Home >> Free Essays >> All Subjects >> IT

IT Examples and Topics

Developing The Corporate Strategy For Information Security

Developing the Corporate Strategy for Information Security

[Name of the Student:]

[Name of the Institution:]

Developing the Corporate Strategy for Information Security

Specific Functions of the CISO

The Chief Information Security Officer (CISO) is a senior executive in a company who is responsible for protecting the systems, assets, and communications of a company from potential and existing threats. These threats can be external as well as internal. The CISO develops and implements programs for information security and evaluates their performance after installation. The CISO has a competent team of professionals who depict various skills needed to complete the project and run it successfully. This information security program is implemented across the organization, and no information can go outside or come inside without being screened through the system.

The CISO works as with the top management of the company to determine the risk factors associated with the system (Hooper & McKissack, 2016). The main function performed will be to assess the acceptable level of risk for the information security system of the organization. The policies for the company's information security will be established consequently. This function will be performed at the start of building a security system.

The CISO will be controlling the security operations in his/her supervision. Any threats liable to harm the company in any sense (information breach, assets exploitation, etc.) will be noticed by the CISO’s team immediately. Any attempts of theft or accounts hacking would become highlighted in the information security system, and the necessary action will be taken in response. Possible threats will be simulated and developed to allow the employees to understand and beware of the real threats. Certain scans, tests, and security assessments will be performed periodically to maintain security. This function will be performed before, during, or after a threat to the security system is noticed.

The CISO is responsible for empowering the information security system in a way that ensures full compliance with the national cyber laws. This is a great responsibility, as complying with the country's law related to cybersecurity is a critical issue, and if not met with successfully can cause serious issues for the company. The compliance activities are mainly performed at the startup of an enterprise. However, with time, there arises the need of formulating strategies and modifying running programs according to the regulatory instructions.

Competencies of the CISO

Among the key competencies of a CISO is to manage the data security of the company. The CISO will develop security programs to ensure data security such that all possible threats are known to the IT professionals beforehand. The CISO will take necessary measures to protect the digital privacy of the company. He/she has to ensure the security of data from any unauthorized access.

The CISO is responsible for incident management in the company. Any incidents that have occurred in the company related to the data theft or misuse will be tackled to prevent future occurrences. The threatening incidents will be identified, analyzed and rectified to make the security system more capable.

The CISO must demonstrate competency in risk strategic management. The security operations are designed and developed according to the strategic planning accomplished by the higher management of the company. The CISO must be capable of working with the top management in a way that their collective efforts result in comprehensive and effective strategies to provide a useful security framework.

Functions of a CIO

The Chief Information Officer (CIO) is a senior executive who is responsible to manage various functions related to the IT needs at an executive level in a company. The CIO generally oversees the IT needs of the company, partly involving in the IT operations of the company.

Among the various functions performed by a CIO is to manage data security in alliance with other executive managers. Data security is a big issue and very critical as well. The CIO will recognize the principle vulnerabilities to a security system. Further, the CIO will conduct periodic employees’ training programs related to the issue. These programs will create awareness among the employees about the potential threats to security. The CIO will indulge in attaining the information related to data security and disseminate it across the different levels of employees’ hierarchy according to their needs.

The CIO will involve in risk management along with the senior executives. The CIO will place the competent professionals for work at risk management. Providing them with adequate resources and necessary authorities to complete their tasks will fulfill their job requirements. The CIO will engage in creating the risk assessment criteria and development of relative strategies (Haffke, Kalgovas, & Benlian, 2016).

Further, the CIO will engage in strategic management at the senior-most level in the company. People at the workplace will be made aware of the strategic context of the organization to better cope with the data risk issues. The CIO will be involved in planning out security, audit, and compliance for the company. He or she has to understand the business requirements and develop strategies aligning with them.

Security Assurances achieved by the CIO

The security assurances can be classified by considering different factors in information security management. Two important security assurance issues are authenticity and confidentiality. The CIO is responsible to achieve these security assurances. The CIO will make sure that whether the information is received or sent by the actual user. It means that the information system will be capable of ascertaining if the information generator or receiver is the same individual or entity as it has introduced itself. The CIO will develop training programs to make employees aware of this issue. Another security assurance achieved by the CIO is confidentiality. This implies information security to make sure that the right person has access to certain information. This also implies that no other irrelevant persons or entities can access a particular piece of information. To establish confidentiality, the CIO will develop programs for monitoring issues related to confidentiality in information systems. Techniques used in assuring confidentiality would be encryption, and different types of data management during acquisition, utilization, and saving.

Ways to certify Security Functions & Data Assets

The CIO will use certain methods, technologies, and processes to certify the security functions and data assets of the organization daily. He or she will make use of the necessary software and programs to protect confidential information. The new hires will be screened for security purposes. The authentication procedures have to be deployed to avoid any data thefts. The network of computers in the organization needs to be established using LAN wherein enclaves are segregated by firewalls. The CIO will assign responsibilities to the related staff for ensuring the security of the systems. Every department's information will be under scrutiny of the information security team. The systems will be designed safely to automatically detect possible threats. The employees should be trained for preventing data risks and secure information processing. Scanners should be run and background checks made to ensure safety. A virus scanner and software update are recommended to make potential attacks ineffective. The sensitive data of the company should be protected with special care and must be saved in the owned systems only.

Role of Digital Forensics in Information Security

Digital forensics refers to the examination of digital devices so that the information can be extracted from them for investigation purposes. The recovered information can have clues to certain specific or sensitive information that can be used as evidence. This field of forensic science has its applications in the digital- or cyber-crimes investigation where useful evidence can be generated by identifying data breaches that involve corporate data thefts. Digital forensics processes can be categorized in four steps. To collect digital forensic data, all related equipment and devices will be seized, and sent for investigation. The seized data will be examined and analyzed to assess the necessary information. Digital forensics also involves obtaining the evidence related to the events or history, such as recovering the deleted browsing data and emails to find out possible suspects involved in the crime.

Operational Duties of Digital Forensic Personnel

Digital forensics personnel are involved in collecting, analyzing, and reporting information from the digital devices to find evidence of certain digital crime. They recover information from computers, mobiles, servers, etc. depending upon the sensitivity of the issue. They recover data like confidential documents, situational photos, or emails to find the relevant clues (Frecks, Curry, Lynn, & Bland, 2015). They search through the Internet browsing histories, word-processing documents, photos, and other files. They use certain sets of developed, technical skills that help them identify the points of data breach, and retrieve relevant hidden information.

Technical Resources available to Digital Forensics Professionals

There are various technical resources available to digital forensic professionals at their disposal. Software tools such as Encase, COP, X-ways, Linux DD, etc. that will help them collecting, indexing, and executing a detailed analysis of the digital data. Encase is a software that is used for various purposes including forensics, cybersecurity, etc. Another popular tool is digital detective that is used to develop advanced forensic analysis software. They can use packet analyzers or sniffer tools to analyze network traffic.

Works Cited

Frecks, A. P., Curry, A. W., Lynn, D. G., & Bland, C. J. (2015). Systems and methods for digital forensic triage. Google Patents.

Haffke, I., Kalgovas, B. J., & Benlian, A. (2016). The Role of the CIO and the CDO in an Organization’s Digital Transformation.

Hooper, V., & McKissack, J. (2016). The emerging role of the CISO. Business Horizons, 59(6), 585–591.

