Operating Data Center

Course: Cloud Computing

In referring to IaaS, Jamsa (2013) noted it is “expensive and staff-intensive”  to operate a data center. The author mentioned five capabilites that must be utilized. 

In 350 to 450 words, list each capability as a level 1 heading and IN YOUR OWN words, state why each is important to a cloud service provider and its clients. What if these capabilities are missing?

Ensure you use proper APA 7 formatting.

Cyber law assignments

  

All the below three questions need to be without plagiarism and need to user proper references, inline citations, APA formatted and wordcount to be as requested,.

Question 1:

Using a Microsoft Word document, please discuss the case involving the United States of America versus Ross Ulbrecht. Please include what took place at the United States Supreme Court. The minimum word count shall be not less than 500 words

Question 2:

Using a Microsoft Word document, please review ONE of the following films and tell how that film represents a contribution to the field of CyberLaw. 

War Games (1983)

Citizen Four (2014)

AlphaGo (2017)

Google and the World Brain (2013) 

The minimum word count shall be not less than 1000 words.

Question3:

Using a Microsoft Word document, please list in order of your preference the five top areas in which you think computer-based laws should be passed or strengthened by legislatures, and a brief description of  why you chose this law and its ranking

The minimum word count shall be not less than 250 words.

In term Paper

 

For the final project, you will be conducting a forensics investigation using one of the following items:

  1. A smartphone
  2. A network (ideally, a wireless network)

 You may use either for your investigation. However, be aware of legal issues surrounding your data gathering. If you are using any system you do not personally control and have authority to investigate/discover, please get written permission from the owner/operator of the system or refrain from your forensics analysis of that systems and use a personal system. For a network, you can use your own personal home network. For a smartphone, consider using an image from the Internet or a personal device. There could be issues related to using a live, active, personal device (example: corruption of the device). If using a personal device, consider using an old, outdated phone, if available.

 You will review various forensics tools used with your selected system. Select a tool and use that tool to gather forensics data for analysis. You are simulating the process of gathering this data, so you do not need to investigate a compromised device or system. The project deliverables are as follows:

Week 3 – Prepare a two-page paper (double-spaced) that describes the device or system you will investigate and the intended tool you plan to use to conduct your forensics investigation. The interim paper should be in the form of an Executive Summary. Be sure to provide references in APA format.

Apply: Ethical Challenges

 

Assignment Content

  1. Your team of international developers will be developing a publicly accessible cloud-based application which may potentially house user PII data, information about users’ behaviors and activities (e.g., physical locations, online sites they visit, searches, purchases, etc.), and users’ intellectual property (e.g., photos, artwork, videos, etc.).

    Continue your work with your team on the features of the application by identifying ethical challenges and specifying the type of data the feature uses, a risk mitigation strategy for the risk you provided in Week 2, and a global ethical perspective of the choices you made in implementing a risk mitigation strategy.

    Develop a 1-page table using the Ethical Challenges Worksheet template provided. Turn in 1 table for the team.

    Note: This assignment will help you develop your individual assignments in subsequent weeks.

main discussion

 Discuss the strengths and weaknesses of using K-Means clustering algorithm to cluster multi class data sets. How do you compare it with a hierarchical clustering technique. 

Quantitative Research Design Prompts

Description

This assignment is intended to deepen your understanding of the dissertation process while also developing your scholarly level writing skills. Although the prompts may be of a quantitative nature, each takes into perspective the entire doctoral research viewpoint.

Instructions

After completing the required research and reading for your chosen prompt, post your original response. The responses must be a minimum length of one paragraph and incorporate at least one scholarly level source. Write your response in APA format (7th Ed.). Please review the rubric for further details on grading.

The selected question to write

3B: Threats to Validity

In research, the threat of internal and external validity is commonly discussed. However, some researchers view one more important than the other. In your writing, compare and contrast internal and external validity, and make a determination based on your research/reading for which of the two validity factors is most critical and why, using citations and references to validate your argument.

Discussion question “Conflict with Teams”, 350 words and 2 references.

Part 1: Conflict within Teams

Think of a conflict that occurred in a team you were a part of and analyze it. What were the main sources of the conflict? What interventions can be used to improve the quality of conflict a team?

Part 2: Creativity in Teams

Evaluate yourself using the three indices of creativity. What strategies can you use to enhance your creativity?

Term Paper

Finish the term paper using the following outline. In addition to the 4-6 pages of the paper itself, you must include a title page and a reference page. You are to follow APA Guidelines for citing and referencing sources. Your paper must be in your own words, representing original work. Paraphrases of others’ work must include attributions to the authors. Limit quotations to an average of no more than 3-5 lines, and use quotations sparingly. It is always better to write the information in your own words than to directly quote. 

Title: Penalties and adjudication for various information and technology offenses.

Thesis: Penalties and adjudication for various information and technology offenses are not playing the crucial role of securing the abolition of breaching the law, which has been set, to safely guide the key players in the platform. The law is not even ensuring that those people who temple with the originality of a given person work.

i. Introduction 

a. Thesis 

b. The role of the thesis. 

ii. Expounding on the law and some of the changes needs to make it better.

a. Background of the law

b. Some of the recommendation that has been pointed out concerning the law by different stakeholders.

c. The effects of the law on today’s information and technology industry.

iii. The main objectives of the law.

a. The success and the future of IT in the country

b. The goals of addressing the topic 

c. The significance of the law and the setbacks  

d. The significance of implement the law to the grass root.

iv. The benefit of law to the industry 

a. The key traits of  for success  

b. The goal of the law 

c. Efforts to introduce new laws and ensuring they have been followed.

i. Significance of changing some articles  in the law

ii. Incorporating of organs to ensure that the effectiveness of the law

d. Making sure that the law meets the national and international standards 

v. Recommendation from the writer’s view.

a. Some of the things that can make a difference in the information and technology sector.

vi. Conclusion 

a. Summarizing the arguments and efforts made 

Reference

Bottoms, A. (2001). Compliance and community penalties. Community penalties: Change and challenges, 87-116.

Roth, M. P. (2010). Crime and punishment: A history of the criminal justice system. Nelson Education.