ITSD424U3DB

 

Assignment Details

To improve the overall functionality and efficiency of your sub-ordering Java application, you are considering the use of some of the Java predefined methods. Some of the predefined Java classes and methods you are evaluating include vectors, wrapper classes, conversion methods, and collections data structures to process lists. Within the Discussion Board area, write 5 paragraphs that respond to the following questions with your thoughts, ideas, and comments. This will be the foundation for future discussions by your classmates. Be substantive and clear, and use examples to reinforce your ideas:

  • Thoroughly describe how you would utilize each of the following 4 topic areas to enhance the implementation of your Java sub-ordering application:
    • Vector class and methods (in terms of queue and stack creation and manipulation)
    • Wrapper classes (primitive)
    • Conversion methods (various string conversions)
    • Collections data structures (to build link list, queue, stack, search, and sort)

Week 15 Assignment

 

Please review the Admissibility of Expert Testimony in Courts.pdf (check the Supplemental Materials) folder.

This is a bit long – 15 page law article but it does a very good job of summarizing the different tests from Frye to Daubert and various hybrid of whether you are qualified to talk about your findings.

Then please provide me a 2 page paper (minimum) summarizing what you have learned. Also do some research – what is the case law in Kentucky? Ohio? Are there differences in state or federal court in both states? Please cite RECENT case law to support your analysis as this law article is out of date. 

Why did I assign this?

Knowing what test is “adopted” in the state is important. Again, – it is NOT the tool but the person’s knowledge, skill, and whether scientific rigor was followed along with chain of custody and authentication / integrity best practices. Also, when you are leading an investigation you want to be familiar with what test courts (state or federal) may apply! 

Lolcode execution

read the Project instructions document and rest other attachments are part of my Assignment 1 which we need to build it from there

network security layers

The purpose of a vulnerability scanner is to scan systems within your environment to make sure there are no missing patches or known threats. Depending on the size of the environment this can be a daunting task. Is this discussion you are to research a vulnerability scanner (try not to duplicate your classmates if possible). In your initial post, you should give an overview of the software and why you chose it. Is it client based or clientless? Is it cloud based? What is the cost of the licensing or is it open source? What are some disadvantages or issues with the software?

Internet Security Threat Report

Read this report :

https://www.mcafee.com/enterprise/en-us/security-awareness/cybersecurity/what-is-internet-security.html#definition

According to the report, write a one page answering the following questions:

  + What threats are currently the most dangerous?

  + Which of these top threats represent problems for you and your use of the Internet?

  + Which of these top threats represent problems for your school or business?

Data base security

  

Read three articles and discuss the principle of least privilege in at least 500 words. Explain how this principle impacts data security.

Use at least three sources.   Use the Research Databases available from the Danforth Library, not Google.  

Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  

Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraph’s. 

Write an essay format not in bulleted, numbered or other list format. 

Dddd

APA format 

500 words

The rising importance of big-data computing stems from advances in many different technologies. Some of these include:

  • Sensors
  • Computer networks
  • Data storage
  • Cluster computer systems
  • Cloud computing facilities
  • Data analysis algorithms

How does these technologies play a role in global computing and big data?

Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:

  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

Artificial Intelligence

What types of smart devices are they and how can they be used for the benefits of consumers. Include both the advantages and disadvantages of it.Provide examples and present your written findings. 

 

Requirement 

APA format. You must include 3 scholarly reviewed references that are DIRECTLY related to the subject. 

Pages : 3 ( 1000 words)