Journal Article: Moral philosophy

Journal Article: Moral philosophy

Your submission must include the following information in the following format: 

DEFINITION: a brief definition of the key term followed by the APA reference for the term; this does not count in the word requirement. 

SUMMARY: Summarize the article in your own words- this should be in the 150-word range. Be sure to note the article’s author, note their credentials and why we should put any weight behind his/her opinions, research or findings regarding the key term. 

DISCUSSION: Using 300-words, write a brief discussion, in your own words of how the article relates to the selected chapter Key Term. A discussion is not rehashing what was already stated in the article, but the opportunity for you to add value by sharing your experiences, thoughts and opinions. This is the most important part of the assignment. 

REFERENCES: All references must be listed at the bottom of the submission–in APA format. Be sure to use the headers in your submission to ensure that all aspects of the assignment are completed as required. Any form of plagiarism, including cutting and pasting, will result in zero points for the entire assignment.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

c program, array read

 

Given two binary vectors X = (x1, x2, …, xN) and Y = (y1, y2, …, yN), each a 1-D array of N binary numbers, the number of positions where corresponding bit values of the two vectors are different is called the Hamming distance of the two vectors. For example, if X = (1,1,0,0) and Y = (1,0,0,1) then their Hamming distance is 2 since X and Y differ in their second and fourth positions counting from left to right. The Hamming distance is a useful tool in various subfields of computer science including communication networks where it captures how much two binary vectors differ. In the above example, X = (1,1,0,0) may comprise four bits transmitted by a sender whereas Y = (1,0,0,1) are the actual bits received by a receiver. The Hamming distance, d(X,Y) = 2, indicates that two bits of X flipped — i.e., changed their value from 0 to 1, or 1 to 0 — while traveling from sender to receiver. This is common when sending bits wirelessly using a smartphone or laptop over cellular and WiFi interfaces.

Write an app, calchamming, that takes as input two vectors whose components are binary from stdin, calculates their Hamming distance, and outputs the value to stdout. The format of the input should be

N
x1 x2 … xN
y1 y2 … yN

where N is an integer specifying the size of the 1-D arrays (i.e., dimension of 1-D vector), x1 x2 … xN are the N bit values of the first vector, and y1 y2 … yN are the bit values of the second vector. The individual bit values x1 x2 … xN are separated by a single space. The same holds for y1 y2 … yN. Assume that N cannot be greater than 15. Declare N, X[15], Y[15] to be local variables of main() of type int.

Perform reading of the input from a function

int readinput(int *, int *, int *);

where the first argument is a pointer to N, the second and third arguments point to the two 1-D arrays X and Y. readinput() returns 0 if successful, -1 if there is an error. For example, if N exceeds 15 then readinput() returns -1. Consider other cases that readinput() should consider as invalid input and return -1 to its caller main(). main() checks the return value of readinput() and terminates the app by calling exit(1) if it is -1. Perform calculation of the dot product by calling function

int calchamm(int, int *, int *);

where the first argument is the value of N, and the second and third arguments are pointers to the two arrays. calchamm() computes the Hamming distance of the binary vectors and returns the value to the caller main(). Since readinput() is tasked with checking that the input is valid, calchamm() can focus on performing the Hamming distance calculation. Print the Hamming distance to stdout by calling

void writeoutput(int);

where the int argument is the distance value.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

deleted

 

Suppose a text file contains ASCII characters ‘0’ and ‘1’ representing bits in human readable form. For example, test.txt may contain 111111110000000 which means its size is 16 bytes. A simple method for compressing the file by a factor of 8 is to represent a block of 8 ‘0’ or ‘1’ ASCII characters as a single byte. Thus test.txt which is 16 bytes long can be compressed into a file that is 2 bytes long where the first byte contains all 1’s and the second byte all 0’s. The resultant compressed file is a binary file since the first byte is not an ASCII character.

Code an app, bitpacker, that reads from stdin the input filename which follows the same specification as Problem 3. However, instead of using getchar(), use the library function fgets() whose the second argument allows specifying how many bytes, at most, should be read which helps prevent array overrun. Process the data in the input file 8 characters at a time by reading them into a 1-D array, char rawdat[8]. Compact the eight ‘0’ and ‘1’ characters in rawdat[] into a single byte using the bit processing techniques discussed in class. Write the resultant byte into an output file with suffix “.P”. For the above example, test.txt.P. We will allow the size of the input file not to be a multiple of 8. Since we are compacting 8 ASCII characters ‘0’ and ‘1’ into a single byte, we will use padding to handle files whose size is not a multiple of 8. For example, if text file test1.dat contains characters 1111111100000000111 (file size is 19 bytes), we will pad the last three characters 111 with 00000 so that the byte containing bit values 11100000 is written to test1.dat.P. To note that we padded the original data with five 0 bit values, we will change the suffix of the output file to test1.dat.P5. For test.txt where no padding was needed, the output filename will be test.txt.P0. Thus the last character of the filename specifies how much padding (0-7) was added.

