We want you to read at least one article or view a video about hardware (not software). Then write a brief summary (or create a short presentation) summarizing the article using MS Word or PowerPoint. Brief means no less than 10 sentences but not more than one page. Make sure to cite your source properly.
Computer science
Briefly describe the following
1.profession (15 marks)
2.professional(15 marks)
3.code of conduct (15 marks)
4.Ethics(15 marks)
5 contracts(15 marks)
6.policies(15 marks)
7.practices(15 marks)
Essay
Please run a Google search of the term, “United States Supreme Court Carpenter v. United States 2018.”
Please write an essay of not less than 500 words, summarizing the court’s decision.
DataMining1
You have been asked by management (manufacturing, healthcare, retail, financial, and etc. ) to create a demo using a data analytic or BI tool. It is your responsibility to download and produce outputs using one of the tools. You will need to focus your results on the data set you select.
Ensure to address at least one topic covered in Chapters 1-5 with the outputs. The paper should include the following as Header sections.
Introduction History of Tool [Discuss the benefits and limitations] Review of the Data [What are you reviewing?] Exploring the Data with the tool Classifications Basic Concepts and Decision Trees Classifications Alternative Techniques Summary of Results References
Ensure to use the Author, YYYY APA citations with any outside content.
Types of Data Analytic Tools
https://www.octoparse.com/blog/top-30-big-data-tools-for-data-analysis/ Excel with Solver, but has limitations R Studio Tableau Public has a free trial Microsoft Power BI Search for others with trial options
Examples of Dataset
Conputer Science
Projects
- Conduct research on the future directions for external storage technologies.
- Compile a list of the various flash memory devices available today on the market. Include key features and approximate prices for each type
Additional Resources
- How HD-DVD Works: http://electronics.howstuffworks.com/hd-dvd.htm
- Understanding RAID technology: http://www.acnc.com/raid
Discussion
Please search the internet for an answer to the following question.
- Why did Cisco Systems transition from standalone access control systems to IP networked systems?
- What challenges did Cisco face in order to solve the physical security problems?
Explain a situation where using a keyloggers may be used in either a legitimate (legal) way or used as a tool for criminals.
Please write a 350 words essay
Keystroke logging, often referred to as keylogging or keyboard capturing, is the action of recording (logging) the keys struck on a keyboard, typically covertly, so that the person using the keyboard is unaware that their actions are being monitored. Explain a situation where using a keyloggers may be used in either a legitimate (legal) way or used as a tool for criminals.
Discussion
Using a firewall rules can hinder the performance of a network, what are some way to stop that from happening? What are some methods that you would use to improve the performance of a firewall? Can those methods be used with on-perm firewalls as well as cloud firewalls?
Discussion
There is much discussion regarding Data Analytics and Data Mining. Sometimes these terms are used synonymously but there is a difference. What is the difference between Data Analytics vs Data Mining? Please provide an example of how each is used. Also explain how you may use data analytics and data mining in a future career. Lastly, be sure to utilize at least one scholarly source from either the UC library or Google Scholar.
Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:
Ask an interesting, thoughtful question pertaining to the topic
Answer a question (in detail) posted by another student or the instructor
Provide extensive additional information on the topic
Explain, define, or analyze the topic in detail
Share an applicable personal experience
Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
Make an argument concerning the topic.
At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.
Paper on SQLMap
Write an essay discussing sqlmap, an automated tool for sql injection and database takeover in 500 words or more. Why do we need an automated tool for sql injection?
Write in essay format.
Use the five paragraph format. Each paragraph must have at least five sentences.
Include an interesting meaningful title.