Cyber law

 On November 3, 2020, California’s Privacy Rights Act is on the ballot. As of the time this assignment is being written, we do not know whether it will pass or not. Please write a 250 word essay on what the Act contains, and if it passed the ballot or not. Please tell why it passed or did not pass. 

cloud computing

Describe the various types of virtualization.

List the pros and cons of virtualization.

Be sure to include at least 2 scholarly sources and use APA format.

Automated tool for SQL Injection

 Write an essay discussing sqlmap, an automated tool for sql injection and database takeover in 500 words or more. Why do we need an automated tool for sql injection? 

Do not copy without providing proper attribution.  Write in essay format not in outline, bulleted, numbered or other list format.  Use the five-paragraph format. Each paragraph must have at least five sentences. 

Include at least one quote from each of 3 different articles. Use the Research Databases available from the Danforth Library, not Google. Cite your sources in a clickable reference list at the end. 

Cloud Computing and Digital Forensics

1.) Describe in 500 words discuss the scope of a cloud computing audit for your business.

Use at least three sources. Use the  Research Databases available from the Danforth Library  as your first choice. 

Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  

Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs.  Stand alone quotes will not count toward the 3 required quotes.

Write in essay format not in bulleted, numbered or other list format. 

2.) Define several forms of metadata that can be useful to an investigation. How are valuable to an investigator?

Post between 200 and 300 words. Use your own words

I need a essay on moodle, isims and their integration

I need a essay on moodle, this must include what is it, how it was started and a brutal critique on it. This should have the pros and cons of moodle.

This essay is also based on isims, this must include what is it, how it was started and a brutal critique on it. This should have the pros and cons of Isims.

The essay should include how these systems are integrated.

Asymmetric cryptography – Component of cryptography

In the final discussion posting please describe what components of cryptography impacted you the most.

I would prefer about asymmetric cryptography and the math underlying it.  Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited. 30-35  lines should be good enough.

1 Discussion and 1 case study

Discussion 2.1

“In general, clustering is the use of unsupervised techniques, for grouping similar objects.” Please discuss this and what is your understanding of ‘unsupervised techniques.’

( With Refrences )

Case Study 2.1

  • Read the Case Study: Case 3.1 – Customer arrival at Bank 98
  • Write a summary analysis and answer the questions

Writing Requirements

  • 3–4 pages in length  (excluding cover page, abstract, and reference list)
  • APA format, Use the APA template located in the Student Resource Center to complete the assignment.
  • Please use the Case Study Guide as a reference point for writing your case study.

Research Paper 6

This week’s article provided a case study approach which highlights how businesses have integrated Big Data Analytics with their Business Intelligence to gain dominance within their respective industry.  Search the UC Library and/or Google Scholar for a “Fortune 1000” company that has been successful in this integration. Discuss the company, its approach to big data analytics with business intelligence, what they are doing right, what they are doing wrong, and how they can improve to be more successful in the implementation and maintenance of big data analytics with business intelligence

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing

Explore data, Python

Advanced filtering

To filter by date ranges we need to get fancy with Boolean operators

Strip out all other values except one

Sort the new baby dataframe on multiple keys

Sort the new baby dataframe with string concatenation to narrow the display