bharg research paper

 

Find a peer-reviewed scholarly journal article discussing government planning and/or entrepreneurial innovation. Complete a review of the article by writing a 2-3 page overview of the article. This will be a detailed summary of the journal article, including concepts discussed and findings. Additionally, find one other source (it does not have to be a peer-reviewed journal article) that substantiates the findings in the article you are reviewing. 

You should use the UC library (https://www.ucumberlands.edu/library) and/or Google Scholar to find these types of articles (https://scholar.google.com/ )

Once you find the article, you will read it and write a review of it.  This is considered a research article review.

Your paper should meet these requirements: 

  • Be approximately 3-4 pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Discussion 4

 

in  this module, we will discuss network forensics. We move away from  cellular/smartphone discovery and look at wired and wireless  investigation. We will use the European Union Agency for  Cybersecurity’s Introduction to Network Forensics guide. The document is available at:

https://www.enisa.europa.eu/topics/trainings-for-cybersecurity-specialists/online-training-material/documents/introduction-to-network-forensics-handbook.pdf

For the discussion, answer the following questions:

1) What types of network investigations are typical of those that fall under the topic of network forsensics?

2) How is information acquired from the various types of networks?

3) Describe several tools for network forensics and how the tools function? 

Your  response to the DQ must be a minimum of 400 words. You must provide  references for your response (APA format). You will need to reply to two  (2) other fellow student’s posts (See the syllabus). The responses must be made in the week due.

CS-340 2-1 Assignment:CRUD in MongoDB

 Please see attached for better formatting.

Overview

To understand and make use of any database system, you must learn various techniques associated with the fundamental operations of create, read, update, and delete (CRUD). For this assignment, you will begin by creating databases of document collections and performing basic reading or querying operations to retrieve specific documents from the database system. You will also gain practice updating documents and subdocuments, and removing documents from a database. You will use the mongo shell and mongoimport commands to complete this assignment.

Note: Since this is the only assignment for Module Two, it is longer than a typical assignment. Be sure to begin working on this early in the week.

Prompt

After completing the textbook reading and reviewing the mongoimport tool documentation in the module resources, complete the following tasks using the mongo shell in Apporto.

  1. The data set for this assignment, city_inspections.json, has already been loaded into the Apporto environment for you. Using the mongoimport tool, load the database “city” with documents found in the city_inspections.json file into the “inspections” collection. Complete this by typing the following commands in the Linux terminal to perform the import in the right directory:
    cd /usr/local/datasets/ #change into the Apporto directory with the data sets mongoimport --db city --collection inspections ./city_inspections.json #mongo import utility
    TIP: In any Linux systems, commands must be exact and use proper syntax and case sensitivity.
  2. Verify your load by switching to the “city” database and issuing the following queries in the mongo shell:
    1. db.inspections.find({"id" : "10021-2015-ENFO"})
    2. db.inspections.find({"result":"Out of Business"},{"business_name":1}).limit(10)
    3. Provide screenshots of the results as evidence.
  3. Using the appropriate commands in the mongo shell, insert a document to the database named “city” within the collection named “inspections.” Use the following key-value pairs as data for your document.
    KeyValueid“20032-2020-ACME”certificate_number9998888business_name“ACME Explosives”dateToday’s dateresult“Business Padlocked”sector“Explosive Retail Dealer-999”addressnumber -> 1721
    street -> Boom Road
    city -> BRONX
    zip -> 10463
    Be sure the address is inserted as a sub-document, and use the JavaScript function Date() for “Today’s date.” Verify your database creation and insertion using the findOne() function in the mongo shell. Provide a screenshot as evidence.
  4. Answer the following questions using MongoDB queries.
    1. What is the distinct list of inspection “sector” in the current inspections collection? How many are in the list? Do not count by hand.
    2. What is the difference in the date data type for the business named “AUSTIN 2012” versus your business document insertion of “Acme Explosives”?
    3. How many businesses have a “Violation Issued”? (See Value column above.)
    4. Verify by providing screenshots of the queries and results as evidence.
  5. Using the appropriate command in the mongo shell, update the document with the ID “20032-2020-ACME” in the collection “inspections” in the database “city” with the information below.
    KeyValuebusiness_name”New ACME Flowers”result”Business Re-opened”comments”Flowers after the explosion”
    Verify your database update using the appropriate find() function in the mongo shell. Provide a screenshot as evidence.
  6. Using the database “city” with documents found in the “inspections” collection, perform the tasks listed below. Verify by providing screenshots of the results as evidence.
    1. Update all the documents that contain the key-value pair “city”:”ROSEDALE” in the address subdocument by changing the zip code in the address subdocument to “76114”.
    2. Remove the first document with the key-value pair “result”:”Violation Issued.”
    3. Guidelines for Submission
      Submit a Word document containing all of your screenshots. Use a screenshot tool, such as the Snipping Tool, for your screenshots and be sure to enlarge the images in the Word document before submitting. This will help make sure that your screenshots are an appropriate size for your instructor to be able to read them. Refer to this Use Snipping Tool to Capture Screenshots guide for help with taking screenshots.

PYTHON

 

Objective: Web scraping with Python

Grading Procedures: All submission will be checked with a plagiarism software. Submission having more than 70% similarity to any other student submission and/or internet resources will share total points the assignment. For example, 4 submissions having more than 70% similarity will be graded as 100/4 = 25pts, assuming that the program is worth of 100 pts.

