Activity to do

“Research a security threat. Learn about the CryptoLocker Virus. Write a brief document targeted to end users that answers these questions:

-What are the symptoms that a PC has been infected by the CryptoLocker Virus?

-What advice would you give users about whether to pay the ransom demanded?

-How can a support specialist remove the CryptoLocker Virus from a user’s PC?

-What is the preferred method to avoid getting infected by the virus?”

 USE WORD (for this document). Use Captured Screens or Photos. Bullets are beautiful to list “symptoms that a PC…”, “advice would you give”, How can “, and “what is the preferred method” (of course, they are asking for 1 answer but a good writer/student aiming for an “A” grade would give two answers and say which is the best/or one you, as student, prefer. 

Discussion 05

Please respond to both questions with insight from your own experiences.

1.  Transformational leadership and transactional leadership often occur in the same organization.  How do they impact each other?

2.  How would you explain servant leadership? What is the critical difference between servant and transformation leadership, in your opinion?

You should post a follow-up response to at least one other classmate.

Exp19_Access_Ch06_Cap – Insurance 1.0

  

Exp19_Access_Ch06_Cap – Insurance 1.0

  

Project Description:

You have been asked to modify a database that tracks driver data and insurance details. You will update, add to, and delete records from tables. You will also create queries that aggregate data, find unmatched, and find duplicate values.

     

Start Access. Open the downloaded   Access file named Exp19_Access_Ch6_Cap_Insurance. Grader has automatically added   your last name to the beginning of the filename. Save the file to the   location where you are storing your files.

 

Open the Drivers table, observe   the data, and then close the table. Create an update query based on the Drivers   table. Include all of the fields from the table.

 

Set   the criteria to update Special   drivers to Senior.   Run the query, save it as Update Class,   and then close the query.

 

Create   a make table query based on the Drivers table. Include all of the fields from   the table. Set the criteria to select Senior   drivers. The query should make a new table named Non-Standard   Drivers   in the current database.

Outbreak prediction of COVID-19(Project)

I have a project about Outbreak prediction it is a machine learning subject where I have to Predict the Outbreak of COVID-19 using machine learning. In the above files i’m attaching kaggle dataset to train the model.

So I’m looking for Data Collection part & Training the model part.

Kaggle dataset link:- https://www.kaggle.com/antgoldbloom/covid19-data-from-john-hopkins-university/code

wk 14

  Discuss the key components of composition in data visualization.  Note why the components are valuable when creating visualizations.

Cryptography

discuss and explore some of the important aspects of symmetric encryption. You must use at least two scholarly resource.  Every discussion posting must be properly APA formatted. (250 words)

Discussion – Information Governance

 Important Note: Please write this topic on   Impact of Health Information Technology on Patient. Since this is my final topic. 

our readings in Chapter 9 this week, as well as the handout discussing the risk companies face over unstructured data raises concerns that need to be addressed when a company uses social media. 

With your industry in mind, identify and discuss these concerns and address how this can be effectively handled. Support with references and do your usual critical review of at least 2 other students’ posts.

Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:

Ask an interesting, thoughtful question pertaining to the topic

Answer a question (in detail) posted by another student or the instructor

Provide extensive additional information on the topic

Explain, define, or analyze the topic in detail

Share an applicable personal experience

Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)

Make an argument concerning the topic.

At least two scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

Mobile platform vulnerabilities

There are many mobile platform vulnerabilities which do you feel is the greatest threat to users? Do you agree that people generally are not aware of the threats to their mobile devices? Need this in a word document with no less than 350 words in APA format with 2 references & Citations