Subject: IT

Pages: 5 Words: 1500

Disaster Recovery And Business Continuity Plan

Disaster Recovery and Business continuity plan

[Name of the Writer]

[Name of the Institution]

Disaster Recovery and Business continuity plan

Disaster recovery plans are very important in connection with the business continuity plan. They should describe the process, policies, and procedures for responding to a disaster. Recovery strategies are very important and should be developed for the databases and telecommunication. The most important information about the companies is found in a database. Database backup is essential for preventing data losses and recovering the data. So the disaster recovery plan must include how to backup data and prevent (Fallara, 2003).

To create a disaster recovery and business plan first organization will identify the business critical operations associated with the database and telecommunication. It is important for an organization to determine the alternatives that can be used if an error occurs in a database and telecommunication. The organization has to document the details that are required for operating database and telecommunication equipment. They will place storage devices & servers to another building so that if an incident occurs, it won't affect the database of the company. The organization will list the diagnostic tools which are required to monitor systems of the organization (Sahebjamnia et al., 2015).

The organization will identify the potential incidents that might affect their operations. Alternative servers will be implemented in the organization so that if a server goes down, employees can shift to other server and continue their work. The company will create a plan which includes a strategy to ensure all critical information is backed up regularly. Every organization has a huge amount of data every day and that data changes throughout the day. There might be chances that data can be lost, so backup must be created to ensure that no data is lost and can be recovered quickly.

The organization needs to create an alternative building in another area for each state which can be utilized for employees when a disaster occurs so that employees can continue their work. An IT team will be established that can operate the database and ensure that backup is regularly performed. The organization will make policies for the employees that can ensure that only authorized persons can access the database servers. They will make sure that each department is working according to their policies. Employees will not be allowed to enter the server room. Only the IT team will be allowed to enter the server room (Wallace & Webber, 2017).

This is a multi-state company, so they have three different sites in three different companies. The company must create a plan for data backup and recovery so that data should be backed up as frequently as necessary to make sure that if data are lost, it can be recovered easily. It is very important to analyze the impact of data loss so that the organization can take measures on how they can secure their data. The company should create one more data center so that each site have its own data center and if any data center stops working due to any incident or bug it won’t affect more then one site.

Database security is also very important so that only authorized persons can access the data. Each employees data must be accessible to just them so that any other person cannot make changes to their data. Software must be installed for the employees on their PCs so that they can create their own backup daily and save that in storage devices. It is also important for the organization to hold the PCs of employees to the same standard as their other assets. Such measures help in continuing the business without having effect of disaster.

References

Fallara, P. (2003). Disaster recovery planning. IEEE potentials, 23(5), 42-44.

Sahebjamnia, N., Torabi, S. A., & Mansouri, S. A. (2015). Integrated business continuity and disaster recovery planning: Towards organizational resilience. European Journal of Operational Research, 242(1), 261-273.

Wallace, M., & Webber, L. (2017). The disaster recovery handbook: A step-by-step plan to ensure business continuity and protect vital operations, facilities, and assets. Amacom.

Subject: IT

Pages: 3 Words: 900

Discussion

Academic Institution

Title

Discussion

By

Name

Location

Date

Discussion

In the server market there are many players competing to gain more market shares. However, Apache is an open source web server application that is powering almost 45% of web servers all over the world. An independent firm, based in the United Kingdom, performs a survey of websites each month to know about the server technologies being used by them. In February 2019, the firm discovered that 40 million websites out of the total surveyed amount of 60 million websites use Apache web server . Apache web server maintained its popularity in the web server market since 1996. The reason behind the popularity of Apache web server applications in consumer as well as enterprise markets is due to the open source architecture of the application. The source code of Apache web server is available to anyone free of cost and developers can contribute to the code base as per their unique requirements.

It is highly customizable and provides different modules for different types of tasks to be performed by the hosted websites. The level of customizability, its modular architectures, and beginner friendly environment helped Apache to maintain its popularity over the years. The only drawback that can cause a decrease in its popularity in the future is c10k problem . As the Apache application use separate threads for each request it cannot handle more than 10,000 simultaneous web requests. The problem was solved by a competing web application known as NGINX that use the same thread for multiple requests and consume fewer resources . Further developments in web technologies to handle massive workloads by a single web server can cause a decrease in the popularity of Apache. However, a large community of developers supporting Apache project and frequent security updates will continue to be the unique features of Apache applications over their competitors.

Bibliography

ADDIN ZOTERO_BIBL {"uncited":[],"omitted":[],"custom":[]} CSL_BIBLIOGRAPHY B, Gediminas. “What Is Apache? An In-Depth Overview of Apache Web Server.” Hostinger Tutorials (blog), June 20, 2018. https://www.hostinger.com/tutorials/what-is-apache.

Bekker, By Scott, and 04/01/2005. “6 Reasons to Consider Apache -- Redmondmag.Com.” Redmondmag. Accessed May 4, 2019. https://redmondmag.com/articles/2005/04/01/6-reasons-to-consider-apache.aspx.

“The Apache HTTP Web Server and Why Is It so Popular - Also a Word on PHP, MySQL and Linux and Should This Be a Part of Your Web Hosting Package.” Accessed May 4, 2019. https://www.webdevelopersnotes.com/apache-web-hosting-php.

Subject: IT

Pages: 1 Words: 300

Discussion

Discussion

[Author Name(s), First M. Last, Omit Titles and Degrees]

[Institutional Affiliation(s)]

After reviewing the core skills for success for IT professional, I believe two of them are important skills such as communication skills and to have a self-knowledge. Communication skills are important part any successful professional. It is fundamental that the professional knows his role and his attributions in a project or process. Having a sense of opportunity and sensitivity to perceive strengths and difficulties is the easiest way to deliver the best result. Emotional intelligence is a strong point in a market increasingly competitive and constantly changing. IT is a tactical segment in corporate and wants to see the requirements of the marketplace, the business and workers (Locker, & Kaczmarek, 2009). The IT professional who has a wider idea of the corporate and the marketplace, achieves to show up. Global competencies in organization have the similar weight as practical knowledge.

Under the “Top Ten – Considerations for Evolving into the Role of a Consultant” the most important consideration is asking good questions. Before, most companies offered training to update their collaborators and retain talents. In current years, specialists are in search of knowledge on their own, from rudimentary preparation to specialism. This is as the great volume of data has facilitated access to knowledge. The speed with which new technologies and updates appear requires an increasingly proactive and dynamic professional.

As a Project Management Office (PMO) at an organization, the best consideration for successful professional is listening as a personal skill, which involves much more than hearing, when we listen or we feel heard there is a confluence between the universes of two people and there is connection (Grognet, & Van Duzer, 2002). Another characteristics is empathy. It involves understanding and accepting others without having to agree with them, understand their beliefs, their thoughts, their perspective, their desires, but without mixing them with ours.

References

Grognet, A., & Van Duzer, C. (2002). Listening Skills in the Workplace.

Locker, K. O., & Kaczmarek, S. K. (2009). Business communication: Building critical skills. New York, NY: McGraw-Hill Higher Education.

Subject: IT

Pages: 1 Words: 300

Discussion

Question 1

The top activities that an IT professional job should utilize are: (1) Stop making assumptions. Rework to check your comprehension. Own the communication. (2) Talk about what you can do, not what you can't. (3) If you're not bringing enthusiasm to work, you might empty it out of others. I truly feel that alternative 3 is a standout amongst the most imperative qualities that can be help drive a project when the one that drives others feed off their positive vitality to take care of business. When you have those pioneers that have no good thing to state and constantly contrary, can bring the lesson of the general population around them down.

Question 2

Project management has changed extensively after some time. As the idea of the business has changed, the job of project manager has turned out to be progressively imperative. These days, propels in innovation, the changing accentuation of environmental effects, and the advancement of industry have made projects a fundamental part of the working environment. Regardless of whether it's a little project to perceive another method for working, a process alteration inside a group or a pricy foundation program project management assumes a vital job. Project managers are looked for after crosswise over businesses since project managers can bring industry experience. The demand for project managers is worldwide and the demand for replaceable aptitudes is high.

