As a cyber investigator, you are investigating a group known as BLGRUS (Bootleggers R Us) that is allegedly posting your company’s music files without your permission. Write a 2-3 page document on your plan to infiltrate their group (keep in mind their motivations to commit the offense), identify the users, send any legal documentation, and preserve evidence.
THREE-TIER WEB APPLICATION ARCHITECTURE-AWS
A three-tier web application architecture has been generically defined as the presentation, business logic, and data storage tiers. However, Amazon Web Services defines the three-tier web application architecture as the web, application, and storage/database tiers.
Write a paper comparing the generic three-tier web application architecture to that applied by Amazon Web Services.
Apply APA Edition 6 formatting.
Use at least three properly documented references (do NOT use wikis).
Correctly cite your references using APA Edition 6 formatting.
Your paper should be at least 500 words in length using good grammar.
Use complete sentences and paragraphs. Do not use bullets.
Net Neutrality Discussion Board
The term net neutrality refers to the equality of data as it is transferred over the Internet. For instance, the data from an individual and the data from Microsoft are treated the same. A recent controversy surrounding the cable giant Comcast brought up the possibility of ISPs interfering with the delivery of Internet data. According to complaints by customers, Comcast has been blocking the use of P2P sites like BitTorrent to download movies, music, and other large files. Comcast, like most ISPs, includes a statement in its terms of service that allows it to use tools to “efficiently manage its networks,” in order to prevent those customers using a higher than normal level of bandwidth from interfering with the access of other customers. However, the Comcast issue was considered by many to be a blatant net neutrality issue—blocking access to multimedia from sources other than its own cable sources.
Do you think the actions taken by Comcast were ethical?
Does an ISP have a right to block selected Internet traffic? Why or why not?
Was there a more ethical way Comcast could have handled the problem of some users consuming a higher than normal level of bandwidth?
online voting system along with biometrics
Requirements :
- Title of the project (with the list of project team members);
- Executive Summary;
- Table of Contents;
- Introduction;
- Project Plan;
- Functional Specifications (including descriptions of Actors/Roles; Business Rules; Use-Case
Diagrams with Use-Case descriptions; Examples of Class Diagrams (related to particular Use Cases); Examples of Object Diagrams [related to the selected Class Diagrams]; Examples of Sequence Diagrams; Examples of Collaboration or Communication Diagrams; Examples of State- Chart Diagrams); - Functional Tests Plan;
- System Design Specifications (including System Architectural [Layered, “Physical”] Design
Scheme selected; Package Diagram [populated with interrelated classes]; Database Tables; Entity- Relational diagrams; Window Navigation Diagrams; Drafts of User Interfaces; and Examples of System-Response Report Forms); - Integration Tests Plan;
- Issues to Future Studies;
- Conclusion;
- References;
- Appendices (if any).
Business Intelligence
1. Define data mining. Why are there many names and definitions for data mining?
2. What are the main reasons for the recent popularity of data mining?
3. Discuss what an organization should consider before making a decision to purchase data mining software.
4. Distinguish data mining from other analytical tools and techniques.
5. Discuss the main data mining methods. What are the fundamental differences among them?
6. Visit teradatauniversitynetwork.com. Identify case studies and white papers about data mining. Describe recent developments in the field of data mining and predictive modeling.
Machine learning
Exp#1: Develop a system based on two-class Support Vector Machine (SVM) that can predict if the subject will purchase iPhone. Dataset:
https://github.com/omairaasim/machine_learning/blob/master/project_11_k_nearest_neighbor/ip hone_purchase_records.csv
Training/ Test Split: 75-25
Exp#2: Develop a voting classifier based on Decision Tree, Logistic Regression and SVM.
Biography Viewer
You need to use a table view and a navigation controller. However, the split view is neither required nor forbidden.
Choose one of your favorite games, and implement an IOS app that shows the biography of each character of the game.
For Requirements and screenshots of the sample app, please check the file attached.
paper
This week, you have read about server virtualization and cloud computing in chapter 6 of your textbook. For your written assignment this week, complete a case study of the organization you work for (use a hypothetical or “other” organization if more applicable) that will address the following prompts:
• Describe the organization’s environment, and evaluate its preparedness for virtualization.
• Explain Microsoft (or another product) licensing for virtualized environments.
• Recommend a configuration for shared storage; make sure to discuss the need for high availability and redundancy for virtualization for the organization.
• Explain Windows Azure capabilities for virtual machines and managing a hybrid cloud, including Windows Azure’s Internet as a Service (IaaS) and storage capabilities
Make a recommendation for cloud computer use in the organization, including a justification for your recommendations.
Submit your midterm research paper as a single document. Your paper should meet the following requirements:
• Be approximately four to six pages in length (1200-1800 words), not including the required cover page and reference page.
• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
• Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.
Week 3b IT impact essay
Find a recent article that relates to data leakage related to user information. How was the information accessed? What were the ramifications? What type of data was lost? What could have been done differently to protect user data? Will this have an impact on users who adopt this technology?
Post your reply by Wednesday at midnight. Your response should be at least 300 words and appropriately cite your resources.
Respond to two of your classmates by Sunday at midnight. Your responses should be at least 150 words and should be substantive. You should offer additional resources, insight, or other helpful feedback. A simple “I like your post” will result in a 0.
You will not be able to see other posts until you make your first post.
Document Store Implementation
This project implements a document store system. It can be written in any language, but I’ve been told that python works best because of the use of dictionaries. I need it back by midnight tomorrow which is 0:00 CST December 6th. All information should be given in the pdf. Attached are also the txt files that will be used, data.txt, queries copy.txt, and just a solution txt you can view to see the correct answer.