1.Write an algorithm for resolving a battle among the classic Pokemon types.
The user should select a type of either fire, water or grass. The computer should randomly select one of those three types as well.
To determine if the user or computer wins, or if it is a draw: fire is stronger than grass, grass is stronger than water, and water is stronger than fire. Whomever chose the stronger type is the winner. If both chose the same type it is a draw.
See for an example of what an algorithm should look like. Your algorithm should be at a similar level of detail.
See ( ) for an example of the interactions and determining a winner (the example has pictures, your algorithm needs only to consider text based inpu
Discussion:
In your own words, explain what the following terms mean to you as they apply to information security and safe computing: Confidentiality, Integrity, and Availability. Why are these factors so important to businesses?
Assignment:
- 2.1 What are the essential ingredients of a symmetric cipher?
- 2.2 What are the two basic functions used in encryption algorithms?
- 2.3 How many keys are required for two people to communicate via a symmetric cipher?
- 2.4 What is the difference between a block cipher and a stream cipher?
- 2.5 What are the two general approaches to attacking a cipher?
- 2.6 Why do some block cipher modes of operation only use encryption while others use both encryption and decryption?
- 2.7 What is triple encryption?
- 2.8 Why is the middle portion of 3DES a decryption rather than an encryption?
In today's world, both government and the private sector are struggling to provide a secure, efficient, timely, and separate means of delivering essential services internationally. As a result, these critical national infrastructure systems remain at risk from potential attacks via the Internet.
It is the policy of the United States to prevent or minimize disruptions to the critical national information infrastructure in order to protect the public, the economy, government services, and the national security of the United States.The Federal Government is continually increasing capabilities to address cyber risk associated with critical networks and information systems.
Please explain how you would reduce potential vulnerabilities, protect against intrusion attempts, and better anticipate future threats.
Background: As noted by Kirk (2016), working with data is one of the four stages of the visualization workflow. According to Kirk (2016), A dataset is a collection of data values upon which a visualization is based. In this course, we will be using datasets that have already been collected for us. Data can be collected by various collection techniques.
Reference: Kirk, Andy. Data Visualisation: A Handbook for Data Driven Design (p. 50). SAGE Publications.
Assignment: Summarize 3 data collection techniques (Interviews, Surveys, Observations, Focus Groups, etc.). Compare and contrast the 3 data collection techniques you selected. Lastly, what collection techniques do you prefer and why?
Your research paper should be at least 3 pages (800 words), double-spaced, have at least 4 APA references, and typed in an easy-to-read font in MS Word (other word processors are fine to use but save it in MS Word format). Your cover page should contain the fol
Need 2 answers
In this week's discussion, prepare a synopsis of the material discussed in the chapter readings. PFA for assignment
Problem set 3 (Please add citation to the assignment also )
Please, address each of the questions below, in 100-150 words (per question). Include any relevant examples and links to your sources.
1. 1. Why are ratios useful? What three groups use ratio analysis and for what reasons?
2. 2. What are some qualitative factors analysts should consider when evaluating a companys likely future financial performance?
3. 3. What are some potential problems and limitations of financial ratio analysis?
Length: 3,500 words
Weighting: 35%
Assignment topic
The purpose of this assignment is to evaluate your ability to develop a comprehensive implementation proposal for an information system that uses a systems approach. The proposal should be targeted at a potential sponsor organisation that will need to be convinced of the appropriateness and effectiveness of the proposed new system.
Choose an information system (e.g., ERP systems, CRM systems, SCM Systems, Management Information Systems, Decision Support Systems, Executive Information Systems, Enterprise Portals, Data Warehouse & Data Mining Applications, Enterprise Collaboration Systems, Knowledge Management Systems), and so on, that you have studied in this unit. Alternatively, you may wish to combine features of several systems. Please note for the purpose of this assignment, mobile apps or other e-business and digital enterprise applications should
How are authentication and authorization alike and how are they different? What is the relationship, if any, between the two?
Your paper should be 2 pages in length. You need to provide a minimum of two references and need to use APA format in the reference section.
Search the Internet for IT governance planning. Select a specific governance plan that exists at a company or a plan framework from an organization. Write a 2-page paper on three or four of the most important suggestions from the plan you select.
Must be in a APA format and References
Compare between different formal Cloud definition? Based on stale and standards? (include the NIST definitions)
Hint: SP 800-145 September 2011 The NIST Definition of Cloud Computing
write briefly on Cloud Computing Recommendations suggested by NIST .
Hint: SP 800-146 May 2012 Cloud Computing Synopsis and Recommendations
What are the Key Security and Privacy Issues?
Hints: SP 800-144 December 2011 Guidelines on Security and Privacy in Public Cloud Computing
1) Go through week3 - Homework document to find questions.
2) For Case Study Sample assignment is attached, please see the format.
3) Textbook is also attached here
Text Book :
James D. McKeen, Heather A. Smith, IT Strategy: Issues and Practices, Third Edition. Pearson, 2015, ISBN-13
978-0-13-354424-4.
No Plagiarism.