Classify types of vulnerabilities in operating system and list some of vulnerabilities in Linux
Create a flowchart that display numbers from 100-1
Spanning Tree where you write 5 chapters. 1. Introduction: Definition, example and characteristics 2. Details of Working procedure and Graphical representation for both of Kruskal and Prim's techniques 3. Design algorithm for both Kruskal and Prim's techniques 4. Implementation (coding) of those algorithms 5. Finding, Result and Conclusion
Write a term paper on Spanning Tree where you write 5 chapters.
1. Introduction: Definition, example and characteristics
2. Details of Working procedure and Graphical representation for both of Kruskal and Prim's techniques
3. Design algorithm for both Kruskal and Prim's techniques
4. Implementation (coding) of those algorithms
5. Finding, Result and Conclusion
You are a system administrator with broad access to enterprise systems. Your supervisor has asked you to begin archiving all of the emails and web activity logs of one of your co-workers. Typically requests of this nature are initiated through a formal communication from your campus’s legal office. You feel that this request is inappropriate and possibly at odds with standard campus procedure and processes. You raise your concerns with your supervisor, but are told that this is a sensitive matter, and details cannot be shared with you. After thinking more about the conversation, you had with your supervisor, you are under the impression that you might lose your job if you persist in discussing the matter further or if you refuse to carry out the task. What would you do? In your answer, refer to ethical codes and what IT professionals need to commit to and mention a few general or common principles included in ethical codes.
Read the following extract (https://www.mycomputercareer.edu/the-guide-to-informationtechnology-and-its-role-during-covid-19/ ) and answer the questions that follow:
Q.4.1 Briefly list two ways in each of the following sectors where IT has helped during the Covid-19 pandemic. Give one example for each sector: • health sector • business sector • communication • education • connection and spreading information. (15)
Q.4.2 Explain what effective communication is.
There are six ethical principles that form the underlying foundation of the IITPSA’s Code of Conduct, and each member of the Institute, as a condition of membership, undertakes to adhere to these ethical principles. Discuss what each of the following principles entail:
M.3.1.1 Ethical Principle 1 – Integrity: “A member will behave at all times with integrity. A member will not knowingly lay claim to a level of competence not possessed and will at all times exercise competence at least to the level claimed.” (15)
M.3.1.2 Ethical Principle 2 – Confidentiality: “A member will act with complete loyalty towards a client when entrusted with confidential information.”(15)
Q.1.1 Professionalism encompasses a number of different attributes, and together these attributes identify and define a professional. Discuss five of these attributes in the context of an IT department. (15) Q.1.2 Discuss your role as an IT professional in terms of your responsibility to clients, coworkers and society. (5) Question 2 ______ _ _ (Marks: 10) IT is useful for implementing a firm's corporate social responsibility (CSR). Discuss two ways the IT profession can contribute to CSR.
A virtual memory has a page size of 2K(words). There are eight pages and four blocks. The associative memory page table contains the following entries:
Page Block
0 3
2 1
5 2
6 0
Make a list of all virtual addresses (In decimal) that will cause a page fault if used by the CPU.
can you develop a function that describes binary variables in R. it has to contain the size(%), mean, median, and the most adapted graph?