611-11D

 Respond to at least two colleagues by suggesting additional methods to become comfortable or more familiar with the identified population.  1-TUB-  Reflection on what learned and less familiar population. Throughout this course, I have learned multiple assessments to be used for clients of all ages. Additionally, this course allowed me to take a deeper look … Read more

611-11

  The ability to reflect on your own growth and awareness is necessary for effective practice with diverse populations. As a social work professional, even after you graduate, you will learn many lessons from your clients. You will consistently be challenged to obtain new skills and knowledge to provide the most effective evidence-informed practice that … Read more

PKI and certs

  Public Key Infrastructure (PKI) is an encryption and cybersecurity architecture for managing digital certificates and communication encryption. PKI can be used to ensure secure electronic transfer, provide authentication for communications requiring data integrity and stringent proof of identity. The public/private keys created as part of PKI digital certificates can be used to provide a … Read more

briefing preparations

  Share one of the links to an Andy Bounds video you liked or found most interesting or compelling. Then respond to the following in a substantive post (3-4 paragraphs): How might you prepare for a presentation at work with people you work with every day on a project team? How might your preparation differ … Read more

Web attacks

  Review the Open Web Application Security Project (OWASP)Links to an external site. website. After reviewing the site, what are your thoughts about the OWASP project and why do you think this would be a useful resource? Be detailed in your response. What do you think is a useful purpose of WebGoat? Share a couple … Read more

communication through teamwork

  (3-4 paragraphs): Given that project teams are made up of people with varying ways of absorbing information, what is the value of the team communicating in different ways? If you were in charge, how would you suggest to others that using different channels and forms of communication is essential to project success? What advice … Read more

Steganography tools

  What do you believe was the original purpose of steganography tools and how have criminals used them to their advantage? Share some steganography tools you’ve found on the Web and provide links to any useful resource you find. Describe in a few sentences how you might use these tools for good, and how they … Read more

Flow diagrams

  In your first paragraph, talk about the use of process flow diagrams in the specialization of cyber-security. What did you learn from your research about your area? Be specific and cite your sources. In your second paragraph, describe the process one would create for a process flow diagram in Week 6. Diagrams are useful, … Read more

Project Peer Feedback

  Prepare the peer’s presentation topic by finding and reviewing the Internet resources and documents about the topic that you are assigned to review. Prepare for your feedback and questions that you will raise throughout the presentation.  provide feedback to your peer.   Ask your questions, critique the presentation, and make your contributions to the presentation.

2-3-4 tree code with insertion and deletion in JAVA

1. Task Trace the operation of a 2-3-4 Tree (The instructor’s correct way) given the following operations: insert(47) insert(43) insert(23) insert(90) insert(95) insert(27) insert(67) insert(80) insert(88) insert(29) insert(59) insert(24) insert(69) insert(44) insert(71) insert(61) insert(99) insert(42) insert(38) Next, Delete the following items sequentially. delete(27) delete(38) delete(44) delete(95) delete(88) delete(59) Starting with an empty tree, perform the … Read more