Question (1) a. What is the significance of using function in python programming?Functions are reusable and can perform specific tasksb. What does the following statement do? You may execute this in Python IDEand submit the screenshot for the output.print(random.uniform(0.1, 0.5))This function prints any random floating variable between the two given numbers (0.1& 0.5) c. List…
CS 462 Term Project
Cybersecurity in the Real World The world has begun entering its technologically advanced age, where many of itsdifferent countries and people are essentially completely reliant on their devices. Some examplesbeing the invention and development of artificial intelligence, the exposure of the people tomedia like Tiktok, X, Instagram, and Snapchat, companies moving their information from paperto…
Discussion Board
I think what Danny Hills meant when he said that IP of the older days was “From each according to their ability to each according to their need” that at first it wasn’t necessarily supposed to be as big as it has gotten and initially it was mainly for people to communicate, interact, and share knowledge…
Cybercrime as a Social Problem
Below is the link for the presentation my group did for this project: https://drive.google.com/file/d/14vQW61fUyCer5nb4vrzaF6MbdM3hHt6J/view?usp=sharing
Categories of Cybercrime
The following is a link to the google slides presentation my group did for this project. https://docs.google.com/presentation/d/1oN8cnpeiynPcDv-QHfewjXX3pdCgiiHCIG_Yre5A01w/edit?usp=sharing
Research Paper 2
Introduction and Acceptable Use Policy Before determining the most important policies to establish for a company you have toknow exactly what you need to protect, how things work, and risks in the industry. There aresome policies that are seen as standards and others that are more specialized or specific to acompany. That being said, important…
Research Paper 1
What Happened? It all began in September of 2023, when the Casino Resort MGM discovered a securitybreach where a third party obtained personal customer information including phone numbers,driver’s license information, and for some even social security information. A group of hackerscalled Scattered Spider took credit for the breach. It is believed that they accessed the…
Discussion Board
What hives and entries are forensically interesting when doing an investigation? Hives seen when doing an investigation include system hives (including hardware and software information), software hives, which includes any software downloaded on the devices, security hives which include checking security settings and password policies (can be how the victims security is set up as…
Midterm Paper
Summary This digital forensics company would function out of the city of Virginia Beach and willonly handle cases in the local Hampton area including Norfolk, Chesapeake, Portsmouth,Newport News, Hampton, and, of course, Virginia Beach. Because it is only focused on thisspecific area, it is a smaller office located in the back area in the main…
Discussion Board
I was a little stuck on whether to agree with the idea of these monitoring systems or not but I think ultimately I would have to agree that they may help in some aspects but it is also very risky in some ways too, especially when it comes to public opinions. In the beginning parts…