assignment

 

Scenario

Your new manager comes to you and asks you that he keeps hearing about read/write blockers for forensic imaging. He’s not sure what that is. He also is confused because he’s heard that there’s two different types (software and hardware). Also, there’s commercial and open source tools. He knows you just took a course in digital forensics so he asks you to prepare a memo for him explaining all that.

Your assignment

  1. Research on what is a forensic read/write blocker and what is the difference between a hardware and a software version?
  2. Research on what tools are available e.g. commercial (you buy) or open-source (free) and what types are available.
  3. Identify some situations where it makes sense to use the hardware versions or when it makes sense to use software versions?
  4. Put it all together and summarize it for your manager! No more than 2 pages please.

What this teaches you

Being familiar with what tools the investigator used will help you. You gain credibility by asking what hardware or software tools they used, how they deployed it and why they went with a hardware or software version. 

coursework to their practical work experience

 1. Briefly explain any steps you are taking, or plan to take, to gain hands-on experience in your program of study(Ph.D. in information technology).  100 words  use own words

2. State two goals you hope to achieve through applying your coursework(  Data Science & Big Data Analy, information security leadership & communication) this term to your workplace experience. 100 words (use own words)

final case

 

Chapter 5 exercises

20. Consider the task of building a classifier from random data, where the attribute values are generated randomly irrespective of the class labels. Assume the data set contains records from two classes, “+” and “−.” Half of the data set is used for training while the remaining half is used for testing.

(a) Suppose there are an equal number of positive and negative records in the data and the decision tree classifier predicts every test record to be positive. What is the expected error rate of the classifier on the test data?

(b) Repeat the previous analysis assuming that the classifier predicts each test record to be positive class with probability 0.8 and negative class with probability 0.2.

(c) Suppose two-thirds of the data belong to the positive class and the remaining one-third belong to the negative class. What is the expected error of a classifier that predicts every test record to be positive?

(d) Repeat the previous analysis assuming that the classifier predicts each test record to be positive class with probability 2/3 and negative class with probability 1/3.

Chapter 6 exercises

5. Prove Equation 6.3 in the book. (Hint: First, count the number of ways to create itemset that forms the left hand side of the rule. Next, for each size k itemset selected for the left-hand side, count the number of ways to choose the remaining d − k items to form the right-hand side of the rule.)

17. Suppose we have market basket data consisting of 100 transactions and 20 items. If the support for item a is 25%, the support for item b is 90% and the support for itemset {a, b} is 20%. Let the support and confidence thresholds be 10% and 60%, respectively.

(a) Compute the confidence of the association rule {a} -> {b}. Is the rule interesting according to the confidence measure?

(b) Compute the interest measure for the association pattern {a, b}. Describe the nature of the relationship between item a and item b in terms of the interest measure.

(c) What conclusions can you draw from the results of parts (a) and (b)?

(d) NOT NEEDED FOR THE TEST

Chapter 7 exercises

5. For the data set with the attributes given below, describe how you would convert it into a binary transaction data set appropriate for association analysis. Specifically, indicate for each attribute in the original data set.

(a) How many binary attributes it would correspond to in the transaction data set,

(b) How the values of the original attribute would be mapped to values of the binary attributes, and

(c) If there is any hierarchical structure in the data values of an attribute that could be useful for grouping the data into fewer binary attributes. The following is a list of attributes for the data set along with their possible values. Assume that all attributes are collected on a per-student basis:

• Year : Freshman, Sophomore, Junior, Senior, Graduate: Masters, Graduate: PhD, Professional

• Zip code : zip code for the home address of a U.S. student, zip code for the local address of a non-U.S. student

• College : Agriculture, Architecture, Continuing Education, Education, Liberal Arts, Engineering, Natural Sciences, Business, Law, Medical, Dentistry, Pharmacy, Nursing, Veterinary Medicine

• On Campus : 1 if the student lives on campus, 0 otherwise

• Each of the following is a separate attribute that has a value of 1 if the person speaks the language and a value of 0, otherwise.

- Arabic
- Bengali
- Chinese Mandarin
- English
- Portuguese
- Russian
- Spanish

Chapter 8 exercises

1. Consider a data set consisting of 2^(20) data vectors, where each vector has 32 components and each component is a 4-byte value. Suppose that vector quantization is used for compression and that 2^(16) prototype vectors are used. How many bytes of storage does that data set take before and after compression and what is the compression ratio?

8. Consider the mean of a cluster of objects from a binary transaction data set. What are the minimum and maximum values of the components of the mean? What is the interpretation of components of the cluster mean? Which components most accurately characterize the objects in the cluster?

9. Give an example of a data set consisting of three natural clusters, for which (almost always) K-means would likely find the correct clusters, but bisecting K-means would not.

11. Total SSE is the sum of the SSE for each separate attribute. What does it mean if the SSE for one variable is low for all clusters? Low for just one cluster? High for all clusters? High for just one cluster? How could you use the per variable SSE information to improve your clustering?

