Help

PROBLEM: RANSOMWARE

QUESTION

In a Microsoft Word document of a minimum of 500 words, include the following:

  1. Research questions: List a minimum of two research questions that will help you to analyze the problem.

  1. Current hypothesis:      Include a hypothesis about how you think the system currently operates.

  1. Collect data and create two visual models of the data that show the current state of the system.      Put the data into MS Excel and generate graphs that show the current state.  

  1. Create a comprehensive visual model of the system/process that you are researching.

  1. Draw clear conclusions:      Document your findings and deliver a professional statement about the analysis according to Christian virtues and values.

  1. Attach an Excel sheet that includes the raw data that was collected to show the current state of the system.

PLEASE FOLLOW THE ATTACHMENT INSTRUCTION TO FINISH THE WORK AND USE EACH QUESTION AS A HEADING

HOW TO GO ABOUT THE ASSIGNMENT 

This is another of your research paper. You will roll this and the other parts up to make a complete paper incorporating feedback from my grading and your peer reviews. Using headings for each item in the same order as the rubric.

  1. Research questions – These are the questions that will guide your study. Its as simple as saying, “The discussion questions for this study are:….”

  1. Number the questions Q1 & Q2.

  1. Example:
    1. The research questions for this study are (assuming a problem to be addressed of poverty):

      Q1: What are the major causes of poverty?
      Q2: How can poverty be lessened?

  1. Current Hypothesis – you job here is to articulate a hypothesis about how your stated problem works. Consider the following as you formulate your hypothesis: https://www.enago.com/academy/how-to-develop-a-good-research-hypothesis/

  1. Excel Spreadsheet – This is really a table made in Excel that contains your data based on your research from your plan (incidents over time and $’s of damage overtime as an example for spear phishing) 

 

  1. Two forms of visual data – For this task you create visual analysis tools/items based on your table such as graphs, timelines, charts etc.

  1. Visual model of the system/process – here you create a visual model of how the problem/phenomenon you are studying works.

  1. Conclusion – Here you draw a conclusion about the problem based on the data, analysis, and model.
Tags: No tags