Enterprise Risk Management

Description of enterprise risk management. Why do you feel ERM is different from traditional risk management?

  • Ask an interesting, thoughtful question pertaining to the topic
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source that applies to the topic, along with additional information about the topic or the source (please cite properly in APA 7)

Disaster Recovery Plan

Submit a report that discusses the techniques used by malware developers to disguise their code and prevent it from being analyzed.  Give suggestions on how these techniques should be classified and ranked in the disaster recovery documentation.

Assignment should follow all APA rules and include a min. of (1) citation/reference.

Discussion: Introductions and Operating System Comparisons

 Need 250 words Initial Post and two replies of 70 words each. I will post the replies later. 

1-1 Discussion: Introductions and Operating System Comparisons

Before you complete this discussion, read and complete Cisco Netacad Chapter 1. Then, introduce yourself briefly and share your interests in taking this course.

Next, describe your experience with the following operating systems: Linux, Windows, OSX, iOS, and Android. (You may not have experience with all of them, but you likely have used one or more.) Compare and contrast the operating systems that you have experience with based on at least one of the following features:

  • User interface
  • Ease of use
  • Performance
  • Applications
  • Support

In your responses to your peers, try to pick those who have different experiences than you do. Consider their initial posts and describe how those features affect you in your professional and personal life. What kinds of issues have you experienced? How did you handle those issues?

Wk 8 Assignment

You are the web master of a college website. You share a server with other school departments such as accounting and HR.

Based on this chapter, create at least five security-related rules for staff members who are adding web pages being added to your site. Include a justification and explanation for each rule. Rules should relate to college, staff and student, and system information security.

Write your answer using a WORD document in about 350 words. Do your own work and use your own words. Submit here. Note your Safe Assign score. Score must be less than 25 for full credit.

Big Data and Cloud Computing

This week’s reading centered around Bitcoin Economics.  For this week’s research paper, search the Internet and explain why some organizations are accepting and other organizations are rejecting the use of Bitcoins as a standard form of currency.  Your paper needs to identify two major companies that have adopted Bitcoin technology as well as one that has refused accepting Bitcoin as a form of currency. Be sure to discuss each organization, how they adopted (or why they won’t adopt) Bitcoin, and what recommendations you have for them to continue to support Bitcoin (or why they should support Bitcoin).

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing

Compilers(Question about Computer Science)

  

1 Consider the following grammar (describing LISP arithmetic):

X -> ( E ) 

E -> O | O T

O -> + | * | – | /

T -> n | X

X == executable, E == expression, T == term, n == number

terminals == ( ) n + * – / 

Find FIRST, FOLLOW and LR(0) sets for this grammar.

Is the grammar LR(0)? Is it SLR?

2.Give a rightmost derivation of the string (x+a)*x using:

S=> E

E=> E+T | T

T=> T*F | F

F=> i | (E)

The lexical analyzer returns a token i==identifier for variables ‘x’ and ‘a’.

Display the parse tree, the syntax tree, and the expression DAG.

3. The algorithm for DOM in the text is based on data flow analysis, but it is often desirable to find the DOM tree from the control flow graph without t need to do data flow. Describe a possible algorithm based on breadh-first search to find DOM given a control flow graph. (An overview description in Englishis sufficient, you do not need a formal specification or code of an algorithm)