End product 3

  • Distinguish between due care and due diligence.
  • Based on your experience, provide examples of due care and due diligence.
    2000 words 

1 Discussion question and Questions

Discussion 4.1

Describe the difference between using Statistics and using Summarize functions on a field.

DISCUSSION ANSWER should be at least 100 words with References.

ASSIGNMENT 1:
I. SHORT ANSWERS Limit your answer to no more than 10-20 words

1. Explain the difference between attribute data and spatial data and give an example of each. Do we need to input both data to GIS? Explain your answer

2. Even with the increasing availability of digital sources, why might one still consider tracing from paper sources for a GIS project?

3. What is the difference between “spatial entities” and “continuous fields”? When we use an entity- based approach and a field-based approach. Give examples.

4. Name four DISADVANTAGES of raster data structure (name more for extra points)

1. 

2.

 3.

 4.

5. Describe how would you create a new ArcGIS layer of the rivers (rivers.lyr), that go through three states: Virginia, Maryland and Pennsylvania?

1) 

2)

 3)

6. Describe the steps in reclassifying the generic map of Virginia to the map of population. What steps do you need to do? What layers/data do you need for this?

1)

 2)

 3)

II. MULTIPLE-CHOICE QUESTIONS

 Check or circle the correct answer. 

1. In the World of GIS, another term for the spatial feature (object) is:

 Entity
 Topology
 Attribute
 Raster Grids

2. Which of the following is the example of non-spatial data?

 The number of rooms in an office building
 The path of a highway between two cities
 The vegetation patterns
 The location of supermarkets in Fairfax, VA

3. Which of the following are NOT the advantages of vector data structure?

 Compact data structure
 Accurate graphic representation  Overlay analysis is easy
 Network analysis is easy

III. TRUE AND FALSE QUESTIONS Mark with T=True or F=False the following statements

1. Today success or failure with GIS depends more on technology, but not on the conceptual models of

space

TRUE FALSE

2. GIS analyst spends much more time on creation than on verification a model

 TRUE FALSE

3. In a GIS attribute information and spatial information are linked to each other 

TRUE FALSE

4. Spatial environmental surface analysis and modeling is easy with CAD systems 

TRUE FALSE

5. When you select the spatial feature on a map in ArcGIS, the attribute information about the same feature has to be found and selected separately

TRUE FALSE

Cloud Computing

 

After reading the article this week, please answer the following two questions.

  • What are some of the potential risks involved with cloud computing?
  • Does the research and model in this article propose a viable solution to cloud-based risk management?

Post should be 300-350 words

Discussion and Assignment

 Discussion

 In no less than 250 words, explain what is meant by an IDS and an IPS.  How are they different?  How are they connected to a network?  List a few examples of IDS/IPS tools that are currently on the market.  

Week 11 Assignment

  • 11.1 List and briefly define three classes of intruders.
  • 11.2 What are two common techniques used to protect a password file?
  • 11.3 What are three benefits that can be provided by an intrusion detection system?
  • 11.4 What is the difference between statistical anomaly detection and rule-based intrusion detection?
  • 11.5 What metrics are useful for profile-based intrusion detection?
  • 11.6 What is the difference between rule-based anomaly detection and rule-based penetration identification?
  • 11.7 What is a honeypot?
  • 11.8 What is a salt in the context of UNIX password management?
  • 11.9 List and briefly define four techniques used to avoid guessable passwords.

Discussion

 Do you believe that all data should be encrypted? Many computing professionals think this is a good idea. But a small number of computing experts feel that no data should be encrypted—that all data and software should be openly available to anyone who wants it. Explain your answer (whether you believe all data should or should not be encrypted). 

 

Internet Research – Wk 11

In this module, you learned that random numbers (or, at least, pseudorandom numbers) are essential in cryptography, but it is extremely difficult even for powerful hardware and software to generate them. Go online and conduct research on random number generators. What are the different uses of these tools besides cryptography? How do they work? Explain your answer using your own words in 2-3 paragraphs 

discussion 11/14

 

Review the Video below, and discuss what tips, or procedures your organization has planned to use or those from the video that they should incorporate into their plan.

Cybersecurity Protections Following a Disaster (Youtube.com)

Include at least one quote from each of 3 different articles

 

Write an essay of at least five hundred words discussing the use of encryption to protect data at rest, in motion, and in use. 

Do not copy without providing proper attribution. This paper will be evaluated through SafeAssign. 

Write in essay format not in outline, bulleted, numbered or other list format.  

Use the five paragraph format. Each paragraph must have at least five sentences. Include 3 quotes with quotation marks and cited in-line and in a list of references. Include an interesting meaninful title.

Include at least one quote from each of 3 different articles. Use the Research Databases available from the Danforth Library, not Google.   Place the words you copied (do not alter or paraphrase the words) in quotation marks and cite in-line (as all work copied from another should be handled). The quotes should be full sentences (no more, less) and should be incorporated in your discussion (they do not replace your discussion) to illustrate or emphasize your ideas.

Cite your sources in a clickable reference list at the end. Do not copy without providing proper attribution (quotation marks and in-line citations).

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your submission Do not use spinbot or other word replacement software. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about.  

Access Control discussion 3

 Discuss why it is more effective and less expensive to prevent security breach than to fix one after an attack.

500 words

no plagiarism 

no grammar mistakes

need APA format

properly cite the references

Compare and Contrast essay (RENG 92)

Develop a three page essay that compare and contrast the lives of the two individuals you selected for the assignment.( File is attached for 2 individual I have selected). You have the freedom to focus on the different areas of the individuals lives of your choice. However, below is a list of suggestions:

  • Compare and Contrast-Childhood
  • Compare and Contrast-Education Background
  • Compare and Contrast-Career

Please type the essay, per MLA Format (Times New Roman Font, Double Spacing, Size 12 Font, Page Numbers, Direct Quotes and In-Text Citations-in each body paragraph, and Works Cited Page) and end with the works cited page. Also, start the thesis statement, each body paragraph, as well as the conclusion paragraph with a transitional word or phrase. Friendly reminder–do not include the following:

  • Contractions
  • First Person, “I”
  • Second Person, “You”
  • Third Person, “We”

Web Analytics: The importance of Reporting

 300 Words Minimum

Discussion Points:

Roll-Up Reporting answers very specific requirement for many companies, please answer the following in your post

  • Explain roll-up reporting and why is it important.
  • Describe what is the tracking roll-up transactions.
  • Describe the implications of the roll-up techniques.
  • Explain how roll-Up pageviews be improved.
  • Compare and contrast web server log files vs. java scripting.