Social Media

 

Company Description

Tech Lopes delivers expert level IT support. We handle both software and hardware issues, as well as general maintenance and IT consultation. We have IT experts ready to provide assistance and results on data recovery, hardware repair, virus removal, and general IT support. We work with all brands of computers, smartphones and tablets in relation to both hardware and software.

QUESTION

Develop a social media ad campaign for your company to measure and influence efforts to strengthen your brand, drive sales, and improve service. Make sure to address the following: 

Big Data

  • Determine the data you wish to collect as well as how you will collect, store, and analyze it.
  • Explain the effects the data might have on how your organization conducts business.

Conclusion and Recommendations

CYBERLAWS & ETHICAL HACKING

Motivation of a Hacker

Hackers can have various motives, many of which are similar to the motives for committing traditional crimes:

  • Status/validation: Hackers seeking to make a name for themselves
  • Monetary gain: Hackers wanting to generate revenue for themselves or deny revenue to a target
  • Ideology: Hackers using malicious software to carry out activist attacks to promote a particular agenda; may include hacktivists, nationalists, or nation-state actors

Answer the following question(s):

1.What type of hacker do you think concerns corporations the most, and why?

2.What type of hacker do you think concerns the federal government the most, and why?

Please prepare an one page synopsis with adequate examples to support your answers.

Python(Spider version of it) related questions

Write a Python program that calculates:

a.) The average trade size.

b.) The probability that the next trade be a size of 1.

c.) The probability that the next trade will be between 5 and 10, inclusive.

Data is attached as a file.

  

It472 week 9

DQ9: The fourth function is the presentation logic: the display of information to the user and the acceptance of the user’s commands (the user interface). These four functions (data storage, data access logic, application logic, and presentation logic) are the basic building blocks of any information system.

  • Explain the process of user interface design including the user interface structure and user interface standards? Give examples.
  • Develop two use scenarios for a Web site that sells some retail products (e.g., books, music, clothes). Submit your screenshot of the layout here.

Digital forensics

 

Review the material on routers.

It is sometimes said that information extracted from a router or switch does not necessarily provide specific evidence of a particular crime. What is meant by that?  If true, what then is the most useful information collected from these devices in an investigation?

Assignment

 

Go online and research some tools that would be valuable in collecting both live memory images and images of various forms off media. Put together a shopping list for your manager that includes tools needed  to be purchased. Include a price if applicable.

Write your answer using a WORD document. Do your own work. Submit here. Note your Safe Assign score. Score must be less than 25 for full credit.

Computer Architecture, Computer Engineering, Computer

1- For performance evaluation, please describe the rationale of quality improvement performance evaluation.

2- Please list & describe possible parallelization approaches and analysis their advantages or disadvantages.

3- If a computer system is with turbo frequency design, can the computer system always use the turbo mode to replace the regular common mode?

4-Caches, TLBs, virtue memory may initially look very different, but they rely on the same 2 principles of locality, please answer the following questions: 

a- where can a block be placed?

b- how can a block be found? 

c- if there is a miss, how can a block be replaced? 

d- if a write is needed, how can you do that?