Biometric Techniques

 Some common biometric techniques include:

  1. Fingerprint recognition
  2. Signature dynamics
  3. Iris scanning
  4. Retina scanning
  5. Voice prints
  6. Face recognition

Select one of these biometric techniques and explain the benefits and the  vulnerabilities associated with that method in 3-4 paragraphs. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Malware Questionnaire

 

  • 10.1 What are three broad mechanisms that malware can use to propagate?
  • 10.2 What are four broad categories of payloads that malware may carry?
  • 10.3 What are typical phases of operation of a virus or worm?
  • 10.4 What mechanisms can a virus use to conceal itself?
  • 10.5 What is the difference between machine-executable and macro viruses?
  • 10.6 What means can a worm use to access remote systems to propagate?
  • 10.7 What is a “drive-by-download” and how does it differ from a worm?
  • 10.8 What is a “logic bomb”?
  • 10.9 Differentiate among the following: a backdoor, a bot, a keylogger, spyware, and a rootkit? Can they all be present in the same malware?
  • 10.10 List some of the different levels in a system that a rootkit may use.
  • 10.11 Describe some malware countermeasure elements.
  • 10.12 List three places malware mitigation mechanisms may be located.
  • 10.13 Briefly describe the four generations of antivirus software.
  • 10.14 How does behavior-blocking software work?
  • 10.15 What is a distributed denial-of-service system?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

PivotTable

  

 Create a Dashboard to provide insight about your data.

Use the Nielsen data provided from the link below:

NIELSEN TOPLINE RATINGS FOR SUBSCRIBING RADIO STATIONS

https://tlr.nielsen.com/tlr/public/market.do?method=loadAllMarket

Select radio market data from 1- 3 Florida markets (cities). Example: Walton Beach – Destin, FL

Export the data into an Excel spreadsheet, labeling the content by market/city.

Part A: Add a PivotTable to display summary data.

  1. Create value fields
  2. Create row dimensions
  3. Add a basic filter for Model
  4. Insert a Slider for Months
  5. Insert a Timeline for      Date

Use “Format as  Table” to format the PivotTable using colors of your choice. (Several PivotTable styles are available to choose from).

Note: In a Pivot Table report, the dimensions are the descriptive attributes used for labeling, grouping, and aggregating the data – for example, Type and Date. The measures are the numeric data points that can be used in mathematical operations; for example, sales, quantity, etc.

Part B: For this part, you are required to perform only one of the following activities:

.

  1. Add a Bar Graph to       show the top category of products, providing additional insight about       your data. You choose the appropriate dimension(s) and measure(s), and       you choose the layout and design.
    Ensure       that your PivotChart is relevant and is able to answer questions about       your data.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

c program, bitpacker and its reverse app

Suppose a text file contains ASCII characters ‘0’ and ‘1’ representing bits in human readable form. For example, test.txt may contain 111111110000000 which means its size is 16 bytes. A simple method for compressing the file by a factor of 8 is to represent a block of 8 ‘0’ or ‘1’ ASCII characters as a single byte. Thus test.txt which is 16 bytes long can be compressed into a file that is 2 bytes long where the first byte contains all 1’s and the second byte all 0’s. The resultant compressed file is a binary file since the first byte is not an ASCII character.

Code an app, bitpacker, that reads from stdin the input filename which follows the same specification as Problem 3. However, instead of using getchar(), use the library function fgets() whose the second argument allows specifying how many bytes, at most, should be read which helps prevent array overrun. Process the data in the input file 8 characters at a time by reading them into a 1-D array, char rawdat[8]. Compact the eight ‘0’ and ‘1’ characters in rawdat[] into a single byte using the bit processing techniques discussed in class. Write the resultant byte into an output file with suffix “.P”. For the above example, test.txt.P. We will allow the size of the input file not to be a multiple of 8. Since we are compacting 8 ASCII characters ‘0’ and ‘1’ into a single byte, we will use padding to handle files whose size is not a multiple of 8. For example, if text file test1.dat contains characters 1111111100000000111 (file size is 19 bytes), we will pad the last three characters 111 with 00000 so that the byte containing bit values 11100000 is written to test1.dat.P. To note that we padded the original data with five 0 bit values, we will change the suffix of the output file to test1.dat.P5. For test.txt where no padding was needed, the output filename will be test.txt.P0. Thus the last character of the filename specifies how much padding (0-7) was added.

