## IS311 security operations

In this Project Final you are to update, refine and combine the past seven weeks of Labs to create the Information Security Plan into final document. Remember that you are the Information Security Officer of Mahtmarg Manufacturing a small manufacturing company worth approximately \$5 Million who provides fiber cable to local businesses, individual customers and to government organizations. You are creating the final Information Security Plan (Issue-Specific Security Policy in Table 4-3 of the textbook).

## Independence

DUE 11/10/2017(Today) 11:30 pm Eastern time

Give a joint distribution for Boolean random variables A, B, and C for each scenario. Give a brief intuitive interpretation of the variables. The notation i(x, y) means that x and y are independent

(a) i(A, B), i(A, C), and i(B, C).

(b) i(A, B) and i(A, C), but not i(B, C).

(c) i(A, B) and i(A, C), but not i(A, B ∧ C).

## hello! So I have this CIS assignment lab but when I try to make the code I don't really know where to start from. My professor is very hard and he likes to see the outcomes as they are shown in the problem. Please help me! Write a program that can be used

hello! So I have this CIS assignment lab but when I try to make the code I don’t really know where to start from. My professor is very hard and he likes to see the outcomes as they are shown in the problem. Please help me!

Write a program that can be used as a math helper for an elementary student. The program should display two random integer numbers that are to be added, such as:
247
+ 129
——-

The program should wait for the students to enter the answer. If the answer is correct, a message of congratulations should be printed. If the answer is incorrect, a message should be printed showing the correct answer.

The program displays a menu allowing the user to select an addition, subtraction, multiplication, or division problem. The final selection on the menu should let the user quit the program. After the user has finished the math problem, the program should display the menu again. This process is repeated until the user chooses to quit the program.
Input Validation: If the user select an item not on the menu, display an error message and display the menu again.

Requirements:

Generate two random numbers in the range 0 – 9.

Subtraction

Generate two random numbers in the range 0 – 9.
num1 = rand() % 10;
num2 = rand() % 10;
Make sure num2 <= num1…
while (num2 > num1)
num2 = rand() % 10;

Multiplication

Generate two random numbers. The first in the range 0 – 10, the second in the range 0 – 9.

Division

Generate a single digit divisor
num2 = rand() % 9;
Generate a num1 that is a multiple of num2 so the division has no remainder. The num1 is never zero.
num1 = num2 * (rand() % 10 + 1);

All constant values must be declare as a constant variable. Use the constant variable in the calculation.
Validating the selection (1 to 5). If the selection is not in the range between 1 and 5, the program keeps asking the input until the correct selection is entered.

Output sample:

2. Subtraction problem
3. Multiplication problem
4. Division problem
5. Quit this program

1
+ 2
—
4

Sorry, the correct answer is 3.
2. Subtraction problem
3. Multiplication problem
4. Division problem
5. Quit this program
The valid choices are 1, 2, 3, 4, and 5. Please choose: 2
8
+ 6
—
2
Congratulations! That’s right.
2. Subtraction problem
3. Multiplication problem
4. Division problem
5. Quit this program
9
*   4
—
36

Congratulations! That’s right.
2. Subtraction problem
3. Multiplication problem
4. Division problem
5. Quit this program
8 / 2 = 4
Congratulations! That’s right.
2. Subtraction problem
3. Multiplication problem
4. Division problem
5. Quit this program
6 / 2 = 3
Congratulations! That’s right.
2. Subtraction problem
3. Multiplication problem
4. Division problem
5. Quit this program

## Digital Forensics – Plain View Doctrine

Describe the plain view doctrine, and why  it has such a significant impact on digital forensics? What are three approaches to determining whether the doctrine applies to a specific case. 500 Words.

## reviews

1.Decision Support Systems are the heart of business intelligence applications and are used by key personnel to help facilitate business strategy especially in times of uncertainty and change.  Consider an organization that has been in the news lately and the business environment pressures they recently experienced.  For this discussion board, please complete the following: Describe the pressures experienced by the company. Describe how the organization responded to those pressures. If you were the key decision maker of this company, what operational areas or periodic measures would you consider monitoring to ensure that your responses are effective and proper.

The video below goes through a hypothetical situation where an airline company must decide which customers will be accommodated when there is limited airline seating.  The BSI team considers several factors by linking different database information systems

2.Business Intelligence technology and processes are constantly changing.  It’s important to stay current on new software, techniques, and innovative ways of converting data into meaningful information. Find a recent online article related to a business intelligence topic. In your own words write a summary of the article. As you write your summary consider how your article relates to topics covered in the textbooks, videos, and presentations.

Suggested Websites for articles:

Business Intelligence  – BusinessIntelligence.com is the place for BI decision makers to access the most current and highest quality BI content aggregated from across the web.

CIO Magazine – CIO Magazine serves Chief Information Officers (CIOs), other IT leaders, as well as ecosystem that surrounds and interacts with them.

Information Week – Information Week is a periodical that concentrates on areas related to Strategic CIO, Software, Cloud, Mobile, Big Data, Security, Infrastructure, Government, and Healthcare.

Information Management  – Information Management contains the latest news, commentary, and features content serving the information technology and business community.

