75 words answer post give feedback
Risk management and assessment
Assessing risks involved in an organization IT
Forensic investigation using Autopsy tool
Conduct a forensics investigation.
Consider using an image from the Internet or a personal device. There could be issues related to using a live, active, personal device (example: corruption of the device). If using a personal device, consider using an old, outdated phone, if available.
Use Autopsy tool to gather forensics data for analysis. You are simulating the process of gathering this data, so you do not need to investigate a compromised device or system. The project deliverables are as follows:
The paper should provide the following information:
· Executive Summary of your investigation, including a description of the device or systems and the Autopsy tool used for the forensics analysis.
· Step-by-step description you used to gather data for analysis
· Report on the information that was obtainable from the device
· Graphics evidence that you conducted the forensics data gathering and analysis
The paper should be in a form that would be used for reporting to a court or a law enforcement agency. Be sure to provide graphics evidence of your forensics investigation effort (Screenshots, reports, etc.). References should be in APA format.
5 pages document with screen shots of the process
Answer all the questions mentioned
APA format and need minimum 5 scholarly references
need plagiarism report with the document and on time
431F3
CHECK ATTACHMENT
Advanced Operating System
Write a C or C++ program to run on a Unix platform. This program will take three arguments. The first argument will be the pathname of a directory on the system. The second argument will be a character string. The third argument is the maximum number of output lines, N. Your program should display at most N entries in the directory tree in a text file.
You need to implement three system calls: Open, Read, and Stat
Details of the system calls are given below. You can also use man command pages to learn more about these system calls.
1. Open system call: DIR *opendir (const char *dirname) Opendir system call opens a directory and returns a pointer to a struct DIR. DIR represents a directory stream, which is an ordered sequence of all directory entries in a particular directory.
2. Read system call: struct dirent *readdir (DIR *dirp) Once the directory has been opened, you can read the directory with readdir system call. Each time you call readdir system call, it returns another entry in the directory.
3. Stat system call: int stat (const char *path, struct stat *sb) Once you have the name of an entry, you can use the stat system call to get more information about it. stat function takes two arguments, the first is a path name and second is a pointer to struct stat, which contains information about the file.
Guidelines and Requirements
1. You can use either C or C++ for this programming assignment.
2. Your program should run on a UNIX platform
3. Add comments (about the function/variable/class) to your code as much as possible
4. Zip your project including source file(s) and input text data files (if any)
IT345 Week 6 discussion
Pick a topic below and post your reply. Your response should be at least 500 words and appropriately cites your resources.
Topics:
- What jobs have been eliminated due to technology? What jobs have been created?
- Do automated systems mean fewer jobs for high-skilled workers?
- Would you want to telecommute? Why or why not? Is it a viable solution for all employers?
- Is hacking that does no direct damage a victimless crime? Give an example to support your case
C++
C++ project
Discussion
“A picture is worth a thousand words” may be a lovely cliché, but it’s exactly the wrong way to view visualization. For this week’s discussion question, please view the Periodic Table of Visualization at the following link (http://www.visual-literacy.org/periodic_table/periodic_table.html). Choose one Data Visualization and one Compound Visualization by placing your mouse cursor over each option. Provide your classmates with a brief description of your choices and explain why you made your choices. Also, describe what advantages do your choices have over the others.
Strict APA format
2 pages
At least 2 scholarly references.
Computer science
Briefly describe the following
1.profession (15 marks)
2.professional(15 marks)
3.code of conduct (15 marks)
4.Ethics(15 marks)
5 contracts(15 marks)
6.policies(15 marks)
7.practices(15 marks)
Assignment
1). Download and install the “R” Programming tool (CRAN) onto your computer. First install the “Basic” version of “R”, then (2) install the “R” Studio. (3). Download and install the MySQL plug-in for Excel onto your computer. (4). Download and install the Python programming tool onto your computer. Verify successful installation of all tools by attaching one screen shot of each that display your completion of each software installation. A total of four screen shots (2 for “R”, 1 for MySQL, and 1 for Python) is expected. Save the screen shots as a MS Word document (*.docx).
Either click the “Write Submission” link below and directly paste your screen shots into this forum OR add the screen shots as a Microsoft Word document attachment (Mac users, please remember to append the “.docx” extension to the filename.). Also, please summarize in 1 -6 lines (in the Comment box) how the installation went for you. That is, what problems, if any, did you have and how were they solved? What things went right for you during the installation?
