Presentation

Create a PP 12 slides with below topics related to telecommunications and networking with applications for every parameters mentioned below. APA formatted.

overview of OSI model

Client-Server Network

TCP/UDP

Methods of Communication

Analog & Digital Transmission

Media Access Control

LAN/WLAN Components

Ethernet/Wireless Ethernet

Dedicated-Circuit Networks

VPN Networks

Network Security

references

Create summary tables that address relevant factors related to COVID-19

COVID-19 Open Research Dataset Challenge (CORD-19)

An AI challenge with AI2, CZI, MSR, Georgetown, NIH & The White House

(1) FULL-LENGTH PROJECT

Dataset Description

In response to the COVID-19 pandemic, the White House and a coalition of leading research groups have prepared the COVID-19 Open Research Dataset (CORD-19). CORD-19 is a resource of over 44,000 scholarly articles, including over 29,000 with full text, about COVID-19, SARS-CoV-2, and related coronaviruses. This freely available dataset is provided to the global research community to apply recent advances in natural language processing and other AI techniques to generate new insights in support of the ongoing fight against this infectious disease. There is a growing urgency for these approaches because of the rapid acceleration in new coronavirus literature, making it difficult for the medical research community to keep up.

Call to Action

We are issuing a call to action to the world’s artificial intelligence experts to develop text and data mining tools that can help the medical community develop answers to high priority scientific questions. The CORD-19 dataset represents the most extensive machine-readable coronavirus literature collection available for data mining to date. This allows the worldwide AI research community the opportunity to apply text and data mining approaches to find answers to questions within, and connect insights across, this content in support of the ongoing COVID-19 response efforts worldwide. There is a growing urgency for these approaches because of the rapid increase in coronavirus literature, making it difficult for the medical community to keep up.

A list of our initial key questions can be found under the Tasks section of this dataset. These key scientific questions are drawn from the NASEM’s SCIED (National Academies of Sciences, Engineering, and Medicine’s Standing Committee on Emerging Infectious Diseases and 21st Century Health Threats) research topics and the World Health Organization’s R&D Blueprint for COVID-19.

Many of these questions are suitable for text mining, and we encourage researchers to develop text mining tools to provide insights into these questions.

In this project, you will follow your own interests to create a portfolio worthy single-frame viz or multi-frame data story that will be shared in your presentation. You will use all the skills taught in this course to complete this project step-by-step, with guidance from your instructors along the way. You will first create a project proposal to identify your goals for the project, including the question you wish to answer or explore with data. You will then find data that will provide the information you are seeking. You will then import that data into Tableau and prepare it for analysis. Next, you will create a dashboard that will allow you to explore the data in-depth and identify meaningful insights. You will then give structure to your data story by writing the story arc in narrative form. Finally, you will consult your design checklist to craft the final viz or data story in Tableau. This is your opportunity to show the world what you’re capable of – so think big, and have confidence in your skills!

Kaggle Website:

https://www.kaggle.com/allen-institute-for-ai/CORD-19-research-challenge

Assignment Length (word count): at least 15 pages.

References: At least 10 peer-reviewed, scholarly journal references.

Discussion 3

 

Week 3: Discussion

The United States vs. Carey, 1998

Prologue 

Carey had been under investigation for possible sale and possession of cocaine and his residence as the center of operation. Six (6) months after the last purchase, the law enforcement officers obtained a warrant to arrest him. During the arrest, officers observed in plain view, a device for smoking marijuana in his residence and labeled the unit as marijuana in defendant’s apartment.

Plan of Action

Alerted by these items discovered in Mr. Carey’s apartment, the law enforcement officers asked Mr. Carey to consent to a search of his apartment. In clean and clear language, the law enforcement officers informed him of the intention to obtain a search warrant to search his apartment if Mr. Carey refused permission. After considerable discussion with the officers, Mr. Carey verbally consented to the search and later signed a formal written consent at the Officer’s station.

The search warrant was all-inclusive; thereby, authorized officers to search the filesystems on the computers for names, telephone numbers, ledger receipts, addresses, and vital documentary evidence about the sale and distribution of controlled substances.

Discoveries

1:1. Armed with the consent, the officers returned to Mr. Carey’s apartment the same night and discovered quantities of cocaine, marijuana, hallucinogenic mushrooms; took two computers believed to demonstrate evidence of drug dealing.

1:2. During the examination of Mr. Carey’s computer, investigators found files with sexually suggestive titles and the label “.jpg” that contained child pornography. 

1:3. In the process, investigators temporarily abandoned the search for evidence about the sale and distribution of controlled substances and focused on child pornography files, and Mr. Carey was charged with one count of child pornography.