Question 3

As per my observations, experiences and understanding from a portion of the move outs that I have seen from my old business, it is apparent that communication and cooperation was the problem. I feel that with organizations redistributing to set aside some cash is the problem with that number. I don't believe that PMO adds to the success or increase efficiency of the projects.

References

Chapman, C., & Ward, S. (2003). Project risk management: processes, techniques, and insights. Wiley.

Subject: IT

Pages: 1 Words: 300

Discussion

Discussion

Your Name (First M. Last)

School or Institution Name (University at Place or Town, State)

.

What are the concerns of the downriver countries over the freshwater access?

Israel

The most important water source for both Jordan and Israel is Jordan River. Three sources, the Dan, the Hasbani and the Banias feed the upper Jordan. Both these countries signed a peace agreement since 1994, but Jordan is being pressurized to annul the peace agreement by other Arab countries. As a reaction to this, Israel threatened Jordan that they would cut their water supply, so if Israel is going to cut off the water supply, Jordan would be unable to meet the freshwater needs of its people.

Iraq

The water crisis has become one of the threatening issues for various countries, but talking in a political scenario it has been witnessed that most of the countries like Iraq in which water heads are linked or controlled by Turkey. A terrible situation is being created by Turkey as it has taken a decision to postpone filling of the massive upstream dam because of which level of the Tigris River is declining. Around 70 percent of Iraq’s water is coming from Tigris and Euphrates rivers, both of which run through Turkey. Social media and other activists are calling for a boycott of Turkish items while some are insisting that table talk should be initiated for settling the issue down. Iraq is looking for the corporation of Turkey for getting access to the fresh water.

Sudan and Egypt

Egypt comes under the list of the countries that depends on other countries for accessing the fresh water. Taking a look at the world geography, it could be said that the Blue Nile rises in Ethiopia that flows towards Sudan where it joins White Nile, from where it flows towards Egypt. From the River Nile, both Sudan and Egypt fulfill their fresh water needs. Everything was going smoothly but things went wrong when the Ethiopian government planned on making the Grand Ethiopian Resistance Dam (GERD) to store the water. This decision made Sudan and mainly Egypt concerned about water as they rely on the Nile River for drinking water as well as for irrigating crops. Egypt has always viewed the Nile River as its own and both countries (Ethiopia and Egypt) are fighting over the fresh water.

References

Lonergan, S. C. (2018). Water and conflict: Rhetoric and reality. In Environmental conflict (pp. 109-124). Routledge.

Yousuf, M., Rapantova, N., & Younis, J. (2018). Sustainable water management in Iraq (Kurdistan) as a challenge for governmental responsibility. Water, 10(11), 1651.

Subject: IT

Pages: 1 Words: 300

Discussion

Discussion 5

Each development venture has its particular characteristics, along these lines required its very own one of a kind association structure, all together for the staff and gatherings include on that undertaking to organize their exercises and keep up the required correspondence, so as to meet the task's destinations. This is likewise bring up by Kerzner. There is no such thing as a positive or negative authoritative structure; there are just proper or wrong ones (Kerzner, 2006, p. 89). In this manner, association of the new successful working group is most significant, when building up another briefly association structure to meet the undertaking necessities. Henceforth, Management implies human aptitudes and capacity to sort out individuals and assets in fabricated condition in a manner of arranging, association, and leading to accomplish venture goals.

Discussion 6

Provider relationship management (SRM), in easiest terms, alludes to connecting with and managing outsider merchants that give merchandise, materials, and administrations to your association. It sounds simple enough that one may pick providers that are cost-effective and simple to work with to augment the estimation of the relationship.

Discussion 7

Leadership is straightforwardly associated to and is synonymous with change. Leadership in the 21st century requires the capacity to persistently manage emergency and change. Change is regularly an unpredictable and burdensome procedure. Change requires a change in the manner individuals think, frameworks and procedures, authoritative conduct and ensuing society. Great leaders grasp the idea of change management. To stay stale is to turned out to be wiped out. "A relic of days gone by.

The misstep that most associations make is they gave the frameworks and procedure their essential consideration while individuals are simply optional. Change ought to be individuals focused.

References

Kerzner, H., & Kerzner, H. R. (2017). Project management: a systems approach to planning, scheduling, and controlling. John Wiley & Sons.

Subject: IT

Pages: 1 Words: 300

Discussion

Discussion

Linux is a popular operating system that is available freely and used in the web servers. It is an open source and works with the components of web hosting software. The second important component of the LAMP includes Apache that is also known as an HTTP server. The software allows server webpages to connect via HTTP protocol. Installation of Apache allows Linux machine to transform into a web server that is used to host live websites.

MySQL is another significant component of LAMP that is a database management system. PHP is a web scripting language and is used for creating dynamic websites. The LAMP server generates dynamic webpages by running a PHP code. After this process, the MySQL database is used for loading the data CITATION Har161 \l 1033 (Bacic, 2016).

MySQL and PHP are the most common databases are used for web programming languages. The main reason for PHP's popularity is that it is open source and is simple for using. Another reason for the popularity of PHS is that it is faster and saves time because the process can be completed within time. It offers high flexibility and security that makes it more platform independent. MySQL offers many benefits such as data security by transactional processing. The provision of the high-speed transactional process makes it efficient and ensures high performance. On-demand scalability is another dominant feature of MySQL that makes it more popular. Complete workflow control improves usability and provides a solution for self-management. Open source solution makes it cost effective for the users CITATION Dat16 \l 1033 (Data, 2016).

The alternative to MySQL and PHP include PostgreSQL. It is considered as one of the best alternatives because it is one of the advanced open source data. It allows developing modules across a wide variety of community. The performance is superiorly high and it facilitates the transmission of information within communities CITATION Bit17 \l 1033 (Bitnine, 2017).

References

BIBLIOGRAPHY Bacic, H. (2016). Taking Your Career Beyond Web Designer. Retrieved 05 23, 2019, from https://www.forbes.com/sites/allbusiness/2016/02/12/taking-your-career-beyond-web-designer/

Bitnine. (2017). Advantages of PostgreSQL. Retrieved 05 23, 2019, from https://bitnine.net/blog-postgresql/advantages-of-postgresql/

Data. (2016). 8 Major Advantages of Using MySQL. Retrieved 05 23, 2019, from https://www.datamation.com/storage/8-major-advantages-of-using-mysql.html

Subject: IT

Pages: 1 Words: 300

Discussion

Discussion

The three big hypervisor options include security, support and features. Security remains an important concern because it ensures that software is capable of enabling virtualization. Security limits the likelihood of attacks and keeps the system updated. Local system attacks are prevented that leads to the sustainability of the system. The single server has downsides because security has become a significant concern. Virtual machine or the software monitors the accessibility and control. The attacker can gain access easily if the software has not adopted adequate security parameters. a secure administration policy and standards help in mitigating the risks of security by restricting access to unauthorized persons. Various monitoring and security tools are used that enhance security by detecting the attacks and unauthorized users. Firewalls are commonly used tools for maintaining security CITATION Bha11 \l 1033 (Tholeti, 2011).

The prominent features of hypervisor include the performance of the virtual machine, improvements in IT resources of the company such as dynamic allocation of virtual resources. Consolidation is used for the reduction of the hardware cost. Flexibility and responsiveness are additional features of hypervisor that makes it ideal for virtualization. Flexible substitutes are created in virtualization that offers functions and external interfaces. Virtualization is applicable to physical hardware by combining multiple resources in the form of shared pools that users receive in the form of virtual resources. A single physical logical system is created that improves the overall efficiency of the company CITATION Joh18 \l 1033 (Barrowclough & Asif, 2018).

