Web Development Help

I have a web project in HTML & CSS but It has some issues which I need some help in fixing. The project is complete so it is just a minor fix. 

computer programing

 what is useful for, how would you apply it in your class or school work, or future/ current job about User-Defined Functions, User-Defined Simple Data Types, Namespaces and String Type, Arrays and Strings. you should have at least a paragraph ( 200 Words )

HR week 3

Discuss the following questions: 1. How can Blockchain increase human resource management efficiencies? 2. What are the stages of Blockchain maturity and explain which stages have the most potential for human resource management application? 3. How and why is Blockchain a disruptive technology in human resource management? You are required to cite this week’s assigned readings in your paper. You may also cite prior week’s reading assignments and external sources if you wish.

Use the following headings to organize your paper: Introduction, Question 1, Question 2, Question 3, Conclusion, References.

Submit your paper as a Word attachment in the discussion forum. I provide feedback within the paper and will not grade your post unless you submit it as an attachment. Your response to the discussion prompt should contain a minimum of 500 word

Writing Requirements for All Assignments:

  • References MUST be cited within your paper in APA format. Your reference page and in-text citations must match 100%. Papers without in-text citations will earn failing grades.
  • Always include a cover page and reference page with all submissions
  • Your paper must have headings in it. For discussion posts Introduction, Prompt/Question, and Conclusion will suffice as headings.  
  • Provide the EXACT web link for all online sources – do not provide just the home page, but the EXACT LINK – I check all sources
  • No abbreviations, no contractions – write formally
  • Write in the third person formal voice (no first or second person pronouns)
  • Write MORE than the minimum requirement of the word count assigned
  • As always, the word count is ONLY for the BODY of the paper – the cover page, reference page, and / or Appendix (if included) do not count towards the word count for the paper 
  • Indent the first line of each new paragraph five spaces
  • Refer to the example APA paper in the getting started folder under the content tab if you need an example. Also, a power is provided under the information tab that addresses APA format.
  • Use double-spacing / zero point line spacing, a running header, page numbers, and left justify the margins.

Major Cloud Service

  • Select one of these major cloud service models: IaaS, SaaS, or PaaS. Please respond to the following in a post of 700-1000 words:
  • Describe key issues when configuring and operating security for your selected cloud service model.
    • Be sure to support your response with examples based on your research and experience.
  • Provide a full citation and reference, formatted according to Strayer Writing Standards.

forming effective searching

Directions

As outlined in the lecture, there are various types of strategies and tools that students can use to develop search phrases to find exactly what they need without mining through hundreds of results.

In this assignment, you will develop a search phrase to best locate the information posed in the prompt. Then, using at least 50 words for each search scenario, explain why you picked this approach. Finally, perform the search in question and evaluate the results. In at least 50 words, explain if your search results were what you expected and why or why not this was the case.

Example: You want to find information on the President Teddy Roosevelt.

Search Phrase developed: “Teddy Roosevelt” president

Strategy: I chose this strategy because using quotation marks around the name Teddy Roosevelt will ensure that both pieces of the name are searched for together. When quotation marks aren’t used, results showing the first name and the second name will all show up, which will populate many results unrelated to Teddy Roosevelt such as Franklin D. Roosevelt.

Search Results:

Wikipedia:https://en.wikipedia.org/wiki/Theodore_Roosevelt#:~:text=Theodore%20Roosevelt%20Jr.%20(%2F%CB%88,States%20from%201901%20to%201909.

History: https://www.history.com/topics/us-presidents/theodore-roosevelt

History: https://www.history.com/news/teddy-roosevelt-legacies

Analysis: Yes, these search results were what I expected to see based on my search. The results reflected my usage of the quotation marks as sites that discussed Teddy Roosevelt’s role as president were returned first. All of the sites included both Teddy Roosevelt’s name as well as the word president.

1, You want to find information on Buffalo, NY but not anything related to the Buffalo Bills football team.

⦁ Develop and document a search phrase that you would use in a search engine to find this information.

⦁ Explain why you chose this strategy using at least 50 words.

⦁ After performing the search yourself, document the first 2-3 result entries that were returned. Analyze if the search results were what you expected using at least 50 words.

2, You want to find information on recipes for stuffed peppers that do not include rice.

⦁ Develop and document a search phrase that you would use in a search engine to find this information.

⦁ Explain why you chose this strategy using at least 50 words.

⦁ After performing the search yourself, document the first 2-3 result entries that were returned. Analyze if the search results were what you expected using at least 50 words.

3, You want to find videos about astronomy only on YouTube.

⦁ Develop and document a search phrase that you would use in a search engine to find this information.

⦁ Explain why you chose this strategy using at least 50 words.

⦁ After performing the search yourself, document the first 2-3 result entries that were returned. Analyze if the search results were what you expected using at least 50 words.

