Power point presentation,

you have been introduced to various security tools (Network Discovery, Network Scanning, DLP, Firewalls, and HIDS).  You are to take one of the five identified categories of tools and identify two specific products from different vendors.  Based on two products, please research the differences and similarities between the two products.  You should also evaluate the implementation issues you may face with each product.  Based on your research, please create a PowerPoint or a similar presentation to explain your research and your findings of the tools.  The presentation should be comparative in nature as to highlight the similarities between the two products you researched.

The presentation must contain the following:

  • Product Background
  • Pros and Cons of each product
  • Side by Side comparison
  • Recommendation

 PowerPoint Requirements

  1. Easy to follow and understand
  2. Ratio of words to background (Essentially, not too many words on a slide.  Highlight the essentials)
  3. Graphics – Charts, Graphs, Illustrations, etc.
  4. Other – media – Audio, Video, etc.
  5. Turnitin will be completed.

Cluster Analysis and Annotation

Q1. Read Chapter 8 in the textbook: Cluster Analysis

Textbook: Tan, Pang-Ning. Introduction to Data Mining

  1. What are the characteristics of data?
  2. Compare the difference in each of the following clustering types: prototype-based, density-based, and graph-based.
  3. What is a scalable clustering algorithm?
  4. How do you choose the right algorithm?

Answer all the questions in Q&A format in 200 words. There must be APA formatted references (and APA in-text citations) to support the thoughts in the post.

Q2. Read ch. 8 in the textbook: Annotation

Textbook: Kirk, Andy.  Data Visualization: A Handbook for Data Driven Design

Annotation is a crucial component of good data visualization.  It can turn a boring graphic into an interesting and insightful way to convey information.  This week, please navigate to any site and find a graphic that could use some annotation work.  Add the graphic and the website it is found as an attachment and note what you would do to enhance the graphic and note why you would make these decisions.

Answer in 250 words. 

IT217 week 6 discussion

1. Change the example on pages 194-195 of the do…while loop into a while…wend loop. 

What is the difference between a do,,,while loop and while…wend loop? 

2. Change the while…wend loop example of page 200 into a for…next loop

What is the difference between a while…wend loop and for…next loop? 

Linux Implementation Proposal: Client Response Memo

 This assignment will be submitted to Turnitin®.Instructions

Faster Computing was impressed with your presentation. The company is interested in moving forward with the project, but the senior management team has responded to the presentation with the following questions and concerns:

(12.3.2: Describe the implementation of controls.)

  • How will security be implemented in the Linux systems—both workstations and servers?

(10.1.2: Gather project requirements to meet stakeholder needs.)

  • End users have expressed some concern about completing their day-to-day tasks on Linux. How would activities such as web browsing work? How would they work with their previous Microsoft Office files?

(12.4.1: Document how IT controls are monitored.)

  • The current Windows administrators are unsure about administering Linux systems. How are common tasks, such as process monitoring and management, handled in Linux? How does logging work? Do we have event logs like we do in Windows?

(2.3.2: Incorporate relevant evidence to support the position.)

  • Some folks in IT raised questions about the Linux flavor that was recommended. They would like to see comparisons between your recommendation and a couple of other popular options. What makes your recommendation the best option?

(10.1.3: Define the specifications of the required technologies.)

  • How does software installation work on Linux? Can we use existing Windows software?
  • How can Linux work together with the systems that will continue to run Windows? How will we share files between the different system types?

The deliverable for this phase of the project is a memo. There is no minimum or maximum page requirement, but all of the questions must be fully answered with sufficient detail. The recommended format is to respond to the questions in a bulleted format. Provide sufficient detail to fully address the questions. You must cite at least two quality sources.

(1.2.3: Explain specialized terms or concepts to facilitate audience comprehension.)

Create a memorandum template with a header of your own design or choosing, brief introduction, addresses Faster Computing, Inc’s questions, and summarizes your position on adopting the specific version of Linux.

(1.4.3: Write concise and logical sentences in standard academic English that clarify relationships among concepts and ideas.)

Your memorandum should not include spelling or grammatical errors. Any Linux commands must be displayed in lower case. Information technology acronyms (e.g., SSH or FTP) should be explained for the reader.

How Will My Work Be Evaluated?

In writing a clear and concise memo in response to senior management queries, you are demonstrating your communication skills, technical expertise, and responsiveness to customer/client needs and concerns.  

The following evaluation criteria aligned to the competencies will be used to grade your assignment:

  • 1.2.3: Explain specialized terms or concepts to facilitate audience comprehension. 
  • 1.4.3: Write concise and logical sentences in standard academic English that clarify relationships among concepts and ideas. 
  • 2.3.2: Incorporate relevant evidence to support the position. 
  • 10.1.2: Gather project requirements to meet stakeholder needs. 
  • 10.1.3: Define the specifications of the required technologies. 
  • 12.3.2: Describe the implementation of controls. 
  • 12.4.1: Document how IT controls are monitored. 

paper

  Topic of your choice within Information Assurance during this course.  The final paper consists of 3 files:

· The main research paper about 4-5 pages, including a cover page and this must be a Word document.

