Due tonight 11/15/2020
BSWA Week 9
In 300 words.
Do a bit if research into File Inclusion Vulnerability.
- What is it?
- Why is is dangerous?
- What is the difference of low and remote inclusion?
- What methods can me employed to prevent a security breach?
- What programming languages are vulnerable to this type of attack.
Discussion
While there are many benefits to the use of cryptocurrency, there is also much skepticism from the general public. Much of this concern centers around legal protection associated with transactions. Search the Internet and outline what legal protections exist for Bitcoin users in the US and other countries.
Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:
- Ask an interesting, thoughtful question pertaining to the topic
- Answer a question (in detail) posted by another student or the instructor
- Provide extensive additional information on the topic
- Explain, define, or analyze the topic in detail
- Share an applicable personal experience
- Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
- Make an argument concerning the topic.
At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.
Discussion 2
Discussion: This week we focus on the social and organizational issues that exist with better understanding why changes occurs. This week discuss the phases of change noted in the Linear Development in Learning Approaches section in the Information Technology and Organizational Learning text.
Textbook Name — Information Technology and Organizational Learning text.
Note: The first post should be made by Wednesday 11:59 p.m., EST.
Cloud Computing
Discuss in 500 words or more federated architecture in cloud systems. Remember that this is a cloud class not a database class.
lighting
The Building is 1400 feet by 1200 feet. Explain your lighting strategy. There will be 20 or so 5-10 trees surrounding the building
Fall 2020 – Analyzing & Visualizing Data
Kirk (2019) states composition is reviewing every visual property of the design. The final layer of design thinking concerned composition: how to position, arrange and size all the chart elements, interactive controls and annotated components across the entire project and the construction decisions within each chart. Meeting the optimum readability and meeting the intent of the project is the objective. Dividing composition into project-level and chart-level composition options can help review and address areas of opportunities.
The scenario – you have just been hired at the company that has only been in business for 6 months. The position was open due to the previous employee asked to resign due to performance issues. You are now the designer for the new visual the previous employee was developing. You must developing new composition choices in the face of having to accommodate new contextual factors listed below. Provide two project-level and two chart-level composition options to address each topic listed below and provide the reasoning for each option.
1. You had to demonstrate the worst possible data visualization composition practices in the same physical space/size. In other words what is the worst practice in a scenario where you are limited to an assigned physical space / size for the visual
2. You had to force yourself to use as small a space as reasonably possible
3. You have to transpose the work from landscape > portrait or vice-versa
4. The initial data provided includes scales that will not fit onto one page, but a refresh of the data is indicating a change is needed
5. The trustworthiness of the entire project is being questioned by upper management
Your research paper should be at least 3 pages (900 words), double-spaced, have at least 4 APA references, and typed in an easy-to-read font in MS Word (other word processors are fine to use but save it in MS Word format). Your cover page should contain the following: Title, Student’s name, University’s name, Course name, Course number, Professor’s name, and Date.
Ted Talk IT
My topic is scam and phishing in the internet. I need you to do the 10 page research report and the PowerPoint presentation. Please make sure the PowerPoint is long because i need to do a presentation for 15 minutes. Please read the files i attached carefully.
Discrete math test
HI i have my discrete math final on Wednesday 16th at 3-6. was wondering if anyone can help me with that at that time. If you are interested i can send you the practice exam so you can take a look at it.
Forensic investigation using Autopsy tool
Conduct a forensics investigation.
Consider using an image from the Internet or a personal device. There could be issues related to using a live, active, personal device (example: corruption of the device). If using a personal device, consider using an old, outdated phone, if available.
Use Autopsy tool to gather forensics data for analysis. You are simulating the process of gathering this data, so you do not need to investigate a compromised device or system. The project deliverables are as follows:
The paper should provide the following information:
· Executive Summary of your investigation, including a description of the device or systems and the Autopsy tool used for the forensics analysis.
· Step-by-step description you used to gather data for analysis
· Report on the information that was obtainable from the device
· Graphics evidence that you conducted the forensics data gathering and analysis
The paper should be in a form that would be used for reporting to a court or a law enforcement agency. Be sure to provide graphics evidence of your forensics investigation effort (Screenshots, reports, etc.). References should be in APA format.
5 pages document with screen shots of the process
Answer all the questions mentioned
APA format and need minimum 5 scholarly references
need plagiarism report with the document and on time