Code bitpacker as a single main() function in main.c . Test and verify that it works correctlyCode an app, bitunpacker, that performs the reverse operation of bitpacker. bitunpacker reads the input filename from stdin using fgets() and checks that the suffix ends with .P[0-7] where [0-7] means that the last character must one of the digits 0, 1, …, 7. Strip the suffix in the name of the output file. Implement the app as a single main() function in main.c . Test and verify that it works correctly. 

all two programs must run within its functions using mac ios terminal and Linux system. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

c program, encrypts a binary file and then save it.

Write a program, myfilehide2, that encrypts a file — ASCII or binary — and saves the encrypted file. myfilehide2 reads from stdin a string that specifies the file to be encrypted followed by an integer. For example,

% myfilehide2
a.out 7

myfilehide2 saves the encrypted content in a new file whose name has “.E2” added as a suffix. After doing so, the app deletes the original file by calling remove(). In the above example, a.out.E2. We restrict input file names to be less than 15 characters and output file names to be less than 18 characters to account for the 3 character suffix. Spaces are not allowed in a file name. The filename and number must be separated by one or more space (‘ ‘) or tab (‘\t’) characters. The number must be a single digit — either 0, 1, …, 7 — and end with ‘\n’ which is generated on stdin when the ENTER/RETURN key is pressed on our lab machines. All other input of different format are disallowed and should result in a suitable error message on stdout followed by app termination by calling exit(1).

use the library function getchar() to read the input byte-by-byte. When a space character or tab character is encountered, assume the filename has ended and store it as a string in a 1-D char array of size 16. Of course, that is assuming that the filename has not exceeded 15 characters. Instead of the constants 15 and 16, use the C preprocessor directive #define to specify your own macro to reduce the potential for run-time bugs. Read the single digit (0, 1, …, 7) into variable, char numpos, and convert numpos into a decimal number, unsigned int decpos, when interpreted as a decimal number. For example, the ASCII character ‘3’ stored in numpos is convered to the decimal number 3, not the decimal encoding of the ASCII character ‘3’ which is 51.

Do not use any string processing library function to perform the input parsing task. The parsing chore can be implemented with a few lines of code. Delegate the input parsing task to

void inputcheck(void);

which stores a valid filename input a global 1-D char array. Make the variable numpos also global. 

After inputcheck() returns (it may not return if the input is ill-formatted), main() opens the input file to read and creates an output file with suffix “.E2” to write the encrypted bytes. If either of the two operations is unsuccessful, main() prints a suitable error message to stdout and terminates by calling exit(1). Otherwise, like in Problem 2, lab3, myfilehide2 reads the content of the input file byte by byte using fgetc(). Unlike myfilehide, myfilehide2 flips the bit value at the bit position specified by decpos and writes the resultant byte into the output file. For example, if an input byte has bits 00001111 and decpos equals 2, the encrypted byte is 00001011. Note that the rightmost bit at position 0 is considered the least significant bit. As with myfilehide, myfilehide2 has the property that running the app again on the encrypted file with the same digit as second arguments decrypts the file. Perform a similar cleanup as myfilehide so that the encrypted file with suffix “.E2” is deleted. Use Makefile to compile your app. Test and verify that it works correctly on mac terminal.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

MGT311: Engineering Management

Analysis of Supervisor/Management Job Descriptions The purpose of this exercise is to have you view some actual job descriptions for supervisory/management positions as listed by real organizations. Instructions:
1. Think about a supervisory/management position that interests you. The position must be a first-line supervisor/manager position of your choice. In addition, you may include the type of industry in your search, such as banking supervisor, nursing supervisor, recreation manager, hotel maintenance supervisor, etc.
2. Visit Monster.com (Links to an external site.) at http://www.monster.com (Links to an external site.).

