PEER POST # 1 From this course, my biggest takeaway has been understanding the intricate dynamics and methodologies of cybersecurity. It’s a realm that is ever-evolving and demands continuous adaptation. The most important aspect of this course, in my opinion, was its emphasis on the practical applications of security principles. It’s one thing to read […]
Respond to at least two of your classmates’ posts. Address the following when responding: How can you continue to grow as a professional? Be specific in your answer. What types of professional resources do you find important that you can share with your classmates? Include a URL when possible. Your responses should show that you’ve […]
Write a Guess the Number game that has three levels of difficulty. The first level of difficulty would be a number between 1 and 10(include 10). The second difficulty set would be between 1 and 100(include 100). The third difficulty set would be between 1 and 1000(include 1000). Prompt for the difficulty level, and then […]
Week Seven-Discussion What is the role of government in securing cyberspace? ( write in 250 words ) ===================================================== Mid-Term Project You are Now the CIO of a Company (Congratulations) As the CIO your job is to educate your employees about cybersecurity issues to keep the company information safe and private. CyberSecurity is a complex field. […]
A small airline has just purchased a computer for its new automated reservations system. The president has asked you to program the new system. You’ll write a program to assign seats on each flight of the airline’s only plane (capacity: 6 seats). Your program should display the following menu of alternatives:Please type 1 for “first […]
WEEK SEVEN-DISCUSSION What is the role of government in securing cyberspace? ( write in 250 words ) ===================================================== MID-TERM PROJECT You are Now the CIO of a Company (Congratulations) As the CIO your job is to educate your employees about cybersecurity issues to keep the company information safe and private. CyberSecurity is a complex field. […]
The Topic is on A.I. and it’s Use in cybersecurity. How do Bad guys use it and what are the your conclusions from it. How do you get the something that is state-of-art, yet both good and bad sides have it. The topic needs to be thoroughly researched using scholarly references. Scholarly references are those […]
Project Assignment #1 – Writing a CONOP documentWe’ve gone into a few topics now, but I want to revisit the CONOP document again. Using the IEEE CONOP template, I want you to write your own CONOP for a system. You have 2 options for completing this assignment. The template below describes CONOP documents in detail. […]
Exercise 6: Book Indexing Purpose Book indexing is still a major activity in the indexing world, albeit not the only one. Old fashion publishing is still alive and well (and growing) and so far no acceptable computer program exists that will adequately index a book automatically. Note: If you are interested in freelance indexing, this […]
Question 5 is unpinned. Click to pin. Question at position 5 Index the following journal article using a free text vocabulary (no thesaurus):Digital sustainability: Ethics, epistemology, complexity and modellingLinks to an external site.. By Lino Trinchini, Rodolfo BaggioFirst Monday, Volume 28, Number 9 – 4 September 2023https://firstmonday.org/ojs/index.php/fm/article/download/12934/11330Links to an external site. doi: https://dx.doi.org/10.5210/fm.v28i9.12934Links to an […]