Python 3 – Two Python Questions

 

Hello!

There are TWO Python 3 questions that I need to be completed.

I will attach the PDF with instructions and a ZIP file with the required .py file needed to complete the home.

Thank you!

final Paper

 

For the final project, you will be conducting a forensics investigation using one of the following items:

  1. A smartphone
  2. A network (ideally, a wireless network)

 You  may use either for your investigation. However, be aware of legal  issues surrounding your data gathering. If you are using any system you  do not personally control and have authority to investigate/discover,  please get written permission from the owner/operator of the system or  refrain from your forensics analysis of that systems and use a personal  system. For a network, you can use your own personal home network. For a  smartphone, consider using an image from the Internet or a personal  device. There could be issues related to using a live, active, personal  device (example: corruption of the device). If using a personal device,  consider using an old, outdated phone, if available.

 You  will review various forensics tools used with your selected system.  Select a tool and use that tool to gather forensics data for analysis.  You are simulating the process of gathering this data, so you do not  need to investigate a compromised device or system. The project  deliverables are as follows:

 Week  7 – Prepare an investigative report of the forensics data capture  conducted using the tool selected for this purpose. The paper should  provide the following information: 

  • Executive  Summary of your investigation, including a description of the device or  systems and the tool used for the forensics analysis
  • Step-by-step description you used to gather data for analysis
  • Report on the information that was obtainable from the device
  • Graphics evidence that you conducted the forensics data gathering and analysis

 The  paper should be in a form that would be used for reporting to a court  or a law enforcement agency. Be sure to provide graphics evidence of  your forensics investigation effort (Screenshots, reports, etc.).  References should be in APA format.

Project management

Find any example of a real project with a real project manager. Feel free to use projects in the media (such as the Olympics, television shows, or movies) or a project from your work, if applicable.

Write a two page paper describing the project in terms of its scope, time, and cost goals.

Also describe other impacts on a project, such as quality, resources, and risks.

Discuss what went right and wrong on the project and the role of the project manager and sponsor.

Be sure to describe whether the project was a success, and why.

Include at least one reference and cite it on the last page. 500 words 

need case study help minimum 300 words

Read the case study “Teloxy Engineering (A)” on page 948 attached and answer the corresponding questions on the same page.

Questions

1. Using the expected value, is it economically better to make or buy the component?

2. Strategically thinking, why might management opt for other than the most economical choice?

Week 15 Discussion

 Discussion  (Chapter 13): Research  Apple Home Pod. How does it interact with smart home devices?  Alexa is  now connected to smart home devices such as thermostats and microwaves.  Find examples of other appliances that are connected to Alexa and write a  report. 

Apply: Configuring and Deploying a Private Cloud with System Center

 

Assignment Content

  1. The director of IT has indicated that the Board of Directors is compiling a corporate portfolio on ethics and has asked all departments to contribute information on how a code of ethics impacts daily decisions. The director of IT has asked for you to help by providing an example.

    Using the links provided, research at least 2 of the following codes of ethics:

Assignment (500 WORDS MINIMUM)

  

Web Analytics – Labeling Visitors, Sessions, Pages, and Web Server Log Files vs. Java Scripting

Assignment Instructions:

· Define the importance of custom variables, attached chapter 9 (Advanced Web Metrics with Google Analytics by Brian Clifton) explains the importance of each variable, and how each is restricted to one particular scope level.

· Explain in as much detail as you can regarding the scope of each of these levels; Visitor Level, Session Level and Page Level.

· Compare and contrast web server log files vs. JavaScript tagging

· What would you recommend in terms of the variables you would set for an ecommerce site? Would this recommendation be dependent on the type of business or any other factors?

Please submit a Word Doc with your answers, in 500 words or more, and use references in support of your answers.

Information Security Fundamentals, Security Policies, and Operations Life Cycle

 

  • This week we learned about Information Security Fundamentals, Security Policies, and Operations Life Cycle. Based on the week’s objectives of defining network security and business priorities that must be taken into account provide your own experiences and perceptions of Network Security and Business Priorities. Research these topic areas on the internet to support your information and provide links to the resources cited in APA format.