Uncategorized

Discussion

  This week we explored the concept of Tokenization.  Three important protocols discussed were Secure Multi-Party Computation (SMPC), Policy-Backed Token (PBT) and Open Asset Protocol (OAP).  Compare and contrast these three protocols and explain which industries can benefit the most from each of these protocols.  (please cite properly in APA)

Discussion Read More »

Use the Web to search for examples of hacks that made the news.Write a brief description of the attack

Use the Web to search for examples of hacks that made the news.Write a brief description of the attack indicating what type of hack was involved. Read and respond to at least two other students Discussions.Post your initial response by the end of day on Thursday and reply to at least two other students by the

Use the Web to search for examples of hacks that made the news.Write a brief description of the attack Read More »

Data visualization

  Data: Simple Graphs in RStudio Background: As we have learned, a lot of thought goes into the design of a visualization. This week we review how the data types influence the graphing types. Assignment: Use RStudio to generate a word document with simple graphs of the following dataset:  dataset_price_personal_computers.csv   Review the slides to

Data visualization Read More »

title: 'Assignment 02: Process State Simulation' author: 'CSci 430: Introduction to Operating Systems' date: 'Fall 2020'

In this assignment you will simulate a three-state process model (ready, running and blocked) and a simple list of processes, like the process control block structure as discussed in Chapter 3. Your program will read input and directives from a file. The input describes events that occur to the processes running in the simulation. These

title: 'Assignment 02: Process State Simulation' author: 'CSci 430: Introduction to Operating Systems' date: 'Fall 2020' Read More »