The concept of the 100-year flood plain is deceptively simpl…

The concept of the 100-year flood plain is deceptively simple. It suggests that all properties within the 100-year flood plain are subject to flooding at least once per century (even if it is more accurate to say that there is a 1% chance of a flood in the 100- year flood plain every year). In class, we suggested that which of the following are problematic issues associated with maps of the 100-year flood plain?

Potpourri You are working on a large financial data system….

Potpourri You are working on a large financial data system. This system contains a complete view of trades ingested from various exchanges. The primary feature is a read heavy, highly detailed dashboard that shows all open positions, and offers various search filters for analyzing relevant trades. The system’s data is updated in batches via intraday SFTP files delivered every 5-30 minutes, depending on the exchange. Assumptions and Considerations:  Each dashboard request may need to consult the full corpus of data  A partial answer may be considered unsafe  The system uses full replication on each node a) [1 point] What can you sacrifice if there is a spike (e., can you sacrifice both yield and harvest, or only yield, or only harvest) and how? Justify your answer in 1-2 sentences. 

Potpourri [2 points] Through the special nature of the Login…

Potpourri [2 points] Through the special nature of the Login process interaction between Virtue and Vice, an ephemeral identity and a handshake key to use during that Login session is given by Vice to the Virtue workstation for a legitimate user of AFS.     Given this, why can’t Virtue simply use this ephemeral identity and encrypting all the subsequent file system calls that the user makes to the file server using the handshake key?  (Multiple choice — choose 1 by specifying its number)  i) Toward off replay attacks ii) Since the handshake key is for one-time use by Virtue iii) To reduce over-exposure of the handshake key within the login session  iv) Since the handshake key is valid only for a limited time v) Since the handshake key is valid only for a limited number of calls to the file server