Questions
JAVA Please Given the following // abbreviated Month names static private final String [] MONTH_NAMES =...

JAVA Please
Given the following

// abbreviated Month names

static private final String [] MONTH_NAMES = {

"Jan", "Feb", "Mar", "Apr", "May", "Jun", "Jul", "Aug", "Sep", "Oct", "Nov", "Dec"

};

// day length of each month

static private final int [] MONTH_SIZES = {

31, 28, 31,30,31, 30, 31, 31, 30, 31, 30, 31

};

Write code to show the Julian Calendar and use formatting to format the code in colomuns and rows
Use nested loops please

In: Computer Science

QUESTION 1 Briefly describe how social engineering can be used to take advantage of unwitting insider...

QUESTION 1

Briefly describe how social engineering can be used to take advantage of unwitting insider threats

QUESTION 2

True or False - Insiders aren't threats unless they recently came from outside the organization

True

False

QUESTION 3

Why is spear phishing particularly relevant to the problem of insider threats?

                                It is specifically crafted to bypass firewalls

                                It is specifically crafted to target computers running the Windows operating system

                                It is specifically crafted to appear relevant to particular insiders

                                It is crafted by specifically talented insiders

QUESTION 4

Why is an insider threat potentially more serious than an external threat?

                                Insiders often already have access to sensitive information or restricted areas

                                Insiders have better social engineering skills

                                External threats aren't interested in industrial espionage but insiders are

                                External threats have comparatively weak technical skills

QUESTION 5

Industrial Espionage is most likely driven by which component of the MICE motivation acronym?

                                Ideology

                                Money

                                Coercion

                                Ego

QUESTION 6

Match each potential insider threat with the most likely motivation from the MICE motivation acronym

                Nurse that has a gambling problem

                Research Scientist being blackmailed

                Employee that believes their company is harming the environment

                Supervisor recently passed over for a promotion to manager

A.           

Ego

B.           

Money

C.           

Coercion

D.           

Ideology

QUESTION 7

Which type of malware is most closely related to the problem of insider threats?

                                Macro Virus

                                Trojan Horse

                                Worm

                                Spyware

QUESTION 8

True or False - The threats that insiders pose can be eliminated by using the right technologies

True

False

QUESTION 9

Behavioral indicators of potential insider threats often violate which cybersecurity concepts? (Choose two)

                                Availability

                                Least Privilege

                                Perimeter security

                                Confidentiality

                                Filtering

In: Computer Science

1) Write an 8051 C program that will simulate a traffic light. Green will turn on...

1) Write an 8051 C program that will simulate a traffic light. Green will turn on for 2 seconds, Yellow for 1 second and Red for 2 seconds. The green, yellow and red LEDs are connected to Ports P11, P12 and P13.

2) Write an 8051 C program that will turn on or turn off an LED using a switch. The LED is connected to Port P15 while the switch is connected to Port P11.

In: Computer Science

PK2A: 1. What kind of speech was the First Amendment written to protect? 2. Does the...

PK2A:

1. What kind of speech was the First Amendment written to protect?

2. Does the First Amendment apply only to spoken words?

3. What does it mean that laws regulating speech must be content neutral?

4. Why are common carriers prohibited from controlling the content of the material they carry?

In: Computer Science

Write a C++ program, ask the user about which sorting algorithm they would like to use...

Write a C++ program, ask the user about which sorting algorithm they would like to use in order to sort the vector. The four sorting algorithms your program should implement are: selection sort, merge sort, quick sort, and insertion sort. Once a sorting algorithm is selected, your program should display step by step every change that the sorting algorithm does on its journey to completely sorting the integer values of the vector

Your output file should then contain the sorted values of the vector with a single integer on each line.

For example:

Enter a file for input: Input1.txt

Enter a file for output: Output1.txt

What sorting algorithm would you like to use? 1. Selection Sort 2. Merge Sort 3. Quick Sort 4. Insertion Sort

(Enter an integer value for your selection): 2

Original Vector: [14, 7, 3, 12, 9, 11, 6, 2]

Vector is now being sorted:

[14, 7, 3, 12] [9, 11, 6, 2]

[14, 7] [3, 12] [9, 11] [6, 2]

[14] [7] [3] [12] [9] [11] [6] [2]

[7, 14] [3, 12] [9, 11] [2, 6]

[3, 7, 12, 14] [2, 6, 9, 11]

[2, 3, 6, 7, 9, 11, 12, 14]

In: Computer Science

1. Mortimer Life Insurance Company wants several lists of salesperson data. Design a flowchart and pseudocode...

1. Mortimer Life Insurance Company wants several lists of salesperson data. Design a flowchart and pseudocode for the following: A program that accepts a salesperson’s ID number and number of policies sold in the last month, and displays the data only if the salesperson is a high performer—a person who sells more than 25 policies in the month. The program that accepts salesperson data continuously until a sentinel value is entered.

In: Computer Science

MUST USE LOOPS. Write a perl program that replicates the actions of a pez dispenser. The...

MUST USE LOOPS. Write a perl program that replicates the actions of a pez dispenser. The program should print out the contents of the dispenser showing that it is empty, prompt a user for 10 pez candy flavors/colors, print out the contents of the dispenser showing that it is full, dispense the candies one at a time, and then print out the contents of the dispenser showing that it is empty. The dispenser should only take in 10 candies and should load and dispense the candies in opposite orders like a pez dispenser.