 Court Proceeding

  • In the appeal, Mr. Carey challenged child pornography count as inadmissible and unacceptable because the computer was taken as the result of a general, warrantless search out of his apartment
  • Law enforcement officers contention was the warrant authorized them to search any filesystem on the computer that might contain data and information germane to drug crimes, cocaine, marijuana, hallucinogenic mushrooms, and asserted that child pornography came into plain view during the search. 
  • The court concluded that the investigators exceeded the scope of the warrant and reversed Mr. Carey’s conviction.
  • The Law enforcement officers adopted “Plain view doctrine” that must have not been extended to embrace wide-ranging search warranties from one item to another until something incriminating emerges.

Precautious

  1. Digital forensic investigators must be extremely cautious and avoid breaching the fundamental principle of digital forensic investigation.
  2. Digital forensic investigators inadvertently abandoned the search warrant and overstepped the authorized limit of the search warrant.  
  3. Investigators engrossed in child pornography files. Notably, Mr. Carey was charged with one count of child pornography.
  4. Tactlessly, Digital forensic investigators failed to obtain a new search warrant before conducting extra search on Mr. Carey’s child pornography operation.

Answer All Questions: (1:1 – 1:3)

Question 1:1. Provide a comprehensive plan of action on Mr. Carey’s count germane to drug crimes, cocaine, marijuana, hallucinogenic mushrooms.

Question 1:2. Provide a comprehensive narrative and concluding evidence on Mr. Carey’s use of the computer to compiled names, telephone numbers, ledger receipts, addresses, and vital documentary evidence on the sale and distribution of controlled substances.

Question 1:3. Describe the immediate danger of Mr. Carey’s modus operandi germane to drug crimes, cocaine, marijuana, hallucinogenic mushrooms, and child pornography in a developing rural community?

Information Systems Business and Beyond

  

students are provided with strong educational programs and courses that allow them to be servant-leaders in their disciplines and communities, linking research with practice and knowledge with ethical decision-making. This assignment is a written assignment where students will demonstrate how this course research has connected and put into practice within their own career.

Assignment:
Provide a reflection of at least 2 pages, double spaced of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. The assignment is worth 100 points. 

Requirements:

· Provide a minimum two (2) page, double spaced reflection paper. Include a coversheet with your name, title and class ID as a minimum.

· Use proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited. 

· Coversheet, reference list, figures and tables don’t count toward the two (2) page count.

· Share a personal connection that identifies specific knowledge and theories from this course. 

· Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 

· You should NOT, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace. 

Business Impact Analysis (BIA)

Create a PowerPoint (5-6 slides) on a life event you may have coming up and apply the strategies you learned in the Business Impact Analysis (BIA) section. 

What workarounds or “back up” plans/solutions can you put in place to ensure your event will still occur?   

Your final slide should include a minimum of 2 references, which are formatted using APA standards. 

Discussion

1. Why are the original/raw data not readily usable by analytics tasks? What are the main data preprocessing steps? List and explain their importance in analytics.

2. What are the privacy issues with data mining? Do you think they are substantiated?

The Relationship between Cyberbullying and School Bullying

 Textbook Chapter 9: Cyberbullying, Online Harassment, and Cyber Stalking.

1. To what area(s) of which chapter does the work most closely relate?

2. What does(do) the author(s) set forth as their thesis in the piece?

3. What subjects does the work regard: people, entities, industries, political bodies, demographic groups, etc.?

4. What journal was it published in, and when?

5. **Key** How can you apply their work to your academic and professional understanding of DF?

6. What did the author(s) get right? Wrong? How could they have expanded/focused their scope?

· No Plagiarism 

· Should be 400 words without References.

PS

 These days, many people are working remotely and working remotely can bring new challenges. List 5 “new” physical security challenges that work remotely entails? 

Discussion

 What is a project, and what are its main attributes? How is a project different from what most people do in their day-to-day jobs? Discuss the importance of top management commitment and the development of standards for successful project management. Provide examples to illustrate the importance of these items based on your experience on any type of project. Discuss the unique challenges that an IT project presents. 

Technology Entrepreneurship

 

From a technology entrepreneurial perspective, the dangers of having exclusive focus on the product or service without due consideration to whether it sincerely addresses a real market or public concern raises numerous ethical issues. Address the following questions:

With the development of several COVID-19 smartphone applications used for tracking COVID affected people and virus heighten areas,

· Is this a possible violation of personal safety?

· Should all personnel be required to download and use the COVID app for monitoring and tracking purposes?

· What are crucial areas of commercialization of the COVID-19 smartphone app? Do you agree with the medical and social safety of their importance and if so why do you agree or disagree that commercialization of innovation is important. 

· What are the external and internal environmental uncertainties?

· What is the risk profile associated with the smartphone tracking app?

· What other rewards besides financial and monetary gains can be obtained using this app?

NOTE:  

  • 5-7 pages in length (excluding cover page, abstract, and reference list)
  • Include at least 5 online references to support your research. 
  •  Assignments will need actual references from EBSCO host, google scholar, and semantic scholar With a website link at the end.  Only use APA 7th edition. (There should be Abstract and conclusion)