using eclipse to write Hangman java programming

following the prompt to create two methods to write problem2 code

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

CYBER ETHICS

 

Chapter 9 – Quiz 9

Instructions:  There are four (4) topic areas listed below that are designed to measure your knowledge level specific to learning outcome (LO 9) shown in your course syllabus.  You must respond to #4 and select any other two of these topic areas providing appropriate responses in essay form.  In most cases the topic area has several components. Each must be addressed to properly satisfy requirements.

State-wide and in most professional industries, there has been a mandate that college students be more proficient in their writing. While this is not a writing class, all writing assignments will be graded for grammar, syntax and typographical correctness to help address this mandate.

Pay attention to what you are being asked to do (see Grading Rubric below). For example, to describe does not mean to list, but to tell about or illustrate in more than two or three sentences, providing appropriate arguments for your responses using theories discussed in our textBe sure to address all parts of the topic question as most have multiple parts. A verifiable current event (less than 4 years old) relevant to at least one of the topics you respond to is a fundamental component of your quiz as well.  You cannot use information from the text book or any book/article by the author of the text book as a current event.  Make sure that your reference has a date of publication.  For each chapter quiz and final quiz you are required to find and include at least one reference and reference citation to a current event less than 4 years old (a reference with no date (n.d.) is not acceptable) in answer to at least one question.  This requires a reference citation in the text of your answer and a reference at the end of the question to which the reference applies.  You must include some information obtained from the reference in your answer.  The references must be found on the internet and you must include a URL in your reference so that the reference can be verified. 

You should type your responses directly under the appropriate question. Be sure to include your name on your quiz. Only the first three (3) questions with answers will be graded.   Include your name in the document filename. Your completed quiz must be uploaded into the appropriate eCollege Dropbox, no later than 11:59pm on the due date.  Do well.

1.  (a) Have DRM systems gone too far, as some critics claim?  Recall the 2005 Sony BMG copy protection case involving the controversial “rootkit” problem (examined in Scenario 9-2). (b) Should Sony have been allowed to use a DRM system that cannot easily be uninstalled when circumstances warrant it?  (c) Do companies like Sony need strong DRM systems to ensure the protection of their intellectual property rights?  (d) What kind of compromise position might be reached between users and content owners in the ongoing debate about DRM systems?  Please elaborate (beyond a yes or no answer) and provide your “theoretical” rationale in support of your responses. (comprehension)

2.  (a) Describe some concerns involving pornography in cyberspace. (b) Why was the Communications Decency Act (CDA), sections which were designed to protect children from concerns about pornography on the Internet, so controversial? (c) Why was it eventually struck down? (d) Why were both COPA and (portions of) CPPA struck down as being unconstitutional? (e) Should they have been declared unconstitutional? Defend your answer. Please elaborate (beyond a yes or no answer) and provide your “theoretical” rationale in support of your responses. (comprehension)

3   (a) What is sexting, and what challenges does it pose for prosecuting current child pornography laws?  Recall the examination of the sexting incident at Greensburg Salem High School, PA (in Scenario 9-3). (b) Should the teens involved in that case have been subject to felony charges under existing child pornography laws?  Explain.  Please elaborate (beyond a yes or no answer) and provide your “theoretical” rationale in support of your responses. (knowledge)

4   (a) Describe some of the issues underlying the free speech vs. censorship debate in cyberspace. (b) What is meant by “free speech”? (c) Describe the differences between what Catudal calls “censorship by suppression” and what he calls “censorship by deterrence”? (d) Is this distinction useful for understanding some of the complex issues surrounding censorship? Defend your answer and please elaborate (beyond a yes or no answer) and provide your “theoretical” rationale in support of your responses. (comprehension) LO 9

Grading Rubric for Quizzes

Grading criterion                                                                                          Unit Points           Total Points

Uploaded to correct Dropbox                                                                            2                            2

Submitted on time                                                                                            15                          15

Document Filename:

Your Last Name,first and middle initial with correct quiz number                   5                            5

(Example only: Creider_RD_q1)

Rationally expressed opinions, experiences (personal or observed),                  8

arguments and premises (where appropriate) to support responses

(did not simply restate/summarize author/textbook

Clearly presented classical ethics theories relative to topic                                8

Included ‘URL’ for appropriate verifiable current event                                 12                          28

(i.e., example of topic being discussed WITH EXPLANATION)

 NOTE: Must be less than 4 years old

Grammatically correct and appropriate tone                                10

(professional, non offensive language)

Typographically correct                                                               10                     20

Included full citations as needed                                                    3

Used correct APA format                                                               7                     10

Addressed each item within selected topic area                           20                     20

Maximum grade                                                                         100                   100

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

W2. Discussion

 

Internet-related crime occurs every minute. Cybercriminals steal millions of dollars with near impunity. For everyone that is captured nearly 10,000 or not captured. For every one successful prosecuted in a court of law, 100 get off without punishment or with a warning. Why is it so difficult to prosecute cybercriminals?

