Discussion Short Answer

  

1. What are authentication and authorization?

2. What are authentication and authorization used for?

3. What is Principle of Least Privilege?

4. Are you in favor or against the principle of least privilege? 

5. How many hard drive types are there, how it attaches to computer and give speed comparison from 1 to 5?

6. What is the RAID structure and brief each RAID level key scheme?

7. Please explain the I/O concept in a computer operating system.

8. Please explain the Buffering, Caching, and Spooling in terms of I/O operation.

Justify your your answers and answer in order with using numbers

Please list your reference/s

Writing a Critical Review

  • Read chapters 8, 9, and 10 in How to Critique Journal Articles in the Social Sciences. 
  • Access and review Writing Critical Reviews(new tab). https://guides.library.queensu.ca/introduction-research/writing/critical
  • Access and review Writing a Critical Review(PDF document). https://www.utsc.utoronto.ca/ctl/writing-support
  • Access and download Writing a Critical Review Structure Map(PDF document). https://www.jcu.edu.au/__data/assets/pdf_file/0016/202660/How-to-write-a-Critical-Review.pdf
  • Access and review Writing a Critique(new tab) which includes reading notes and language use options.
  • https://www.ucl.ac.uk/ioe-writing-centre/critical-reading-and-writing/critical-review
  • Locate, download, and read one full-text, qualitative, scholarly article at least 10 pages in length that would be beneficial for a research study on the Virtuous Business Model.
  1. Use the qualitative scholarly article to address the following prompts:
    1. Write a critical review on the selected article using concepts introduced throughout the textbook.
    2. Access and use the hyperlinked resources to inform the scholarly process and writing of the review.
    3. The completed article critique should be at least two full pages and no more than three full pages in length, single spaced, with a few headings as appropriate.
      1. The use of two columns with inclusion of headings is optional to the typical page layout.
    4. Doctoral quality, reasonably sized tables, charts, bulleted lists or figures may be included (of limited quantity to not overshadow the narrative critic are optional as well.)

need APA references and minimum 2 pages with content mentioned in all points

Correlation1

correlation of course and Job

Course name  

Data Analysis 

EDD 771 

 

Course Objectives

           Doctoral candidates will… 

  • Candidates will identify and apply statistical methods of analysis that are appropriate for the data being used. 
  • Candidates will read and comprehend statistical results and discussions. 
  • Candidates will distinguish between good and poor data interpretation. 
  • Candidates will describe the results of statistical analyses in clear, accurate language. 

Course Requirements 

  1. Readings: Prior to each class period, chapters in the text and/or journal articles will be assigned for reading.   
  2. Article Reflection: Each week, students will apply lesson concepts to current peer reviewed research and comment on the process.  
  3. SPSS Activities: These are practice activities embedded within the Chapter PDF slides to be completed as students learn the material.  
  4. SPSS Assignments: Several activities that utilize the statistical software, SPSS, will be given through the course of the class.  These may begin during class, but require completion at a later time 

Help 1

 

Create a quality digital presentation with no more than 12 slides (including detailed speaker notes for all) that describes the dynamic system, the Causal loop diagram, and the rationale for each assumption. Each presentation will be turned in individually and should include the following: A clear definition/introduction of the dynamic system

Causal loop diagram modeling the relationships between factors in the dynamic system.

Dynamic system model that is appropriate for the system

Use MS Excel to construct and run a model simulation. The simulation will require finding relevant data to be used in the model.

Three output graphs that display three possible outcomes from the system. For example: equilibrium and imbalance that favors one of the factors over the other.

A description of the limitations of your model, and how you could improve it

Explain why this clear explanation of the model and assumptions is needed to provide an ethical representation of the data

Please follow the instructions in the attachment to complete it 

java chat

  Modern computing systems play a neat magic trick; they manage to run dozens of software seemingly simultaneously on your desktop. Underneath the hood, each process is being shuffled in and out of the processor at lightning speed, giving us the illusion of parallel operations. A Java Thread is a programming technique that allows us to do just that. We’ll see how Java Threads use time-slicing techniques to divide up the CPU and create concurrent lightweight processes 

Prompt: Take the opportunity to engage with classmates on all matters regarding Java. Asking for and providing assistance are solid ways to build your coding skills. You are required to provide at least one of the following each week:

  • A question regarding how to accomplish a certain task from this week’s assignment or project
  • A response that aids a student’s aforementioned question
  • An interesting article with a brief synopsis that details an interesting aspect or capability of Java
  • A link to and short description of a tool, technique, plug-in, IDE, and any other useful resource you run across

PostgresSQL Procedures

This editor formats code poorly.  Please see the linked file: create_function_2.sql

You will complete the procedure: proc_insertGame beginning on line 120.

Test your code, save it, and upload the SQL script.

Homework

Start with this file and complete the procedure: proc_insertGame

    

    Write the code to call the procedure and test it.  You may change

    the table definition if you have a good reason… document it!

    

    Document your error codes.

    

    Place all of the code in one SQL file and submit via Canvas.  Remember

    that I’m fussy about format!  This is *not* the obfuscated C contest!

    

    The prcedure proc_insertGame begins about line 118.

discution

-need one page 

 

  1. In 100-200 words, please explain in your own words why Cybersecurity is important to people, businesses, and governments.
  2. In 100-200 words, please express your opinion about the importance and necessity of assessing threats, knowing vulnerabilities, and gathering cyber threat intelligence. 

research paper

 Contingency PlanningContingency planning is a risk mitigation process for developing back-up plans in anticipation of events (scenarios) that might disrupt ‘business as usual’. Business continuity planning is an expanded version of contingency planning that typically encompasses a more comprehensive and extended response plan for getting back to ‘business as usual’. In a well-formatted, highly-detailed research paper, address the need to contingency planning, ensuring to address the following items:(1) Benefits of scenario events/planning.
(2) Questions to consider when implementing scenario planning.
(3) The common types of scenario planning.Your paper should meet these requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.