Discuss the “Edge” is in cloud computing. What is it? Why is it important? What impact will it have on the industry? Alternatively, what are some of the areas of IT/cloud governance?
Discreet Logic
For each question, you will be given an argument (or a tautology) and you need to use rules of implication, rules of replacement, conditional proofs and/or indirect proofs, to prove the arguments (or tautologies) valid. Be sure to justify every line you provide with both line numbers and the applicable rule. If you can’t access the logical operation signs, just write “dot,” “wedge”, “horseshoe” or “triple bar” wherever applicable.
Physical security
Perform a Vulnerability Assessment of your place of employment or living area. If you use your work area make sure you inform the Security Manager to get permission as to what you are doing. If you live in a gated community inform the security guard of your activities.
Instructions: Please download the Assignment 1 Vulnerability Assessment template (MS Word), which is already in APA 7 format, using size 12 Times New Roman font, 1-inch margins, TOC, Headings and Reference page. If you insert images or tables in your report make sure you label them appropriately according to APA. (click here for link).
For this assignment: The 4 Heading-1s are required. Each Heading-1 must have at least 3 Heading-2s. Each Heading must have at least 2 properly formatted paragraphs with 3 properly formatted sentences each. Once completed name your file:
diss (WS&F)
1) What type of device or system did you select to conduct your forensics investigation?
2) What tool did you use for the data capture?
3) What did you learn from the experience?
Your response to the DQ must be a minimum of 400 words. You must provide references for your response (APA format). You will need to reply to two (2) other fellow student’s posts (See the syllabus). The responses must be made in the week due.
PLE 10
Please answer each below in 2-3 lines
1. Should society help workers dislocated when technology, like the Internet, elimlnates their jobs in a process called ‘ Creative Destruction‘?
2. are we working more and earning less?
3. Would you want a telecommuting job? Why or why not?
4. Does the gig economy appeal to you? Why or why not?
5. How is an employee differentiated from a contracter under US law?
6. Why have some municipalities put restrictions on innovations in the sharing economy and in on-demand services?
7. What has been the effect on the US economy of outsourcing (or offshoring) technical and professional jobs?
8. How much monitoring of employee activities at work is appropriate?
9. Should an employer be able to discipline or terminate an employee for on-line behavior in his/her own time?
10. What is the relationship betwee BYOD (bring your own device) and shadow IT.
11. What is cyberloafing?
Need an Computer Science major expert for Analysis of Algorithms
Check this one question below if you can solve it. I have solved some of them but will need an expert because I’m a lil behind.
Discussion 4 Info tech import strat plan
Discuss the benefits of virtualization software, as described in the text. Do you agree/disagree with these benefits, or can you think of additional benefits not already presented? Also discuss the security concerns highlighted by server sprawl and how you would propose to solve those in your (real or hypothetical) organization.
Please make your initial post of 500 to 600 words .
At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.
project
Assignment 2
DEVELOPING INTIMACY WITH YOUR DATA
This exercise involves you working with a dataset of your choosing. Visit the Kaggle website, browse through the options and find a dataset of interest, then follow the simple instructions to download it. With acquisition completed, work through the remaining key steps of importing, exploring and examining your data to develop a robust familiarization with its potential offering:
Thoroughly examine the physical properties (type, size, condition) of your dataset, noting down useful observations or descriptions where relevant.
What could you do/would you need to do to clean or modify the existing data to create new values to work with? What other data could you imagine would be valuable to consolidate the existing data?
Using a tool of your choice (such as Excel, Tableau, R) to visually explore the dataset in order to deepen your appreciation of the physical properties and their discoverable qualities (insights) to help you cement your understanding of their respective value. If you don’t have scope or time to use a tool, use your imagination to consider what angles of analysis you might explore if you had the opportunity? What piques your interest about this subject?
(You can, of course, repeat this exercise on any subject and any dataset of your choice, not just those on Kaggle.)
Getting Started with R Tool
Complete this tutorial to assist with the assignment
· Data Importing Using R – http://www.r-tutor.com/r-introduction/data-frame/data-import
· R Data Type – http://www.r-tutor.com/r-introduction/basic-data-types
· R Data Vectors – http://www.r-tutor.com/r-introduction/vector
· R Data Frame – http://www.r-tutor.com/r-introduction/data-frame
· Data Import – http://www.r-tutor.com/r-introduction/data-frame/data-import
· Data Statistic – http://www.r-tutor.com/elementary-statistics
Physical security 7
Search the Internet for an article where physical security failed:
- Propose a possible change in that organization’s physical security that could have prevented the breach/failure for that scenario
- Submit at least 5 full pages double spaced (not including your required cover page, reference pages, abstract, or table of contents)
- No photos or graphs
- Reference all sources used
- Your paper must be APA formatted (including a separate cover page and reference page)
- Your paper must include at least 2 references that are properly cited inside the body of your paper and listed in your reference section
Case Study
1) Read the CASE STUDY and answer the two questions in the attached document(CASE STUDY),
-No plagiarism in the answers
-A minimum of 100 words for each question
– One reference.
2) Reply to the responses in the attached documents(RESPONSE 1 and RESPONSE2),
– Minimum of 100 words