4, You want to combine the search for both woodworking and welding.

⦁ Develop and document a search phrase that you would use in a search engine to find this information.

⦁ Explain why you chose this strategy using at least 50 words.

⦁ After performing the search yourself, document the first 2-3 result entries that were returned. Analyze if the search results were what you expected using at least 25 words.

5. You want to find information related only to gestational diabetes.

⦁ Develop and document a search phrase that you would use in a search engine to find this information.

⦁ Explain why you chose this strategy using at least 50 words.

⦁ After performing the search yourself, document the first 2-3 result entries that were returned. Analyze if the search results were what you expected using at least 50 words.

Assignment Portfolio (Subject —- Digital Forensic Evidence)

 

Assignment 1 ) —–  Portfolio Assignments

Preface

Listed below are areas of concentration for MSDF-630 202 Portfolio Assignment. Keep in mind that the portfolio research concentration is an essential segment of the course. Two research topics are created for you, and I hope that your professional effort will be represented in this project. Portfolio projects consist of the following three unique phases:

  1. Profile.
  2. Research Question 1

Investigation of Alabi, Time as Alibi and Location as Alibi.

  1. Research Question 2.

Cybercrime Law, Computer-Integrity Crime, Fraud, and Abuse.

Portfolio Project 

Profile:      Required

Group 1.    Research Question 1

Group 2.    Research Question 2

Group 3.    Research Question 1

Group 4.    Research Question 2

  • Each student Must submit two (2) successful completed documents (here):
  1. Profile
  2. Collaborative Group Assignment.

Phase 1: Student Professional Profile

  • Portfolio
  • Full-Name
  • Profile
  • Status: Graduate or Post-graduate
  • Academic areas concentration
  • Current Professional Career Path
  • Professional Career Path Completion Upon successful completion of your studies at the University of the Cumberlands.
  • Research Question 1.

 Investigation of Alabi, Time as Alibi and Location as Alibi.

Preamble

Alibi is a Latin acronym, meaning somewhere else and someone other than the culprit. A scenario that identifies the perpetrator of a crime to be someone or somewhere else other than where the crime took place. Criminal activities involving location, login and logout time, illegal behaviors, can be easily tracked by use computer and internet technologies. 

  • Offenders and their Alabi are often naive and ignore the fact that telephone companies always keep records of the number dialed, the time and duration of the call, and caller’s number. 
  • Offenders and their Alabi are oblivious and unaware of the fact that credit card corporations keep records of the dates, times, and locations of all purchases, banks keep track of the dates, times, and locations of all deposits and withdrawals, and dates, times, and locations reside on computers for an indefinite period. Customers receive a report each month with detailed information in the form of a bill and financial statement.
  • Offenders and their Alabi are often neglectful of the fact that when an e-mail message is sent, the time and originating internet protocol (IP) addresses are noted in the header and log files that contain information of the past and current activities. 

Forensic investigator must be vigilant at all times and try to acknowledge and recognize criminal Modus Operandi (MO) motive, intent, and ability to manipulate and change contents of the conclusive evidence and create false Alibi to amplify deceitful schemes. During the investigation of an alibi, the first step is to secure access to the data and information on the computer workstations, file servers, protocol, and network system. 

BOOTP is the computer network designed to control and monitor which computers and specific internet protocol (IP) addresses. The BOOTP is a networking protocol used to automatically assign an IP address to network devices from a configuration server. Furthermore, BOOTP is often configured to synchronize their clocks regularly with exactly accurate time satellites and create a log in case of any discrepancies.

Dynamic host configurations protocol (DHCP) server is designed to automatically assign IP address and other information to each host on the network, communicate efficiently with other endpoints. Furthermore, the DHCP system allows anyone to change their clocks and does not keep logs of time changes.  A DHCP server enables computers to automatically request IP addresses and networking parameters from the internet service provider (ISP), reducing the need for a network administrator and a user to assign IP addresses to all network devices manually. 

Situation 1: Investigation of the Victim, Alibi, and Conspirator.

Alibi defense does not play an essential role in a conspiracy theory. Conspiracy is an agreement between two lawless persons to commit a crime, and one of the parties must agree to engage in an overt act in furtherance of the crime. 

Research Question 1:1. Develop a measurable research framework relative to the user computer and internet technologies, criminal Modus Operandi, (MO) motive, intent, conspiracy theory, and dynamic host configurations protocol (DHCP) server to amplify conclusive evidence in court. 

Research Question 1:2. To what extent are the significant differences between the Victim and the suspect?

Research Question 1:3. To what extent are the significant differences between the suspect and Alibi

Research Question 1:4. To what extent are the significant differences between Alibi and conspirators?

