Questions

Question 1

This Internet threat uses targeted fraudulent messages from reputable companies to elicit information from end users.

Crypto malware
Spear phishing
End-point attack
Supply chain attacks

Question 2

An SMB server should only allow access to which port?

443
445
80
22

Question 3

The Internet started as a project to route network communications around failed hardware.
True
False

Question 4

An HTTPS server should only access to which port?
443
445
80
22

Question 5

This Internet threat uses holes in the manufacturing process to insert malware or vulnerabilities.

Crypto malware
Spear phishing
End-point attack
Supply chain attacks

Question 6

A DMZ is a?

Demilitarized zone
Delta metal zone
Data message zero
None of these

Question 7

Port 80 is typically used by which protocol?

HTTP
HTTPS
SMTP
IMAP

Question 8

This Internet threat encrypts your hard disk and ransoms the keys to decrypt it.
Crypto Malware
Phishing
End-point attack
Supply chain attacks

ple week14 p14

Hello,

i need this paper by 4/28 afternoon 12am.

Strictly No plagiarism please use your own words.

Answer each these questions in a paragraph with five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.

  1. Give an example from the book where insufficient testing was a factor in a program error or system failure.
  2. What was one cause in the delay in the completing of the Denver Airport.
  3. Why didn’t the healthcare.gov website work at first?
  4. What is one characteristic of high reliability organizations?
  5. Describe the potential risks of alert fatigue in EHR systems.
  6. What were 2 common factors in both the Therac-25 case and the space shuttle disaster.
  7. What does design for failure mean?

Make sure Strictly No plagiarism content should not match and even the reference should not match in plagiarism 

Assignment

 

The game of “Geography” is played by 2 (or more, but let’s stick with 2) players. The idea is that one player lists out the name of a place (say, “California”). The next person needs to list out a name whose first letter is the same as the last letter of the previous name (So, since “California” ends with an “A”, the next name needs to star with an A.  Perhaps the “Alps”). The game continues until one player can’t find a name that hasn’t been used already, and they lose.

Your job is to think about how you’d design an agent to play this game. DO NOT create a program! This is just a design.

You can assume that the agent has access to a “place list” of all legal names.  It may be a directed graph, with places as vertices and an edge (x, y) existing if the last letter of the place name x corresponds to the first letter in the place name y. You can think of it as represented in other ways if you want. 

  • If the agent has multiple choices for the next location, what should it pick?
  • What strategy will you use to pick a move?
  • How will you evaluate whether a move is good or not?

  

Python

 This is the topic: You are the IT manager of a large corporation. You are planning to use Python to develop statistical models to aid in analyzing your sales data. You are preparing a report for management. Here are the basic requirements for your report: Prepare in APA format Include references Report length: 500 – 700 words Briefly describe Telecommunication company (Ex: Charter communication, ATT, TMO) Briefly describe Python Give an overview of Machine Learning Report on:’ Implementation plans, Technical training, Python libraries required, How Python will be used And Types of reports that will be produced.

CBSC 630 Case Study 5.1

 

Conduct additional research and write a 3 to 4 page paper explaining the steps you would take in detecting and removing a trojan horse from a computer system.. 

Writing Requirements

  • 3–4 pages in length  (excluding cover page, abstract, and reference list)
  • Include at least two peer reviewed sources that are properly cited

Discussion 6- Planning

Assigned Readings:Chapter 13: Procurement ManagementChapter 14: Quality PlanningInitial Postings: Read and reflect on the assigned readings for the week. Then post what you thought was the most important concept(s), method(s), term(s), and/or any other thing that you felt was worthy of your understanding in each assigned textbook chapter.Your initial post should be based upon the assigned reading for the week, so the textbook should be a source listed in your reference section and cited within the body of the text. Other sources are not required but feel free to use them if they aid in your discussion.Also, provide a graduate-level response to each of the following questions:

  1.  In addition to cost, what factors should be considered in selecting a building contractor? What can go wrong if the lowest bid is selected and nothing else is considered? 
  2. What is the difference between an RFP and an RFQ? Give two specific examples where an RFQ could be used and two specific examples where it is more likely that the organization will go with an RFP. (Use examples NOT from your textbook.)
[Your post must be substantive and demonstrate insight gained from the course material. Postings must be in the student’s own words – do not provide quotes!] 

Text

 Title: Project Management 

Subtitle: https://opentextbc.ca/projectmanagement/ 

Authors: Adrienne Watt 

Publisher: BCcampus Open Education 

Publication Date: 2019 

Edition: 2nd Edition