digital

Review the material on routers.

It is sometimes said that information extracted from a router or switch does not necessarily provide specific evidence of a particular crime. What is meant by that?  If true, what then is the most useful information collected from these devices in an investigation?

300 WORDS

BSweek5

In 250 words 

An IT Security consultant has made three primary recommendations regarding passwords:

  1. Prohibit guessable passwords 
    • such as common names, real words, numbers only
    • require special characters and a mix of caps, lower case and numbers in passwords
  2. Reauthenticate before changing passwords 
    • user must enter old pw before creating new one
  3. Make authenticators unforgeable 
    • do not allow email or user ID as password explain each of these security recommendations.  Do you agree or disagree with these recommendations. Would you change, add or delete any of these?  Add additional criteria as you see necesarry.

wk-7

 Assignment 1

Examine Alexa’s skill in ordering drinks from Starbucks

Refer to Chapter 12 in the attached textbook:

Sharda, R., Delen, D., Turban, E. (2020). Analytics, Data Science, & Artificial Intelligence: Systems for Decision Support 11E. ISBN: 978-0-13-519201-6. 

Requirement: 

****Separate document for each assignment****

Minimum 300-350 words. Cover sheet, abstract, graphs, and references does not count.

Add reference separately for each assignment question.

Strictly follow APA 7th Edition Format

No plagiarized content please! Attach a plagiarized report.

Check for spelling and grammar mistakes!

$5 max. Please bid if you agree.

Assignment 2

Research Apple Home Pod. How does it interact with smart home devices? Alexa is now connected to smart home devices such as thermostats, microwaves, and much more. Find examples of other appliances that are connected to Alexa and write a report.

Refer to Chapter 13 in the attached textbook:

Sharda, R., Delen, D., Turban, E. (2020). Analytics, Data Science, & Artificial Intelligence: Systems for Decision Support 11E. ISBN: 978-0-13-519201-6. 

Requirement: 

****Separate document for each assignment****

Minimum 300-350 words. Cover sheet, abstract, graphs, and references does not count.

Add reference separately for each assignment question.

Strictly follow APA 7th Edition Format

No plagiarized content please! Attach a plagiarized report.

Check for spelling and grammar mistakes!

$5 max. Please bid if you agree.

Assignment 3

Practical connection assignment

Refer to the “Required Practical Connection Assignment – Students(1)” word document for instructions. 

Other previous homework done from you has been attached for your reference. 

Requirement: 

****Separate document for each assignment****

Minimum 500-600 words. Cover sheet, abstract, graphs, and references does not count.

Strictly follow APA 7th Edition Format

No plagiarized content please! Attach a plagiarized report.

Check for spelling and grammar mistakes!

$10 max. Please bid if you agree.

  

Assignment 4:

Based on your readings in this course and research on the Internet and other sources, identify and discuss at least two trends or best practices related to key concepts and principles of operational excellence in any field of human endeavor. Use your own words and give credit to any sources referenced in your submission.

Text book attached: 

1. Information Systems for Business and Beyond

2. Information Technology and Organizational Learning Managing Behavioral Change in the Digital Age by Arthur M. Langer

Requirement:

****Separate document for each assignment**** 

Minimum 300-350 words. Cover sheet, abstract, graphs, and references does not count.

Add reference separately for each assignment question.

Double Spaced and APA 7th Edition Format

No plagiarized content please! Attach a plagiarized report.

Check for spelling and grammar mistakes!

$5 max. Please bid if you agree.

Physical Security

 Topic: Based on your text, the attached additional material and any research you have done, discuss the salient points of a Vulnerability Assessment(300 words) and Make sure you talk about Risk Management and Physical Protection Systems (PPS). 

Need help in homework IOT

The recent advances in information and communication technology (ICT) has promoted the evolution of conventional computer-aided manufacturing industry to smart data-driven manufacturing. Data analytics in massive manufacturing data can extract huge business values while it can also result in research challenges due to the heterogeneous data types, enormous volume and real-time velocity of manufacturing data.

