we need python tutors. its paid after delivery. send your application to [email protected]
assignment
Scenario
Your new manager comes to you and asks you that he keeps hearing about read/write blockers for forensic imaging. He’s not sure what that is. He also is confused because he’s heard that there’s two different types (software and hardware). Also, there’s commercial and open source tools. He knows you just took a course in digital forensics so he asks you to prepare a memo for him explaining all that.
Your assignment
- Research on what is a forensic read/write blocker and what is the difference between a hardware and a software version?
- Research on what tools are available e.g. commercial (you buy) or open-source (free) and what types are available.
- Identify some situations where it makes sense to use the hardware versions or when it makes sense to use software versions?
- Put it all together and summarize it for your manager! No more than 2 pages please.
What this teaches you
Being familiar with what tools the investigator used will help you. You gain credibility by asking what hardware or software tools they used, how they deployed it and why they went with a hardware or software version.
assignment
· Pick two (2) charts of different chart type (Categorical, Hierarchical, Relational, Temporal and Spatial) [Do not choose bar, pie and line charts)
· For each use a tool that can be used to create the selected chart. Use a different tool to create each chart.
· For each chart, write how to read the chart and what to look for.
Delivery: A word file with the following information:
1. 2 Charts
2. 2 Screenshots of the charts in development with the tools selected.
3. Paragraphs detailing how to read each chart and what to look for.
Access Module 6 SAM Project 1a
Need help with Access Sam Project. Details below.
Personal Insurance, Inc. is a national company that insures homeowners and renters. As a regional manager, you need to be able to create professional reports for employees and for entities outside the company.
Import the data from the file Support_AC19_6a_Claims.txt, and then append the records to the Claims table. The text file is a delimited file with a comma separating each of the six fields. Do not create a new table, and do not save the import steps.
Instructions uploaded, but starting file cannot be attached. Will need to send it separately.
Ethical issues in technogy 'continuation'
PREVIOUS ASSIGNMENT
Set up a MS Word document to include both of the following steps:
Step 1:
You will research information about an ethical issue and an emerging technology.
• Find at least three (3) sites that identify and describe the ethical issue that you want to research• Enter these into a Word document• Find at least three (3) sites that identify an emerging technology of your choosing• Enter these into the Word document as well• NOTE: Your chosen ethical issue and your chosen emerging technology must be related in some way• For instance, if social media is your emerging technology, then choose an issue that is ethically related to that emergingtechnology• Keep all (6) URLs in the Word document.▪ NOTE: URL means address of a Web page
Step 2:
Create a bibliography (reference page) using the Word references feature.
Include each of your sources. Use the resources available on the GCF LearnFree website on “How to create a bibliography or works cited page in Word”.
Once you’ve been through the above site,
• • ▪ ▪ For each of your 6 URLs (from Step 1), create a source through MS Word’s Citations and Bibliography section ▪ Have MS Word generate your Bibliography or Works Cited table to include APA-style information on your 6 sources▪ Enter your Bibliography or Works Cited table into the Word document
CURRENT ASSIGNMENT
When you did your MS Assignment #1, you chose self-driving cars as your emerging technology and their negative impact as your ethical issue.
Also,
– There are statements made throughout that are not backed up by any citations.
– Make sure you have at least 6 references under the “Bibliography” section in APA style.
– You didn’t really connect your emerging technology to the ethical issue in a convincing manner.
– You’ll get a chance to provide more on the above items, when you do the final draft; that is, the next assignment.
Update your MS Word Assignment #3 by iincorporating the feedback you received on that Assignment 3 (the initial draft) to arrive at your final draft: your MS Word Assignment 4.
Ensure to format your paper according to the APA formatting style. It should include:
· Title page
· Table of Contents
· Abstract
· Body of paper with sources credited parenthetically
· See the explanation on this below
· References page (having at least 6 sources in APA style)
Submit this final draft document (one Word file) by clicking on the MS Word Assignment 4 link.
What Should the Body of Paper Include?
The body of your paper should include:
· Introduction: The introduction begins by introducing the broad overall topic and providing basic background information. It then narrows down to the specific research question relating to this topic. It provides the purpose and focus for the rest of the paper and sets up the justification for the research.
· A brief explanation of your choices. The body should tell why you chose that particular “Ethical Issue” and “Emerging Technology”. Explain in detail on what you discovered.
· Explain the benefits and limitations of the emerging technology that you have chosen to write about. Details should be supported by your research.
· Evaluate the ethical issue that you have chosen. Relate this issue to the identified emerging technology (above). Support your opinion by citing facts learned in your research.
