Digital forensics evidence

 

  1. Compare and contrast the three categories of crime as outlined by the Cybercrime Convention computer-integrity crimes, computer-assisted crimes, and content-related cybercrimes.
  2. Provide an example of one of these types of cybercrime offenses

Write 1000 words document in APA format

The final portfolio project

The final portfolio project is a three- part activity. You will respond to three separate prompts but prepare your paper as one research paper. Be sure to include at least one UC library source per prompt, in addition to your textbook (which means you’ll have at least 4 scholarly sources cited). 

Start your paper with an introductory paragraph.

Prompt 1 “Data Warehouse Architecture” (2-3 pages): Explain the major components of a data warehouse architecture, including the various forms of data transformations needed to prepare data for a data warehouse. Also, describe in your own words current key trends in data warehousing. 

Prompt 2 “Big Data” (1-2 pages): Describe your understanding of big data and give an example of how you’ve seen big data used either personally or professionally. In your view, what demands is big data placing on organizations and data management technology? 

Prompt 3 “Green Computing” (1-2 pages):  One of our topics in Chapter 13 surrounds IT Green Computing. The need for green computing is becoming more obvious considering the amount of power needed to drive our computers, servers, routers, switches, and data centers. Discuss ways in which organizations can make their data centers “green”. In your discussion, find an example of an organization that has already implemented IT green computing strategies successfully. Discuss that organization and share your link. You can find examples in the UC Library.

Conclude your paper with a detailed conclusion section. 

The paper needs to be approximately 5-8 pages long, including both a title page and a references page (for a total of 7-10 pages). Be sure to use proper APA formatting and citations to avoid plagiarism.

Your paper should meet the following requirements:

  • Be approximately 5-8 pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course, the course textbook, and at least three scholarly journal articles from the UC library to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Emerging Technologies

 Please respond to only one of the two questions below.

Total word count must be 250 to 300 words in your posting. (20 points)

Please also respond to at least two of your classmates with a meaningful reply of 150 words or greater each. (5 points each)

Do not cut and paste, please post original work.

Please provide references for your original postings in APA format.

Google.org is Google’s outreach arm. The organization provides funding and guidance to socially conscious technology entrepreneurs. Visit its website, describe the social mission, and state how this fits into Google’s broader corporate mission.

Identify a technology company that incorporated more than 100 years ago. Describe the industry and context for the firm today. Describe a significant industry and context shift for the firm in its history. Has the firm maintained a sustainable competitive advantage in the markets it competes in? If so, how?

Advance operating system

 Please read “Windows 3.1: 25 Years Later, It’s Still a Milestone” by Benji Edwards and write an 1000 word summary and reaction paper in APA format, including citations to the paper and a “works cited” section which must include at least the article itself. Please note that this will be automatically run through “TurnItIn dot Com”, so please be sure that it will not appear to be plagiarized.

Works Cited

Edwards, B. (2017, May). Windows 3.1: 25 Years Later, It’s Still a Milestone. PC World, 35(5), pp. 157-171. 

Two separate questions

 If an attacker can retrieve the API and libraries, then use these to write an agent, and then get the attacker’s agent installed, how should Digital Diskus protect itself from such an attack? Should the business analytics system provide a method of authentication of valid agents in order to protect against a malicious one? Is the agent a worthy attack surface?  500 words 

 Consider the data flow “octopus,”. How can the analysis system gather data from all these sources that, presumably, are protected themselves? 300 words

 

BIT-200-INTRODUCTION TO COMPUTER TECHNOLOGY

UNIT 1

DQ1

Why is the knowledge of basic Excel skills crucial for success in the workplace or businesses within your field of study? How could this knowledge be applied in your chosen or future career field? Provide two examples. In replies to peers, consider the commonalities and differences you see in how this knowledge is applied across career fields, and explain how lack of working knowledge in Excel could negatively impact the business.

DQ2

Discuss software solutions most commonly used within your current workplace or within your field of study. Describe how working knowledge of these applications can create a competitive advantage for you as an employee or potential employees. Explain how the use of these software solutions can help you execute your job more efficiently and effectively. In replies to peers, consider the following, discuss whether their chosen software solutions could be useful in your current workplace or within your field of study and provide relevant example.

STUDY MATERIALS

 Gaskin, S., Vargas, A., Goeghan, D., & Graviett, N. (2017). GO! All in one: Computer concepts and applications (3rd ed.). New York, NY: Pearson. ISBN-13: 9780134505749

UNIT 2

DQ1

In your own words, can you explain the difference between system and application software? How does your business or organizations within your field of study use both system and application software? Are there constraints between using one type of system software with different application products? In replies to peers, explain whether you agree with the differences and constraints your peers discussed?