For this assignment, you are required to research the benefits as well as the challenges associated with Big Data Analytics for Manufacturing Internet of Things.

Your paper should meet these requirements:

Be approximately four to six pages in length, not including the required cover page and reference page.

Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 

Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Discussion post – Qualitative research methods

 

Primary Task Response: Within the Discussion Board area, write 400-600 words that respond to the following questions with your thoughts, ideas, and comments. This will be the foundation for future discussions by your classmates. Be substantive and clear, and use examples to reinforce your ideas.

Part 1

Top management of a large company has told you that they would like to be able to determine what the impact of years of service at their company has on workers’ productivity levels, and they would like to be able to predict potential productivity based upon years of service. The company has data on all of its employees and has been using a valid productivity measure that assesses each employee’s productivity.

What is a possible way to answer management’s question, and how does the analysis work? Reference the section on bi-variate linear regression from Green & Salkind.

Part 2

After reviewing the results of the analysis in Part I, the company found they are significantly related. However, a statistician reviewed the output and said that the results really do not explain much of what is happening in the total relationship.

What information is the statistician referring to from your output, and why is it important? Reference the section on bi-variate linear regression from Green & Salkind. 

Creating a Resource List

Create a resource list to use to learn about the most current security attacks. Include people, user groups, networking resources too. Suggest ways to share information within your own IT department so that the helpdesk and other IT professionals become aware of issues and concerns quickly too.

Complete a three to four-page report with APA cited references to support your work. Please submit your work using this table as an example. You may add or remove additional columns as needed.  

Introduction to machine language and digital logic

 

Task 4: Download the file masm_2018.zip (see below). Create a folder called masm, as described in the Lecture Notes “Writing the First Program”. The software you need to assemble and link your assembly language programs are in the file masm_2018.zip.

Copy masm_2018.zip and paste it into your folder “masm”, that you just created on your computer and then unzip masm_2018.zip into the “masm” folder,  or a folder of your choosing. These files are necessary for assembling and linking your first programs. Everything is explained in HANDOUT 4 WEEK 4 First Programs.
Programming Assignments
Assignment #1 – Write an assembly language program that will accept a single character from the keyboard, and then output the next character in the ASCII sequence. For example, if the character ‘A’ is entered, the character ‘B’ will be typed out.
Assignment #2 – Write an assembly language program that will print out the message of your choosing!
Assignment #3 – Examine Assignment #1 above using DumpRegs; Find registers AX, BX, CX, DX. Find the hex value in AL after returning from the ReadChar input routine?
Videos: If you need help with Assignments 1,2,3 then watch this video:  Getting Started Assignments 1,2,3

5Th Discussion And Assignment

 Discussion:
This week we discuss the overall process of developing new software.  Please also note the differences between software development and methods (200 to 300 words) references

Exercise

  1. How is the IT function organized in your school or place of employment? Create an organization chart showing how the IT organization fits into your overall organization. Comment on how centralized or decentralized the IT function is.
  2. Which software-development methodology would be best if an organization needed to develop a software tool for a small group of users in the marketing department? Why? Which implementation methodology should they use? Why?
  3. Chapter 7 – Review the section on dealing with multiple locations and outsourcing.  Review figure 7.2 and note how virtual team communications further reiterates the importance of this model. 
  4. Chapter 8 – Review the Siemens AG case study.  Note the importance of understanding the interrelationships amongst all the senior leaders at every location.  Pay special attention to Figure 8.1 and Figure 8.2. Note how the corporate CIO should engage with each of the regional leaders.  Why is this important?

Week 4 assignment

 

Complete the following assignment in one MS word document:

Chapter 7 –discussion question #1-4 & exercise 3 & Internet exercise # 7

When submitting work, be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) to support the work this week.

All work must be original (not copied from any source).

**Please don’t wait until the last minute to set up an account: To complete this week’s assignment you will need to create an account with Teradata by going to the email address below from your school account and they will send them a password: [email protected]. **