JAVA Please
Given the following
// abbreviated Month names
static private final String [] MONTH_NAMES = {
"Jan", "Feb", "Mar", "Apr", "May", "Jun", "Jul", "Aug", "Sep", "Oct", "Nov", "Dec"
};
// day length of each month
static private final int [] MONTH_SIZES = {
31, 28, 31,30,31, 30, 31, 31, 30, 31, 30, 31
};
Write code to show the Julian Calendar and use formatting to format
the code in colomuns and rows
Use nested loops please
In: Computer Science
QUESTION 1
Briefly describe how social engineering can be used to take advantage of unwitting insider threats
QUESTION 2
True or False - Insiders aren't threats unless they recently came from outside the organization
True
False
QUESTION 3
Why is spear phishing particularly relevant to the problem of insider threats?
It is specifically crafted to bypass firewalls
It is specifically crafted to target computers running the Windows operating system
It is specifically crafted to appear relevant to particular insiders
It is crafted by specifically talented insiders
QUESTION 4
Why is an insider threat potentially more serious than an external threat?
Insiders often already have access to sensitive information or restricted areas
Insiders have better social engineering skills
External threats aren't interested in industrial espionage but insiders are
External threats have comparatively weak technical skills
QUESTION 5
Industrial Espionage is most likely driven by which component of the MICE motivation acronym?
Ideology
Money
Coercion
Ego
QUESTION 6
Match each potential insider threat with the most likely motivation from the MICE motivation acronym
Nurse that has a gambling problem
Research Scientist being blackmailed
Employee that believes their company is harming the environment
Supervisor recently passed over for a promotion to manager
A.
Ego
B.
Money
C.
Coercion
D.
Ideology
QUESTION 7
Which type of malware is most closely related to the problem of insider threats?
Macro Virus
Trojan Horse
Worm
Spyware
QUESTION 8
True or False - The threats that insiders pose can be eliminated by using the right technologies
True
False
QUESTION 9
Behavioral indicators of potential insider threats often violate which cybersecurity concepts? (Choose two)
Availability
Least Privilege
Perimeter security
Confidentiality
Filtering
In: Computer Science
In: Computer Science
PK2A:
1. What kind of speech was the First Amendment written to protect?
2. Does the First Amendment apply only to spoken words?
3. What does it mean that laws regulating speech must be content neutral?
4. Why are common carriers prohibited from controlling the content of the material they carry?
In: Computer Science
Write a C++ program, ask the user about which sorting algorithm they would like to use in order to sort the vector. The four sorting algorithms your program should implement are: selection sort, merge sort, quick sort, and insertion sort. Once a sorting algorithm is selected, your program should display step by step every change that the sorting algorithm does on its journey to completely sorting the integer values of the vector
Your output file should then contain the sorted values of the vector with a single integer on each line.
For example:
Enter a file for input: Input1.txt
Enter a file for output: Output1.txt
What sorting algorithm would you like to use? 1. Selection Sort 2. Merge Sort 3. Quick Sort 4. Insertion Sort
(Enter an integer value for your selection): 2
Original Vector: [14, 7, 3, 12, 9, 11, 6, 2]
Vector is now being sorted:
[14, 7, 3, 12] [9, 11, 6, 2]
[14, 7] [3, 12] [9, 11] [6, 2]
[14] [7] [3] [12] [9] [11] [6] [2]
[7, 14] [3, 12] [9, 11] [2, 6]
[3, 7, 12, 14] [2, 6, 9, 11]
[2, 3, 6, 7, 9, 11, 12, 14]
In: Computer Science
1. Mortimer Life Insurance Company wants several lists of salesperson data. Design a flowchart and pseudocode for the following: A program that accepts a salesperson’s ID number and number of policies sold in the last month, and displays the data only if the salesperson is a high performer—a person who sells more than 25 policies in the month. The program that accepts salesperson data continuously until a sentinel value is entered.
In: Computer Science
MUST USE LOOPS. Write a perl program that replicates the actions of a pez dispenser. The program should print out the contents of the dispenser showing that it is empty, prompt a user for 10 pez candy flavors/colors, print out the contents of the dispenser showing that it is full, dispense the candies one at a time, and then print out the contents of the dispenser showing that it is empty. The dispenser should only take in 10 candies and should load and dispense the candies in opposite orders like a pez dispenser.