Description: The university maintains course schedules at http://appsprod.tamuc.edu/Schedule/Schedule.aspx for different semesters (spring, fall, winter, etc ). You will develop a Python program to dynamically complete certain tasks, such as list, find, sort, and save, in course listings from schedule portal. You will mainly use “request” and “BeautifulSoup” libraries (or similar, see exercise 12.1). The program will operate at different level: Semester and Department.  Your program will be a menu based application. Assume that you project file is myproject.py. Once you run, it will show last 5 semester (fall, spring, summer only, (not winter, may mini))

> python myproject.py
Choose a semester: 1) Sprint 2021   2)Fall 2020  3)Summer II  4)Summer I 5)Spring 2020 
Selection: 2

Here, your program will parse the data from website and show only last (most recent) 5 semesters. User will make selection, then, you will show departments for the selected semester (Fall 2020). Note that selected semester is visible before a “>” sign.

Fall 2020> Select a department:
1) Undeclared
2) Accounting and Finance
3) Art
4) Ag Science & Natural Resources


30) Social Work
31) Theatre
Q)Go back

Selection: 3

Fall 2020> Art > Select an option:
1) List courses by instruction name
2) List courses by capacity
3) List courses by enrollment size
4) List courses by course prefix
5) Save courses in a csv file
6) Search course by instruction name
7) Search courses by course prefix
Q)Go back
Selection: ??

Here, your program will parse the data from website and show all available department then list of tasks. Q (go back) option will take user to previous level. 

Course listing output should show the following fields. For instance for course listing for “Fall 2020> Computer Science & Info Sys> List the course by prefix ” should show

PrefixID         Sec              Name                                Instructor          Hours   Seats   Enroll.

COSC1301     01      WIntro to CompuLee,                    Kwang                3           35           10     

COSC1436     01      EIntro to Comp Sci & ProgBrown,  Thomas             4           40            36  

COSC1436     01L    Intro to Comp Sci & ProgBrown,       Thomas                         40            36

COSC1436     01W     Intro to Comp Sci & ProgHu,             Kaoning           4           45            43

COSC1436     02E      Intro to Comp Sci & ProgHu,              Kaoning           4           35            32

as first 5 rows.

You will follow above headers and order (prefix (col. width 6), ID (5), Sec (5) ,Name (25), Inst (20), Hours (5), Seats (5), Enroll. (7) ) for other listing selections too. Data cell should be aligned with column header and left justified. A course name should not have a word more than 5 chars. For instance Algorithms should be abbreviated as “Algor”. The length of course name will not exceed 25 chars. In option 5, the above format should be used to save a listing to a file as .csv format. User will be able to provide a filename for csv file.

For this program you need to develop at least one class (chapter 10) with (possible) many methods.

IT Management Executive Brief

 

Assignment Content

  1. Imagine you are an IT manager at small retail organization that has a new owner. The new owner is from another industry and has expressed a lack of understanding of some of the controls and processes important to IT management and governance. You must help the new owner with understanding these important concepts.

    Write a 2- to 4-page executive brief in which you:

    • Discuss how the 2002 Sarbanes-Oxley Act has affected IT governance, including the major provisions of the act and how this might affect IT, and how IT might assist in compliance.
    • Discuss how IT policies, standards, and procedures can be used to determine if the enterprise is in compliance and support the IT strategy.
    • Discuss how Quality Management Systems (QMS) are important to ensure quality processes are in place.
    • Discuss how IT management and monitoring of controls can be used to assess IT performance.
    • Format your assignment according to APA guidelines.

      Submit your assignment.

ET WK4 – S

275 words

Internet-related crime occurs every minute. Cybercriminals steal millions of dollars with near impunity. For everyone that is captured nearly 10,000 or not captured. For every one successful prosecuted in a court of law, 100 get off without punishment or with a warning. Why is it so difficult to prosecute cybercriminals? 

Fall 2020 – Analyzing & Visualizing Data

Kirk (2019) states composition is reviewing every visual property of the design.  The final layer of design thinking concerned composition: how to position, arrange and size all the chart elements, interactive controls and annotated components across the entire project and the construction decisions within each chart. Meeting the optimum readability and meeting the intent of the project is the objective. Dividing composition into project-level and chart-level composition options can help review and address areas of opportunities.

The scenario – you have just been hired at the company that has only been in business for 6 months.  The position was open due to the previous employee asked to resign due to performance issues.  You are now the designer for the new visual the previous employee was developing.  You must developing new composition choices in the face of having to accommodate new contextual factors listed below.  Provide two project-level and two chart-level composition options to address each topic listed below and provide the reasoning for each option.

1.           You had to demonstrate the worst possible data visualization composition practices in the same physical space/size. In other words what is the worst practice in a scenario where you are limited to an assigned physical space / size for the visual

2.           You had to force yourself to use as small a space as reasonably possible

3.           You have to transpose the work from landscape > portrait or vice-versa

4.           The initial data provided includes scales that will not fit onto one page, but a refresh of the data is indicating a change is needed

5.           The trustworthiness of the entire project is being questioned by upper management

Your research paper should be at least 3 pages (900 words), double-spaced, have at least 4 APA references, and typed in an easy-to-read font in MS Word (other word processors are fine to use but save it in MS Word format). Your cover page should contain the following: Title, Student’s name, University’s name, Course name, Course number, Professor’s name, and Date.

Organizational Analysis

Each student will write an 5-7 page paper on a conflict that he or she experienced in an organizational setting.  The submission must be typed, double-spaced, and have uniform 1-inch margins in 12-point Times New Roman font.  The organizational analysis will contain the following sections:

  • Background and history that led to the conflict?
  • How/why did the conflict escalate?
  • How was the conflict resolved?
  • What would the student have done differently, based on what he or she has learned in the class?