Signature Assignment

  • Assignment Requirements: Integration: One Piece of a Large Puzzle. 

Refer back to the Marseille Urban Planning Project article you read in the Week 1 Content folder within your course Documents and Resources. In this article, you can visually see how multiple departments came together using Esri’s CityEngine tool to create and implement an urban plan to restructure a city within a matter of months.

To complete this assignment, choose a large public works project, such as the construction of a new high school. For the public works project you can select any project – this could be a local project or a hypothetical situation (adding a city park, expanding a freeway, creating more housing, building a new commercial complex, adding a neighborhood school, building out a train system, etc.). 

Write a two page paper, using the newest APA formatting edition within a Microsoft Word Document, that identifies two phases that can be independent projects. Discuss each phase and discuss how each phase is an independent project and what makes them independent projects.  Specifically, state how each project meets the definition of a project, and describe the product, service, or result of each project, and why it is temporary.

Applied Machine Learning

Total 21 question.

Have to use ANACONDA NAVIGATOR_under JUPYTER… 

DOWNLOAD LINK: 

https://www.anaconda.com/products/individual

Open Source (Free Individual)

I added two excel database sheets and .ipnyb folder. 

Network Forensics-1

In this module, we will discuss network forensics. We move away from cellular/smartphone discovery and look at the wired and wireless investigation. We will use the European Union Agency for Cybersecurity’s Introduction to Network Forensics guide. 

The document is available at:

https://www.enisa.europa.eu/topics/trainings-for-cybersecurity-specialists/online-training-material/documents/introduction-to-network-forensics-handbook.pdf

1) What types of network investigations are typical of those that fall under the topic of network forensics?

2) How is information acquired from the various types of networks?

3) Describe several tools for network forensics and how the tools function? 

· No Plagiarism 

· Each Answer Should be 400 words without References.

!!! NEED 2  ANSWERS FOR THIS QUESTION WITH 0% PLAGIARISM !!!!

Cyber Law

 Research frequency-division multiplexing. Identify three everyday examples of FDM use. For each of these examples show how FDM is used and it works. Summarize your findings in a brief paper. 

Instructions:

 In these writing assignments, there is not a “right or wrong” answer. Rather, cases provide a vehicle for you to demonstrate your understanding and ability to apply course concepts. You must use at least two appropriate sources (other than your course textbook) that are properly cited; do not solely use the case itself to support your position. You are strongly encouraged to use the following outline so that your analysis is organized appropriately:

  • Identify both the key issues and the underlying issues. In identifying the issues, you should be able to connect them to the principles which apply to this situation.
  • Discuss the facts which affect these issues. The case may have too much information. In your discussion, you should filter the information and discuss those facts which are pertinent to the issues identified above.
  • Discuss your proposed solution/recommendation to the problem and include how you would implement it. What actions would you propose to correct the situation, based on the knowledge you have gained in this course? Be sure to support your recommendation by citing references in the text and in the supplementary readings. You should also draw on other references such as business periodicals and journals. Remember that an ANALYSIS is more than simply a SUMMARY of the Writing Assignment.
  • Discuss follow-up and contingency plans (if necessary). How will the organization know that your proposed solution is working? What should they do if it does not work?
  • Word count is 400 words, not including references and figures. References should be in the APA style. 

Social Media

 

This week, you watched the Social Media Revolution 2019 #Socialnomics and read The Beginner’s Guide to Social Media.  https://moz.com/beginners-guide-to-social-media

Discussion:
As you review the multiple statistics that display in Social Media Revolution 2019 #Socialnomics, and reflecting on what you read about social media, assess the impact of social media in your life.
Question #1: 
What role does Social Media play in your life? Are you aware of the social media policies of the organizations where you work, attend school, or volunteer? Have you used social media to resolve problems, participate in a cause you are passionate about, or to learn about UMGC? How does Social Media impact your personal and professional communications?

 

Topic 2: Digital Humanitarianism

This week you also watched Innovations in Humanitarian Relief (PBS online video) https://www.pbs.org/video/innovation-humanitarian-relief-e6xivw/

Discussion:
In the wake of natural disasters and acts of terror, several tech companies are making an effort to improve traditional responses effort in humanitarian relief.

Question #1: 
Do you think that humanitarian aid workers constantly need new ways of thinking, new products and new processes to better respond to disasters? Why or why not?

 

Topic 3: Cyber Psychology

This week you read: Cyber psychology and cyber behavior of adolescents-the need of the contemporary era  https://www.sciencedirect.com/science/article/pii/S1877050917326704

Discussion:

Cyber psychology evaluates how we interact with others using technology, how we can develop technology to best fit our requirements, and how our behavior and psychological states are influenced by technology. Cyber psychology applies psychological theory to explain how individuals interact in cyberspace and how these interactions might affect our offline lives. It offers a new way to define the self and society.

Question #1: 

How does technology impact psychology? List at least three advantages and at least three disadvantages.

Question #2: 

Do you present yourself differently in different online spaces? In what ways are you different and in what ways are you consistent? Why do you think this is?

DS-3

In 500 words or more, discuss the risk and costs of compromised data integrity breaches. Focus on integrity not confidentiality. Look at military, education, science, medicine, finance, utilities, municipalities, etc.

Use at least three sources.  Use the Research Databases available from the Danforth Library, not Google.   Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.

Write in essay format not in bulleted, numbered or other list format. 

Reply to two classmates’ posting in a paragraph of at least five sentences by asking questions, reflecting on your own experience, challenging assumptions, pointing out something new you learned, offering suggestions. These peer responses are not ‘attaboys’.   

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your post and that you reply to two classmates in a substantive way (not ‘nice post’ or the like).  Your goal is to help your colleagues write better. Do not use spinbot or other word replacement software. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about. Please do not submit attachments unless requested.

Discussion

What is the firewall evaluation criteria for your organization? Does your organization have one and in your opinion does it addresses the overall network security or does it have gaps? Either way, talk about how it can be improved.

Discuss how the advent of AI/MI and how it may affect network security. What do you think network security will look like 5 years, 10 years, or 15 years from now. How will the cloud play into this scenario or will there be something bigger than the cloud that could affect network security?

Operative Paradigm

  1. Develop a personal “operative paradigm” based on a review of the paradigmatic assumptions and concepts involved in each of the three basic methodological approaches in organization and management research. First, a brief review of the three basic methodological approaches in organization and management research is conducted. Second, the preferred personal “operative paradigm” is covered based on the following components: assumptions, concepts, propositions, hypotheses, variables, and operational definitions.
  2. The body of your paper should be 7–10 pages long, written in good APA, and with at least 10 references.