Cloud Computing and Digital Forensics

Review in 500 words or more the video below called Cloud Security Myths.

Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources.   Stand alone quotes will not count toward the 3 required quotes.

Write in essay format not in bulleted, numbered or other list format. 

Statistical analysis using R

  

Final Exam DPEE

Note: 

· For demonstrating conceptual understanding, you are required to work on the model that is easier to handle or compute, not necessarily the more suitable (or more complicated) model for the dataset. Follow the question description. 

· You don’t need to check the assumption of a model unless the question asks for it. For example, if the question asks you to make prediction based on a model, you don’t need to check the assumption for the model before making prediction. 

· For any of the testing (hypothesis test) problem, define Ho/Ha, compute the test statistic, report the exact p value, and state the conclusion. The default alpha value is 5%, unless specify. 

· Elaborate your reasoning clearly and show relevant plots, R results, and tables to support your opinion in each step and conclusion. 

· Submit the Rmd file and the corresponding pdf file knitted from it, along with your answer, this format is similar to your homework. 

· The data is real, just like the project you are working on. Hence it is possible that even after the remedial method has been done, the model is still not perfect. When this happens, evaluation will be based on the level you execute the methods covered in Stat512 to improve the model. Don’t worry if your model is not perfect, try your best to demonstrate the skill set you learn in this class. 

Study the data with a linear analysis and complete the problems. The data set, dataDPEE.csv has 3 continues predictors and two categorical predictors. 

  

Problem 1. Consider only the first order model with X1, X2 and X3, perform the following hypothesis. 

a. (10) whether X1 can be dropped from the full model. 

> dpeemod <- lm(y ~ x1 + x2 + x3)

> plot(dpee)

> summary(dpeemod)

Call:

lm(formula = y ~ x1 + x2 + x3)

Residuals:

Min 1Q Median  3Q Max 

-15.948 -11.640 -1.480 6.402 31.650 

Coefficients:

Estimate Std. Error t value Pr(>|t|) 

(Intercept) 90.79017 22.07408 4.113 0.00106 **

x1 -0.68731 0.47959 -1.433 0.17377 

x2 -0.47047 0.24227 -1.942 0.07254 . 

x3 -0.06845 0.46523 -0.147 0.88513 

Signif. codes: 0 ‘***’ 0.001 ‘**’ 0.01 ‘*’ 0.05 ‘.’ 0.1 ‘ ’ 1

Residual standard error: 14.75 on 14 degrees of freedom

Multiple R-squared: 0.6257, Adjusted R-squared: 0.5455 

F-statistic: 7.8 on 3 and 14 DF, p-value: 0.002652

 

Ho: X1 is significant and cannot be dropped from the model.

Ha: X1 can be dropped from the model. 

Using the model Y~X1 + X2 + X3, 

b. (10) whether X1 can be dropped from the model containing only X1 and X2. 

  

Problem 2 (10) Consider the first order model with X1, X2 and X3, simultaneously estimate parameters (beta1, beta2 and beta3)  with a confidence level of 75%. 

  

Problem 3 (20) Perform appropriate analysis to diagnose the potential issues with the first order full mode with X1 X2 and X3, improve the model as much as possible with the methods covered in Stat512. You should also consider the assumption checking for your revised model.  

  

Problem 4 

a. (10) Compute AIC, BIC, and PRESSP to compare the following two models. 

· The model on the first order terms for X1 and X2 and the interaction term X1X2.

· The model on the first order terms for X1, X2 and X3 

Do they all yield the same better model? If not, explain. 

b. (10) Select the model that you think is better to predict the mean response value, then predict the mean response for the following case, at a confident level of 99%. 

  

x1

x2

x3

 

45

36

45

Problem 5 

X4 and X5 are two factors on Y.

a. (10) Is there any significant interaction effect between X4 and X5 on Y? 

b. (10) With the ANOVA method, compute the 95% confidence interval for the following difference, respectively: 

D1= The difference in the mean of Y when (X4=high, X5=less) and (X4=high, X5=more) 

D2= The difference in the mean of Y when (X4=low, X5=less) and (X4=low, X5=more) 

c. (10) With the ANOVA method, compute the 95% confidence interval for 

D1-D2

Where D1 and D2 are described in b. 