Video:

The following video gives an overview of data warehouses including the ETL process. link: https://www.youtube.com/watch?v=zTs5zjSXnvs

3. Find at least three online demos of Sentiment Analysis software.

Find at least three different movie reviews where the user also includes a score.  For example customer movie reviews on Amazon and Netflix use a 5 star rating system.  Copy and paste the text into the sentiment analysis demonstration software and compare the Positive/Negitive score from the sentiment analysis with the customer’s star rating. In your post give an evaluation of each of the sentiment analysis applications. In your opinion, which of the applications that you tested was the most accurate? What are the limitations of sentiment analysis applications? Given an example of how a company can use sentiment analysis.

Online examples of Sentiment Analysis demos: Stanford University Sentiment Analysis  This website provides a live demo for predicting the sentiment of movie reviews.  This deep learning model buids up a representation of whole sentences based on the sentence structure.  It computes the sentiment based on how words compose the meaning of longer phases. Text Processing – Sentiment Analysis  This sentiment analysis demonstration uses the Python programming language using NLTK to perform text classification.  It can tell you whether it thinks the text you enter expresses positive sentiment, negative sentiment, or neutral. Lexalytics  This demonstration is provided by Lexalytics.  Their software is used for social media monitoring, reputation management, and voice of the customer programs.

4. Discuss the advantages of Hadoop technology and distributed data file systems. How is an Hadoop Distributed File System different from a Relational Database system? What organizational issues are best solved using Hadoop technology?  Give examples of the type of data they will analyze. What companies currently use Hadoopo related technologies.

Video:

This video provides a comparison of Hadoop and Big Data processing and SQL used over a Relational Database.

5. Describe what is meant by the “Internet of Things”. What industries are most likely to use Internet of Things technology? What are the challenges of Internet of Things?

Video:

Bare with the audio of this TED talk.  It improves after the first two minutes.  Dr. John Barrett describes how over time most everything will be connected to the Internet.

## Forensic Report 2

Required Deliverables:

1. Forensic Report #2 File containing:

a. Transmittal Letter

b. Delivery Package Inventory

c. Forensic Report (Full) and all appendices

2. Chain of Custody Document

3. List of MD5 Hash Values for all files submitted for this assignment

CMIT 424 Forensic Report #2 Scenario

James Randell, president and owner of Practical Applied Gaming Solutions, Inc. (PAGS), contacted you to request additional assistance in handling a sensitive matter regarding the unexpected resignation of a senior employee of his company. In your previous investigation, you learned that Mr. Randell had become concerned about an employee’s resignation after receiving a report that Mr. George Dean (also known as Jeorge Dean), the company’s Assistant Chief Security Officer, left a voice mail tendering his resignation effective immediately.

## I have chemistry online homework that is due Sunday 11:50 pm Newyork time

My assessment now is 84% as you can see in the file I uploaded. I want you to continue working on the pie until you reach 100% progress in the assessment

## Greatest risks a company has to deal

We have two questions in one assignment.

1. What are the 2 greatest risks a company has to deal with today?

2. When thinking of a recovery plan pick a company and provide some basic options they will need to embrace to keep the business running.

answer should be at least 250 words.No plagiarism

## Short Research paper

Each student will write a short research paper for a peer-reviewed research paper that pertains to the week’s assigned reading. This will be a detailed summary of the research paper and what you gained from the research. Each week, you will find an article/peer-reviewed research paper that pertains to the week’s assignment. If you have a difficult time, Google Scholar is a wonderful location to find these types of articles:  https://scholar.google.com/  Once you find the article, you will simply read it and then write a review of it. Think of it as an article review where you submit a short overview of the article.  *All outside sources must be referenced and cited in your paper. All papers will be reviewed with a plagiarism software. Any references not properly referenced and cited will result in a 0 on your paper. Multiple violations will result in a failure for the course!

Week Topic :Values in Computational Models Revalued

## Ashworth Semester Exam PY36S Ethics in Technology

PY36S : Ethics in Technology

Question 1

Tablets, abacuses, and manual tables:

are no longer used, because of the proliferation of calculators and computers.

are examples of aids to manual calculating.

were developed in Western Europe in the late Middle Ages.

replaced Hindu-Arabic numerals as the preferred way to do calculations.

Question 2

A key application that first made personal computers more attractive to business was:

desktop publishing.

e-mail.

the World Wide Web.

Question 3

The idea that social and economic inequalities must be to the greatest benefit of the least-advantaged members of society is called:

capitalism.

communism.

socialism.

the difference principle.

Question 4

According to Kant, the moral value of an action depends upon:

its consequences.

the underlying moral rule.

how closely it aligns with Biblical teachings.

how closely it aligns with the law.

Question 5

Which of the following rights is NOT a right of a copyright holder?

The right to reproduce the copyrighted work

The right to distribute the work to the public

The right to perform the work in public

The right to prevent others from producing competitive works

Question 6

The Financial Services Modernization Act:

allows banks to offer insurance and stock brockerage services.

requires banks to disclose their privacy policies to consumers.

requires banks to inform consumers how they can “opt out” of having their confidential information released to other companies.

All of the above

Question 7

A software program that responds to commands sent by a command-and-control program located on an external computer is called a:

bot.

spoof.

vampire.

virus.

Question 8

Determining that a person is who he or she claims to be on a computer is called:

accountability.

authentication.

authorization.

debugging.

Question 9

Computers that process data from sensors as events occur are called:

distributed computers.

event-driven simulations.

pseudo-sensory systems.

real-time systems.

Question 10

According to Max Weber, the growth of capitalism was stimulated by a new attitude toward work brought about by:

the Industrial Revolution.

the Protestant Reformation.

the English Civil War.

the Lisbon earthquake of 1755