HW: Are Your Articles Research Articles? feb 11

Assignment Content

  1. In class today, you were asked to find research articles that explore your approved research question. (DO NOT ATTEMPT THIS ASSIGNMENT UNLESS YOU HAVE COMPLETED THE PREVIOUS ASSIGNMENT and gained approval of a research question: Research Question Proposals.)

    For this assignment, follow directions CAREFULLY: 

  2. Step 1: download the document below which is your Finals Packet:

    Step 2: Complete p. 13a, PHASE 1 ONLY
    Step 3: Then, copy and paste the entire activity into a Word document and upload it here to be graded and approved. 

    ***If you need help finding research articles, 
    visit the virtual library using the link in the Content page***

An approved topic and research question:

What have the researchers learned about the effects of anxiety on academic performance of medical school students?

Grading is as follows:

Article 1 (Basic Research Article): 25pts

  • HOW = Name the methodology AND cut and paste AND highlight indicator words 
  • WHAT = Findings 
  • Article 2 (Basic Research Article): 25pts
  • HOW = Name the methodology AND cut and paste AND highlight indicator words 
  • WHAT = Findings 
  • Article 3 (Basic OR Applied Research Article): 25pts
  • HOW = Name the methodology AND cut and paste AND highlight indicator words 
  • WHAT = Findings 
  • Article 4 (Applied Research Article): 25pts
  • HOW = Name the methodology AND cut and paste AND highlight indicator words 
  • WHAT = Findings 

policies

Section1 

Using the Internet and/or the Library, research and complete the following: 

In 1,000 or more words, respond to the following: 

Evaluate how to implement a secure wireless network using Active Directory and RADIUS server. 

Explain how to do this and provide it in a step-by-step implementation guide using screenshots and explanations. 

Section 2 

In 200 or more words for each answer, respond to the following: 

  • Explain step by step how a hacker would crack passwords, starting with extracting the hash file in a non-Active Directory and an Active Directory client.
  • Write a remote access cybersecurity policy for remote users. 

Assignment

PFA details :

Topic: Based on this week’s lectures take an inventory of door and window locks in your living area or place of work to identify areas of concern and improvement. Remember to get permission from security.  

Chapter 7 

Title: Effective Physical Security

Subtitle: **PLEASE SEE BOOKSTORE LINK BELOW TO PURCHASE REQUIRED MATERIALS

ISBN: 9780128044629 (print, rental or digtial)

Authors: Lawrence Fennelly

Publisher: Butterworth-Heinemann

Publication Date: 2016-11-25

Edition: 5th

Sporting Goods Feasibility Analysis

Overview:

A feasibility analysis, also called a feasibility study, is performed to estimate the chances of a project’s success before a commitment of money and time is made. Some of the factors involved are technical, financial, or legal.

Instructions:

For this assignment, you will develop a feasibility study on Sporting Goods and construct a feasibility analysis based on the project requirements.

• Provide three (3) goals of a feasibility analysis.

• Describe what a feasibility analysis of Sporting Goods might entail (the website, the database system, etc.).

Requirements:

• Your feasibility analysis should be 2-3 pages in length, with additional cover and reference pages.

• The summary should be double-spaced, written in 12-point Times New Roman font, and use a 1-inch margin.

• Use at least two (2) scholarly sources in your assignment and include all references and citations properly formatted in APA.

• Use complete sentences and appropriate grammar and spelling.

Timeline

 

Completion of the dissertation primarily rests upon you, the doctoral student. However, research indicates that self-regulated learning strategies predict the elapsed time along the dissertation journey (Dunn & Rakes, 2015; Kelley & Salisbury-Glennon, 2016). One such strategy is the creation of a timeline. This cyclical process has the learner plan out a task, monitor their performance along major milestones, reflect on their progress, and then use the reflection to adjust the timeline. However, to be effective, this strategy needs to be personalized for each learner’s purpose (Zimmerman, 2002).

Using the attached template as a guide, you are to create such a timeline – a roadmap, if you will, along your dissertation journey. Incorporated within the timeline are major milestones. Build into the timeline goals for each milestone with specific dates. You may also want to include specific contact information as well as possible obstacles that may arise. This will be a tool you will bring to each consultation with your professor/chair. Most importantly, it is to be a useable point of reference along your dissertation journey.

References

Dunn, K., & Rakes, G. (2015). Exploring online graduate students’ responses to online self-regulation training. Journal of Interactive Online Learning, 13(4), 1–21.

Kelley, M., & Salisbury-Glennon, J. (2016). The Role of Self-regulation in Doctoral Students’ Status of All But Dissertation (ABD). Innovative Higher Education41(1), 87–100.

Zimmerman, B. J. (2002). Becoming a self-regulated learner: An overview. Theory into Practice, 41(2), 64-70.

Paper with minimum of 6-8-pages.

Research and identify three large scale hacks or violations of Internet security that have occurred over the past five years. For each of the hacks, identify the suspected hacker or hacker group, what the hack consisted of, what the hackers wanted, and how the hacked entity was able to fend off the attack, or how the entity resolved the hack if it was successful. 

Compare and contrast each of these and write a proposal for an information security review for The New York Times newspaper. This review should include the potential threats, ease of access to reporters and staff accounts, and so on. You should also identify the top three threats to the newspaper in your review.

Your APA-formatted report should be a minimum of 6-8-pages, and include a minimum of 6 peer-reviewed or academic resources.

Python Program Project

 In this project, you will write a Python program for a miniature “Isolation” game on a 3-by-3 board. Your program should make a suggestion about the best possible move for Player 1 (the player represented by Max nodes on the Min-Max search tree), and once Player makes his move, make the best move for Player 2 (the player represented by Min nodes on the Min-Max search tree), and iteratively enter rounds of moves till the end of game, in which one player cannot move and thus become the loser.

File

First Normal Form Assignment

First Normal Form Assignment

Attached Files:

In this exercise you will:1.) Run the attached SQL script “exampleData.sql” in your preferred way (E.g., workbench or from the command line tool in a terminal window.)This script creates a database named FN1 and a table named “VoterData”, and loads three rows of data into the table.Notice that the data are not stored in First Normal Form because two of the columns: “address” and “email” are used in a way that makes their data nonatomic. A valid address is hierarchical: street number, street name, city/town name, state, zip code, etc. The email field is used to store more than one email address. (If you want to know more about postal addresses read this: https://en.wikipedia.org/wiki/Address)2.) Watch Caleb Curry’s youtube video on First Normal Form (https://www.youtube.com/watch?v=JjwEhK4QxRo) and understand what this means and how he redesigns his database. Notice that the database I gave you is similar to his.3.) Redesign the provided example database so that the email information is in first normal form. This means that you will create a new table called “EmailAddresses” that is specialized for storing email address information, and, it has a foreign key relationship with the VoterData table, etc.