Hypervisor support for virtual machines improves performance and efficiency in the data centre. Linux is used as a support service for enhancing the overall performance and the capacity of the physical resources. Different hypervisor management components contribute to the overall efficiency. Architectural support is provided by a hypervisor that increased data storage capacity CITATION Sze11 \l 1033 (Szefer & Lee, 2011).

References

Barrowclough, J. P., & Asif, R. (2018). Securing Cloud Hypervisors: A Survey of the Threats, Vulnerabilities, and Countermeasures. Security and Communication Networks.

Szefer, J., & Lee, R. B. (2011). Architectural support for hypervisor-secure virtualization. ACM.

Tholeti, B. P. (2011). Learn about hypervisors, system virtualization, and how it works in a cloud environment. Retrieved 06 01, 2019, from https://developer.ibm.com/articles/cl-hypervisorcompare/

Subject: IT

Pages: 1 Words: 300

Discussion

Apache Server

Student’s Name

Institutional Affiliation

The OS chosen for this project is MAC OS. I generally love because of its versatility. Having used Windows and Linux operating systems in the past, I have come to fall in love with Mac. It is versatile and cannot be attacked by any malware.

The latest versions of the MacOs are already installed with the Apache. The procedure here in therefore is useful for those who want to install Apache on earlier versions. Before installing the Apache, one must however take heed of the following. First, there is need for a terminal. One need to have a Mac Terminal and also some knowledge on how to use the terminal (Kabir, 2002). There should also be Homebrew. Homebrew is a package manager used in the Mac OS. It helps in installing a number of software.

The first step in the installation is the removal of any Apache server that might be present. This is done by opening the terminal and executing the right commands to stop the Apache server from running ("How to Install Apache on macOS via Homebrew – TecAdmin," 2018). After this, proceed to install the server. The Apache server should then be configured to use the httpd service automatically when the system is booted (Bloom 2002). To check if the server is available, one can check it out at http://localhost:8080. If all went well, the header should display the words “that it works.”

The second step involves the configuration of the Apache web server. The configuration is done based on the local development environment ("How to Install Apache on macOS via Homebrew – TecAdmin," 2018). The configuration file can be edited using the various text editors at will. The Apache server uses port 8080 and therefore one should manually change any listed port from the 8080 which might be the default to just port 80.

References

Bloom, R. B., & Foreword By-Behlendorf, B. (2002). Apache Server 2.0: The Complete Reference. McGraw-Hill, Inc..

How to Install Apache on macOS via Homebrew – TecAdmin. (2018, February 13). Retrieved from https://tecadmin.net/install-apache-macos-homebrew/

Kabir, M. J. (2002). Apache Server 2 Bible. Wiley Publishing.

Subject: IT

Pages: 1 Words: 300

Discussion

Discussion: E-commerce

Student’s Name

Institution

Date

Discussion

Secure Sockets Layer (SSL) is a standard security technology, which is established to encrypt link between the browser and web server. It ensures that all the data, which pass between the browser and web server is private and integral. This kind of security is required for organizations dealing with financial and highly confidential information and therefore, an e-commerce company company’s website can be secured using secure Sockets Layer. Therefore, the website for Alibaba, (www.alibaba.com), Amazon (www.amazon.com) and other e-commerce web sites can be hosted or secured using SSL technology. The technology is used to protect online transaction and therefore, it is high likely that most companies doing transaction online are using the technology.

The web sites have identified should be secured because of the confidentiality of the information or data, they deal with. These web sites deal with business transaction, which involve financial transactions such as payment where customers use their debit and credit. This information is very confidential and any exposure and lead to lose of trust and lawsuit against the company. It is important to ensure that the financial information of the company remains protected and only SSL can offer the best protection.

A certificate authority is an authority, which issued digital Certificate. It is the authority, which is in charge of issuing SSL to companies. However, the GeoTrust and DigiCert are some of the certificate authority, which I can recommend to a company. This is because of their fair price, security of their systems CITATION Rap19 \l 1033 (RapidSSLonline, 2019). GeoTrust is the second largest Certificate Authority with over 10,000 users and available in over 150 countries. This shows how it has been operating over the years and therefore, it has integrity to protect CITATION Pet14 \l 1033 (Michale, 2014). The type of SSL, which I can recommend from the vendor, is an Extended Validation. Extended Validation checks the right of applicants to use specific domain and it conducts thorough vetting. The advantage of using SSL on all Zeus web pages is the protection of the confidentiality of the information. The transaction shall be exposed and the data transfer between the client and the web server to remains protected.

Bibliography

BIBLIOGRAPHY RapidSSLonline. (2019). Top Trusted Certificate Authority/CA List Explained. https://www.rapidsslonline.com/blog/top-trusted-certificate-authority/ , 2-15.

Subject: IT

Pages: 1 Words: 300

Discussion 1-5

Discussion 1-5

Name

School or Institution Name (University at Place or Town, State)

Discussion 1-5

Discussion 1:

Myths can be defined in many ways such as tales and stores describing or interpreting the inner working of the universe including religious beliefs. In Polynesian culture, Maui was a god. He and his mother were worried about the shortness of the day to complete any work. So, by using magic and a mysterious fish hook he controlled the sun to crawl slowly on the sky ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"a29cbtfv542","properties":{"formattedCitation":"(Graves, 1955)","plainCitation":"(Graves, 1955)"},"citationItems":[{"id":1696,"uris":["http://zotero.org/users/local/gITejLE9/items/R46H8HLP"],"uri":["http://zotero.org/users/local/gITejLE9/items/R46H8HLP"],"itemData":{"id":1696,"type":"book","title":"The Greek Myths. Vol. 1","publisher":"Penguin Baltimore","volume":"160","author":[{"family":"Graves","given":"Robert"}],"issued":{"date-parts":[["1955"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Graves, 1955). Similar myths from Izanami deities created the Kagutsuchi, known as the fire god. Some religions and cultures still believe in myths.

Discussion 2:

Data of millions of Facebook users was breached in a session hijacking attack during 2018. Attackers were able to steal login cookies from end users and then used the stolen cookies to authenticate on servers of the social media network. The attack was discovered when multiple requests were identified on the server with the same digital footprint ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"a22r3hfmjdn","properties":{"formattedCitation":"(Isaac & Frenkel, 2018)","plainCitation":"(Isaac & Frenkel, 2018)"},"citationItems":[{"id":1697,"uris":["http://zotero.org/users/local/gITejLE9/items/HWR2PZXZ"],"uri":["http://zotero.org/users/local/gITejLE9/items/HWR2PZXZ"],"itemData":{"id":1697,"type":"article-journal","title":"Facebook Security Breach Exposes Accounts of 50 Million Users","container-title":"NY Times (Sept. 28, 2018), https://www. nytimes. com/2018/09/28/technology/facebook-hack-data-breach. html","author":[{"family":"Isaac","given":"Mike"},{"family":"Frenkel","given":"Sheera"}],"issued":{"date-parts":[["2018"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Isaac & Frenkel, 2018). After the attack, the social media giant changed the authentication mechanism on servers and the expiry dates of specific cookies.

Discussion 3:

In 2017, a word press malware capable of stealing cookies form users compromised thousands of website designed using word press programming models. The attacks were successful due to the flaws in code rendering engine of word press. The vulnerability was fixed by word press to prevent future attacks.