How is your result related to a? 

Interm1

  For the final project, you will be conducting a forensics investigation using one of the following items:

  1. A smartphone
  2. A network (ideally, a wireless network)

 You may use either for your investigation. However, be aware of legal issues surrounding your data gathering. If you are using any system you do not personally control and have authority to investigate/discover, please get written permission from the owner/operator of the system or refrain from your forensics analysis of that systems and use a personal system. For a network, you can use your own personal home network. For a smartphone, consider using an image from the Internet or a personal device. There could be issues related to using a live, active, personal device (example: corruption of the device). If using a personal device, consider using an old, outdated phone, if available. You will review various forensics tools used with your selected system. Select a tool and use that tool to gather forensics data for analysis. You are simulating the process of gathering this data, so you do not need to investigate a compromised device or system. The project deliverables are as follows:Week 3 – Prepare a two-page paper (double-spaced) that describes the device or system you will investigate and the intended tool you plan to use to conduct your forensics investigation. The interim paper should be in the form of an Executive Summary. Be sure to provide references in APA format. 

ITM- Graded assignment 2

 You are a member of the Human Resource Department of a medium-sized organization that is implementing a new interorganizational system that will impact employees, customers, and suppliers.  Your manager has requested that you work with the system development team to create a communications plan for the project.  He would like to meet with you in two hours to review your thoughts on the KEY OBJECTIVES OF THE COMMUNICATIONS PLAN.  What should those objectives be? 

Practical connection to the Subject

Subject Name : Business Intelligence

Assignment:

Provide a reflection of at least 500 words  (double spaced) of how the knowledge, skills, or theories of  this course have been applied, or could be applied, in a practical  manner to your current work environment. If you are not currently  working, share times when you have or could observe these theories and  knowledge could be applied to an employment opportunity in your field of  study. 

Requirements:

Provide a 500 word (double spaced) minimum reflection.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

Share a personal connection that identifies specific knowledge and theories from this course.

Demonstrate a connection to your current work environment. If you  are not employed, demonstrate a connection to your desired work  environment. 

Note:  I am currently not applied so you can write this assignment as how the subject knowledge is used for  future 

3 page Assignment with no plagiarism in APA format | Organ leader and decision making

This week’s journal article was focused on the Complexity of Information Systems Research in the Digital World.  Complexity is increasing as new technologies are emerging every day.  This complexity impacts human experiences.  Organizations are turning to digitally enabled solutions to assist with the emergence of digitalization. 

Please review the article and define the various technologies that are emerging as noted in the article.  Note how these emerging technologies are impacting organizations and what organizations can to do to reduce the burden of digitalization.

Be sure to use the any Library for scholarly research. Google Scholar is also a great source for research.  Please be sure that journal articles are peer-reviewed and are published within the last five years.

The paper should meet the following requirements:

  • 3-5 pages in length (not including title page or references)
  • APA guidelines must be followed.  The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.
  • A minimum of five peer-reviewed journal articles.

The writing should be clear and concise.  Headings should be used to transition thoughts.  Don’t forget that the grade also includes the quality of writing.

ITEC 8030

Create a program using the principles of inheritance based on the following scenario: Scenario: The teachers of a local school need a program to teach their students the basics about animals and their characteristics. The teachers want the program to contain a database of animals, from which the teachers can choose animals to add to a list. The list will be displayed on the students’ monitors so they can study the animals and their characteristics. Right now, the teachers want a program that handles only mammals and birds, but in the future they may want to add other types of animals. The teachers also expect the program to run smoothly and be thoroughly tested to handle extraneous input. Create a program that fulfills the specifications outlined in the scenario above. Use the concept of inheritance to allow for later additions to the program. Also use the TDD concepts from Unit 1 to test the program as you go.