In: Computer Science

If n = 10 Mean X = 13 One value 20 was deleted Find the new...

If n = 10
Mean X = 13
One value 20 was deleted
Find the new mean

Step by step. Why ??? and how???
please explaination.
Thank you~

In: Computer Science

CSCI4520Programing Project for algorithm analysis: Sorting, searching, and efficiency analysis Project introduction In the project, you...

CSCI4520Programing Project for algorithm analysis: Sorting, searching, and efficiency analysis

Project introduction In the project, you will apply the theory in the class to actual computer simulation to verify your results. Project Description You will simulate the procedure of search, sorting by programming and analyze the efficiency based on the computer simulation and theoretical result.

1.Generate 100000positive numbers between (0,150)

2.Search the position of the first “58”in the array

3.Count how many “58”inthe array

4.After you finished the first three steps,sort the array by the one required algorithm.

5.Repeat step 3 on the sorted array

6.Compute the time cost difference between the time from step 3 only, and time from step 4 and 5 together.

7.Run your program three times and calculate the time:

1)The time to generate 100000#

2)The time to search the element 58s

3)The time to count the 58’s

4)The time to sort the array

Project Learning Objectives • Students will be knowledgeable of the concepts and techniques of computation • Develop code and understanding software life cycle. • Familiar with algorithm efficiency analysis Computer Programming Learning Objectives Students will enhance knowledge in following areas: • Arrays (Bounded) • Algorithm design • Data structure • Interface design • Graphic user interface design Learning Objectives • Upon the successful completion of the project, the students will gain a better understanding of following course concepts • The efficiency analysis of algorithms • The student will enhance the knowledge and skills in writing a well-documented Java program with object oriented concepts involved Program structure The program should include the following sections: • Algorithms design: Describe the algorithm in pseudocode• Implementation of the algorithm: The code to realize the algorithms• The efficiency analysis of the algorithm: The time and space efficiency

In: Computer Science

c++ Create a program where you can add binary while they're still in binary form and...

c++

Create a program where you can add binary while they're still in binary form and convert them to decimal, adds them, then converts then back to binary. (without built in conversions).

Convert 34 to Binary Convert 22 to Binary Convert 1001 to Decimal Convert 111011 to Decimal Add 11 and 1110 in Binary Return the Answer in Binary Subtract 111 from 1010 in Binary, then Convert the Answer to Decimal

In: Computer Science

Read through the Ridgeline Mountain Outfitters (RMO) case study in the text book ( system analysis...

Read through the Ridgeline Mountain Outfitters (RMO) case study in the text book ( system analysis and design in a changing word). Identify the company's business processes from the key functional areas of their business. DRAW A BUSINESS USE CASE DIAGRAM to show the business processes that take place in the business. The business use case diagram must clearly demonstrate your understanding of their business requirements, and must be sufficient to aid the systems analysts' roles in providing the systems use case diagrams that the designers and developers can use in building the proposed system that can solve the company's overall problems either as a whole or part, in a specified business area. You can provide only one use case diagram where you indicate all the actors and use cases, or you can have multiple diagrams as long as you are able to graphically represent the actors and uses cases and their associations in the business processes that take place in the business. Note that this is a business use case diagram where you have to show your understanding of the business requirements for a proposed business information system for the RMO project.

In: Computer Science

Write a Python program that takes as input two numbers, the height, and width of a...

Write a Python program that takes as input two numbers, the height, and width of a rectangle. It then prints a rectangle with height lines and width characters in each line. The rectangle should contain information regarding its dimensions and area inside (centered vertically but not horizontally). If any part of the information (including two stars on each end and a space before and after the line) does not fit in the rectangle, then print the complete information after the rectangle.

In: Computer Science

How can knowing how to create forms and reports in Microsoft Access benefit you? Give an...

  • How can knowing how to create forms and reports in Microsoft Access benefit you?
    • Give an example of information that you could use to create a form and report as it relates to your career.
    • In what ways would a business use these features?

In: Computer Science

What command(s) do you use to view or edit the Windows registry? What precautions do you...

What command(s) do you use to view or edit the Windows registry? What precautions do you need to take when using it?

In: Computer Science

C++ Write a program that reads in a list of 10 names as input from a...

C++

Write a program that reads in a list of 10 names as input from a user and places them in an array.

The program will prompt for a name and return the number of times that name was

entered in the list. The program should output total number of instances of that name and then prompt for another name until the word done is typed in.

For this lab, use the string data type as opposed to char to store the names (i.e. don’t use c-strings).

Expected Input/ Output:

Enter name #1: Joe

Enter name #2: Sally

Enter name #3: Joe

Enter name #4: Sue

Enter name #5: Sally

Enter name #6: Adam

Enter name #7: Joe

Enter name #8: Adam

Enter name #9: Adam

Enter name #10: Joe

Who do you want to search for (enter done to exit)? Joe

There are 4 instances of the name Joe.

Who do you want to search for (enter done to exit)?Sally

There are 2 instances of the name Sally.

Who do you want to search for (enter done to exit)? Adam

There are 3 instances of the name Adam.

Who do you want to search for (enter done to exit)? Sue

There is one instance of the name Sue.

Who do you want to search for (enter done to exit)? John

John’s name does not exist in this list.

Who do you want to search for(enter done to exit)?done

Thank you for using my program.

In: Computer Science