data communication and networking

  1. Write a short research paper on the development of Internet2 and how this deployment of this network will impact corporate WANs based on the Internet.
  2. Devise a strategy for connecting LANs for a single corporation with four geographically separate entities into a single corporate wide area network
  • Turn in the Paper to SMARTHINKING.com before submitting your final paper.
  • Turn in a final paper and the paper with the SMARTHINKING.com tutor comments.
  • Complete the project in APA format
  • Paper should include at least 3 references
  • Paper should be a minimum of 4 pages in length

Module 8 Assignment : Cyber Law

 Module 8 Assignment

On April 18, 2016, The United States Supreme Court denied a petition for certiorari (refused to review the lower court’s ruling) in the case of Authors Guild v. Google, Inc., 804 F. 3d 202 – Court of Appeals, 2nd Circuit 2015.

Tell me what you would do if you were the Supreme Court.

That case let stand the ruling of the Court of Appeals which can be found at the following website:

https://scholar.google.com/scholar_case?case=2220742578695593916&q=Authors+Guild+v.+Google+Inc&hl=en&as_sdt=4000006  last accessed February 9, 2019.

Please write a 500-word summary of fair use as this court decision says it. please use APA format and add references. 

You have been asked by management (manufacturing, healthcare, retail, financial, etc. ) to create a demo using a data analytic or BI tool.

Project Based Midterm

You have been asked by management (manufacturing, healthcare, retail, financial, etc. ) to create a demo using a data analytic or BI tool. It is your responsibility to download and produce outputs using one of the tools. You will need to focus your results on the data set you select.  

Ensure to address at least one topic covered in Chapters 1-5 with the outputs. The paper should include the following as Header sections:

Introduction
History of Tool [Discuss the benefits and limitations] Review of the Data [What are you reviewing?] Exploring the Data with the tool
Classifications Basic Concepts and Decision Trees
Classifications Alternative Techniques
Summary of Results
References

Types of Data Analytic Tools

Examples of Dataset:https://www.forbes.com/sites/bernardmarr/2016/02/12/big-data-35-brilliant-and-free-data-sources-for-2016/#4b3e96f1b54d

Discussion 6

The readings this week expand on investigation and of digital forensic analysis and investigations. Organizations, especially those in the public, health and educational areas are bound by legal and statutory requirements to protect data and private information, therefore digital forensics analysis will be very beneficial when security breaches do occur. Using this weeks readings and your own research, discuss digital forensics and how it could be used in a risk management program.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

Presentation power point.

Hide Folder InformationTurnitin®Turnitin® enabledThis assignment will be submitted to Turnitin®.Instructions

Pick one of the below operating systems and present information on the operating systems, and your thoughts comparing the selected operating system with other systems.

  • Windows 
  • Linux 
  • Unix
  • Android
  • iOS

Due DateOct 22.

Only seroious bidder.
Must be Computer Science Major to do this task.

ITISP W 2 D

 The vast majority of the population associates Blockchain with cryptocurrency Bitcoin; however, there are many other uses of blockchain; such as Litecoin, Ether, and other currencies. In this discussion, please describe at least two cryptocurrencies with applicable examples. Discuss some similarities and differences. Lastly, discuss if you have any experience using any cryptocurrencies.