Discussion 4:

Modern Olympics are somewhat similar to the ancient Olympics. Like the modern Olympics, ancient Olympics were also celebrated every four years with a similar type of gaming competitions such as jumping, wrestling, etc. For ancient Olympics, married women were not allowed to participate, but unmarried females were allowed to participate. The “Running girl” statue was a symbolization for female participation in Olympics and what they wore during games.

Discussion 5:

Emperor Titus Flavius Vespasian built the Colosseum in ancient Rome as a gift to his people. It was built at the heart of the town where it was used to house commercial activities. It was the fascinating structure of ancient Rome. Due to the circumstances and reasons for that, it was built make it comparable to modern corporate and religious structures.

References

ADDIN ZOTERO_BIBL {"custom":[]} CSL_BIBLIOGRAPHY Graves, R. (1955). The Greek Myths. Vol. 1 (Vol. 160). Penguin Baltimore.

Isaac, M., & Frenkel, S. (2018). Facebook Security Breach Exposes Accounts of 50 Million Users. NY Times (Sept. 28, 2018), Https://Www. Nytimes. Com/2018/09/28/Technology/Facebook-Hack-Data-Breach. Html.

Subject: IT

Pages: 1 Words: 300

Discussion 4

Discussion 4

[Name of the Writer]

[Name of the Institution]

Discussion 4

Introduction

Different Hyperlink options in Microsoft Word 2016

Hyperlinks in Microsoft Word are used to open web pages, files and locations directly by clicking on the hyperlink in MS Word. The quickest way to add a hyperlink in the word document is to press SPACEBAR or ENTER key after typing the address of the web page such as http://www.google.com. Microsoft office automatically converts the text into a hyperlink when the user presses the ENTER or SPACEBAR key. There are also options in the MS word which you can be used to edit the address, display text and font style of a hyperlink. There are many options of a hyperlink in Microsoft Word 2016 which include a hyperlink to a location on the web, hyperlink to a file on the computer, hyperlink to a new email message, and editing the current appearance of a hyperlink (Create or edit a hyperlink, n.d).

Different methods of creating tables

Getting started in Microsoft office word is very easy. Opening a new document or existing document and start typing in it is very simple. There are different elements used in a word document such as page numbers, citations, header and footers, equations, symbols, an index, tables and table of context. (Office Quick Starts, n.d). The different methods which can be used to create tables in MS Word document. To create tables click on the Insert tab, then click on the place in a document where you want to insert table. After clicking on the table icon, you will see different options of creating tables such as creating tables, draw tables and the easiest way by selecting rows and columns from the given grid. After selecting rows and columns, you will see the table on the location where you added the table. You can edit the table and add or remove rows or columns in a table after creating a table. (Insert items in a document, n.d).

References

Microsoft Corp. (n.d.). Office Quick Starts. Retrieved from https://support.office.com/en-us/article/Office-Quick-Starts-25f909da-3e76-443d-94f4-6cdf7dedc51eCreate a document. Retrieved from https://support.office.com/en-us/article/Create-a-document-3AA3C766-9733-4F60-9EFA-DE245467C13D

Microsoft Corp. (n.d.). Video: Insert items in a document. Retrieved from https://support.office.com/en-us/article/Video-Insert-items-in-a-document-ABA910D1-6927-47A4-8F5E-FDA9879F7947

Microsoft Corp. (n.d.). Create or edit a hyperlink. Retrieved from https://support.office.com/en-us/article/Create-or-edit-a-hyperlink-5D8C0804-F998-4143-86B1-1199735E07BF

Subject: IT

Pages: 1 Words: 300

Discussion Board # 2

Linked List

[Author Name(s), First M. Last, Omit Titles and Degrees]

[Institutional Affiliation(s)]

Linked List

Linked lists represent a type of data structure in which every element represents an object. A single object in a linked list is called a node. A node comprises of two parts. One is the data, and the other is the reference to the next location i.e., node. The first object in the list is the head, while the last is the tail. A linked list is an upgraded form of arrays. An array only allocates contiguous memory locations ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"cju24KD4","properties":{"formattedCitation":"(Sravani et al., 2017)","plainCitation":"(Sravani et al., 2017)","noteIndex":0},"citationItems":[{"id":42,"uris":["http://zotero.org/users/local/WKtM8IGm/items/JC7UD7BX"],"uri":["http://zotero.org/users/local/WKtM8IGm/items/JC7UD7BX"],"itemData":{"id":42,"type":"paper-conference","title":"Analyzing the linked list complexity using correlation methods","container-title":"2017 International Conference on Trends in Electronics and Informatics (ICEI)","publisher":"IEEE","publisher-place":"Tirunelveli","page":"1127-1130","source":"DOI.org (Crossref)","event":"2017 International Conference on Trends in Electronics and Informatics (ICOEI)","event-place":"Tirunelveli","URL":"http://ieeexplore.ieee.org/document/8300888/","DOI":"10.1109/ICOEI.2017.8300888","ISBN":"978-1-5090-4257-9","author":[{"family":"Sravani","given":"K."},{"family":"Pavithra","given":"D"},{"family":"Dhanya","given":"S."},{"family":"Thirumalai","given":"Chandrasegar"}],"issued":{"date-parts":[["2017",5]]},"accessed":{"date-parts":[["2020",1,13]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Sravani et al., 2017). So if the locations in memory are not available, then array can't be formed. A linked list is further divided into its types like a singly linked list, which is a dimensional and doubly linked list, which is two dimensional. Some more variations of a linked list are also present, like the circular linked list where the last node references the first node.

Stack and queue are two major types of arrangement of data that can be executed using a linked list. Two major operations that are performed on a linked list are push and pop. Push means to add an element/object in a particular location on a linked list. While the pop operations involve taking the object out of a particular location in a linked list. Stack works on the principle of Last In First Out (LIFO) ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"HVRGRhAS","properties":{"formattedCitation":"(Dale et al., 2016)","plainCitation":"(Dale et al., 2016)","noteIndex":0},"citationItems":[{"id":40,"uris":["http://zotero.org/users/local/WKtM8IGm/items/RISLTQMF"],"uri":["http://zotero.org/users/local/WKtM8IGm/items/RISLTQMF"],"itemData":{"id":40,"type":"book","title":"Object-Oriented Data Structures Using Java","publisher":"Jones & Bartlett Publishers","number-of-pages":"714","source":"Google Books","abstract":"The updated and revised Object-Oriented Data Structures Using Java, Fourth Edition is an essential resource for students learning data structures using the Java programming language. It presents both the traditional and modern data structure topics with an emphasis on problem-solving and object-oriented software design. Beginning early and continuing throughout the text, it introduces and expands upon the use of many Java features such as classes, objects, generics, polymorphism, packages, interfaces, library classes, inheritance, exceptions, and threads.","ISBN":"978-1-284-08909-7","note":"Google-Books-ID: LSbtDAAAQBAJ","language":"en","author":[{"family":"Dale","given":""},{"family":"Joyce","given":"Daniel T."},{"family":"Weems","given":"Chip"}],"issued":{"date-parts":[["2016",9]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Dale et al., 2016). To implement a stack, push the objects at the head location and also pop from the head location, or you can add objects at the tail location and pop from the tail location as well. The queue is based on the First In First Out (FIFO) rule. To implement a queue, add nodes at the tail and pop from the head ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"qiFAf7Kh","properties":{"formattedCitation":"(Liu et al., 2017)","plainCitation":"(Liu et al., 2017)","noteIndex":0},"citationItems":[{"id":43,"uris":["http://zotero.org/users/local/WKtM8IGm/items/5VZG9QMN"],"uri":["http://zotero.org/users/local/WKtM8IGm/items/5VZG9QMN"],"itemData":{"id":43,"type":"paper-conference","title":"Concurrent Data Structures for Near-Memory Computing","container-title":"Proceedings of the 29th ACM Symposium on Parallelism in Algorithms and Architectures - SPAA '17","publisher":"ACM Press","publisher-place":"Washington, DC, USA","page":"235-245","source":"DOI.org (Crossref)","event":"the 29th ACM Symposium","event-place":"Washington, DC, USA","URL":"http://dl.acm.org/citation.cfm?doid=3087556.3087582","DOI":"10.1145/3087556.3087582","ISBN":"978-1-4503-4593-4","language":"en","author":[{"family":"Liu","given":"Zhiyu"},{"family":"Calciu","given":"Irina"},{"family":"Herlihy","given":"Maurice"},{"family":"Mutlu","given":"Onur"}],"issued":{"date-parts":[["2017"]]},"accessed":{"date-parts":[["2020",1,13]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Liu et al., 2017).

