA
§ Length: 3 pages
§ I created a policy that addressed all issues.
§ I followed the submission guidelines.
Law enforcement professionals and investigators use digital forensic methods to solve crimes every day. Locate one current news article that explains how investigators may have used these techniques to solve a crime. Explain the crime that was solved and the methods used to determine how the crime was committed. Some examples of crimes solved may include locating missing children, finding criminals who have fled the scene of a crime, or unsolved crimes from the past that have been solved due to the use of new techniques (such as DNA testing). 4 paragraphs
this is one page for the ticketing system project – due in a couple days
1. Apply industry standards to the implementation and support of network systems and computer devices.
2. Demonstrate the principles of information technology security.
3. Use information systems for the collection, organization, and delivery of data.
4. Express relevant information to technical and nontechnical audiences.
5. Design secure network infrastructures for physical and virtual environments.
6. Create information technology solutions based on business needs or requirements.
Please answer the following questions with supporting examples and full explanations.