Spr1.3

Assignment 1

Kirk (2016) tells us that all requirements and restrictions of a project must be identified. Select 1 key factor below and discuss why Kirk (2016) states it will impact your critical thinking and shape your ambitions:

· People: stakeholders, audience.

· Constraints: pressures, rules.

· Consumption: frequency, setting.

· Deliverables: quantity, format.

· Resources: skills, technology

Textbook is attached, “Andy Kirk – Data Visualisation_ A Handbook For Data Driven Design-Sage Publications (2019)”.

Requirement: 

· ****Separate word document for each assignment****

· Minimum 300-350 words. Cover sheet, abstract, graphs, and references do not count.

· Add reference separately for each assignment question.

· Strictly follow APA style. 

· Include at least two citations (APA) from academic resources

· No plagiarized content please! Attach a plagiarized report.

· Check for spelling and grammar mistakes!

· $5 max. Please bid if you agree.

  

Assignment 2

Project Part 3.

Refer to the “Project Part 3-Malware Protection Procedure Guide” word document for tasks and instructions. 

Requirement: 

· ****Separate word document for each assignment****

· Minimum 3 pages. Cover sheet, abstract, graphs, and references do not count.

· Strictly follow APA style.

· No plagiarized content please! Attach a plagiarized report.

· Check for spelling and grammar mistakes!

· $10 max. Please bid if you agree.

week 9 assignment data mining

For this assignment, you need to research the following question and write at least 2 paragraphs with references. (you do not have to follow APA, but it is recommended)

-How do search engines (you can take google as case study), utilize clustering? 

-Why?

-Which type of clustering?

Please write your answers to word document and submit it here as a word document or PDF. 

Computer archtecture paper

DUE: December 12th!!

 Pick two topics among the following below topics. Write a research paper of five full content pages explaining the two topics, their importance to computer architecture, what makes them important, and why you chose these two topics and not the others. Support your research with scholarly references.

-computer systems architecture

Computer Arithmetic and Digital Logic

-Architecture and Organization

-Instruction Set Architectures-Breadth and Depth

-Computer Architecture and Multimedia

-Performance—Meaning and Metrics

Processor Control.

Discussion Emerging threats

What are the various technologies employed by wireless devices to maximize their use of the available radio frequencies? Also discuss methods used to secure 802.11 wireless networking in your initial thread.

Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA 7)
  • Make an argument concerning the topic.

At least two scholarly source should be used in the initial discussion thread. Use proper citations and references in your post.

legal process in Digital Forensics

 For this assignment, please discuss the following:

  • How does the Fourth Amendment relate to the legal process of digital forensics?
  • How do exigent circumstances apply to the legal process?
  • Explain UFED, its purposes, and one of the primary reasons law enforcement will use this service.
  • Explain CDMA and GSM, their significance as it relates to the cellular network.

homework computer

File submission: Word processor document creation lab

 

Objective of the activity

Through this activity the student will reinforce the concepts and skills learned in the module

Instructions

The academic goal of this assignment is to apply the skills learned in the previous module

What are we going to do?

In this activity the students will practice the use of templates and text editing

How are we going to do the job?

Download the Welcome to Word template. Preview the document

Then follow the instructions in the document. Save it with the name Welcome to Word_your name. For example: Welcome to Word_Maria Oliveros

Upload your work to the platform.

If you have any doubts about how to do the job, go through the material in the textbook, the tutorials and the simulations given.

Deliverable

The activity is individual. The work must be delivered on time, without spelling or grammatical errors. The works will be submitted to the tool to detect similarity of content (now Urkund). Submit the answers in a Word document, Times New Roman, size 12. You must include the references in APA format, three years old or less.

Basic review resources

Microsoft. (2018). Word for Windows Training. Retrieved from https://support.office.com/es-es/article/word-for-windows-training-7bcd85e6-2c3d-4c3c-a2a5-5ed8847eae73 (Links to an external site.)

Supplemental Review Resource

Hoisington, C., Freund, S., Vermaat, M., Pratt, P. J.,. Last, M. Z., Schmieder, E., Sebok, S. L., Starks, J. (2016). Shelly Cashman series Microsoft Office 365 & Office 2016: Introductory. Cengage.

risks in cloud computing

  

Read the attached article and  please answer the following two questions.

  • What are some of the potential risks involved with cloud computing?
  • Does the research and model in this article propose a viable solution to cloud-based risk      management?

Make sure to write in proper format

  • Explain, define, or analyze the topic in detail
  • Provide an outside source (for example, an article from the UC Library) that applies to the      topic, along with additional information about the topic or the source      (please cite properly in APA 7)