File1, 2, & 3 for jdo:


INFO300

File1:

Cyber security is the practice of ensuring the integrity,
confidentiality and availability of information. It represents the ability
to defend against and recover from accidents like hard drive failures or
power outages, and from attacks by adversaries. The latter includes
everyone from script kiddies to hackers and criminal groups capable of
executing advanced persistent threats, and they pose serious threats to
the enterprise.
Security should be top of mind across the enterprise, and come
come with a mandate from senior management. The fragility of the
information world we now live in also demands strong cyber security
standards and that employees are properly trained. All code, for example,
has bugs, and some of those bugs are security flaws. Develops are only
human, after all.
All companies will experience some kind of cyber attack, even if
strong controls are in place. An attacker will always exploit the weakest
link, and many attacks are easily preventable by performing basic security
tasks, sometimes referred to as "cyber hygiene." A surgeon would never
eneter an operating room without washing their hands first. Likewise, an
enterprise has a duty to perform the basic elements of cyber security care
such as maintaining strong authentication practices and not storing
sensitive data where it is openly accesible.

File2:

Bitcoin is a new currency that was created in 2009 by an unknown
person using the alias Satoshi Nakamoto. Transactions are made with no
middle men - meaning, no banks! Bitcoin can be used to book hotels on
Expedia, shop for furniture on Overstock and buy Xbox games. But much of
the hype is about getting rich by traading it. The price of bitcoin
skyrocketed into the thousands in 2017.
Bitcoins can be used to buy merchandise anonymously. In addition,
international payments are easy and cheap because bitcoins are not tied
to any country or subject to regulation. Small businesses may like them
because there are no credit card fees. Some people just buy bitcoins as an
investment, hoping they'll go up in value.
Many marketplaces called "bitcoin exchanges" allow people to buy
or sell bitcoins using different currencies. Coinbase is a leading
exchange, along with Bitstamp and Bitfinex. But security can be a concern:
bicoins worth tens of millions of dollars were stolen from Bitfinex when
it was hacked in 2016.

File3:

The images you see on your monitor are made of tiny dots called
pixels. At most common resolution settings, a screen displays over a
million pixels, and the computer has to decide what to do with everyone in
order to create an image. To do this, it needs a translator -- something
to take binary data from CPU and turn it into a picture you can see.
Unless a computer has graphics capability built into the motherboard,
that translation takes place on the graphics card.
A graphics card's job is complex, but its principles and
components are easy to understand. In this article, we will look at the
basic parts of a video card and what they do. We'll also examine the
factors that work together to make a fast, efficient graphics card.
Think of a computer as a company with its own art department.
When people in the company want a piece of artwork, they send a request to
the art department. The art department decides how to create the image
and then puts it on paper. The end result is that someone's idea becomes
an actual, viewable picture. Similarily, a graphics card works along the
same principles. The CPU, working in conjunction with software
applications, sends information about the image to the graphics card. The
graphics card decides how to use the pixels on the screen to create the
image. It then sends that information to the monitor through cable.

No lines are longer than 80 characters, TYVM. Other specified properties aren't being scored automatically at this time so this is not necessarily good news...