Situation 2. The Alibi can exercise the constitutional right to remain silent, granting the alibi opportunity to reposition the witness other than the crime scene.

Research Question 1.5. Develop a measurable research framework allowing the forensic investigator to use computer and internet technologies, criminal modus operandi (MO), motive, intent and, bootstrap protocol (BOOTP) to gather data and information on more than one crime scene for the same case.

Situation 3: A Judge can be suspicion of the alibi evidence. The burden of proof often rests on the prosecutor, who must prove that the suspected Alibi is guilty beyond a reasonable doubt. The add-on burden of proof is on the forensic investigator who visited the crime scene. 

Research Question 1:6 Develop a measurable research framework relative to criminal modus Operandi (MO) motive, intent, to help forensic investigator’s attempt to bring the suspected criminal to justice, only if the person was guilty.  

Research Question 2.

Cybercrime Law, Computer-Integrity Crime, Fraud, and Abuse.

 Preamble.

Integrity of evidence, cyber-crime, fraud, and abuse are prefaced on the assumption that computer and internet technologies are designed to make life easier for a public and private organization, the judicial system, and forensic investigators; it has, unfortunately, made life incredibly challenging and enduring in all levels of forensic investigation. Cyber-crime, fraud, abuse, are open-ended criminal operations, allowing unauthorized users to obtain information from various sources against a target organization. Naturally, criminals are endowed with extraordinary skills and expertise to break into any organization’s secured network center. Most criminal are have access automated freeware tools available on computer and Internet and breaks into the organization’s secured network system, data, assets, resources, to make forensic investigation exceedingly tricky. Most organizations and the global community are actively using computer and internet technologies to build four walls around security data storage centers, creating an opportunity for forensic investigator’s ability to produce reliable evidence. Similarly, organizations and the global defensive approach require a proactive plan of action to guide against data breach. This section examines the primary federal statutes used to prosecute cybercrime. The focus is on the Computer Fraud and Abuse Act and the statutes criminalizing identity theft, child pornography, and copyright and trademark offenses (Casey, 2011: 86-95).

Computer Fraud and Abuse Act  

The Computer Fraud and Act, Abuse is the primary source of federal law related to computer cybercrimes, and approval of the Computer Fraud and Abuse Act (CFAA) in 1986. The amendments were designed to update specific Arts provisions in light of advancements in computer and internet technologies and to address loopholes that existed in earlier versions of the Act. Criminals gaining unauthorized access to a computer, disseminating malware, launching denial of service attacks, trafficking passwords, and using computers and the internet to commit fraud. Criminals are sophisticated and can intentionally use the computer and internet technologies without authorization.   

Research Question 2:1. Develop a measurable research framework of hos computer fraud and Abuse Act (CFAA) can play a role during the forensic investigation and impact on conclusive evidence in court. 

Research Question 2:2. To what extent can the computer fraud and Abuse Act (CFAA) of 1986 empowers forensic investigation to bring cyber-crime, fraud, and abuse to justice.

 Situation 1.      

Naturally, criminals often retain extraordinary skills and expertise to break into any

organization’s secured network center. The criminal fully utilizes automated freeware

tools available on computers and the Internet and breaks into the organization’s secured network system, data, assets, resources, and makes forensic investigation exceedingly.

  • These extraordinary skills, expertise, and availability of automated freeware tools are creating a considerable obstacle against the forensic investigation process. We are the nation of law.

Question 2:3. Develop a measurable research framework of amendment items needed to strengthen the computer fraud and Abuse Act (CFAA), and expand forensic investigator authority over criminal activities.  

Assignment 2 ) —– Attached a document below, please take a look 

Assignment 1 is Due on 12/6/2020 and Assignment 2 is due on 12/3/2020

NO PLAGIARISM 

FOLLOW APA FORMAT

Need 3 Pages 

week 5 MM

a) Select one element of the Marketing mix and discuss how marketing research could help that area.  Be specific in your recommendations (350 words and in APA formate)

b) 1 reply of 250 words 

ANALYTICS, DATA SCIENCE, & ARTIFICIAL INTELLIGENCE assignment

complete the following assignment in one MS word document:

Chapter 5 –discussion question #1-4 (roughly 100-200 words each) & exercise 6 & internet exercise #7 (go to  neuroshell.com click on the examples and look at the current examples.  The Gee Whiz example is no longer on the page. I  did find mention of it here: https://nstsupport.wardsystemsgroup.com/support/gee-whiz-example-charts/ that might help you respond to the questions here. )

Chapter 6– discussion question #1-5 (roughly 100-200 words each)  & exercise 4

When submitting work, be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) to support the work this week.

All work must be original (not copied from any source). It is checked via SafeAssign. I ensure that the SafeAssign is not just finding matches for the questions and bibliography.