intr to theatrical computer science

1-  Consider a TM tape containing a number in unary form (i.e., the number n is represented by a string of n 1’s).

Give a Turing machine that computes the function f(x) = x % 3 (i.e., that replaces the input number on the tape by its remainder when divided by 3.

Below, give a simple summary of the inputs associated with each state in your TM controller.

——————————————————————————————————————————-

2- Give a Turing machine that accepts the set of strings over {0.1} havng the form 0i1j with i ≠ j.

Below, give a simple summary of the inputs associated with each state in your TM controller.

——————————————————————————————————————————–

3- 

Describe the function computed by the following Turing machine. Assume the tape contains an input number in unary form (i.e., we represent the number n by a string of n 1’s).

for q3 I uploaded the picture 

40/s2

  1. Describes the factors influencing the need for change and the imperatives for managing information assurance change initiatives.
  2. Discusses how group and organizational dynamics may affect the success of your information assurance change initiative.

Assignment

 While this weeks topic highlighted the uncertainty of Big Data, the author identified the following as areas for future research.  Pick one of the following for your Research paper:

  • Additional study must be performed on the interactions between each big data characteristic, as they do not exist separately but naturally interact in the real world.
  • The scalability and efficacy of existing analytics techniques being applied to big data must be empirically examined.
  • New techniques and algorithms must be developed in ML and NLP to handle the real-time needs for decisions made based on enormous amounts of data.
  • More work is necessary on how to efficiently model uncertainty in ML and NLP, as well as how to represent uncertainty resulting from big data analytics.
  • Since the CI algorithms are able to find an approximate solution within a reasonable time, they have been used to tackle ML problems and uncertainty challenges in data analytics and process in recent years.

Discussion post

Topics:

1. How operating systems control access to resources.

 2.Network threats and vulnerabilities.

I want a 300-word discussion post for each of the above topics with references

Note: The matter should be like own words

          No plagiarism 

          APA format 

          

          

Unit 10 Differentiate between various computer operating systems.

 

IT332-6: Differentiate between various computer operating systems.

Purpose

Quite a variety of operating systems are used in everyday devices and computer systems. The purpose of this assignment is for you to identify the operating systems that are used specifically for each device in order for that device to run efficiently. OS X is specifically designed for an Apple device only. However, Apple desktops have the ability to partition the hard drive, which allows the user to install a flavor of your favorite Windows OS on an Apple machine. This is called Boot Camp, which is a multiboot utility included with Apple systems.

Assignment Instructions:

Research on the Internet to determine at least six criteria upon which you will base a comparison of operating systems (examples might be reliability, speed, security). Create a table that lists your criteria as the rows of the table and lists the operating systems as the columns of the table. Operating systems should include Windows, iOS, Android®, OS X, Linux, and Unix. Enter in-depth information on each of the criteria for each operating system. Once your table is complete, write 1–2 paragraphs describing what you feel is the best use for each operating system, and justify what you state based on the facts presented in your table.

Provide a complete list of references below the table, using appropriate APA format.

Make sure the assignment includes:

  • A table that has 10 criteria to compare operating systems.
  • A table that compares the following operating systems: Windows, iOS, Android, OS X, Linux, and Unix.
  • In-depth information for each criterion for each operating system.
  • One to two paragraphs below the table that describe the proposed best use for each operating system. This is supported and justified by the information provided in the table.
  • A complete list of references at the end of the paper.

Assignment Requirements

Be sure to use the appropriate APA format and cite your textbook or other sources that you used in your paper.

The paper should contain sufficient information to adequately answer the questions and contain no spelling, grammar, or APA errors. Points deducted from the grade for each writing, spelling, or grammar error are at your instructor’s discretion. 

Oral Presentation:-

   

· Create a 10-minute presentation on you, demonstrating your Professional Profile on LinkedIn and highlighting the skills you can bring to your chosen industry in the Australian market – your presentation topic is: “What I have to offer the Australian workforce”

so I wanted Do CCNA CCNP (Routing And Switching) Course later this year and work as a Network Administrator so can you make research presentation on this Course And Work

Assin10

 

  1. What is the definition of data mining that the author mentions?  How is this different from our current understanding of data mining?
  2. What is the premise of the use case and findings?
  3. What type of tools are used in the data mining aspect of the use case and how are they used?
  4. Were the tools used appropriate for the use case?  Why or why not?

mod6

 

Module 06 Content

  1. XYZ Technologies had a DDoS (Distributed Denial of Service) attack to their environment yesterday. Your deliverable will include reviewing the incident details document and create a RCA (Root Cause Analysis) report based on this incident. Review the details of the incident below:
    Incident Details: DDoS (Distributed Denial of Service) Attack
    At 2:26 CST the internet facing firewalls peaked at 100% CPU load. This load level caused any additional connection to be lost, giving the appearance that the corporate website and connectivity to the other IoT devices supported by this site to lose connectivity. Initial investigation of the log data showed 1.25 million syn requests by the following external IP addresses:
    1.169.228.122, 5.254.97.84, 27.254.56.45, 37.48.80.165, 37.186.206.134, 41.32.37.226, 42.61.188.34, 103.213.45.145, 111.91.82.161, 151.233.52.209, 168.187.104.130, 186.167.1.54, 190.205.33.163, 213.184.112.102, 217.219.150.126
    In the first 8 minutes, the following remediation techniques were used:

    • The addition of attacking IP addresses to a global block list. Result, a new attacking IP appears with the same number of syn requests.
    • When the website is disabled, the syn requests drop to zero.
    • When the website is brought up in a new location, the syn requests return, and bring down the protecting firewall.
    • Remediation:
      After 8 minutes of complete down-time, a decision was made to disable the site in IIS until an appropriate solution could be implemented.
      At 23 minutes, a recommendation was made to the support team to offload the syn requests to a cloud-based firewall, called incapsula.
      At 42 minutes Incapsula implemented solution with a 30-day free trial.
    • Setup of Incapsula Tool
    • Configuration of primary website within Incapsula
    • Configuration of DNS from original location to Incapsula
    • At 45 minutes the website was returned to functional status, by re-enabling the site in IIS.
      Future State:
      XYZ currently has only 2 websites with public facing addresses. These two sites will be protected by the incapsula tool to offload any future DDoS attempts.
  2. Root Cause Analysis (RCA) Report
    After reviewing the incident above, create a RCA (Root Cause Analysis) report based on this incident. While your report is a technical document, rich in detail, it is your role as the cybersecurity professional to tailor this RCA to meet the expectations of the target audience of non-technical, executive leadership, and customers. Please be sure to address the following:

    • A breakdown of the incident details (Areas Affected, Dates, and Times).
    • Information on the root cause of the incident.
    • Specifics of how the incident was resolved, or if additional steps need to be taken to fully resolve the incident.
    • Preventative measures for future incidents.
    • Be sure to tailor this RCA so that it is rich in detail but does not rely on technical language to meet the expectations of the target audience of non-technical, executive leadership, and customers.
    • Your report should use professional tone and vocabulary, APA format, and proper spelling and grammar.
    • Submit your completed assignment by following the directions linked below. Please check the Course Calendar for specific due dates.
      Save your assignment as a Microsoft Word document. (Mac users, please remember to append the “.docx” extensions to the filenames.) The name of the file should be your first initial and last name, followed by an underscore and the name of the assignment, and an underscore and the date. An example is shown below:
      Jstudent_exampleproblem_101504