In terms of preference for the usage of either stack or queue, it all depends upon the situation. There is no single preferred method e.g if something needs to be implemented where the FIFO method is to be used then queues are the best way. While any implementation that requires LIFO, stack would be used.

When talking about stacks, one real-life example would be that of a garage of small width so that one car may enter at a time. You put all your cars in the garage one by one. If you have to remove the first car you put in, you would have to remove all the other cars that you inserted after that particular one. Also, placing plates in a box is an example of the stack. You have to take out all the plates before you take the first one out.

When discussing about the queue, the shopping malls are the perfect example. You go shopping for groceries, and you make a queue at the checkout. If you are the first in line, you would be the first to check out.

References

ADDIN ZOTERO_BIBL {"uncited":[],"omitted":[],"custom":[]} CSL_BIBLIOGRAPHY Dale, Joyce, D. T., & Weems, C. (2016). Object-Oriented Data Structures Using Java. Jones & Bartlett Publishers.

Liu, Z., Calciu, I., Herlihy, M., & Mutlu, O. (2017). Concurrent Data Structures for Near-Memory Computing. Proceedings of the 29th ACM Symposium on Parallelism in Algorithms and Architectures - SPAA ’17, 235–245. https://doi.org/10.1145/3087556.3087582

Sravani, K., Pavithra, D., Dhanya, S., & Thirumalai, C. (2017). Analyzing the linked list complexity using correlation methods. 2017 International Conference on Trends in Electronics and Informatics (ICEI), 1127–1130. https://doi.org/10.1109/ICOEI.2017.8300888

Subject: IT

Pages: 1 Words: 300

Discussion Board #2

Discussion Board

Carlesha Hayes

[Institutional Affiliation(s)]

Author Note

B-tree: Implementation and Examples

Discussion Board

B-Tree is a type of self-balancing search tree like AVL and Red-Black Trees. It is used when we need to manage a huge amount of data and there is a lack of main memory. The idea behind the use of B-Tree is to reduce the incidents of disk accesses. The “height” of the B-Tree is kept low by putting maximum keys, or “branches”. This way the disk access is reduced compared to the use of other methods like AVL tree or Red-Black Tree.

A B-Tree can be implemented using a variety of methods. The most favored among the programmers and the computer pundits is the method of using C++ programming language CITATION DMa19 \l 1033 (D Malhotra, 2019). The reason many scholars prefer this language due to its range and versatility. Many programmers even go as far as to declare it a "middle-level programming language." In the B-Tree, several internal non-leaf nodes have a varying number of child nodes attached to them with some pre-defined range. As the range of child nodes permitted have a predefined range, internal nodes can be split or joined. The upper and the lower bounds on the number of child nodes are fixed, but for a particular implementation. Take the example for a 2-3 B-Tree. As the name specifies, each internal node may have 2 or 3 child nodes.

B-trees have several advantages over different implementations when the time required to access the data often surpasses that of actually accessing the data CITATION Pop17 \l 1033 (Popov, 2017). For one, each node can be assigned to multiple operations that usually helps multiple users to access the required information simultaneously. However, it should be noted that the number of child nodes strictly depends upon the amount of information that must be stored in these nodes. While a 2-3 B-Tree may be easier to explain, practical B-Tree using secondary storage always needs a large number of nodes to improve their performance.

Heap data structure is also a type of data tree CITATION Jin19 \l 1033 (Jinn-Pean Lin, 2019), but there are still some noteworthy differences between a B-Tree and a Heap. Heap is a special case of a balanced binary structure where the root-node key is often compared with the child, or subsequent structure and arranged consequently. They are usually implemented with an implicit heap data structure. This structure consists of an array where a specific parent and children relationship is defined indirectly. One disadvantage of this system is that heap gets imbalanced by frequent deletions and additions and therefore they have to balance accordingly.

Different types of heaps implement their operations differently. But, the process of insertion of data is almost the same. It is done by the addition of new elements at the end of any first available free space. This process often violates the structure of the heap that is often needed to be reestablished. Also, the root can be deleted by deleting the target root and selecting the child node below it to rebalance the whole structure. The programming language C++ is the preferred language in the case of Heap Structures as well CITATION DMa19 \l 1033 (D Malhotra, 2019).

References

BIBLIOGRAPHY D Malhotra, N. M. (2019). Data Structures and Program Design Using C++. Stylus Publishing.

Jinn-Pean Lin, J. L. (2019). Efficient Heap Data Management on Software Managed Manycore Architectures. 32nd International Conference on VLSI Design and 2019 18th International Conference on Embedded Systems. IEEE.

Popov, A. (2017). An Introduction to MISD Technology. DOI:10.24251/HICSS.2017.119

Subject: IT

Pages: 2 Words: 600

Discussion Thread

Discussion

The array features involve an aggregate data structure designed for storing a group of objects that are of the same or different types. The array consists of holding primitives and references. It is an effective data structure that is used for accessing the sequence of the objects. Invoking a function leads to suspension or execution of the current function. The control of the parameter is passed to the new function. The JavaScript function is used for the execution of the function code. Call of function is used in place of invoking the function and the parameter includes function name method. This involves re-executing blocks of code and re-writing the codes entirely. To create a function the process requires grouping codes together and assigning a name to it that is call function CITATION Gee19 \l 1033 (Geeks, 2019).

For the creation of a function, it is important to declare it and give a name in the same way as created by any other variable. The array parameter features commonly used for invocation include copying and cloning, insertion and deletion and searching and sorting. Two types of data used by the Java language include primitives and reference. The array is not a primitive data and is commonly known as a length. The assessment of the array parameter and its features depicts that it is a reference type that is not part of Java API's. Dealing with array means handling references. The array cannot be copied by assigning to another CITATION Cha171 \l 1033 (Gundamaraju, 2017). Array class is considered as a convenience class involving different array manipulations. This includes comparisons, printing, sorting and others. Proper invocation has to be demonstrated in case of array parameters. A loop structure issued for copying array while the second parameter specifies the length. System method is commonly used for copying the data between arrays. Insertion and deletion are also prominent features of the array parameter.

References

BIBLIOGRAPHY Gundamaraju, C. (2017). Essential JavaScript: Mastering Immediately-invoked Function Expressions. Retrieved 05 26, 2019, from https://medium.com/@vvkchandra/essential-javascript-mastering-immediately-invoked-function-expressions-67791338ddc6

Geeks. (2019). JavaScript | Function Invocation . Retrieved 05 26, 2019, from https://www.geeksforgeeks.org/javascript-function-invocation/

Subject: IT

Pages: 1 Words: 300

Disscusion Board

Algorithms

[Author Name(s), First M. Last, Omit Titles and Degrees]

[Institutional Affiliation(s)]

Algorithms for Sorting

The algorithms that have been selected are bubble sort, insertion sort, and selection sort.