Java program
7.2 Inventory Management
Submission Details:
- Part 1 to be submitted on eLearning. See the Notes section below for details.
- Zip the contents of the src directory into a single zipped file for Part 1 submission.
- Make sure the zipped file has a .zip extension (not .tar, .rar, .7z, etc.)
- Part 2 to be submitted on zyBooks. Make sure you remove the package name from your files before submitting.
Objectives:
- Use inheritance to create base and child classes
- Utilize multiple classes in the same program
- Perform standard input validation
- Implement a solution that uses polymorphism
Problem:A small electronics company has hired you to write an application to manage their inventory. The company requested a role-based access control (RBAC) to increase the security around using the new application. The company also requested that the application menu must be flexible enough to allow adding new menu items to the menu with minimal changes. This includes re-ordering the menu items and making changes to the description of a menu item without having to change the code.Security:The company has suggested to start the application by prompting the user for a username and password to authenticate the user. There are two types of users at this company, managers and employees. If managers log on to the application, they will see all options on the menu list. If employees log on to the application, they will see a limited set of options on the menu list. User information is stored in Users.dat file, which may or may not exist at the start of the program. A super user “admin” with password “admin” has already been hardcoded in the program to allow for the initial setup and the creation of other users. The Users.dat file contains the FirstName, LastName, Username (case insensitive), HashedPassword and a flag to indicate whether a user is a manager or not. The file is comma separated and it is formatted as follows:
Joe, Last, jlast, 58c536ed8facc2c2a293a18a48e3e120, true
Sam, sone, samsone, 2c2a293a18a48e3e12058c536ed8facc, false
Jane, Best, jbest, 293a18a48e3e12052058c536ed8facc2c, false
Note: Ensure that the ‘AddUser’ function does not add duplicate values, and the ‘ChangePassword’ function does not change password if username/password is entered incorrectly. If adding a new user or changing the password is successful, return true, or else return false.Application Menu:The menu of the application is dynamically loaded and displayed to the user only after the user successfully logs on. The menu items will be loaded from file “MenuList.dat”, which may or may not exist at the start of the application. If the file doesn’t exist, the application should show at least an Exit menu item as default. The file will contain all menu items details, including the name of the command that will be executed when the menu item is selected. If a menu item is marked as restricted (Boolean flag), only managers can see that item. The file contains the following comma separated fields, Description, a Boolean flag to indicate if the option is restricted to managers only, and the name of the menu command that will be executed when the option is chosen. The order and option number of a menu item may change depending on how they are listed in the file. The Exit option will always be listed last and it will not be in the file. Below is a sample of how the MenuList.dat file looks like:
Add User, true, AddUserCommand
Delete User, true, DeleteUserCommand
Change Password, false, ChangePasswordCommand
Add New Product, true, AddProductCommand
Note: The command name of each menu item must match the name of the class that you will create in the code (See AddProductCommand class in the code for example).Inventory:The inventory consists of multiple products of type Product stored in class ProductCatalog. The ProductCatalog is responsible of all inventory operations that add, remove, find and update a product. When printing a product information, the product retail price should be calculated and displayed as well. Retail price = (cost + (margin * cost/100)). A list of functions has been added to this class in the provided code template. You must implement all listed functions. The inventory products will be saved in file Inventory.dat, which may or may not exist when the program first starts. The file will contain the product unique id (int), product name (string), cost (double), quantity (int) and margin (int, integer that represents margin percentage). The Inventory.dat file is comma separated and formatted as follows:
3424, Smart Watch, 20.45, 23, 80
65454, Flat Screen TV, 465.98, 15, 35
435, Computer Monitor, 123.54, 84, 43
Program Flow:
- Program starts in main() method
- Prompt user for username and password
- Authenticate user and maintain the logged-on user object
- Load inventory
- Load and create menu list
- Display menu list and prompt the user for option
- Execute selected option
- Keep displaying the menu until the user chooses to exit
Output Format:
Enter username: some username
Enter password: some password //Repeat prompts until user is authenticated OR show error and
option to exit.
Invalid username or password!
Press enter to continue or “Exit” to exit:
Enter username: some username
Enter password: some password
Welcome Firstname LastName!
Inventory Management System Menu //This is the header of the MenuList
// The order and option number of a menu item may change depending on how they are listed in the MenuList.dat file. The Exit option will always be listed last and it will not be in the MenuList.dat file.
