Please find out the attached document. Need answers for all question
5-1 Discussion: E-Commerce
In this module, we have explored the surge of e-commerce and the escalation of online contracts. How has the evolution of the internet piloted the growth of e-contracts? With the implementation of legislation, the Electronic Signatures in Global and National Commerce Act (E-SIGN Act) and the Uniform Electronic Transactions Act (UETA), what is the impact and significance of digital signatures in cyberspace?
Finally, in responding to your peers’ posts, discuss the validity of e-contracts within an information technology business model. What are the boundaries of e-contracts? Offer suggestions on how your peers can protect contracts that fall outside the boundaries.
Discussion 4
in this module, we will discuss network forensics. We move away from cellular/smartphone discovery and look at wired and wireless investigation. We will use the European Union Agency for Cybersecurity’s Introduction to Network Forensics guide. The document is available at:
For the discussion, answer the following questions:
1) What types of network investigations are typical of those that fall under the topic of network forsensics?
2) How is information acquired from the various types of networks?
3) Describe several tools for network forensics and how the tools function?
Your response to the DQ must be a minimum of 400 words. You must provide references for your response (APA format). You will need to reply to two (2) other fellow student’s posts (See the syllabus). The responses must be made in the week due.
blockchain
Industry experts believe blockchain is a technology that has the potential to affect the business of most IT professionals in the next five years. Pick an industry you feel will be most affected by blockchain and how blockchain may be used in that industry. As an IT manager, how would you embrace blockchain? For instance, how would training occur for your team, what strategies might you use, what security methods may you recommend be used?
Your paper should meet the following requirements:
- Be approximately 2-3 pages in length, not including the required cover page and reference page.
- Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
- Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
- Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.
700 words: Leadership
- Discuss Howell and Mendez’s three perspectives on followership. Note how these behaviors influence work productivity.
- What is the big five personality model?
- What is the Myers-Briggs test? How is it similar to the Big five model? How is it different than the Big five model?
Discussion (course – Bussiness Continuation Plan & Disaster Recovery Plan )
Select an organization of your choice and describe at least two data storage options that the organization adopts. Discuss the reasons why the company chooses these storage options.
The post should include adequate citations and references that adhere strictly to the APA format.
Write an essay for 500 words on topic placed below ?
Investigate whether or not an employee at a local hospital has been accessing patient records and setting information to online pharmacies. It is your first day of the investigation. Put together a list of data sources that must be examined during the investigation.
Incident Response Cloud
Discuss in 500 words or more the best practices for incident response in the cloud.
Cite your sources and APA format. Do not copy. Write in essay format not in bulleted, numbered or other list format.
Discussion help
After reading Chapter 8 discuss the importance of the personnel assigned to the Disaster Recovery Team and their role. You can use outside research, or your personal work experiences as your basis for discusson.
Note – attached text book
Machine learning Project
Machine Learning Course Project
This course project is an opportunity for you to explore a machine learning problem of your choice.
There are many datasets out there. UC Irvine has a repository that could be useful for you project:
using this link (http://archive.ics.uci.edu/ml/index.php)
Project guideline
**Classifier Implementation
Implement a classifier or classification algorithm. It can be any classification algorithms we learned or have not learned in the class.
1. Project Proposal should be 1 page long and Include the following information:
-Project title;
-The name of classifier or classification algorithm that you will implement;
-The programming language you will use;
-The format of training data you will use, i.e., the source of data set, the attributes’ types, the range of attributes’ values, the size of training set, etc.
2. Project Report should be maximally 8 pages long and be written by using this link( https://nips.cc/Conferences/2020/PaperInformation/StyleFiles)
and Include the following information:
-Abstract
-The description of implementation process, such as flowchart, functions, pseudocode, or partial codes;
-The description about 1) using training set to build the classifier, and 2) applying the classifier on a small amount of test instances. That is to show how your classifier works, as well as the training errors and test errors.
-Conclusion
3. Presentation (10 ~ 20 pages)
-Explain the source code files;
-Present how your classifier works;
-Evaluate your classifier.