Topic Summary

There are two tasks:

Task 1:

1. Discuss the relationship between data, information, and knowledge

2. Support your discussion with at least 3 academically reviewed articles.

3.  Why do organizations have an information deficiency problem? Suggest ways on how to overcome the information deficiency problem.

The Topic should be 300 words on the above points. 

Task 2:

Reply to the below two responses ( Response 1 and Response 2) attached with a minimum of 150 words each. 

There should be absolutely NO plagiarism in the final reports( attach a plagiarism report) 

Apply research to create original insights and/or solve real-world problems

 

How did this historic landmark case affect the scientific field of computer forensics, and the required expert testimony of forensic professionals? Your paper should assess the problem that prompted the lawsuit and draw on key points from your research to justify your views.

The complete essay should be no less than 3 double-spaced pages, conforming to APA style guidelines. Be sure to reference at least three sources outside of the course book. Ensure that the paper has a complete introduction, main body, conclusion, and reference page.

Assignment Requirements:

  1. Include a title page.
  2. Font size 10 or 12.
  3. At least 3-5 full double-spaced pages in length, not counting the title page or reference page.
  4. Includes a highly developed viewpoint, purpose and exceptional content.
  5. Demonstrates superior organization, is well ordered, logical and unified.
  6. Free of grammar and spelling errors.
  7. No evidence of plagiarism.

Spr1.1

Assignment 1

“A picture is worth a thousand words” may be a lovely cliché, but it’s exactly the wrong way to view visualization. For this week’s discussion question, please view the Periodic Table of Visualization at the following link:

http://www.visual-literacy.org/periodic_table/periodic_table.html

Choose one Data Visualization and one Compound Visualization by placing your mouse cursor over each option. Provide a brief description of your choices and explain why you made your choices. Also, describe what advantage your choices have over the others.

Requirement: 

· ****Separate word document for each assignment****

· Minimum 300-350 words. Cover sheet, abstract, graphs, and references does not count.

· Add reference separately for each assignment question.

· Strictly follow APA style. 

· Include at least two citations (APA) from academic resources

· No plagiarized content please! Attach a plagiarized report.

· Check for spelling and grammar mistakes!

· $5 max. Please bid if you agree.

Assignment 2

Security experts recommend using a multilayered defense strategy. A multilayered defense puts multiple controls in place to protect computer system, networks, and other resources.

Answer the following question(s):

Does a multilayered defense guarantee that attacks will not be successful? Why or why not?

Requirement: 

· ****Separate word document for each assignment****

· Minimum 300-350 words. Cover sheet, abstract, graphs, and references does not count.

· Add reference separately for each assignment question.

· Strictly follow APA style. 

· Sources: 2 References to Support your answer

· No plagiarized content please! Attach a plagiarized report.

· Check for spelling and grammar mistakes!

· $5 max. Please bid if you agree.

Assignment 3

Project Part 1.

Refer to the “Project Part 1-Active Directory Recommendations (1)” word document for questions and instructions. 

Requirement: 

· ****Separate word document for each assignment****

· Minimum 3 pages. Cover sheet, abstract, graphs, and references does not count.

· Add reference separately for each assignment question.

· Strictly follow APA style.

· No plagiarized content please! Attach a plagiarized report.

· Check for spelling and grammar mistakes!

· $15 max. Please bid if you agree.

The Internet & Databases

 

Answer the following question:

How do you believe smart technologies and the Internet will continue to play an integral role in the use of databases as we collect more contextual, personalized data from all around us?

Instructions

  • This is a required assignment, worth 15 points. The assignment  must be submitted by the due date. Late assignment are not allowed. 
  • You are required to submit a minimum of two postings. Points will be deducted for not fulfilling this minimum requirement.
  • Apply and use the basic citation styles of APA is required. Points are deducted per the rubric for this behavior.
  • Do not claim credit for the words, ideas, and concepts of  others. Use in-text citation and list the reference of your supporting  source following APA’s style and formatting. Points are deducted per the  rubric for this behavior.
  • Do not copy and paste information or concepts from the Internet  and claim that is your work. It will be considered Plagiarism and you  will receive zero for your work. A second offense results in a zero for  the course. A third is termination from the university.

Information Sec System

  

At present, there is a banking service that is needs improved authentication and authorization. Your goal in this assignment is to improve this service so that it does authenticates and authorizes its users properly. You will propose an array of solutions (see slides from module 1 – authentication, access control, introduction) so that 

1. Users are authenticated with password-based method

a. discuss the method, 

b. how to technically implement it, 

c. advantages and limitation, 

d. Include any sources you are using to answer including websites, books, and papers from conference and journals. 

2. Then discuss if users could be authenticated using biometric method or a second method of authmetication/verification– 

a. discuss the potential method, 

b. how to technically implement it, 

c. advantages and limitation, 

d. Include any sources you are using to answer including websites, books, and papers from conference and journals. 

3. Compare both password and biometric based method in terms of advantages and disadvantages.

Infer Stats in Decision-Making QUALITATIVE Journal Submit Article Reviews

You will review both quantitative and qualitative research.  The topic is up to you as long as you choose a peer-reviewed, academic research piece.  I suggest choosing a topic that is at least in the same family as your expected dissertation topic so that you can start viewing what is out there.  There are no hard word counts or page requirements as long as you cover the basic guidelines.  You must submit original work, however,  and a paper that returns as a large percentage of copy/paste to other sources will not be accepted.  (Safe Assign will be used to track/monitor your submission for plagiarism. Submissions with a Safe Assign match of more than 25% will not be accepted.) 

Please use APA formatting and include the following information:

  • Introduction/Background:  Provide context for the research article.  What led the author(s) to write the piece? What key concepts were explored? Were there weaknesses in prior research that led the author to the current hypothesis or research question?
  • Methodology:  Describe how the data was gathered and analyzed.  What research questions or hypotheses were the researcher trying to explore? What statistical analysis was used?
  • Study Findings and Results:  What were the major findings from the study? Were there any limitations?
  • Conclusions:  Evaluate the article in terms of significance, research methods, readability and the implications of the results.  Does the piece lead into further study? Are there different methods you would have chosen based on what you read? What are the strengths and weaknesses of the article in terms of statistical analysis and application? (This is where a large part of the rubric is covered.) 
  • References   

writing

Discuss in 500 words or more the differences between and advantages of MAC, DAC, and RBAC.

Use at least three sources.   Use the Research Databases available from the Danforth Library not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Research Essay

 Description 

Your final research essay will present a comparison of Sara Teasdale’s poem, “There Will Come Soft Rains” and Ray Bradbury’s short story “There Will Come Soft Rains.” Your will address one of the following questions: 

1) What is the role of humanity in each of the two texts? Expand by illustrating the relationship between nature and humanity as represented in the poem and between humanity and technology as represented in the short story. 

the link for the poem: https://poets.org/poem/there-will-come-soft-rains

the link for the short story: https://urcourses.uregina.ca/pluginfile.php/2300543/mod_resource/content/1/7_There%20Will%20Come%20Soft%20Rains%20by%20Ray%20Bradbury.pdf

you need to compare  both the poem and short story and write a research essay based on the question.