13. The Voronoi diagram for a set of 1( points in the plane is a partition of all the points of the plane into K regions, such that every point (of the plane) is assigned to the closest point among the 1( specified points. (See Figure 8.38.) What is the relationship between Voronoi diagrams and K-means clusters? What do Voronoi diagrams tell us about the possible shapes of K-means clusters?

Owning a dominion name

  

Instructions

In order to complete assignment #5, you will need to answer the below questions. Please complete the questions in a Word document and then upload the assignment for grading. When assigning a name to your document please use the following format (last name_Assignment #5). Use examples from the readings, lecture notes, and outside research to support your answers. The assignment must be a minimum of a 1-full page in length with a minimum of 2 – outside sources. Please be sure to follow APA guidelines for citing and referencing sources. Assignments are due by 11:59 pm Eastern time on Sunday.

Chapter 8

Review Question #4 on page 261 and then answer the following question:

The new age of technology presents many opportunities for litigation. The Internet is no exception. When operating Internet websites, an important part of it is owning the domain name (www.example.com). Anyone in the world can own any domain name that is available and the facts of this case arise from this concept.

The plaintiff, in this case, Weather Underground Corporation (Weather Underground), a Michigan corporation, is a commercial weather service. It owns and operates several domain names so that people can access their company through their websites. Defendants, in this case, Navigation Catalyst Systems, Incorporated (“NCS”), a Delaware corporation, owns many domain names that are similar to the plaintiff’s company name (some would result from people misspelling the correct domain name for Weather Underground). NCS profits from consumers going to one of these websites and clicking on links that are on them.

Plaintiff filed suit against NCS and several of its companies in the District Court for the Eastern District of Michigan. As defendants were not incorporated in Michigan, the issue of personal jurisdiction arise. The courts of appeals have held that in order to establish specific personal jurisdiction (showing that this company has established contacts with the forum state), one must show three things: (1) the defendant purposefully availed himself of the privilege of acting in the forum state, (2) the cause of action arises from the defendant’s activities there, and (3) the defendant’s acts were so substantial as to make the exercise of personal jurisdiction there reasonable.

The district court is considering whether the exercise of personal jurisdiction is proper. What should it decide and why?

Weather Underground Inc. v. Navigation Catalyst Sys. Inc., No. 09–10756, 2009 WL 3818191 (E.D. Mich. Nov. 13, 2009).

The district court is considering whether the exercise of personal jurisdiction is proper. What should it decide and why?

Chapter 9

Apple, Inc., and Major League Baseball (MLB) signed an agreement for the broadcast of games. MLB will offer two live games per day, subject to blackout restrictions. Then MLB plans to roll out an entire offering of out-of-market games currently offered only through its premium live streaming video service. Identify some other, extra features users want. Identify restrictions that MLB will want to see in the agreement.

Disuccsion

The control of processes and threads are of deep concern by developers of all operating systems capable of handling “real or emulated” simultaneous computer activity. Threads are typically created by processes (initially invoked by the user or another process). Discuss how an operating system manages these processes and threads, how they are instantiated and discarded, how the activity is controlled, along with the respective advantages and disadvantages of both process and thread. Do not discuss MS Windows OS. Instead you may choose from Linux, UNIX, ROS, z/OS, or VM.

SQL ( fund of data systems)

Answer the following question:

SQL is a pervasive querying language. While there is one primary SQL dialect that all SQL RDBMS implementations must support, and that’s ANSI SQL, each database platform comes out with its own context. Each of these dialects has its own  DDL (Data Definition Language). DML (Data Manipulation Language). and DQL (Data Query Language). Other than for marketing purposes (to sell the product as unique), what is the value of creating a new variation of a SQL dialect. 

Provide an example of one SQL dialect as part of your write-up. 

Instructions:

This is a required assignment, worth 15 points. The assignment must be submitted by the due date. Late assignment are not allowed. 

You are required to submit a minimum of two postings. Points will be deducted for not fulfilling this minimum requirement.

Apply and use the basic citation styles of APA is required. Points are deducted per the rubric for this behavior.

Do not claim credit for the words, ideas, and concepts of others. Use in-text citation and list the reference of your supporting source following APA’s style and formatting. Points are deducted per the rubric for this behavior.

Do not copy and paste information or concepts from the Internet and claim that is your work. It will be considered Plagiarism and you will receive zero for your work. A second offense results in a zero for the course. A third is termination from the university.

data & file structures

Exercise 1: Write a function template midElement that takes an array A and its dimension N and returns the middle element of the array. In the main function, call the function template midElement to 1) an integer array of integers with 4 elements 2) An array of doubles with 5 elements and 3) an array of characters which dimension is entered by the user

____________________________________________

Exercise 2:

You have a situation in which you have 2 lists List1, and List2 with length L1

and L2 implemented as arrays. Write two member functions MergeEven that

will merge the even elements from both lists into one list EvenList and

MergeOdd that merges the odd elements from both lists into a list OddList. 

Research paper

Considering the importance of data in organization, it is absolutely essential to secure the data present in the database. What are the strategic and technical security measures for good database security? Be sure to discuss at least one security model to properly develop databases for organizational security. Create a diagram of a security model for your research paper.

Your paper should meet the following requirements:

  • Be approximately 4-6 pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 
  • Be clear and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.