Code bitpacker as a single main() function.  Test and verify that it works correctly.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Wk 2 – Apply: Social Engineering Presentation

Assignment Content

  1. Imagine you have been hired to conduct a social engineering penetration test by a flooring sales and installation company with showrooms, warehouses, and offices throughout the state. Recently, several employees, including the company’s president, fell prey to a phishing scam. The company’s leadership realized they needed to better understand social engineering to better protect the company, the employees, and their customers. The first step is to present a general overview of social engineering and how social engineering threats function in preparation for the social engineering penetration test to the leadership team.

    Create a 10- to 12-slide media-rich presentation with speaker notes providing your client with details on how the social engineering penetration test will be conducted. Include the following information:

    Explain the concept of social engineering and how it can threaten the security of an organization.

    Describe human-, computer-, and mobile-based methods of social engineering.

    Explain differences between social engineering threats from inside and outside an organization.

    Identify tools and techniques used in a social engineering campaign.

    Explain how credentials are captured.

    Describe the target audience and what characteristics will be exploited in your social engineering penetration test.

    Format your references according to APA guidelines.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Week 3 Assignment

 

Instructions 

Please watch this video: https://youtu.be/ctij93rBmsM which is an hour long video on anti-forensics.

Instructions

Now that you have watched the video – please complete this assignment. 

1. What did you learn?
2. Did you learn anything that surprised you such as “I didn’t know I could use this technique to try to hide data?!”
3. Please list at least four different ways that an bad actor may try to obfuscate their tracks.
4. Once you have identified four different ways that a bad actor may try to evade scrutiny, please identify how you might be able to uncover those techniques.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Week 11 Assignment

 

  1. Discuss the general history of automation and robots
  2. Discuss the applications of robots in various industries
  3. Differentiate between industrial and consumer applications of robots

 When submitting work, be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) to support the work this week.
All work must be original (not copied from any source). 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

GNS3 and encryption

 

In this lab we will look at data which is unencrypted and data that is encrypted. We will use a tool called GNS3 to simulate two routers that are connected via a point-to-point link. We will run data through this link while looking at the packets going through it. The tool we will use to view the data is Wireshark which is probably the most important tool we as network engineers have in our toolbelt. Let’s answer the following questions as we go through the lab.

Ÿ 1. What is the cleartext data that is being sent in the ping between the two PCs? _____________________

Ÿ 2. What is the protocol used for the ping utility? ____________________

Ÿ 3. How many ping messages do you see? _____________________ Why? ________________________________________________________________________

Ÿ 4. Is this data encrypted or unencrypted? _____________________________

Ÿ 5. Now let’s make a change in the router. What types of messages do you see now? Does it look the same as the messages we saw before we made the change to the router? ________________________

Ÿ 6. What protocol do you see now? ____________________

Ÿ 7. Are you still able to see the source and destination MAC address? __________What layer is this you are looking at the MAC address in? _____________

Ÿ 8. Are you still able to see the source and destination IP address? __________What layer is this you are looking at the IP address in? _____________ 

Ÿ 9. Can you see the cleartext data you saw before? ____________________________

Ÿ 10. Explain the ESP protocol. Does what we see in Wireshark make sense? Write a paragraph answering these two questions.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Benchmark – Risk Assessment

Please use the atachment for your response 

Provide a detailed report using the “Security Assessment Report  (SAR),” located within the required readings, and “Security Assessment  Report Template.” Within the report make sure to:

  1. Evaluate  vulnerabilities, threats, and gaps in an organization’s infrastructure  to identify appropriate security measures to reduce risks’ impact to  business processes.
  2. Evaluate the implications as it applies to small and medium-sized business (SMB) data protection for intellectual property.
  3. Present appropriate business strategies to ensure business sustainability, availability, and reliability.
  4. Interpret assessments and current cybersecurity trends to plan for future challenges.

APA style is not required, but solid academic writing is expected.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Compare Theorems

 

By various theorem’s of prime numbers.  Write a 1 to 2 page paper on the similarities and differences of Fermat’s Theorem to Euler’s Theorem.Need 500 words in the paper.

Be sure to cite your sources and use APA formatting

Attaching the textbook and Week class slides also.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Discuss why Goldman Sachs was a disciple of Albert Carr’s theory of “business is a poker game and we are all bluffing.”

Need a discussion paper on the question posted above with 250 words and references used.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now