Submit a 2 page paper (APA style) creating a market strategy using Blockchain technology to increase knowledge about consumer preferences and developing branding for your company. Deadline Sunday
Reflection Two (R2) is an essay assignment.
Submit a 2 page paper (APA style) creating a market strategy using Blockchain technology to increase knowledge about consumer preferences and developing branding for your company. Deadline Sunday
Reflection Two (R2) is an essay assignment.
400 words APA FORMAT WITH CITATIONS
discussion topic:
How do ERP CRM Systems generate forecasting analyses of product consumption based on critical variables such as geographical area, season, day of the week, and type of customer, identify particular customer needs and then utilize this information to suggest specific product campaigns?
____________________________________________________________
Please support your position with evidence from your textbook and/or other sources. Remember, you must cite every sentence in which you use materials from a referenced source. A corresponding reference list must be included.
An important component of your dissertation is the methodology chosen. Discuss the topic that you are selecting for your dissertation. Locate one article in a peer reviewed journal that closely relates to your topic. Describe the method used, the sample, the population chosen, was there a survey involved in a quantitative study, or a set of questions asked as in a qualitative study. Finally, can you identify the problem the researcher(s) tried to examine? Provide an APA 7 formatted citation for the study you have outlined. Paraphrase you work – no quotes are allowed for this assignment.
Topic: User-centred Design and Evaluation of Health Information Technology
Exp19_PowerPoint_Ch01_ML2_Outdoor_Adventures
You have been asked to put together a promotional presentation on the company you work for, Peddle and Paddle. The company has a presentation it has used in the past that you have been asked to modify.
Start PowerPoint. Download and open the file named Exp19_PPT_Ch01_ML2_OutdoorAdventures.pptx. Grader has automatically added your last name to the beginning of the filename. Save the file to the location you are saving your files.
Apply the Wood Type theme.
Type Peddle and Paddle in the title placeholder. Type The Ultimate Outdoor Adventure in the subtitle placeholder.
Use the Reuse Slides feature to add all slides from the downloaded Adventure.pptx presentation. Deselect the Use Source Formatting option when importing the slides.
Delete Slide 2. Move Slide 6 so that it becomes Slide 4.
On Slide 5 insert the Peddle.jpg image. Change the height of the image to 5.8″.
On Slide 5 set the horizontal position of the image to 3.4″ and the vertical position to 1.25″.
Apply the Reflected Perspective Right picture style to the image on Slide 5.
On Slide 6 insert the Paddle.jpg image. Change the height of the image to 5.8″.
On Slide 6, set the horizontal position of the image to 3.4″ and the vertical position to 1.25″.
Apply the Reflected Perspective Right picture style to the image on Slide 6.
On Slide 4, convert the list to a Basic Block List SmartArt graphic. Apply the Intense Effect SmartArt style.
Select the text Book Your Adventure Soon! on the last slide. Format the text as WordArt Fill:
Black, Text color 1; Shadow.
On Slide 2 change the font size of the text in the placeholder to 80 pt.
Add slide numbers to all slides with the exception of the title slide.
Check the presentation for spelling errors. Make corrections as needed on the slides. Hint: Ignore the spelling error for Funyak in the notes.
Save and close Exp19_PPT_Ch01_ML2_OutdoorAdventures.pptx. Submit the file as directed.
Assignment.
Your boss has had an intrusion (or so she says) on his home network. She has brought in a packet capture file for you to analyze.
She says:
“Something has happened on my home network. I use my network for internet access so I can access read email (remember my AT&T email account). I am not sure whether this event(s) should cause me concern or not, but I was lucky to be running Wireshark when the event occurred. I will email you the Wireshark capture file so you can analyze the capture file and tell me what occurred during the internet session.”
1) Open the capture file (by clicking Here) using any tools you see fit
2) Perform an analysis on the captured traffic. Some things you should consider are the following (not all of these happened and may not be all inclusive either):
a. How long did the session capture last?
b. How many packets were captured?
c. How many bytes were captured?
d. What protocols were observed?
e. When did the bulk of the data get transmitted?
f. What caused this transmission spike?
g. Were any ISP sites accessed? If so which ones? What accounts?
h. What is the name of the host computer? It’s IP address?
i. What Operating system is it using?
j. What does the local network look like?
k. What device names are on the local network?
l. Did I access any other computes on the local area network?
m. Are any other devices on the network?
3) What “story” does the capture file tell?
4) Run the capture file through SNORT. What alerts are triggered?
Provide a lab report, which will includes the answers to the questions above and an analysis of what actually happened during the network session. Identify the key events and either prove or disapprove that a malicious event occurred.
When referencing the answer to questions or providing proof of your analysis it might be helpful to reference the actual packet number that proves your point.
GRADING: The grade will come from your paper, and supporting documentation. Papers which are clearly organized, referenced, describe the sequence of events and subsequent analysis, and provide sound conclusions based on the presented analysis/evidence will be graded higher. Limit your response to no more than 5 pages. This assignment counts as a double-lab grade.
IT security attacking virtual machine Project
Analysis the given pdf.
Choose the 10 best sources from your searches for articles, papers, and dissertations. Focus on sources that give details about your research topic. Next, write the reference list entry (APA citation style) for each source. Alphabetize your list of reference list entries. After you have the correctly ordered list, number your entries from 1 to 10. Note: different reference entry formats are used for different types of sources. Review the UMGC Library’s “Get Help > Citing and Writing for samples and explanations of the formatting rules. If you are using APA format, your list should look something like the following.
Next, write your annotations for each source in your list. In an annotated bibliography, the annotation is a paragraph or two placed under the reference list entry for each source. For this assignment, the annotation should be a combination of factual information from the source and your evaluation (opinion) of the quality and usefulness of the information; you will be combining the descriptive and analytical styles of annotations.
To accomplish this, you should read the abstract, introduction section, and closing sections for each article or paper. For dissertations, look over the Introduction and the Literature Review (usually the first two chapters). From this information, develop a short informative or descriptive summary of the source that includes: (a) a description the information provided in the source, (b) how you plan to use this source to support your analysis of your research topic, and (c) your thoughts and opinions about the utility or quality of the source. Each annotation should be approximately 100-125 words (five to seven sentences). Place this summary after the reference list entry for the source.
For more information about annotated bibliographies, see https://libguides.umgc.edu/annotated-bibliography-apa
Submit your annotated bibliography for review and feedback from your instructor.
Below are the steps used in data mining. Please provide why each of the steps listed below are important in data mining:
1. Business understanding
2. Data understanding
3. Data preparation
4. Modeling
5. Evaluation
6. Deployment