Please find the homework 5 attachment
Access Control – Laws
Select two Laws and Regulation and compare and contrast them, along with the ramification to business.
500 words. APA reference needed.
5s week 11 assignment BS
In 300 words
Do a bit of research on penetration testing techniques. Investigate and document the following
- Five network penetration testing techniques
- Advantages and disadvantages of each
- One notable social engineering test
- Possible negative implications of penetration testing.
Include References, do not copy paste strictly.
1 page
I would like you to find an elegantly designed chart and tell me in 4 sentences (one paragraph) why you think it is elegant.
The quiz should be submitted in one page of a word document.
The top part should be a the screen shot of the design.
The explanation should be below.
Malicious Activities 4.0
Based on your research:
- Describe a present-day example of your selected type of malicious activity and its impact on the organization.
- Specify the countermeasures the organization took to address the malicious activity.
- Recommend at least one additional preventative countermeasure and at least one countermeasure organizations could take to address this type of activity once it has occurred.
- Provide a full citation and reference, formatted according to Strayer Writing Standards.
Spr1.3
Assignment 1:
Kirk (2016) tells us that all requirements and restrictions of a project must be identified. Select 1 key factor below and discuss why Kirk (2016) states it will impact your critical thinking and shape your ambitions:
· People: stakeholders, audience.
· Constraints: pressures, rules.
· Consumption: frequency, setting.
· Deliverables: quantity, format.
· Resources: skills, technology
Textbook is attached, “Andy Kirk – Data Visualisation_ A Handbook For Data Driven Design-Sage Publications (2019)”.
Requirement:
· ****Separate word document for each assignment****
· Minimum 300-350 words. Cover sheet, abstract, graphs, and references do not count.
· Add reference separately for each assignment question.
· Strictly follow APA style.
· Include at least two citations (APA) from academic resources
· No plagiarized content please! Attach a plagiarized report.
· Check for spelling and grammar mistakes!
· $5 max. Please bid if you agree.
Assignment 2:
Project Part 3.
Refer to the “Project Part 3-Malware Protection Procedure Guide” word document for tasks and instructions.
Requirement:
· ****Separate word document for each assignment****
· Minimum 3 pages. Cover sheet, abstract, graphs, and references do not count.
· Strictly follow APA style.
· No plagiarized content please! Attach a plagiarized report.
· Check for spelling and grammar mistakes!
· $10 max. Please bid if you agree.
Short research paper for PHD. Please read below before bidding. APA 7th edition format
Find two different recent articles involving data mining. Describe the role of “data mining” in the story using your own words.
1. Two APA 7 References needed
2. 400 to 500 words
transformational leadership
This week’s journal articles focus on transformational leadership and knowledge and knowledge sharing within an organization, please review these concepts and answer the following questions:
- How do trustworthy and ethical leaders enhance knowledge sharing in organizations? How does this impact the rate of information technology implementations? How does this impact data management within organizations?
- How does servant leadership assist with transferring knowledge in an organization?
- When thinking about data analytics, how does transformational leadership assist with building good data structures?
Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research. Please be sure that journal articles are peer-reviewed and are published within the last five years.
The paper should meet the following requirements:
- 3-5 pages in length (not including title page or references)
- APA guidelines must be followed. The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.
- A minimum of five peer-reviewed journal articles.
The writing should be clear and concise. Headings should be used to transition thoughts. Don’t forget that the grade also includes the quality of writing.
Automatic coding. Discussion board
There is a trend in programming to make coding easier and more automatic. Some welcome this trend, but others are concerned about future programmers not learning necessary programming fundamentals if programming is no longer required. For instance, without understanding how looping and variable initializations work, how easily would an individual be able to find a logic error in a looping process? Do you think programmers of the future should still learn programming fundamentals, even if coding is no longer required? Why or why not?
Discussion
Research Apple Home Pod. How does it interact with smart home devices? Alexa is now connected to smart home devices such as thermostats and microwaves. Find examples of other appliances that are connected to Alexa and write a report.