cis 500 week 4

Please respond to the following:

You may have noticed that when you look at products on a search engine, that same product appears as an advertisement in your social media and other sites you visit. Many search engines provide advertisers with tools for evaluating the impact of different keywords or phrases. These tools typically “track” user behavior patterns and associate products for sale by companies that subscribe to and pay for their services to help identify potential customers. On the other hand, there are also ad blockers that block this type of communication.

  • What constraints, if any, should be applied to this practice? Do not repeat ideas that have been posted by other students.
  • How might your feelings toward the technology be affected if you are the CIO or an executive manager at a small company that depends on this type of advertising to generate revenue?

Issues/breaches the company has gone through

Pick a company to focus on for this assignment.  Based upon the given information you can find on the company and any technology-related issues/breaches the company has gone through no older than 5 years, create Crisis Management Plan

  1. Introduction – brief background of company and any issues the company has had in the past such as data breaches
  2. Strategies and Management – business activities, risk factor activities, reactive risk mitigation strategy, risk management, financial performance (more or less depending upon company)
  3. Risk Analysis – political analysis, environmental analysis (more or less depending upon company)
  4. Crisis Management Plan:
    1. Purpose
    2. Committee for crisis management planning
    3. Crisis types
    4. Structure of the Crisis Management Team
    5. Responsibility and control
    6. Implementation Plan
    7. Crisis Management Protocols
    8. Crisis Management Plan Priorities
  5. Conclusion
  6. Divide the work on the plan amongst your group members.

References – APA format

Page Count Range should be 10 pages not including:

Title page, Table of Contents and References page

annotated bibliography

Topic:: Cloud migration and data security as key indicator in e-commerce and business success

Identify top 5 journals related that topic and write 150 words about each one.

No plagiarism 

operational excellence

 Question-1 

In 750-1000 words, identify and explain the five steps of forecasting, and then come up with an original example taken from your own professional experiences to illustrate these steps. Your response must be original. You must incorporate at least three reliable sources, both as references and corresponding in-text citations. APA format is expected.
 

Question 2:
In 750-1000 words, explain qualitative and quantitative forecasting, and then come up with an original example of each taken from your own professional experiences to illustrate these two forecasting types. Your response must be original. You must incorporate at least three reliable sources, both as references and corresponding in-text citations. APA format is expected.
 

Question 3:
In 750-1000 words, identify and explain the types of data patterns, and then come up with an original example of each (strive to make it based on your own professional experiences) to illustrate each data pattern type. Your response must be original. You must incorporate at least three reliable sources, both as references and corresponding in-text citations. APA format is expected.

cs

 

Please solve three (3) programming problems related to the content presented in Chapter 13 in your text. You can find the programming problems in the attached file (Module 6 Programming Problems Worksheet.docx (Links to an external site.)).

  • Download the worksheet and save it as Mod6-Worksheet-Programming-Last-First.docx. For example, Mod6-Worksheet-Programming-Smith-John.docx.
  • Consider the problem, design an algorithm (or algorithms) that would solve the problem, and then implement the algorithm in Java.
  • Create a new folder and name it as Mod6-Java-Programming-Last-First, for example, Mod6-Java-Programming-Smith-John.
  • Write the source code for each problem and save them as .java files in the folder you created. There are three programming problems for this module so you should have three .java files. Name your java files as Mod6Problem#.java, for example, Mod6Problem1.java.
  • Please insert the algorithm written in pseudocode as a comment in the beginning of your program.
  • Take screenshots of your running program – you can take screenshots using PrintScreen or any tool that you are familiar with, making sure that the console window in which you run the program appears on the screen.
  • Copy the screenshots in the worksheet. If your program has different outcomes, take screenshots of each variation.

Submission

  • Compress the folder that saves all of your java files as .zip file. Please note don’t save the worksheet in the same folder as they need to be submitted separately.
  • Submit the following two files as attachments by clicking the Submit Assignment above.
    • Mod6-Java-Programming-Last-First.zip.
    • Mod6-Worksheet-Programming-Last-First.docx.

Grading

This assignment is worth 20 points. You can find the grading rubric for each program in the worksheet attached above.

  • PayCalculator (6 pts).
  • MessageEncoder (8 pts).
  • MessageDecoder (6 pts).

Page 3 of 6 in Module 6

Wireless Security-2

1) You need to bypass security on a phone to gather evidence. Describe the forensic process used to allow bypassing user the PIN or other forms of security as a forensics analyst? Explain the process of SIM security?

2) You have a phone that has been retrieved during an arrest. You need to identify the type of phone. Summarize the process of phone identification. Compare and contrast the steps of triaging a phone is powered on versus powered off status.

. No Plagiarism 

· Should be 400 words without References.

REFER chapter-5 to 8

!!! NEED 2 ANSWERS FOR THIS QUESTION WITH 0% PLAGIARISM!!!!

assignment

 

Answer the following questions. Please ensure to use the Author, YYYY  APA citations with any content brought into the assignment.  

For sparse data, discuss why considering only the presence of  non-zero values might give a more accurate view of the objects than  considering the actual magnitudes of values. When would such an approach  not be desirable?

Describe the change in the time complexity of K-means as the number of clusters to be found increases.

Discuss the advantages and disadvantages of treating clustering as  an optimization problem. Among other factors, consider efficiency,  non-determinism, and whether an optimization-based approach captures all  types of clusterings that are of interest.

What is the time and space complexity of fuzzy c-means? Of SOM? How do these complexities compare to those of K-means?

Explain the difference between likelihood and probability.

Give an example of a set of clusters in which merging based on the  closeness of clusters leads to a more natural set of clusters than  merging based on the strength of connection (interconnectedness) of  clusters.

Summary

 

Topic

Do research on service-oriented architecture (SOA) and find three different images/diagram that represents its functions and features. In your opinion, what is the most important thing about SOA to a business? Which image you would use to best represent an SOA to non-technical managers and explain why? List URLs or embed referenced images. 

– The summary should be 300 words with a minimum of 3 references on the topic.

– There should be no plagiarism, attach a plagiarism report with 0% similarity index