DQ2

Other than Microsoft Office and Quicken, what are two common software products that are used in your workplace or organizations within your field of study? Can you provide an explanation and practical examples of how the software is used? In replies to peers, consider one of the following: 

1. Your experience with the identified software

2. Advantages and disadvantages

3. Available alternate software that could be considered?

 

UNIT 3

DQ1

What is the importance of system security within the organization where you currently work or at an organization within your field of study? What are the legal and ethical implications the organization could face for failing to protect systems and information? Identify and explain three strategies the organization could implement to protect its systems and information against threats. In replies to peers, consider whether the three identified strategies are the best defense against threats. Justify your response.

DQ2

What is your perception of the current threats presented by social media or Internet sites that you frequent? How can you protect your personal information to minimize these threats? In replies to peers, provide additional ways to protect personal information on social channels and the Internet through providing examples found in your own research or by citing the topic Resources.

 

UNIT 4

DQ1

How does utilizing the Internet and the cloud help a business achieve organizational and operational goals or competitive advantage? Use two specific examples to support your ideas. In replies to peers, provide additional examples of how the Internet and cloud computing can be employed.

DQ2

Identify and explain two ways you use the cloud as a consumer. Identify potential risks associated with using the cloud in such ways. What are the pros and cons consumers must consider when using the cloud to store and share information? Choose a peer that has used the cloud in a manner different from your post and comment on your experiences with using the cloud in this way, including advantages and disadvantages of this type of use.

 

UNIT 5

DQ1

If you had the technical capability, what type of app would you create for the business where you currently work or your selected field of study that is completely new or significantly different from an existing app? Explain how your app would change the way the business operates or gains competitive advantage and why you think others might adopt and pay for the app. In replies to peers, provide feedback about the app proposal and the additional competitive advantages it could potentially produce if adopted.

DQ2

The evolution of smart phones has opened up a new venue for organizations and businesses to communicate and conduct commerce. Research and discuss an emerging mobile technology trend that can further enhance the way organizations in your line of work or field of study use mobile technology. Include a link to your research with your post. In replies to peers, explain how the mobile technologies recommended by peers could be applied to your business or field of study.

 

UNIT 6

DQ1

Search two blogging and two microblogging social media channels that businesses can use to gain competitive advantage and explain how has each changed the way information is communicated and used to influence social perception? In replies to peers, identify whether your organization or businesses within your field of study are using the social media channels identified. Are these channels effective in communicating with consumers and creating competitive advantage? Provide specific examples to illustrate your ideas.

DQ2

How do companies use social media channel “influencers” to promote their product? Discuss any legal or ethical issues associated with this type of promotion? Provide a link to a specific example that illustrates your idea. In replies to peers, elaborate on the legal and ethical issues presented by peers by researching and discussing actual cases that illustrate the ideas presented. Include links to relevant articles in your reply.

 

UNIT 7

DQ1

Consider some of the new and emerging technologies you have used recently or learned in the topic and identify which of the technologies you like. Which do you not like? Provide some specific examples of how you used any of these technologies and justify your like or dislike of the technology. In replies to peers, state whether you agree or disagree with the assessment provided? Share your own experience with the use of that technology.

DQ2

Using the Tech Trends Report for the current year (available at https://futuretodayinstitute.com), topic Resources, and your own experience, consider current technology that you use as a part of your job or that is used within your field of study. Articulate ways it could be changed, upgraded, or improved by emerging technologies, such as those presented in the topic Resources, to help you do your job/future job more efficiently or effectively. Provide specific examples to support your ideas. In replies to peers, provide additional examples of similar emerging technologies and their workplace application.

I want the analyzation for the below content

[1:54 pm, 28/02/2022] suma@ USA : Explore research papers in the literature using GoogleScholar (Links to an external site.)/MSU Library databases  (Links to an external site.)which incorporate parametric and non-parametric tests (see the list of tests on the course file). (For instance, “Mann-Whitney U test Human Resources”; “Comparison Test Operation management”; “Kruskal Wallis Test Healthcare” etc. )

You can explore a single published paper in finance, operation management, HR, accounting, marketing, healthcare, medicine, etc. c. 

Summarize the title and the research hypothesis/questions of the paper. 

Investigate if they apply the most appropriate tests. Have the authors investigated the assumptions of the employed tests?

What other tests can you recommend? Why? 

Find out if the hypotheses are supported or not.

Summarize the research methodology section of the paper where the parametric or non-parametric tests are performed. 

Min 500 words.