Check Attachment
Cloud Computing and Digital Forensics
1.) Describe in 500 words discuss the scope of a cloud computing audit for your business.
Use at least three sources. Use the Research Databases available from the Danforth Library as your first choice.
Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.
Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs. Stand alone quotes will not count toward the 3 required quotes.
Write in essay format not in bulleted, numbered or other list format.
2.) Define several forms of metadata that can be useful to an investigation. How are valuable to an investigator?
Post between 200 and 300 words. Use your own words
I need a essay on moodle, isims and their integration
I need a essay on moodle, this must include what is it, how it was started and a brutal critique on it. This should have the pros and cons of moodle.
This essay is also based on isims, this must include what is it, how it was started and a brutal critique on it. This should have the pros and cons of Isims.
The essay should include how these systems are integrated.
Asymmetric cryptography – Component of cryptography
In the final discussion posting please describe what components of cryptography impacted you the most.
I would prefer about asymmetric cryptography and the math underlying it. Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited. 30-35 lines should be good enough.
1 Discussion and 1 case study
Discussion 2.1
“In general, clustering is the use of unsupervised techniques, for grouping similar objects.” Please discuss this and what is your understanding of ‘unsupervised techniques.’
( With Refrences )
Case Study 2.1
- Read the Case Study: Case 3.1 – Customer arrival at Bank 98
- Write a summary analysis and answer the questions
Writing Requirements
- 3–4 pages in length (excluding cover page, abstract, and reference list)
- APA format, Use the APA template located in the Student Resource Center to complete the assignment.
- Please use the Case Study Guide as a reference point for writing your case study.
Research Paper 6
This week’s article provided a case study approach which highlights how businesses have integrated Big Data Analytics with their Business Intelligence to gain dominance within their respective industry. Search the UC Library and/or Google Scholar for a “Fortune 1000” company that has been successful in this integration. Discuss the company, its approach to big data analytics with business intelligence, what they are doing right, what they are doing wrong, and how they can improve to be more successful in the implementation and maintenance of big data analytics with business intelligence
Your paper should meet the following requirements:
- Be approximately four to six pages in length, not including the required cover page and reference page.
- Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
- Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
- Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing
Explore data, Python
Advanced filtering
To filter by date ranges we need to get fancy with Boolean operators
Strip out all other values except one
Sort the new baby dataframe on multiple keys
Sort the new baby dataframe with string concatenation to narrow the display
Business Intellegence
Discussion: Examine Alexa’s skill in ordering drinks from Starbucks.
Discussion Questions:
1. Some people say that chatbots are inferior for chatting. Others disagree. Discuss.
2. Discuss the financial benefits of chatbots.
3. Discuss how IBM Watson will reach 1 billion people by 2018 and what the implications of that are.
Exercises:
1. Compare the chatbots of Facebook and WeChat. Which has more functionalities?
2. Research the role of chatbots in helping patients with dementia.
3. Microsoft partners with the government of Singapore to develop chatbots for e-services. Find out how this is done.
Presentation Computer Science(( must complete in 6hrs ))
Instructions
Explain and provide example when it is possible that will cover chapter 4 subjects:
Data Link Layer–
Media Access Control•
Controlled Access• Contention Access– ErrorControl• Prevention• Detection• Correction– Protocols• Async• SDLC• Ethernet• PPP–Transmission Efficiency and Throughput
Additionals resources
https://www.csus.edu/indiv/m/millerd/Ch4%20Ed7%20Notes.ppt
5s week 8 assignment PL
Answer each these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.
1. With all the stories about millions and millions of bytes of personal data having been exposed, why is their still any faith at all in the Internet?
2. How has the term hacking changed meaning over the years?
3. What is the most dangerous hacker tool?
4. From the news: How were NSA’s hacker tools compromised?
5. What was the vulnerability in the Target Breach?
6. What do you think of hactivism?
7. How did Stuxnet work?
8. What was the Arpanet?
9. Deep brain stimulation is a treatment for Parkinson’s disease. Medical devices such as these are now becoming accessible through the web. Consider the dangers (threat surface)?
10. What is the Red Team?
include references. do not copy paste.