Questions
As you analyze any modern corporate setup, you will see that companies want to ensure that...

As you analyze any modern corporate setup, you will see that companies want to ensure that all users are aware of their own individual responsibility to help protect the enterprise. Social engineering (SE) is becoming a more prevalent threat at all levels of business. To combat it, you first need to understand it. Therefore, you must complete the following: Describe what social engineering is and explain its existence and prevalence. Explain why SE is an important part of an information technology security course. Discuss employee and management responsibilities with regard to information security and combating SE. Make sure your work clarifies your opinion as to who carries more responsibility for preventing SE-the employees or management. Provide examples to back up your statements. Prepare a 1-2 page Word document that covers the above areas.

In: Computer Science

User Python to solve; show all code: A user will enter in data for a basketball...

User Python to solve; show all code:

  1. A user will enter in data for a basketball team. For each player on the team the user will enter
    1. The player’s last name
    2. The average number of point the player scored last season
    3. The number of games the player is projected to play in this year

Write a program that will prompt the user for the player data described above. The user does not know how many players are on the team so allow the user to enter the word end when he/she has finished entering data.

Validate that the player is not entered more than once.

After entering the data, compute the following:

  1. The projected number of points the team will score this year. Assume the player will score the same number of points per game as they did last season.
  2. The name of the player who is projected to score the most points this year. Also display the projected number of points.

In: Computer Science

Consider the following two investors’ portfolios consisting of investments in four stocks: Stock Beta Jack's Portfolio...

Consider the following two investors’ portfolios consisting of investments in four stocks:
Stock Beta Jack's Portfolio Nelson's Portfolio
A 1.3 $2,500 $10,000
B 1.0 $2,500 $5,000
C 0.8 $2,500 $5,000
D -0.5 $2,500 $2,500
Portfolio Expected Return 10% 9%
(a)
Calculate the beta on portfolios of Jack and Nelson respectively.

(b) Assuming that the risk-free rate is 4% and the expected return on the
market is 12%, determine the required return on portfolios of Jack and
Nelson respectively.

(c) From your answers in part (b), explain whether portfolios of Jack and
Nelson are over-priced, under-priced or correctly priced.

(d) State and explain whether the following statement is true or false:
“If a security lies above the security market line (SML), then it must be
over-priced.” (word limit: 150 words)

In: Finance

Consider the following simple script incorporating a for loop: #!/bin/bash RED='\033[0;31m' NC='\033[0m' clear; cd /home for...

Consider the following simple script incorporating a for loop:

#!/bin/bash
RED='\033[0;31m'
NC='\033[0m'
clear; cd /home
for DIR in $HOME; do
#for DIR in *;do
CHK=$(grep -c "/home/$DIR" /etc/passwd)
if [ $CHK -ge 1 ]
then
echo -e "${NC}$DIR is good"
else
echo -e "${RED}ALERT! $DIR is NOT good!"
fi
done

What kind of script is presented above? How did you make your determination? What is the purpose of the script?

In lines #5/6, what is the type of $DIR?

In line #7, what is the value of $CHK?

In line #8, what are the instructions contained with the brackets known as?

Why are there two lines containing the word "for"? Which line will execute? Will that line execute correctly?

What should you do before running the script?

How could the script be factored into your duties as a sysadmin?

In: Computer Science

How can I make this not add to the counter when the guess is right? void...

How can I make this not add to the counter when the guess is right?

void guessGenerator(string hangmanStar, string wordFromWordtxt)  
{

   char temp = '\0';
   bool win = false;
   int counter = 0;

   while ((win == false) || (counter == 7))
   {
       char temp;
       cout << hangmanStar << endl;
       cout << "? ";
       cin >> temp;
       counter++;

       for (int i = 0; i < wordFromWordtxt.length(); i++)
       {
           if (wordFromWordtxt.at(i) == temp)
           {
               hangmanStar.at(i) = temp;
           }
       }

       if (wordFromWordtxt == hangmanStar)
       {
           win = true;
           cout << "You win." << endl;
           cout << "The word was: " << hangmanStar << endl;
       }
       else if (counter == 7)
       {
           hangManPicture(counter);
           cout << endl;
           cout << "You lost" << endl;
           cout << "Answer: " << wordFromWordtxt << endl;
           return;
       }
       else
       {
           if (hangmanStar.find(temp) == string::npos)
           {
               cout << endl;
               cout << "Oops";
               hangManPicture(counter);
               cout << endl;
           }
           else
           {
               hangManPicture(counter);
               cout << endl;
           }          
       }
   }
   return;
}

In: Computer Science

Disorder At-a-Glance STEP 1: Pick one of the disorders you read about in this module and...

