Spr1.2

 Assignment 1

In Chapter 2, the author talks about four key stages with regards to data visualization workflow. Select one key stage and expand on the author’s comments about the stage.

Textbook is attached, “Andy Kirk – Data Visualisation_ A Handbook For Data Driven Design-Sage Publications (2019)”.

Requirement: 

· ****Separate word document for each assignment****

· Minimum 300-350 words. Cover sheet, abstract, graphs, and references does not count.

· Add reference separately for each assignment question.

· Strictly follow APA style. 

· Include at least two citations (APA) from academic resources

· No plagiarized content please! Attach a plagiarized report.

· Check for spelling and grammar mistakes!

· $5 max. Please bid if you agree.

Assignment 2

A human resources manager stores a spreadsheet with sensitive personal information on her local workstation. The spreadsheet is the only file with sensitive data, and the name of the spreadsheet does not change.

As a security specialist, you must choose the best form of encryption to protect the spreadsheet. Your choices are:

· BitLocker

· BitLocker To Go

· File encryption via Encrypting File System (EFS)

· Folder encryption via EFS

Answer the following question(s):

Ø Which form of encryption would ensure the spreadsheet is always stored on the disk in encrypted format? More than one form may be correct.

Requirement: 

· ****Separate word document for each assignment****

· Minimum 300-350 words. Cover sheet, abstract, graphs, and references do not count.

· Add reference separately for each assignment question.

· Strictly follow APA style. Length – 2 to 3 paragraphs. 

· Sources: 2 References to Support your answer

· No plagiarized content please! Attach a plagiarized report.

· Check for spelling and grammar mistakes!

· $5 max. Please bid if you agree.

Assignment 3

Project Part 2.

Refer to the “Project Part 2-Access Controls Procedure Guide” word document for tasks and instructions. 

Requirement: 

· ****Separate word document for each assignment****

· Minimum 3 pages. Cover sheet, abstract, graphs, and references do not count.

· Strictly follow APA style.

· No plagiarized content please! Attach a plagiarized report.

· Check for spelling and grammar mistakes!

· $10 max. Please bid if you agree.

Assignment

 

create a portfolio related to a specific topic from the list below. Make sure to explain and backup your responses with facts and examples.

  • A case study assessing risk and proposing security for some chosen organization (real).
  • Review of a security incident or threat, describing it in-depth and proposing a controls for future use
  • Technology review, reviewing some security product or control technology
  • Survey of technology, theory, or practice building on and expanding some topic covered

This assignment should be in APA format and have to include at least two references (Only peer reviewed articles/Technical white papers).  Minimum of 1000 words

java interview question

 

1. Describe the key architecture points in a high capacity enterprise solution processing over 100/000 TPS?

 2. What are the key breakage points in the architecture? How would you improve upon them?

SQL Servers installation and access (Cyber Security)

 Using your textbook, the Internet, and any other suitable references, answer the following questions in your own words. Save your answers in a single file (minimum length of a full page of content).  Remember to include any sources that you use.

  1. Why would you perform a silent installation?
  2. Under what circumstances would a system administrator lose access to an instance of SQL Server? Give an example.
  3. Oracle offers a free download of all editions of the Oracle Database.  How does the company derive benefits from this approach?

Questions Need to be Completed in 10 hours

1. (250 words)

 

Before an organization considers scaling, it should understand the organizational system performance and potential system bottlenecks. Web Page Test (https://webpagetest.org/) is a site evaluator that creates a detailed report. The report helps identify images that can be further compressed and the impact of the systems cache, as well as potential benefits of compressing text. 

Use WebPagetest to evaluate two or more websites. In one page, discuss how the report’s findings align with your user experience.

The paper must adhere to APA guidelines including Title and Reference pages.  The Title and Reference pages do not count towards the page count requirement. There should be at least one scholarly source listed on the reference page.  Each reference cited in the text must appear in the reference list, and each entry in the reference list must be cited in text. APA requirements for this class include:

  • A title page
  • 12-point Time New Roman font
  • Your paper should be typed and double-spaced with 1″ margins on all sides
  • The first sentence of each paragraph should be indented one tab space
  • All papers should contain the page number, flush right, in the header of every page. Use the automatic page-numbering function of your word-processing program to insert page numbers in the top right corner; do not type page numbers manually.
  • APA 7th edition in-text citations
  • Reference page

2. (250 words)

 

This week’s assigmnet is based on Chapter 6 & 7. Please complete the following assignment. You should have acquired the require text book for course.

Week 5 Assignment .pdf (Please Find attached Document)

3. (250 words)

 

Some partitional clustering algorithms that automatically determine the number of clusters claim that this is an advantage.  Using your required textbook, Chapters 6 & 7 as a guide, discuss two (2) situations in which this is not the case.

PLEASE PROVIDE PAGE NUMBER from your textbook in your citation.

Assignment

Instructions

  • Add two separate HTML pages that contain: One Page includes details about your Contact Information (home vs work) and best way to contact
    Second Page includes your favorite Links with a brief information about each link
     
  • Using  headings , paragraphs, lists and images in your pages.
  • Using ONE External CSS file to format your pages
  • Your Style file should include at least TEN different rules  that applied on your HTML files.

Make sure that all your site has a valid HTML code

Operation Security

 

A tenet of telecommunications says the more people who access a network, the more valuable the network becomes.  This is called Metcalfe’s Law.  When organizations implement security policies, there are pressures and trade-offs ~~ Chapter nine examines different types of users on networks as it reviews an individual’s need for access & how those needs can lead to risks.

  • How can the use of security policies reduce risk? Explain
  • How can a SAP reduce risk?  Explain
  • Why are end-users considered the “weakest” link in regards to implementing security policies and controls? Explain