read the attachment and answer the question.

Read the attached Ethics-V.pdfPreview the document which continues the discussion on the professional codes of software engineering ethics.

Then proceed to answer the questions inside the reading:

  • Questions 8.1 and 8.2
  • Case Study: Questions C1-C4

Because for many ethics questions there is no absolutely right or wrong answers as such, your responses will be graded based on completeness and thoughtfulness as opposed to rote or perfunctory ones. There are three grade levels for this assignment based on your responses to all the questions: 20 (no reasoning in responses), 35 (minimal to little reasoning), and 50 (sufficient reasoning and consideration).

Write your answers in a Word file using Times New Roman font (no smaller than 10 pt but no bigger than 12 pt), single spacing, 1″ margins on all sides.

Save your file as Ethics_5_FL where FL is your first and last name initial and Submit.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Combine a variety of coding in one Arduino code

I have a project to make a smart home system. I made a wide range of functions, such as doorbell, remote, fan control etc. All functions were tested and feasible. However, I don’t know how to combine a variety of coding in one Arduino code?

Thank you very much.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Policy Making

Chapter 7 presents a comparative analysis of various tools useful in policy making. Select two tools described in chapter 7 from different categories and describe how these tools could be used to develop policy for optimizing bus and local train schedules to minimize energy use and passenger wait times in a Smart City environment.

To complete this assignment, you must do the following:

As indicated above, select two tools described in chapter 7 from different categories, and describe how these tools could be used to develop policy for optimizing bus and local train schedules to minimize energy use and passenger wait times in a Smart City environment.  

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

R studio Assignment

 Objective: Utilize Naïve Bayes to predict the flight delay. Given the FlightDelay.csv file, use Naïve Bayesian Analysis model to determine whether the various flights experience delay or arrive at their destination on time. We start by clicking the “install” on your R plot window (as shown below) to type and install the following packages: naivebayes, dplyr, ggplot2, and psych; one at a time. After the installation of all the packages, load them into the memory through these commands: > library (naivebayes) > library (dplyr) > install.packages(ggplot2) > library (psych) Next, we load the .csv file and check the statistical properties of the csv file as follow: > setwd(“C:/RData”) # your working directory > tumor <- read.csv(“FlightDelay.csv”) # loading the file > str(FlightDelay) # check the properties of the file . . . continue from here! Important Note: • You need to split your data into test-data (tdata) and validated-data (vdata). • Use tdata to build Naïve Bayes’ model and use vdata to predict your model. • The dependent variable (y) of the model is delay. • The independent variables are dest, origin, carrier, deptime, weather, & dayweek. • Show your conclusion. Mandatory video on Naïve Bayer classification using R programming: https://www.youtube.com/watch?v=RLjSQdcg8AM 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Corporate Infrastructure Part VI: Wireless Network

Please see attachments:

Create a Wireless Security Policy document. Refer to the Wireless Communication Policy example located within the required readings as a template. Make sure to address the following:

  1. Describe if the wireless network will be on a different subnet to protect your wired network.
  2. What type of encryption will be utilized, including the attributes of the encryption methodology? What kind of logon security will be employed to keep unauthorized users out of your network?

Then, in 250 words, summarize your findings and provide a recommendation to your company CIO.

Refer to “ITT-116 Corporate Infrastructure Part VI: Wireless Network Scoring Guide,” prior to beginning the assignment to become familiar with the expectations for successful completion.

The company I have chosen to do my projects for is: Canyon Aeronautics

Link to my company’s website: https://lc.gcumedia.com/itt115/company-website-profiles/v2.1/canyon-aeronautics/#/

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Cryptography (Please See Attached Rubric)

 

Review the following questions from Network security: Private communication in a public world and provide your responses in a Word document. In answering each prompt, be sure to defend your answers and explain how you have arrived at your solution.

  1. Random J. Protocol-Designer has been told to design a scheme to prevent messages from being modified by an intruder. Random J. decides to append to each message a hash of that message. Why does this not solve the problem?

Hint: We know of a protocol that uses this technique in an attempt to gain security.

  1. Suppose Alice, Bob, and Carol want to use secret key technology to authenticate each other. If they all used the same secret key, K, then Bob could impersonate Carol to Alice (actually any of the three could impersonate the other to the third). Suppose instead that each had their own secret key; so Alice uses KA, Bob uses KB, and Carol uses KC. This means that each one, to prove his or her identity, responds to a challenge with a function of his or her secret key. Is this more secure than having them all use the same secret key?

Hint: What does Alice need to know in order to verify Carol’s answer to Alice’s challenge?