Bubble sort compares the adjacent elements to see if they are in the right order i.e. ascending or descending. If they are in the correct order, it moves to the next two elements, otherwise, the positions of the elements are swapped. Each time the full array is traversed, one element moves to the right location after each outer-loop is executed. Its best case with regards to time is O(n) and worst is O(n^2). It involves two loops and each time the first loop is executed, the second loop executes one less time because one element is always sorted. Bubble sort is utilized for a quick implementation regardless of the time constraint demanded ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"pRfxXMnn","properties":{"formattedCitation":"(Min, 2010)","plainCitation":"(Min, 2010)","noteIndex":0},"citationItems":[{"id":93,"uris":["http://zotero.org/users/local/WKtM8IGm/items/SIRGRKYX"],"uri":["http://zotero.org/users/local/WKtM8IGm/items/SIRGRKYX"],"itemData":{"id":93,"type":"paper-conference","title":"Analysis on Bubble Sort Algorithm Optimization","container-title":"2010 International Forum on Information Technology and Applications","publisher":"IEEE","publisher-place":"Kunming, China","page":"208-211","source":"DOI.org (Crossref)","event":"2010 International Forum on Information Technology and Applications (IFITA)","event-place":"Kunming, China","URL":"http://ieeexplore.ieee.org/document/5635119/","DOI":"10.1109/IFITA.2010.9","ISBN":"978-1-4244-7622-0","author":[{"family":"Min","given":"Wang"}],"issued":{"date-parts":[["2010",7]]},"accessed":{"date-parts":[["2020",1,22]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Min, 2010).

Insertion sort is another sorting algorithm. It works by traversing through the list of elements and checking if that particular element is in the right order. If the element is not in the right order, it is placed in the right position and then the algorithm moves onto the next element. The process ends when the list is fully sorted. The best case for the insertion sort is O(n) and the worst is O(n^2). Insertion sort is used when the list size is small as it would cause issues for larger lists ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"3ZveNhEg","properties":{"formattedCitation":"(Wang Min, 2010)","plainCitation":"(Wang Min, 2010)","noteIndex":0},"citationItems":[{"id":95,"uris":["http://zotero.org/users/local/WKtM8IGm/items/IX6KPWI7"],"uri":["http://zotero.org/users/local/WKtM8IGm/items/IX6KPWI7"],"itemData":{"id":95,"type":"paper-conference","title":"Analysis on 2-element insertion sort algorithm","container-title":"2010 International Conference On Computer Design and Applications","publisher":"IEEE","publisher-place":"Qinhuangdao, China","page":"V1-143-V1-146","source":"DOI.org (Crossref)","event":"2010 International Conference on Computer Design and Applications (ICCDA 2010)","event-place":"Qinhuangdao, China","URL":"http://ieeexplore.ieee.org/document/5541165/","DOI":"10.1109/ICCDA.2010.5541165","ISBN":"978-1-4244-7164-5","author":[{"literal":"Wang Min"}],"issued":{"date-parts":[["2010",6]]},"accessed":{"date-parts":[["2020",1,22]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Wang Min, 2010).

The third type of sorting technique is called selection sort. Let us consider a list that is to be sorted. The sorting order is ascending. The selection sort algorithm would take the minimum value element and then place it at the beginning. The process would continue till the entire list is perfectly sorted. When talking about selection sort, the best time complexity is O (n^2) while its worst-case complexity is also O (n^2). Selection sort is also utilized when time is not an issue and easy implementation is demanded. If properly optimized, selection sort may be quicker than the insertion sort ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"oTeyyzmt","properties":{"formattedCitation":"(Jadoon et al., 2011)","plainCitation":"(Jadoon et al., 2011)","noteIndex":0},"citationItems":[{"id":94,"uris":["http://zotero.org/users/local/WKtM8IGm/items/UGR6MH3D"],"uri":["http://zotero.org/users/local/WKtM8IGm/items/UGR6MH3D"],"itemData":{"id":94,"type":"article-journal","title":"Optimized selection sort algorithm is faster than insertion sort algorithm: a comparative study","container-title":"International Journal of Electrical & Computer Sciences IJECS-IJENS","page":"19-24","volume":"11","issue":"02","author":[{"family":"Jadoon","given":"Sultanullah"},{"family":"Solehria","given":"Salman Faiz"},{"family":"Qayum","given":"Mubashir"}],"issued":{"date-parts":[["2011"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Jadoon et al., 2011).

I would choose bubble sort as it is among the quickest algorithms that have been listed. It has the most efficient best-case time complexity. Furthermore, it is one of the easiest algorithms to implement so it would be my main choice for an algorithm when implementing in the application.

The pseudocode for the implementation of bubble sort is as follows. ‘ar’ is the array of total size ‘p’.

for s =1 to p

for k = 0 to p-1

if a[k]>a[k+1]

swap(ar[k], ar[k+1])

References

ADDIN ZOTERO_BIBL {"uncited":[],"omitted":[],"custom":[]} CSL_BIBLIOGRAPHY Jadoon, S., Solehria, S. F., & Qayum, M. (2011). Optimized selection sort algorithm is faster than insertion sort algorithm: a comparative study. International Journal of Electrical & Computer Sciences IJECS-IJENS, 11(02), 19–24.

Min, W. (2010). Analysis on Bubble Sort Algorithm Optimization. 2010 International Forum on Information Technology and Applications, 208–211. https://doi.org/10.1109/IFITA.2010.9

Wang Min. (2010). Analysis on 2-element insertion sort algorithm. 2010 International Conference On Computer Design and Applications, V1-143-V1-146. https://doi.org/10.1109/ICCDA.2010.5541165

Subject: IT

Pages: 1 Words: 300

Domains

Domains

[Name of the Writer]

[Name of the Institution]

Domains

Main Post

Domains are used to represent the logical address also known as Ip address in a string which specifies it belongs to a specific domain. Computers are connected to a network using unique numeric network address (IP addresses). These numeric network addresses are easy to understand for the machine, but humans can't understand them, so domains were introduced which represents these numerical addresses in a format which can easily be understandable by the human beings (Marinkovic,2012). A domain name is basically your website name. For example google.com, yahoo.com, bing.com, proquest.com, etc. These are all domain names and are very easy to remember as compared to the IP addresses. A domain name can be a combination of letter, names, and it can also be used with a combination of different domain name extension such as .com, .net, .us, etc. A single domain is reserved for only one user which that every domain is unique. The domain name must be registered before users can use it. There are many websites which are selling domain names for users. They can easily search domains and find their desired domains on different websites if they are not sold to someone else. Domain names are not only usage of individuals but also for different organizations.

Follow up (1)

Domain names are required because they represent the unique identity of the company. Any business organization which is planning to create their website needs to buy a domain name which represents their organization. For example, amazon.com represents one of the most successful e-business company Amazon. Domain names help in increasing brand awareness among people.

Follow up (2)

There are many websites which are selling domains for users. However, hosting is also very important for running a website. Domain name is the first step in the creation of website, and the next step is to buy hosting services. Hostgator, Namecheap, Havor, Bluehost and Domain.com are the top 5 domain registers.

