Questions

         

WRITTEN INTERVIEW QUESTIONS

DOCTORAL CANDIDATES SHOULD PROVIDE AN AUTHENTIC PERSONAL STATEMENT TO EACH OF THE FIVE FOLLOWING QUESTIONS/PROMPTS REFLECTING ON THEIR INTERESTS. IN THE EVENT THAT ANY OUTSIDE RESOURCES ARE USED, RESOURCES SHOULD BE CITED IN APA FORMAT. SUBMISSIONS SHOULD BE A MAXIMUM OF 500 WORDS OR 125 WORDS PER QUESTION/PROMPT. IT IS BEST TO RESPOND TO EACH PROMPT/QUESTION INDIVIDUALLY FOR CLARITY OF THE REVIEWER. WRITING SAMPLES SHOULD BE SUBMITTED IN MICROSOFT WORD FORMAT AND INCLUDE THE CANDIDATE’S NAME.

1. PROVIDE A BRIEF INTRODUCTION FOCUSING ON YOUR EDUCATION, CAREER, AND DECISION TO APPLY TO UNIVERSITY OF THE CUMBERLANDS.

2. IN RELATION TO YOUR DOCTORAL PROGRAM APPLICATION, WHAT AREA OF RECENT RESEARCH IN THE FIELD WOULD YOU WANT TO STUDY, AND WHY?

3. HOW DOES YOUR CURRENT VOCATION RELATE TO YOUR APPLICATION TO THE DOCTORAL PROGRAM?

4. HOW WILL YOUR EXPERIENCES AND PERSONAL SKILLS HELP YOU TO BE SUCCESSFUL IN YOUR PROGRAM?

5. WHAT LONG-TERM GOALS DO YOU HAVE FOR APPLYING YOUR LEARNING FROM YOUR DOCTORAL PROGRAM?

Python Functions

1) Write a function that calculates the volume of a sphere with radius r for only values > 0, return 0 otherwise . V=4/3  π r^3

2)  Write a function that finds you weight in stones using the formula.  mstone = mkgx2.2/14

3) Write a function that takes some monetary amount from the user in dollars, and then display exact changes for this amount using the minimum number of coins. For example, $0.97 shows 3 quarters, 2 dimes, and 2 pennies. 

 

Output: 
change_it(97)

The change for 97 cents is:
3 quarters
2 dimes
2 pennies

 Write an function to calculate both Ohm’s Law and Power transferred. The function takes i and r as inputs and prints the results (see output below). Calculate only if both i and r are > 0. 

 

FORMULA
 i is current, v is voltage, r is resistance, p is power
 p = i * v   # power = current * volatage
 v = i * r   # voltage = current * resistance
def ohms_law(i, r): 
   '''
     i is current
     r is resistance
   '''
   # check if both i and r are greater than 0
   # calculate v and p
   # PRINT v and p
omhs_law(5, 5)
v = 25 p = 125

omhs_law(-5, -5)
0

digital

Review the material on routers.

It is sometimes said that information extracted from a router or switch does not necessarily provide specific evidence of a particular crime. What is meant by that?  If true, what then is the most useful information collected from these devices in an investigation?

300 WORDS

Physical Security

 

 Topic: Research the popular Types, Pros, Cons and your company’s use of Biometric Identification devices. Remember to get permission from security. If you are not currently employed discuss what types you would recommend.  

Instructions: Please download the Assignment 4 Biometrics Assessment template (MS Word), which is already in APA 7 format, using size 12 Times New Roman font, 1-inch margins, TOC, Headings and Reference page. If you insert images or tables in your report make sure you label them appropriately according to APA. Once completed name your file: YourName_Assignment_4_Biometrics_Assessment.docx and submit to the appropriate assignment folder. You must have at least 3 references and 1 must be from the text. The others may be from the text or web sites. I will NOT accept any references from any other sources including journals UNLESS you provide the written proof of the reference with your submission. 

why institutions might be reluctant to move their IT to the cloud. Consider a specific industry like education, medicine, military, etc.

 

Discuss in 500 words, why institutions might be reluctant to move their IT to the cloud. Consider a specific industry like education, medicine, military, etc. 

Use at least three sources. Use the Research Databases available from the Danforth Library not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Write in essay format not in bulleted, numbered or other list format. 

 It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your post and that you reply to two classmates in a substantive way (not ‘nice post’ or the like).  Your goal is to help your colleagues write better. Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. . I will not spend a lot of my time trying to decipher nonsense. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about.  Please do not submit attachments unless requested. 

Assignment1010

 What kind of user training should be conducted to deal with the issue of noise (not the electrical kind). How do you strike a balance between being overwhelmed with false positives and the danger of ignoring true incidents?  What effects would false positives have on an organization?  

PLEASE USE THE ATTACHED TEMPLATE

Simple random Sampling Discussion

What’s simple random sampling? Is it possible to sample data instances using a distribution different from the uniform distribution? If so, give an example of a probability distribution of the data instances that is different from uniform (i.e., equal probability).

All discussions should contain at least one reference (and matching in-text citation in APA format).

Security Architecture & design

Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples.  include at least two references.

Minimum of 600 words

simple, no plagiarism, due by 11/08/2020 1:30 PM EST

As you consider the reputation service and the needs of customers or individual consumers, as well as, perhaps, large organizations that are security conscious like our fictitious enterprise, Digital Diskus, what will be the expectations and requirements of the customers? Will consumers’ needs be different from those of enterprises? Who owns the data that is being served from the reputation service? In addition, what kinds of protections might a customer expect from other customers when accessing reputations?

Information Governance discussion 7

Chapters 17/18 – From our weekly chapter reading, digital preservation can be defined as the long-term, error-free storage of digital information, with means for retrieval and interpretation, for the entire time span the information is required to be retained.  Though this assessment holds true to the authors, business organizations continue to face significant challenges in meeting their LTDP needs, especially those organizations whose primary mission is to preserve and provide access to permanent records.

Q1: Looking forward, the authors concluded that, there is going to be a great need for collaboration between both internal and external stakeholders to develop governance policies and strategies to govern and control information assets over long periods of time, among other requirements.  For this to be achievable, the chapter has identified one most important consideration that must be met.  What is that consideration?  Identify, and provide a brief narrative to support your answer.

Cybersecurity

Reflect on what you have gained from taking this course.

Write a short statement of 200 words that completes and explains the following sentence.

“One of the most important Cybersecurity learnings I am taking away from this  fundamentals of Cybersecurity course is…