  1. Assume a cryptographic algorithm in which the performance for the good guys (the ones that know the key) grows linearly with the length of the key and for which the only way to break it is a brute-force attack of trying all possible keys. Then, suppose the performance for the good guys is adequate (e.g., it can encrypt and decrypt as fast as the bits can be transmitted over the wire) at a certain size key. Finally, suppose advances in computer technology make computers twice as fast. Given that both parties— the good guys and the bad guys— get faster computers, does this advancement in computer speeds work to the advantage of the good guys? The bad guys? Or does it not make any difference?

Kaufman, C., Perlman, R., & Speciner, M. (2011). Network security: Private communication in a public world. Upper Saddle River, NJ: Prentice Hall PTR. (note: this textbook is a reference for the assignment and not a required resource for learners)

In each of your responses to the above scenarios, please ensure that you provide a brief explanation of why you chose to take your mentioned actions.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Quiz in 1 Hour Please Help – Physical Security – Close at 11PM 24 Sep

  

Minimum security is designed to _______________ unauthorized external activity:

A.

Detect and impede some

B.

Detect and impede all

C.

Impede some

D.

Impede all

Functions of a chain-link fence include (mark all that apply):

A.

Supports surveillance and other security functions

B.

Assists in screening entry into the facility

C.

Deters casual intruders

D.

Protects against explosives

—————————————————————

Surreptitious attacks on locking devices include:

A.

Circumvention of internal barriers of the lock

B.

Illicit keys

C.

Shimming

D.

All of the above

—————————————————————

When formulating the approach to presenting the security design/upgrade plan, the format

should be based on:

A.

Proposals from other security designers

B.

Personal experience

C.

Personal knowledge of the approving authority

D.

Time before the meeting

—————————————————————

Minimum security is designed to _______________ unauthorized external activity:

A.

Detect and impede some

B.

Detect and impede all

C.

Impede some

D.

Impede all

—————————————————————

The ID Method providing the greatest amount of security is:

A.

Card/Badge Exchange System

B.

Personal-Recognition System

C.

Single-Card/Badge System

D.

Multiple-Card/Badge System

—————————————————————

Research to justify a proposal of a security design/upgrade is based on:

A.

The company’s past experience

B.

Area crime rates

C.

The company’s budget 

D.

LLEA perception

—————————————————————

The maximum useful number of combinations for most standard four-pin tumblers is about:

A.

64,000

B.

1,025

C.

8,196

D.

145

—————————————————————

When protecting an objective, it should first be surrounded by:

A.

An isolation zone

B.

A penetration-resistant fence

C.

A high-security barrier

D.

An alarmed door

—————————————————————

When determining who will be admitted to the facility and who will be allowed unrestricted access within it, vital areas requiring access controls include (mark all that apply):

A.

The facility itself

B.

Outside area leading to the facility

C.

Vault or strong room

D.

Alarm stations

—————————————————————

Types of interlocking dead bolts include (mark all that apply):

A.

Long-throw deadbolt

B.

Vertical-throw dead bolt

C.

Deadlock

D.

Rotating dead bolt

—————————————————————

Visitor categories include (mark all that apply):

A.

Those with business reasons for visiting the facility

B.

Individuals or groups sponsored by the government

C.

Those with personal or educational purposes

D.

Upper management who are not at the facility all the time

—————————————————————

Using a typical combination of 10-35-75 indicates that the lock:

A.

Contains three tumblers

B.

Uses three keys

C.

Contains three bolts

D.

All of the above

—————————————————————

Types of biometric devices include (mark all that apply):

A.

Iris scanner

B.

ID card scanner

C.

Hand scanner

D.

Spectrogram

—————————————————————

To maintain reasonable key security (mark all that apply):

A.

Maintain strict control over master keys and control keys.

B.

Ensure that the key cannot be linked to the lock it operates.

C.

Ensure that someone else always has an extra key.

D.

Ensure that no extra duplicates are made.

—————————————————————

The dial of a typical three-wheel combination lock is first turned four times in one direction to allow the flies to engage their respective wheels.

True

False

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

assignment 2

 Read the ModMeters Case Study . Answer the Discussion Question at the end of the Case Study. Your responses must be complete, detailed and in APA format. See the sample assignment for expected format and length. The grading rubric is included below. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

python programming (computer science related )

do the exercise in atom and write all the instruction and all the logic and algorithm. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Case Study: Trash and Waste Pickup Services, Inc.

  

Discussion Questions:

Read the case study in the attached document and answer below questions.

1. What are the positive and negative aspects of Andersen’s use of the GPS‐based system to monitor his drivers and salespeople? 

2. What advice do you have for Andersen about the use of the system for supervising, evaluating, and compensating his drivers and salespeople? 

3. As more and more companies turn to IS to help them monitor their employees, what do you anticipate the impact will be on employee privacy? Can anything be done to ensure employee privacy? 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now