References

Marinkovic, A. R. (2012). ON DOMAIN NAMES AND TRADEMARKS. Journal of Internet Law, 15(12), 29-36. Retrieved from https://search.proquest.com/docview/1021058030?accountid=41759

Subject: IT

Pages: 1 Words: 300

Drones And Artificial Intellegence

Drones and Artificial Intellegence

[Name of the Writer]

[Name of the Institution]

Drones and Artificial Intellegence

Introduction

Until a few years back, a drone was seen as a sophisticated gadget used to record videos, take pictures aerially. However, with the technology industry moving towards artificial intelligence, drones have been employed for various purposes. Artificial intelligence is a highly sophisticated language that enables computers, robots, and gadgets to perform different tasks with the intelligence commonly associated with only humans. Additionally, Artificial intelligence has made possible for machines to learn from experiences and adapt themselves to any new input. There is a broad spectrum of machines and devices that artificial intelligence has evolved. There have been simplest applications of artificial intelligence in the form of computers playing chess like a human to highly sophisticated autonomous cars taking on the roads aiming to achieve sustainable development and a healthier environment. The drones powered by artificial intelligence also lies somewhere in that spectrum near to upper limit. The drones equipped with artificial intelligence have been employed to assist farmers, help construction workers, aid petroleum engineers, and support law enforcement and militaries in surveillance. The possibilities are endless as far as drone equipped with artificial intelligence is concerned.

Discussion

Ever since early childhood, sophisticated gadgets have fascinated me to a great extent. I always thought should mankind be ever capable enough to create gadgets that would function on their own and interact with us in the same way as humans always do. I did not know that this would be achieved at such a rapid pace. Based on this motivation solely, this paper focuses research on drones and artificial intelligence. I am sure this research would somewhat satisfy my insatiable desire to seek emerging technological trends.

Artificial intelligence based drones have taken over a number of industries in just a matter of a few years. AI based drones have redefined how these industries previously functioned. The artificial intelligence based drones have been designed to be used for commercial and military purposes as well as custom-built to address specific needs. The artificial intelligence powered drones are a mix of artificial intelligence technology and highly complex, yet sophisticated and aesthetically pleasing hardware that enable them to perform their functions without much hassle. Many companies have developed softwares that assist users of these drones to integrate various other hardware components. Although the underlying hardware mechanism remains unchanged, night vision cameras, smoke detectors, facial recognition cameras, and weather sensors can be easily mounted and made to work with a couple of clicks in the softwares built to aid users of these drones. AiRFLOW is a company that specializes in artificially intelligent drones. AiRFLOW has developed a software that is named ALiSA that primarily serves as an assistant and a monitoring unit when a drone is airborne. Like AiRFLOW, numerous companies are working hard to assist mankind by employing artificial intelligence based drones to use. According to numerous appraisal reports, the market of artificial intelligence based drones has great potential. Since drones could and most certainly would substitute conventional methods of operations and transportation, the Federal Aviation Administration has permitted artificial intelligence based drone manufacturers to expand their businesses and seek new opportunities. This is a welcome decision that would certainly encourage investors to invest their fortune in this still nascent market. According to various reports, the artificial intelligence based drone had a market potential of $2.8 billion in 2016, which it attained easily. Now, many experts and investors are aiming to take this industry well beyond $100 billion mark.

Benefits and Ethical issues and limitations regarding artificial intelligence based drones

The benefits of artificial intelligence based drones are endless. For starters, take an example of engineers scanning a piece of land on which they intend to make high rise infrastructure and map their findings on software afterward. The process concluded in days. Now consider artificial intelligence based drone doing the same work. With the drones, it would be a matter of minutes to do the needful. Moreover, amid the long-festering issue of climate change, organizations have envisioned smart cities that would not only be sustainable but also help to tackle environmental issues. The possibilities are endless about what drones would be able to perform in these cities. For instance, drones could be employed to transport blood lowering the wait for carrying out transfusion. Artificial intelligence based drones have been used in entertainment, industrial infrastructure, farming, and military and defense purposes along with the aforementioned usages (Stahl, 2011).

Ethical issues also entail with the use of artificial intelligence based drones (Pustovrh & Mali, 2014). Of all the issues, one major ethical issue doing rounds on the media is surveillance and spying against one's will and consent. Human rights organizations have always come forward and put up a strong resistance against the commercial use of artificial intelligence based drones (Mali, 2012). The concerns of these organizations are valid. However, these can be addressed. Authorities must bring to the table the manufacturers of artificial intelligence based drones and representative from human rights organizations to formulate a robust strategy on the usage of drone for commercial use (Mali, 2012). Additionally, authorities must impose measure to make manufacturers compliant of existing data protection laws should a convergence is reached over the extent of industrial usage of drones (Mali, 2012).

The limitations of artificial intelligence based drones have always been simmering just below the surface of its wide range of applications and usages (Brey & E, 2012). An important question asked by the analysts is that what would be the outcome should these drones use their cognitive skills and carried out acts malevolent towards mankind. This question is hard to answer considering the ability of artificial intelligence based devices to evolve and adapt accordingly, making them hard to predict.

Conclusion

Artificial intelligence has enabled drones to perform a wide range of functions. However, to fully achieve the potential of this nascent market, ethical issues must be addressed before it is too late. Additionally, there are limitations to artificial intelligence based devices because of their unpredictability.

References

Brey, P. A., & E. (2012). Anticipating ethical issues in emerging IT. Ethics and Information Technology, 14(4), 305- 317. doi:http://dx.doi.org/10.1007/s10676-012-9293-y

Feeney, S., & Freeman, N. K. (2016). Ethical issues: Responsibilities and dilemmas.YC Young Children, 71(1), 86-89. Retrieved from https://ezproxy.pgcc.edu/login?url=https://searchproquest-com.ezproxy.pgcc.edu/docview/1789778178?accountid=13315

Haines, R., Street, M. D., & Haines, D. (2008). The influence of perceived importance of an ethical issue on moral judgment, moral obligation, and moral intent: JBE JBE. Journal of Business Ethics, 81(2), 387-399. doi:http://dx.doi.org.ezproxy.pgcc.edu/10.1007/s10551-007-9502-5

Mali, F. (2018). How to address the policy and ethical issues emerging with new technology. the case of synthetic biology in a small country. Nanoethics, 12(1), 61-73. doi:http://dx.doi.org/10.1007/s11569-017-0310-9

Mujtaba, B. G., Griffin, C., & Oskal, C. (2004). Emerging ethical issues in technology and countermeasures for management and leadership consideration in the twenty first century's competitive environment of global interdependence. Journal of Applied Management and Entrepreneurship, 9(3), 34-55. Retrieved from https://ezproxy.pgcc.edu/login?url=https://search.proquest.com/docview/203902627?accountid= 13315

Pustovrh, T., & Mali, F. (2014). THE SOCIAL AND ETHICAL ASPECTS OF PROGRESS IN THE NEW AND EMERGING SCIENCES AND TECHNOLOGIES. Teorija in Praksa, 51(5), 717- 725. Retrieved from https://ezproxy.pgcc.edu/login?url=https://search.proquest.com/docview/1617364927?accountid =13315

Stahl, B. C. (2011). Teaching ethical reflexivity in information systems: how to equip students to deal with moral and ethical issues of emerging information and communication technologies. Journal of Information Systems Education, 22(3), 253+. Retrieved from https://link.galegroup.com/apps/doc/A275312859/AONE?u=pgcc_main&sid=AONE&xid=2409 2460

Wakunuma, K. J., & Stahl, B. C. (2014). Tomorrow's ethics and today's response: An investigation into the ways information systems professionals perceive and address emerging ethical issues. Information Systems Frontiers, 16(3), 383-397. doi:http://dx.doi.org/10.1007/s10796-014-9490-9

Subject: IT

Pages: 3 Words: 900

Free Essays About Blog
info@freeessaywriter.net

If you have any queries please write to us

Invalid Email Address!
Thank you for joining our mailing list

Please note that some of the content on our website is generated using AI and it is thoroughly reviewed and verified by our team of experienced editors. The essays and papers we provide are intended for learning purposes only and should not be submitted as original work.