I need to write a term paper on the topic Siemens Simatic- PCS7/WINCC (SCADA)
Research Report Due by May 1st 2022 7PM
Please go through the attached document and complete the research report with the guidelines. Please complete it on 5/1/22 by 7PM
Discussion and Assignment
ESSAY TYPE QUESTION (NOT AN ESSAY) (3 QUESTIONS GIVEN (1 DISCUSSION AND 2 EXERCISE )
– PROVIDE APPROPRIATE ARGUMENT FOR THE RESPONSE.
– INSTRUCTION ARE ATTACHED. PLEASE FOLLOW DISCUSSION GUIDELINES FOR DISCUSSION AND ASSIGNMENT GUIDELINE FOR ASSIGNMENT.
– SHOULD STRICTLY FOLLOW THE INSTRUCTIONS.
– LIMIT TO ONE PAGE FOR QUESTION (DOUBLE-SPACED)
– NEED PLAGIARISM REPORT ALONG WITH WORK. *****
– APA FORMAT, IN TEXT CITATION
Analysis of the Breach Notification Law Letter
Describe the purpose of a breach notification letter and appropriate content.
Search online for an example of an official breach notification letter. Analyze the notification letter. Write a summary of your findings. The summary must include:
- The specific laws alleged to have been violated in the breach notification letter
- The roles/responsibilities each department possesses in relation to the breach based on your state-specific data breach policy
Submission Requirements
- Format: Microsoft Word
- Font: Arial 10-point size, Double-space
- Citation Style: Follow your school’s preferred style guide
- Length: Minimum 500 words
Evaluation Criteria and Rubric
- Prepare a list enumerating which department should perform what function in the given scenario
c program, encrypts a binary file and then save it.
Write a program, myfilehide2, that encrypts a file — ASCII or binary — and saves the encrypted file. myfilehide2 reads from stdin a string that specifies the file to be encrypted followed by an integer. For example,
% myfilehide2
a.out 7
myfilehide2 saves the encrypted content in a new file whose name has “.E2” added as a suffix. After doing so, the app deletes the original file by calling remove(). In the above example, a.out.E2. We restrict input file names to be less than 15 characters and output file names to be less than 18 characters to account for the 3 character suffix. Spaces are not allowed in a file name. The filename and number must be separated by one or more space (‘ ‘) or tab (‘t’) characters. The number must be a single digit — either 0, 1, …, 7 — and end with ‘n’ which is generated on stdin when the ENTER/RETURN key is pressed on our lab machines. All other input of different format are disallowed and should result in a suitable error message on stdout followed by app termination by calling exit(1).
use the library function getchar() to read the input byte-by-byte. When a space character or tab character is encountered, assume the filename has ended and store it as a string in a 1-D char array of size 16. Of course, that is assuming that the filename has not exceeded 15 characters. Instead of the constants 15 and 16, use the C preprocessor directive #define to specify your own macro to reduce the potential for run-time bugs. Read the single digit (0, 1, …, 7) into variable, char numpos, and convert numpos into a decimal number, unsigned int decpos, when interpreted as a decimal number. For example, the ASCII character ‘3’ stored in numpos is convered to the decimal number 3, not the decimal encoding of the ASCII character ‘3’ which is 51.
Do not use any string processing library function to perform the input parsing task. The parsing chore can be implemented with a few lines of code. Delegate the input parsing task to
void inputcheck(void);
which stores a valid filename input a global 1-D char array. Make the variable numpos also global.
After inputcheck() returns (it may not return if the input is ill-formatted), main() opens the input file to read and creates an output file with suffix “.E2” to write the encrypted bytes. If either of the two operations is unsuccessful, main() prints a suitable error message to stdout and terminates by calling exit(1). Otherwise, like in Problem 2, lab3, myfilehide2 reads the content of the input file byte by byte using fgetc(). Unlike myfilehide, myfilehide2 flips the bit value at the bit position specified by decpos and writes the resultant byte into the output file. For example, if an input byte has bits 00001111 and decpos equals 2, the encrypted byte is 00001011. Note that the rightmost bit at position 0 is considered the least significant bit. As with myfilehide, myfilehide2 has the property that running the app again on the encrypted file with the same digit as second arguments decrypts the file. Perform a similar cleanup as myfilehide so that the encrypted file with suffix “.E2” is deleted. Use Makefile to compile your app. Test and verify that it works correctly.
Computer-Based Decision Modeling – Module 3 Discussion
I need a study guide that discuss how data mining, clustering and statistical inference can apply within a specific workplace setting.
Provide at least two examples you have used. Are these techniques more likely to be done by a specialist within the organization? What about your work experience, what have you observed?
Discussion Question
One main response with 500 words and response to other post with 250 words