Disorder At-a-Glance STEP 1: Pick one of the disorders you read about in this module and learn more about it in order to make a “At-a-Glance” page with details about the disorder. Visit the National Institute of Mental Health and search for the disorder, read through the information, then scroll to the section on “Research and Statistics” or “Journal Articles or Reports” to find helpful links to outside information. Look elsewhere as well for details about the prevalence, signs, symptoms, details, and research related to the disorder. Keep track of all of your sources as you investigate. STEP 2: In a format of your choosing (Microsoft Word, PowerPoint, etc.), create a 1 page visual that includes the following information about the disorder: Description Prevalence Causes and Risk Factors Recent Research (referencing at least 2 research articles) Either as a footnote on the same page, or on a separate page, include the citations in APA format

In: Psychology

The needs of the pediatric patient differ depending on age, as do the stages of development...

The needs of the pediatric patient differ depending on age, as do the stages of development and the expected assessment findings for each stage. In a 500‐750‐word paper, examine the needs of a school‐aged child between the ages of 5 and 12 years old and discuss the following:

  1. Compare the physical assessments among school‐aged children. Describe how you would modify assessment techniques to match the age and developmental stage of the child.
  2. Choose a child between the ages of 5 and 12 years old. Identify the age of the child and describe the typical developmental stages of children that age.
  3. Applying developmental theory based on Erickson, Piaget, or Kohlberg, explain how you would developmentally assess the child. Include how you would offer explanations during the assessment, strategies you would use to gain cooperation, and potential findings from the assessment. CITE REFERENCE

In: Nursing

M11 Discussion - Data Security Data security is a concern every day for information technology professionals....

M11 Discussion - Data Security

Data security is a concern every day for information technology professionals. Users, even information technology professionals move data from point to point on a regular basis and often this requires some form of mobility. For this discussion, please address the points listed below. If you use web sources, include the complete URL to the article.

  • Think about your normal day. Describe how you use your smartphone, table, or laptop away from your home or office.
  • Now, refect on the possible areas in which your data could be breached, reviewed, copied, or stolen.
  • If you were an information technology professional, what are some of the things you would do to help prevent such data breaches?

Each student will be responsible for responding to the discussion question by Wednesday with a word count of at least 250 words.

In: Computer Science

LP2 Assignment: Social Support and Student Success This assignment will assess competency 2. Evaluate how Support...

LP2 Assignment: Social Support and Student Success This assignment will assess competency 2. Evaluate how Support can have a powerful effect on student performance, retention, and persistence. Directions: Write a 1500 word research paper titled The Importance of Social Support and Student Success. Provide your analysis of this topic. In addition to your analysis, please include an answer to the following questions: Prioritize the importance of Academic Support & Support Programs during the critical first year of college. Assess the impact of Self-Efficacy and Student Success on retention. Can universities help students improve their self-efficacy? Evaluate the research evidence surrounding Financial Support and student retention. You must provide a separate/different reference in your answer to each question. One reference must be from the Survey of Best Practices in Student Retention 2015 Edition.

In: Psychology

Dynamic Weight Loss Co. offers personal weight reduction consulting services to individuals. After all the accounts...

Dynamic Weight Loss Co. offers personal weight reduction consulting services to individuals. After all the accounts have been closed on June 30, 20Y7, the end of the fiscal year, the balances of selected accounts from the ledger of Dynamic Weight Loss are as follows:

Accounts payable $36,000
Accounts receivable 116,250
Accumulated depreciation-equipment 184,200
Cash ?
Common stock 75,000
Equipment 475,350
Land 300,000
Prepaid insurance 6,200
Prepaid rent 20,000
Retained earnings 635,600
Salaries payable 8,100
Supplies 4,900
Unearned fees 18,000

Prepare a classified balance sheet that includes the correct balance for Cash. Land must be entered as the first fixed asset. Be sure to complete the statement heading. Refer to the Instructions and the list of Labels and Amount Descriptions for the exact wording of text entries. Negative amounts should be indicated by a minus sign. You will not need to enter colons (:) or the word "Less" on the balance sheet; they will automatically insert where necessary.

Labels
Current assets
Current liabilities
For the Year Ended June 30, 20Y7
June 30, 20Y7
Property, plant, and equipment
Amounts Descriptions
Book value-equipment
Net income
Net loss
Total assets
Total current assets
Total expenses
Total liabilities
Total liabilities and stockholders’ equity
Total property, plant, and equipment
Total stockholders’ equity

Prepare a classified balance sheet that includes the correct balance for Cash. Land must be entered as the first fixed asset. Be sure to complete the statement heading. Refer to the Instructions and the list of Labels and Amount Descriptions for the exact wording of text entries. Negative amounts should be indicated by a minus sign. You will not need to enter colons (:) or the word "Less" on the balance sheet; they will automatically insert where necessary.

Dynamic Weight Loss Co.

Balance Sheet

1

Assets

2

3

4

5

6

7

8

9

10

11

12

13

14

15

16

Liabilities

17

18

19

20

21

22

Stockholders’ Equity

23

24

25

26

In: Accounting