Category: Graduate

Homework

I have weekly discussions,  every other week a quiz sends weekly labs.
Ice hired a local tutor but we’ve hit a snag he’s not understanding
My homework and my deadline is Tuesday by midnight.  I’m in Ca.
I’m going to need help for the next 5 weeks because I’m moving from CA
Back to Fl and have way too much on my plate for this stressful class.
I need top hired someone who will help me weekly do my
Homework on time and I’m willing to pay $100
A week for the next 5 weeks. I can fyi the pairs

Cell cycle regulation in the cell

PowerPoint presentation on the following topic

—Cell cycle regulation in the cell

The lesson presentation should include a title and reference slide and have between 10-15 content slides. At least four references should be cited (only one can be the textbook).

Finance

Groups should answer the questions provided by the instructor in the case in a PowerPoint presentation of 10-15 slides.  Summarize the case first and then proceed with the answers to the questions at the end of the case. The questions should be answered directly and comprehensively. Names should be displayed on the first slide. Finally wrap up your presentation with some concluding comments of the point of the case and what you learned (takeaways). Be sure to show the tables with your calculations for asset allocation. Be sure to discuss the answers to the questions in detail. You will not be presenting, the PowerPoint is just to turn in to me (emailed on CANVAS). Please use slide numbers on each slide.

Understanding Cyber Conflict: 14 Analogies – Discussion Forum #3

In this discussion, we will look at Steven Miller’s commentary on whether our response to nuclear technology has any key lessons-learned to our current response to the overall cyber threat.

Mr. Miller asks the key question, “What elements of the response to nuclear technology, if any, have relevance for the cyber era?”

With that said, I would like you to tell me where you may disagree with some of the assertions Mr. Miller makes in his commentary. In no more than 400 words, please tell me where you feel some of Mr. Miller’s assertions are flawed. You may share some of the areas you agree with Mr. Miller, but I would like you to critically analyze his overall assertions.

Book to use for assignment:

Understanding Cyber Conflict: 14 Analogies (Chapter 4, 10, & 14

https://carnegieendowment.org/files/GUP_Perkovich_Levite_UnderstandingCyberConflict_FullText.pdf

Assignment #2 – Lone Wolves in Cyberspace

In your essay, please explore the following three 3 key questions:

1. How real is the threat of cyber terrorism?

2. Is the threat greater from a nation-state, state-sponsored, or lone-wolf actor in cyberspace?

3. What is the appeal of cyberterrorism for terrorists?

Essay Requirements

3-4 Pages
APA, 12-point font
1” margins
4-5 references

Heat map in Java

Please go through the pdf file named “Question” in detail. It contains the instructions on how to use the other two zipped files. Assignment is on Java Parallel Programming using Schwartz approach and I am required to create a Heat Map. Please reply if you have any questions on the assignment.

Understanding Cyber Conflict: 14 Analogies – Discussion Forum #2

Please read Chapters 7 & 9 in the textbook.

Within Chapter 7, Francis Gavin brilliantly articulates an analogy between the expansion of cyberspace and the growth of the railroads in the early 20th century.

He opens his discussion, “The role of new technologies, especially the massive expansion of rail lines throughout Europe and their ability to move huge numbers of men and weapons more quickly to the battlefield, is often seen as a key element of how the July 1914 Crisis began and played itself out in a catastrophic world war. Can we generate insights from this history into how emerging cyber capabilities might affect great power crises in the future? What, if anything, can the story of railroads and their effect on international stability tell us about cybers influence on crisis stability today, and looking into the future”

In your discussion post, I want you to answer those specific questions. In no more than 750 words, please discuss those critical questions, and the analogy he unpacks in the chapter

Book to use for assignment:

Understanding Cyber Conflict: 14 Analogies – Chapter 7 & 9

https://carnegieendowment.org/files/GUP_Perkovich_Levite_UnderstandingCyberConflict_FullText.pdf

Module 3 Discussion – Cyber Secuity in National & International Law

In no more than 750 words, please discuss the following one (1) of the following three (3)  questions:

1) Is it important to distinguish between different types of cyber attacks? How should we do it?

2) What should the role of the United States be in Internet Governance?

3) Is cyberspace at risk of being militarized?

Please utilize outside sources. They must be “credible” by all academic standards. You will be rewarded by the use of outside sources.

building a unix shell

This assignment asks you to build simple Unix shell and gives you in the process an opportunity to
demonstrate that you are mastering concurrency (including running external executables) and file
manipulation using the POSIX API. You may have seen similar assignments in other courses but
they are similar and not identical; make sure you follow the specifications herein, not something
else.
Our shell repeatedly provides a prompt, accepts a command (possibly with arguments), and
executes it. Most commands are external executables, but some are internal.
The shell ignores completely its environment and reads a simple configuration file upon
startup instead. The file is named shconfig and resides in the current directory. It contains pairs
consisting in a variable name and a value for that variable, separated by at least one blank. The
two interesting lines in this file have the form
VSIZE v
HSIZE h
where v and h are strings representing positive integers. These variables are used by the internal command more. If these lines do not exist (or if the file is missing altogether), two such lines
must be appended to the configuration file (which must be created first if not already there) with
the values 40 for v and 75 for h. The configuration file may contain other lines, which should be
ignored.
The following functionality should then be implemented:
All the typed in commands should be considered external except the commands more and
exit. Your shell should attempt to execute these commands. The search path for the external
commands contains only the directories /bin and /usr/bin (so any command outside these
directories should be ignored unless it is given by absolute path). If the command cannot
be found, then the shell should print an appropriate message; if the command produces an
error during its execution, then the shell should print yet another appropriate message (in
addition to whatever is printed by the command itself).
The arguments for the commands are provided in the same manner as in normal shells.
A command may be prefixed by the character & followed by a blank. If this is the case, then the
command is executed in the background, in the sense that the shell presents the prompt (and
accepts another command) before the completion of the previous command. Whenever the
background command terminates (with or without errors) the shell must print an appropriate
message, again in addition to whatever is printed by the command.
1
The command more must be implemented internally. This command receives one file name
as argument, and displays it to the standard output page by page. The number of columns
in a page and the number of characters in a column are taken from the configuration file and
are given by the value v of variable VSIZE and by the value h of variable HSIZE, respectively1
.
The command more displays v lines of the file given as argument and then awaits user input.
If the input is the character blank, then the next v lines are displayed; if the input is anything
else, then the command terminates. The command also terminates when it reaches the end
of the file. All the lines are displayed truncated to h characters if necessary (i.e., if they are
longer than h characters).
The command exit terminates the shell.
What to submit For this assignment you must use the POSIX interface presented in class for file
access rather than library functions.
The default target of your makefile must produces an executable named sshell and residing
in the root directory of your submission

Compare two jsons

I have a basic code. I want to clean up all the hard coding in this basic code and make it more efficient.
What has to be done?
1) Read a json which has arrays into separate template hash map for each type in the array
2) Without using any hard coding, use the template and compare a new json for new and missing fields.