Introduction to technology 1010

 We want you to read at least one article or view a video about hardware (not software). Then write a brief summary (or create a short presentation) summarizing the article using MS Word or PowerPoint. Brief means no less than 10 sentences but not more than one page. Make sure to cite your source properly. 

Computer science

Briefly describe the following

1.profession (15 marks)

2.professional(15 marks)

3.code of conduct (15 marks)

4.Ethics(15 marks)

5 contracts(15 marks)

6.policies(15 marks)

7.practices(15 marks)

Essay

Please run a Google search of the term, “United States Supreme Court Carpenter v. United States 2018.” 

Please write an essay of not less than 500 words, summarizing the court’s decision.

DataMining1

You have been asked by management (manufacturing, healthcare, retail, financial, and etc. ) to create a demo using a data analytic or BI tool. It is your responsibility to download and produce outputs using one of the tools. You will need to focus your results on the data set you select.  

Ensure to address at least one topic covered in Chapters 1-5 with the outputs. The paper should include the following as Header sections.

Introduction History of Tool [Discuss the benefits and limitations] Review of the Data [What are you reviewing?] Exploring the Data with the tool Classifications Basic Concepts and Decision Trees Classifications Alternative Techniques Summary of Results References

Ensure to use the Author, YYYY APA citations with any outside content.

Types of Data Analytic Tools

https://www.octoparse.com/blog/top-30-big-data-tools-for-data-analysis/ Excel with Solver, but has limitations R Studio Tableau Public has a free trial Microsoft Power BI Search for others with trial options

Examples of Dataset

https://www.forbes.com/sites/bernardmarr/2016/02/12/big-data-35-brilliant-and-free-data-sources-for-2016/#4b3e96f1b54d

Discussion

Please search the internet for an answer to the following question.

  • Why did Cisco Systems transition from standalone access control systems to IP networked systems?
  • What challenges did Cisco face in order to solve the physical security problems?

Explain a situation where using a keyloggers may be used in either a legitimate (legal) way or used as a tool for criminals.

Please write a 350 words essay

Keystroke logging, often referred to as keylogging or keyboard capturing, is the action of recording (logging) the keys struck on a keyboard, typically covertly, so that the person using the keyboard is unaware that their actions are being monitored. Explain a situation where using a keyloggers may be used in either a legitimate (legal) way or used as a tool for criminals.

Discussion

Using a firewall rules can hinder the performance of a network, what are some way to stop that from happening? What are some methods that you would use to improve the performance of a firewall? Can those methods be used with on-perm firewalls as well as cloud firewalls?

Discussion

There is much discussion regarding Data Analytics and Data Mining.  Sometimes these terms are used synonymously but there is a difference.  What is the difference between Data Analytics vs Data Mining? Please provide an example of how each is used. Also explain how you may use data analytics and data mining in a future career. Lastly, be sure to utilize at least one scholarly source from either the UC library or Google Scholar. 

Please make your initial post and two response posts substantive. A substantive post will do at least two  of the following:

Ask an interesting, thoughtful question pertaining to the topic

Answer a question (in detail) posted by another student or the instructor

Provide extensive additional information on the topic

Explain, define, or analyze the topic in detail

Share an applicable personal experience

Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)

Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

Paper on SQLMap

Write an essay discussing sqlmap, an automated tool for sql injection and database takeover in 500 words or more. Why do we need an automated tool for sql injection? 

Write in essay format.  

Use the five paragraph format. Each paragraph must have at least five sentences. 

Include an interesting meaningful title.