1- Add user
2- Remove user
3- Change password
4- Add new product
5- Update product information
6- Delete product
7- Display product information
8- Display inventory
9- Exit
Enter your selection: 7
Enter product name: sMaRt wAtCh
Id Name Cost Quantity Retail
----------------------------------------------------
3424 Smart Watch $20.45 23 $36.81
//Repeat the menu after each command is executed
Unit Testing:A unit test method is required to test each of the methods listed below. These methods will be used by the unit testing framework to test the accuracy of your code.
- InventoryManagementSecurity.AuthenticateUser
- InventoryManagementSecurity.AddNewUser
- InventoryManagementSecurity.RemoveUser
- InventoryManagementSecurity.ChangePassword
- MenuList.AddMenuItem()
- ProductCatalog.AddUpdateProduct(Product product)
- ProductCatalog.RemoveProduct(int productId)
- ProductCatalog.FindProduct(int productId)
- ProductCatalog.PrintProductInformation(int productId)
- ProductCatalog.PrintInventoryList()
Grading:
- Coding standards, style and comments (10 Points)
- Unit testing methods x 10, (2 points for each of the methods mentioned above – 20 Points)
- The rest of the grade will be broken down as follows:
- InventoryManagementSecurity.AuthenticateUser (5 Points)
- InventoryManagementSecurity.AddNewUser (5 Points)
- InventoryManagementSecurity.RemoveUser (5 Points)
- InventoryManagementSecurity.ChangePassword (5 Points)
- MenuList.AddMenuItem() (20 Points) //This includes implementing all commands for the menu list
- ProductCatalog.AddUpdateProduct(Product product) (10 Points)
- ProductCatalog.RemoveProduct(int productId) (5 Points)
- ProductCatalog.FindProduct(int productId) (5 Points)
- ProductCatalog.PrintProductInformation(int productId) (5 Points)
- ProductCatalog.PrintInventoryList() (5 Points)
Notes:
- The “InventoryManagement” Maven solution zip file has been provided to you in eLearning.
- All *.dat files are assumed to be local to the current executable.
- Do not change the methods stubs or constructors in the template. If in doubt, please ask.
- Your program is expected to have basic input validation.
- You may use ArrayList in this project
- Part 1 deliverables: Unit Test methods + AuthenticateUser() function (no add or remove user is required in part 1). See eLearning for due date.
- Part 2 deliverables: Functioning program including the Unit Test methods
Big Data Analytics – REsearch Paper
This week’s article provided a case study approach which highlights how businesses have integrated Big Data Analytics with their Business Intelligence to gain dominance within their respective industry. Search the UC Library and/or Google Scholar for a “Fortune 1000” company that has been successful in this integration. Discuss the company, its approach to big data analytics with business intelligence, what they are doing right, what they are doing wrong, and how they can improve to be more successful in the implementation and maintenance of big data analytics with business intelligence
Your paper should meet the following requirements:
- Be approximately four to six pages in length, not including the required cover page and reference page.
- Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
- Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
- Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing
Cloud computing 10
Start and complete AWS Cloud Practitioner Essentials (Second Edition): AWS Securitymodule.
It will take approximately 50 minutes. Once complete, return to Week 10 discussion and (a.) tell us what you learned that you found interesting about the content. (b.) Discuss how these services work together and finally
Data Classification and Data Loss Prevention
Before you begin: review the information provided in this resource: https://www.pic.gov/sites/default/files/RACI%20Chart%20Overview%20v2.pdf
It takes a team of individuals throughout an organization who work together to safeguard the integrity and confidentiality of data resources. But, how does an organization know that it has enough people in the right roles performing the right tasks to ensure that digital assets will be protected from loss or harm?
The RACI matrix is a tool that can be used to outline the various roles and responsibilities required to provide this protection. For this discussion, you will prepare a RACI matrix that outlines roles of key players in the organization who have data protection responsibilities (i.e. asset security and data protection). Your matrix should specifically address executives (C-level), managers, supervisors, employees. The tasks that you should address are: generating information, using information, classifying information, and managing / using / implementing data loss prevention technologies.
After you have completed your chart, write a brief discussion of responsibilities for each role listed in the rows of your chart. Each role should be addressed in a separate paragraph.
Combine your matrix and your narrative descriptions into a briefing paper for a working group that has been charged with reviewing and improving the company’s data classification business processes. Post your paper in the body of your reply to this topic.
Provide in-text citations and references for 3 or more authoritative sources. Put the reference list at the end of your posting. Use a consistent and professional style for your citations and reference list entries. (Hanging indent is NOT required.)
HackerView Vulnerability Assessment
Prepare answers according to the questions given in this week’s homework document. The assignment is that you “provide a remediation plan based on the HackerView vulnerability assessment” I have attached a sample assignment as a guide and a pdf that need to be followed.