Computer archtecture paper

DUE: December 12th!!

 Pick two topics among the following below topics. Write a research paper of five full content pages explaining the two topics, their importance to computer architecture, what makes them important, and why you chose these two topics and not the others. Support your research with scholarly references.

-computer systems architecture

Computer Arithmetic and Digital Logic

-Architecture and Organization

-Instruction Set Architectures-Breadth and Depth

-Computer Architecture and Multimedia

-Performance—Meaning and Metrics

Processor Control.

Discussion Emerging threats

What are the various technologies employed by wireless devices to maximize their use of the available radio frequencies? Also discuss methods used to secure 802.11 wireless networking in your initial thread.

Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA 7)
  • Make an argument concerning the topic.

At least two scholarly source should be used in the initial discussion thread. Use proper citations and references in your post.

legal process in Digital Forensics

 For this assignment, please discuss the following:

  • How does the Fourth Amendment relate to the legal process of digital forensics?
  • How do exigent circumstances apply to the legal process?
  • Explain UFED, its purposes, and one of the primary reasons law enforcement will use this service.
  • Explain CDMA and GSM, their significance as it relates to the cellular network.

Discrete Probability Distributions (Binomial)

An archer hits a bull’s-eye with a probability of 0.09, and the results of different attempts can be taken to be independent of each other. If the archer shoots nine arrows, calculate the probability that: (a) Exactly two arrows score bull’s-eyes. (b) At least two arrows score bull’s-eyes. What is the expected number of bull’s-eyes scored?

homework computer

File submission: Word processor document creation lab

 

Objective of the activity

Through this activity the student will reinforce the concepts and skills learned in the module

Instructions

The academic goal of this assignment is to apply the skills learned in the previous module

What are we going to do?

In this activity the students will practice the use of templates and text editing

How are we going to do the job?

Download the Welcome to Word template. Preview the document

Then follow the instructions in the document. Save it with the name Welcome to Word_your name. For example: Welcome to Word_Maria Oliveros

Upload your work to the platform.

If you have any doubts about how to do the job, go through the material in the textbook, the tutorials and the simulations given.

Deliverable

The activity is individual. The work must be delivered on time, without spelling or grammatical errors. The works will be submitted to the tool to detect similarity of content (now Urkund). Submit the answers in a Word document, Times New Roman, size 12. You must include the references in APA format, three years old or less.

Basic review resources

Microsoft. (2018). Word for Windows Training. Retrieved from https://support.office.com/es-es/article/word-for-windows-training-7bcd85e6-2c3d-4c3c-a2a5-5ed8847eae73 (Links to an external site.)

Supplemental Review Resource

Hoisington, C., Freund, S., Vermaat, M., Pratt, P. J.,. Last, M. Z., Schmieder, E., Sebok, S. L., Starks, J. (2016). Shelly Cashman series Microsoft Office 365 & Office 2016: Introductory. Cengage.

risks in cloud computing

  

Read the attached article and  please answer the following two questions.

  • What are some of the potential risks involved with cloud computing?
  • Does the research and model in this article propose a viable solution to cloud-based risk      management?

Make sure to write in proper format

  • Explain, define, or analyze the topic in detail
  • Provide an outside source (for example, an article from the UC Library) that applies to the      topic, along with additional information about the topic or the source      (please cite properly in APA 7)

Deliverable Length: SPSS 0utputs and 500–1,000-word analysis

 

Use the Explore command to compare the income levels (rincdol) for both genders (sex). Go to the Resources area of the class to download the files that you will need to complete your assignments each week. Open gss.sav in SPSS, and complete the following calculations to determine the differences in the income level between males and females.

Compute the following for each group:

  1. Mean
  2. Median
  3. Quartiles
  4. Range
  5. Variance
  6. Standard deviation
  7. Skewness
  8. Kurtosis

The Explore command will also produce several different types of plots. Click on the Plots button, and create the following plots for each group:

  1. Histograms (include the normal curve on the histogram)
  2. Box plots
  3. Stem-and-leaf plots

Use the calculations and plots to answer the following questions. When discussing a calculation, include the value in the text to bolster your analysis.

  1. What can you determine from the measures of skewness and kurtosis relative to a normal curve?
  2. What are the mean and median?
  3. Does the mean or median seem better to represent the scores? How have extreme scores impacted these values?

Submit your output from all SPSS analysis as an SPSS output file and your Word document.