  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA 7)

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Business Intelligence

Discussion -1 Compare and contrast predictive analytics with prescriptive and descriptive analytics. Use examples.

I am looking for active engagement in the discussion.  Please engage early and often.

Your response should be 250-300 words.  

Discussion 2 (Chapter 2): 

Discuss the process that generates the power of AI and discuss the differences between machine learning and deep learning.

Your response should be 250-300 words

Chapter 1 –discussion question #1 & exercise 15 (limit to one page of analysis for question 15)

Chapter 2 – discussion question #1 & exercises 4, 5, and 15(limit to one page of analysis for question 15)

I have attached a textbook for the reference of Chapter 1 & chapter 2 and for the exercises as well. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Operating Systems Vulnerabilities (Windows and Linux)

 

The  operating system (OS) of an information system contains the software  that executes the critical functions of the information system. The OS  manages the computer’s memory, processes, and all of its software and  hardware. It allows different programs to run simultaneously and access  the computer’s memory, central processing unit, and storage. The OS  coordinates all these activities and ensures that sufficient resources  are applied. These are the fundamental processes of the information  system and if they are violated by a security breach or exploited  vulnerability it has the potential to have the biggest impact on your  organization. 

Security for operating systems consists of protecting the OS  components from attacks that could cause deletion, modification, or  destruction of the operating system. Threats to an OS could consist of a  breach of confidential information, unauthorized modification of data,  or unauthorized destruction of data. It is the job of the cybersecurity  engineer to understand the operations and vulnerabilities of the OS  (whether it is a Microsoft, Linux, or another type of OS), and to  provide mitigation, remediation, and defense against threats that would  expose those vulnerabilities or attack the OS. 

 

There are six steps that will help you create your final deliverables. The deliverables for this project are as follows:
 

  1. Security Assessment Report (SAR): This report should be a 7-8  page double-spaced Word document with citations in APA format. The page  count does not include figures, diagrams, tables, or citations.
  2. Nontechnical presentation: This is a set of 8-10 PowerPoint  slides for upper management that summarizes your thoughts regarding the  findings in your SAR.
  3. In a Word document, share your lab experience and provide screen prints to demonstrate that you performed the lab.

When  you submit your project, your work will be evaluated using the  competencies listed below. You can use the list below to self-check your  work before submission.

  • 1.1: Organize document or  presentation clearly in a manner that promotes understanding and meets  the requirements of the assignment.
  • 2.3: Evaluate the information in a logical and organized manner to determine its value and relevance to the problem.
  • 5.4: Identify potential threats to operating systems and the security features necessary to guard against them.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

You have to design game “Rock Paper Scissors” on Logisim

 You have to design game “Rock Paper Scissors” on Logisim. See the attached document for more information. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Assignment – 1

 

Read Chapter 2 – Data Analytics Lifecycle and answer the following questions.

1. In which phase would the team expect to invest most of the project time? Why? Where would the team expect to spend the least time?

2. What are the benefits of doing a pilot program before a full-scale rollout of a new analytical method- ology? Discuss this in the context of the mini case study.

3. What kinds of tools would be used in the following phases, and for which kinds of use scenarios?

a.Phase 2: Data preparation
b.Phase 4: Model building

Requirements:

– Typed in a word document.
– Each question should be answered in not less than 150 – 200 words.
– Follow APA format.
– Please include at least three (3) reputable sources.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

COP 1000c Lab Assignment 7

Who Wants to Be a Millionaire 

Your final project will be to create a quiz game similar to “Who Wants to be a Millionaire?” 

Requirements: 

• Your game will include 5 questions.

• You will ask the user multiple choice questions (in increasing difficulty if possible). 

• Each question, if answered correctly, will have a point value attached to it. The point values should be as follows: 100, 200, 500, 1000, 2000. 

• Unlike the game on T.V., the score will be an accumulation of the points earned throughout the game and the user may continue if he/she answers incorrectly. Show the user’s point total after each question. 

• At the end of the game, the user should be given the option to play again if he/she chooses. 

• Include a text file called “highscore.txt” that stores the highest scoring player’s first name and score. Update the text file if the user scores the highest score. 

• Include at least three functions in your program. 

Input Validation: The user must choose valid options from menus. 