· The reference, at least three references and in APA format. This must be a Word document.

· The presentation slides with highlights and details of your project. This must be a PPT or PDF document.

Please note:

· SafeAssign/Turnitin is used to check similarity.

· For each of the Paper/Presentation documents, its acceptable similarity rate is 20%. If it is higher than 50%, a score of 0 will be graded for the project. A rate between (20%~50%) will have impact on the grading.

· The reference similarity will not have impact on the grading.

Operating System

Please provide an elaborate answer on each of the following questions:

1. What are the trade-offs that determine the size of the cache memory?

2. What is an interrupt?

3. What is the kernel of an OS?

4. List and briefly explain five storage management responsibilities of a typical OS.

5. What does it mean to preempt a process?

6. What is the difference between a mode switch and a process switch?

Word Count: 5000 words (maximum)

Your work needs to be well written and have quality information. Your work must be clear and must be able to educate someone with no prior knowledge in the field of operating systems.

Assignment Evaluation Rules:

• Overall presentation 10%

• Structure 10%

• Introduction 10%

• Main body

o Critical analysis/evaluation 50%

o Recommendations 10%

o Conclusion 10%

Technology in Your Life Project

 

The 3 parts of this project are designed for you to reflect on how you are using technology in your day-to-day life. How do you use technology and do you find it as something that is a great accessory to have or a necessary appliance? Are you addicted to your devices? Do you find them to be a huge benefit and something you cannot give up?

Part 1: Do one of the following

  1. Eliminate or severely limit your use of consumer technology for a day. This means, no cell phones, tablets, television, streaming content, computers or other media. Make notes throughout the day (written…you can’t tell Siri to “take a note”) so you can reflect on this experience.
  2. Examine how much time you spend using consumer technology for a day. Take notes of roughly how much voice time, text messages, computing, and mobile device time spent. You should make a list of how you consume technology throughout the day – note your technology and the approximate time you use it during that interval. Include a screenshot of your weekly screen time report from your mobile device. 

Depending on which option you choose, take down observations and thoughts of your experience. For example, if you choose to not use technology for the day, make notes of how difficult it has been to communicate and work in the world without it. Have specific examples to provide and how you worked around it. If you decide to use your screen time report, additionally, keep a log of how much you are using technology, you will want to make notes and observations on how much time you are using it and what you are using.

Part 2: Presentation

Use PowerPoint or Google Slides to create a 5 slide presentation that you will present to the class.

  1. Title slide
  2. What exactly did you do and why? Describe your experience.
  3. Results. What happened? What made you think during the course of your day? Were there any surprises?
  4. Consider what was discussed in class. Are you concerned about your behavior? Or do you find that your technology use is distracting your day-to-day life?
  5. Did this exercise inspire you to change any of your habits? Why or why not? Did you find this to be beneficial to you? Or just a waste of time?

Part 3: Reflection Summary

Write a detailed summary of what you did and your thoughts on the experience and covering the material that is in your presentation. This will provide you a chance to expand on your thoughts that you had in the presentation.

The summary must be:

  • 2 (full) pages – double spaced
  • APA format – 7th edition
  • 12-point Arial or Time News Roman font, double-spaced

Remember there is no right or wrong to how you feel. The purpose of this assignment is to get you to think about how you are using technology in your life and how it affects your relationships and your daily living. Whether you think positively or negatively about it, there is no wrong answer.

The goal is for you to develop an overview of your personal technology habits. How do they differ from what you did before the pandemic? What social media tools do you use? What apps do you download? How much time do you spend on the computer or tablet? Do you use technology for work or for fun? What technology “skills” do you have for future employment? 

You will be graded and assessed on the content of your presentation and summary.  Did you fully fulfill the requirements?  Were you able to express your thoughts and feelings on your technology use (or lack thereof) effectively? Do you have a strong opinion about how technology is used in today’s world?

Discussion Board DB5a

DB5a
Initial posts should be at least one paragraph (4-8 sentences) per question. In the first chapter of your textbook, various fallacies of critical thinking are described. Review attached PowerPoint.
1.)Based on your understanding/interpretation of these fallacies, highlight two fallacies that you or someone you know are guilty of and why. Provide examples.
2.)Speak to how you can/will avoid these critical thinking fallacies in your academic endeavors and/or discussion and debate with peers.
Discussion Board
Grading Criteria
Point Value
The initial response is extremely well-written containing relevant information regarding the topic. The response includes details and incorporates examples that accurately reflect the concept being discussed. Correct grammar and punctuation is utilized. The student uses external sources in addition to the course textbook to inform his or her response.