In: Computer Science
In: Computer Science
CSCI4520Programing Project for algorithm analysis: Sorting, searching, and efficiency analysis
Project introduction In the project, you will apply the theory in the class to actual computer simulation to verify your results. Project Description You will simulate the procedure of search, sorting by programming and analyze the efficiency based on the computer simulation and theoretical result.
1.Generate 100000positive numbers between (0,150)
2.Search the position of the first “58”in the array
3.Count how many “58”inthe array
4.After you finished the first three steps,sort the array by the one required algorithm.
5.Repeat step 3 on the sorted array
6.Compute the time cost difference between the time from step 3 only, and time from step 4 and 5 together.
7.Run your program three times and calculate the time:
1)The time to generate 100000#
2)The time to search the element 58s
3)The time to count the 58’s
4)The time to sort the array
Project Learning Objectives • Students will be knowledgeable of the concepts and techniques of computation • Develop code and understanding software life cycle. • Familiar with algorithm efficiency analysis Computer Programming Learning Objectives Students will enhance knowledge in following areas: • Arrays (Bounded) • Algorithm design • Data structure • Interface design • Graphic user interface design Learning Objectives • Upon the successful completion of the project, the students will gain a better understanding of following course concepts • The efficiency analysis of algorithms • The student will enhance the knowledge and skills in writing a well-documented Java program with object oriented concepts involved Program structure The program should include the following sections: • Algorithms design: Describe the algorithm in pseudocode• Implementation of the algorithm: The code to realize the algorithms• The efficiency analysis of the algorithm: The time and space efficiency
In: Computer Science
c++
Create a program where you can add binary while they're still in binary form and convert them to decimal, adds them, then converts then back to binary. (without built in conversions).
Convert 34 to Binary Convert 22 to Binary Convert 1001 to Decimal Convert 111011 to Decimal Add 11 and 1110 in Binary Return the Answer in Binary Subtract 111 from 1010 in Binary, then Convert the Answer to Decimal
In: Computer Science
Read through the Ridgeline Mountain Outfitters (RMO) case study in the text book ( system analysis and design in a changing word). Identify the company's business processes from the key functional areas of their business. DRAW A BUSINESS USE CASE DIAGRAM to show the business processes that take place in the business. The business use case diagram must clearly demonstrate your understanding of their business requirements, and must be sufficient to aid the systems analysts' roles in providing the systems use case diagrams that the designers and developers can use in building the proposed system that can solve the company's overall problems either as a whole or part, in a specified business area. You can provide only one use case diagram where you indicate all the actors and use cases, or you can have multiple diagrams as long as you are able to graphically represent the actors and uses cases and their associations in the business processes that take place in the business. Note that this is a business use case diagram where you have to show your understanding of the business requirements for a proposed business information system for the RMO project.
In: Computer Science
Write a Python program that takes as input two numbers, the height, and width of a rectangle. It then prints a rectangle with height lines and width characters in each line. The rectangle should contain information regarding its dimensions and area inside (centered vertically but not horizontally). If any part of the information (including two stars on each end and a space before and after the line) does not fit in the rectangle, then print the complete information after the rectangle.
In: Computer Science
In: Computer Science
What command(s) do you use to view or edit the Windows registry? What precautions do you need to take when using it?
In: Computer Science
C++
Write a program that reads in a list of 10 names as input from a user and places them in an array.
The program will prompt for a name and return the number of times that name was
entered in the list. The program should output total number of instances of that name and then prompt for another name until the word done is typed in.
For this lab, use the string data type as opposed to char to store the names (i.e. don’t use c-strings).
Expected Input/ Output:
Enter name #1: Joe
Enter name #2: Sally
Enter name #3: Joe
Enter name #4: Sue
Enter name #5: Sally
Enter name #6: Adam
Enter name #7: Joe
Enter name #8: Adam
Enter name #9: Adam
Enter name #10: Joe
Who do you want to search for (enter done to exit)? Joe
There are 4 instances of the name Joe.
Who do you want to search for (enter done to exit)?Sally
There are 2 instances of the name Sally.
Who do you want to search for (enter done to exit)? Adam
There are 3 instances of the name Adam.
Who do you want to search for (enter done to exit)? Sue
There is one instance of the name Sue.
Who do you want to search for (enter done to exit)? John
John’s name does not exist in this list.
Who do you want to search for(enter done to exit)?done
Thank you for using my program.
In: Computer Science