Grading Criteria: 

1. Algorithm 

2. Text File manipulation 

     -Read from file  

     -Compare to score in file  

     -Write to file 

3. Loops/If Structures 

     -Game ends at correct place  

     -Play as many times as user wishes  

     -Game and score resets o Input Validation 

4. Score Accumulation 

5. Functions 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Computer Science ISSC499 week 2 assignment

 

Instructions

Hello Class!

Welcome to Week # 2. This week’s assignment will help you to fulfill the requirements for the second course objective (CO-2: Deconstruct the processes and goals of cyber forensics investigations including the importance of search warrants and chain of custody in a forensic investigation of computer related crimes). For this week’s assignment instructions, please see below:

Assignment Instructions:
You are tasked as the Cyber Security Analyst at your new organization to assist Law Enforcement with investigating a digital crime.

For the purpose of this assignment, you are to search the Internet for a recent Digital Crime or Cyber attack on an actual organization (and that will be your new organization). Use the Tasks outlined below (and feel free to add your own steps) and create an in-depth plan that that provides a well thought out approach (what you propose to do to carry out each task) to investigate the crime.

Cybersecurity Investigation & Forensic Methodology (Tasks):

  • Investigate the crime or the scene of the incident
  • Reconstruct the scene or incident
  • Collect the digital evidence, and make a copy of the original data
  • Analyze the evidence using inductive and deductive forensic tools
  • Establish linkages, associations and reconstructions
  • Use the evidence for the prosecution of the perpetrators

REQUIREMENTS:

  • 4 – 6 Pages in length in APA format (not including a cover page and reference section)
  • Cover Page
  • Cybersecurity Investigation & Forensic Methodology (Plan) – that lists and explanation of how you will complete each of the 6 tasks listed above.
  • Reference Section

MISCELLANEOUS:

  1. Use current and real world data to make your points, not just the textbook
  2. Your references should not be more than 5 years old
  3. Your assignment is due by Sunday not later than 11:59 p.m. Eastern time.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

ISSC499 Capstone Project Topic Selection

 

Instructions

Hello Class!

Welcome to Week # 2. For this week’s assignment, Please see below:

Assignment Instructions:

Please select your Capstone Project Topic idea paper by submitting a topic based on previous research and coursework that you have completed in Cybersecurity or on a Cybersecurity topic that peaks your interest. Your topic needs to be closely related to at least one of the course objectives (listed below for your convenience). Your Capstone Project Topic paper will be analyzed to determine if it meets the criteria for a full Capstone project. If it does, you will be permitted to begin fleshing out your final Capstone Project that will be due in Week # 8. If your project topic requires further work or needs to be changed altogether, you will be notified as such.

REQUIREMENTS:

  1. 4 – 6 Pages in length in APA format (not including a cover page and reference section)
  2. Papers need to be double spaced and in 12 point times new roman font
  3. Cover Page
  4. Introduction
  5. Review of Literature (it will need to be detailed enough to determine that you have enough background for a topic that is sufficient for a 35 page Capstone project)
  6. Reference Section (you will need at least 10 references – for the final Capstone Project Paper you will need 20)

MISCELLANEOUS:

  1. Use current and real world data to make your points, not just the textbook.
  2. Your references should not be more than 5 years old.
  3. Your Capstone Project Topic assignment is due by Sunday not later than 11:59 p.m. Eastern time.

 COURSE OBJECTIVES:

CO-1: Examine the various aspects of cybersecurity including the relationship between cyber defense, cyber operations, cyber exploitations, cyber intelligence, cybercrime, Cyberlaw within Federal and State Laws

CO-2: Deconstruct the processes and goals of cyber forensics investigations including the importance of search warrants and chain of custody in a forensic investigation of computer related crimes

CO-3: Prepare a plan to manage functions that encompass overseeing a program or technical aspect of a security program at a high level ensuring currency with changing risk and threat environments.

CO-4: Prepare a plan to design functions that encompass scoping a program or developing procedures, processes, and architectures that guide work execution at the program and/or system level.

CO-5: Develop strategies and plans for security architecture consisting of tools, techniques, and technologies to detect and prevent network penetration, and to design effective cybersecurity countermeasures.

CO-6: Develop a policy to analyze network designs, topologies, architectures, protocols, communications, administration, operations, and resource management for wired, wireless, and satellite networks that affect the security of the cyberspace.

CO-7: Develop a policy to implement functions that encompass putting programs, processes, or policies into action within an organization.

CO-8: Prepare a plan to evaluate functions that encompass assessing the effectiveness of a program, policy, process, or security service in achieving its objectives.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now