I‘m requesting 5 pages of the risk associated with surfing Deep and Dark web. This paper should be all about the viruses, technical issues, softwares to use to surf the Deep and dark.
focus on some additional terms for IT users
This week we focus on some additional terms for IT users. This week lets discuss what a community of practice is. Why are they important and how can they impact the culture within an organization?
Note: The first post should be made by Wednesday 11:59 p.m., EST. I am looking for active engagement in the discussion. Please engage early and often.
Your response should be 250-300 words. Respond to two postings provided by your classmates.
answer the following question from text book
Textbook Exercises
Chapter 5 Hashed Data Structures
1, 5, 9, 10, 11 (a)(b), 25, 26, 28
Chapter 6 Recursion
2 (a,b,c,d), 11(a, b, c, d)
privacy qa
Answer each these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.
1. What is privacy?
2. What risks, if any, does facial recognition software raise?
3. How much information about you can be found on-line with a simple google search?
4. How much information about you can be found by searching government and commercial databases?
5. Describe informed consent.
6. Should secondary use of consumer provided data be available without notice to the consumer?
7. How do data mining and predictive analytics work?
8. Watch this Science Friday video by Ira Flatow. And, offer your opinion – Are advancing algorithms taking our free will?
9. Should Facebook be regulated, at least as far as it’s privacy and data policies?
10. How many public cameras is too many?
discussion
Why do you think that a study of Digital Forensics is important?
Hardware, Software, and Network Requirements
Assignment Content
- Conduct an internet search using the phrase “small office local area network” for network diagram examples to help you complete this assignment.
As you continue to work on Great Day Fitness Tracking’s website, you now need to gather business requirements and user requirements to identify the hardware, software, and network requirements to support the online business.
Write a 2- to 3-page proposal in Microsoft® Word. Your proposal should:
- Describe how you would select appropriate hardware and software to develop the internal business infrastructure.
- Explain at least two possible approaches to managing the data for easy access and security.
- Describe possible networks that might be used to support business needs.
- Create a logical system diagram with a software of your choice showing possible internal connections as well as those between the site and the potential customers.
- Format your assignment according to APA guidelines.
Submit your assignment.
Context Diagram & System Design Specification Document Assignment
Your Week 3 Assignment has two required parts: (1) to make a context diagram, and (2) to create and complete the System Design Specification document for your project.
Part 1 :
- Use a tool to make a context diagram, there are tools such as Lucidchart and others in the market for making a diagram.
- Develop a Context Diagram for the case system using Lucidchart or another to create the context diagram.
- Criteria: Full credit for use of the appropriate shapes, with appropriate labeling on the shapes and the lines.
- Take a screenshot of your diagram, and paste it into a Word document.
Part 2 :
- Create your project’s System Design Specification document. You may conduct research to find a template or use a blank Word document.
- Criteria: Complete the System Design Specification document for your project.
- Include:
- title page,
- project name,
- table of contents,
- references, and
- detailed information about each component listed in your table of contents.
- Also, include the Context Diagram form Part 1 at the end of your System Design Specification document.
json and ajax
Do a bit of research on JSON and AJAX.
How do they relate to the the Same-Origin policy?
Using WORD, write several short paragraphs on each. A total of 300 words.
Malware & Sniffers
Using the following link as your reference, select TWO and explain the differences
(viruses, worms, trojans, and bots).
Cloud_computing_week5
Discussion Topic: Define and describe a SAN vs. NAS. Name one applicable purpose of each and why.
Paper:
Write a paper on cloud-based data storage. The following are the items to discuss in the paper:
- Describe how cloud-based data storage works.
- List the pros and cons of cloud-based data storage.
- List the pros and cons of a cloud-based database.
Paper requirements:
- Minimum 900 words (excluding title page, table of contents, and references pages)
- Minimum of 3 references
- Format your paper consistent with APA guidelines