3. Type the name of the supervisory/management position in the “Search Jobs” box. You may leave blank the “U.S. Locations” box, which will result in a nationwide search. Clicking “Search” will likely result in numerous listings, depending on how general or specific your “Search Job” supervisory/management listing was
4. Scroll the listings, viewing job titles and the names of the organizations for which there are position vacancies. Find a position/organization that looks of interest, and click the job title. You will then find the company’s job description for the position.
5. Select and write job descriptions for three different organizations, noting the differences in responsibilities, duties, and requirements. 
6. Write a report, one-half to one page in length commenting on the differences noted. Include printouts of the three job listings.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

BI wk 3

Understanding that you cannot simply overwrite previously deployed smart contracts, contrast approaches to deploying traditional applications and blockchain apps. Does blockchain make deployments easier or harder? Are there any potential risks when deploying blockchain apps that either don’t exist in traditional environments or aren’t as prominent? What should a development organization do differently to mitigate these risks?

  • Contrast approaches to deploying traditional applications and blockchain apps.
  • Explain whether blockchain make deployments easier or harder.
  • Identify any potential risks when deploying blockchain apps that either don’t exist in traditional environments or aren’t as prominent.
  • Describe what a development organization should do differently to mitigate these risks.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

wk 11

How do unified communication tools influence knowledge sharing in an organization? Are they better suited for Intranet, Internet, or extranet consumption?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Discussion9- ECOM-500: Business and IT

 

Identify a case of corporate fraud by finding a current event or by researching historical cases. After finding a case, complete the following in your initial discussion post:

  • Briefly summarize the case, including what happened, who was involved, and what damages were incurred.
  • Note how the fraud was detected and discuss any red flags that appeared prior to detection.
  • Could an accounting and finance system have helped deter this fraud? If yes, how? If no, why not?
  • Are there any specific business policies and procedures that could have been in place that would have prevented the fraud from occurring? Explain.
  • Embed course material concepts, principles, and theories, which require supporting citations along with at least two scholarly peer reviewed references supporting your answer. Keep in mind that these scholarly references can be found in the Saudi Digital Library by conducting an advanced search specific to scholarly references.
  • Reply to at least two of your peers’ initial posts. These replies need to be substantial and constructive in nature. They should add to the content of the post and evaluate/analyze that post’s answers. Normal course dialogue doesn’t fulfill these two peer replies but is expected throughout the course. Keep in mind that within your initial post, answering all course questions is required.
  • Use Saudi Electronic University academic writing standards and APA style guidelines.

Be sure to support your statements with logic and argument, citing all sources referenced. Post your initial response early, and check back often to continue the discussion. Be sure to respond to your peers’ posts as well.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Critical Thinking -ECOM-500: Business and IT

Data Visualization and GIS Solutions (130 points) 

Research digital dashboards Data Mashups that are available to businesses. In a paper, summarize the range of solutions available with examples of how they might be utilized. Then conduct some research and identify an organization that has adopted one of these software solutions. Briefly describe the organization, and then answer the following questions: 

· What technology (or technologies) is the organization using? 

· Which business units utilize the data presented by the technology? 

· What does the technology provide to the organization? What benefits does it offer and/or what problems does it solve? 

· Explain the present and future impacts of such a technology from a business perspective. 

· Identify areas in which the organization might expand or improve upon using the technology. Explain what they could do and why they should do it. 

  • This assignment is an individual assignment. 
  • All students are encouraged to use their own words.  
  • Student must apply Saudi Electronic University academic writing standards and APA style guidelines.  
  • Support your submission with course material concepts, principles, and theories from the textbook along with at least two scholarly, peer-reviewed journal articles. 
  • A mark of zero will be given for any submission that includes copying from other resource without referencing it.  
  • Write at least 4-5 pages in length, excluding the title page, abstract and required reference page, which are never a part of the minimum content requirements. 
  • It must submit your assignment into the safe assignment Originality Check 
  • Review the grading rubric to see how you will be graded for this assignment.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now