31/p1

  1. What are the key elements of disaster recovery planning?
  2. What are steps that an organization should take to mitigate the risk of data loss?
  3. Is the Penson Financial Services Inc. disaster recovery plan adequate? If not, suggest some ideas to improve the plan.

dq

From your research, discuss whether or not your organization has ISO 27001 certification. Outside of overall protection from cyber-attacks, describe, in detail, some other benefits your organization will achieve in obtaining this certification. If your company does not have this certification, how can they go about obtaining it?

Present your discussion post as if you were presenting to senior leaders of your company.

Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

Annotation and Cluster Analysis

Q1. Read Chapter 9 in the textbook: Cluster Analysis

Textbook: Tan, Pang-Ning. Introduction to Data Mining

  1. What are the characteristics of anomaly detection? 
  2. What are the detection problems and methods?
  3. What are the statistical approaches when there is an anomaly found?
  4. Compare and contrast proximity and clustering based approaches.

Follow APA7 guidelines and answer in Q&A format.  There should be headings to each of the questions and include an introduction and conclusion.  Ensure there are at least two-peer reviewed sources to support your work. The paper should be at least 2-3 pages of content (this does not include the cover page or reference page).

Q2. Read ch. 8 in the textbook: Annotation

Textbook: Kirk, Andy.  Data Visualization: A Handbook for Data Driven Design

Select any example of a visualization or infographic. The task is to undertake a deep, detailed ‘forensic’ like assessment of the design choices made across each of the five layers of the chosen visualization’s anatomy. In each case your assessment is only concerned with one design layer at a time. For this task, take a close look at the annotation choices:

  1. Start by identifying all the annotation features deployed, listing them under the headers of either project or chart annotation.
  2. How suitable are the choices and deployment of these annotation features? If they are not, what do you think they should have been?
  3. Go through the set of ‘Influencing factors’ from the latter section of the book’s chapter to help shape your assessment and to possibly inform how you might tackle this design layer differently.
  4. Also, considering the range of potential annotation features, what would you do differently or additionally?

Be sure to show the visualization first and then thoroughly answer the above questions. 

Answer in a Q&A format in 2-3 pages. Ensure that there are at least two-peer reviewed sources utilized this week to support your work.

Discussion 300 words

 Explain in your own words what “FOOTPRINTING” (or digital reconnaissance) is and how you would go about gathering the information you need to determine the location of a recently stolen late model car that was last seen in the parking lot of our college 

Database security and model diagram

Considering the importance of data in an organization, it is absolutely essential to secure the data present in the database. What are the strategic and technical security measures for good database security? Be sure to discuss at least one security model to properly develop databases for organizational security. Create a diagram of a security model for your research paper. Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

IT THEORY FUNDAMENTAL

 

When you’re managing a network, it is vital that you understand how it functions. If a problem arises, you will need to interpret the data it in order to solve the issue. Using graphs to visualize a network can help you make sense of the data and reach a faster conclusion. In order to conduct analysis of paths on network graphs, it is necessary not only to know where connections exist but also to be able to characterize each vertex and each edge. Each vertex is a device like a router operating on the network; so, information such as what routes the router is connected to and how fast the router can process a packet is critical. Each edge is a wired or wireless connection; so, the speed and throughput of that connection must be considered.

In this discussion, you will investigate how graph analysis can help solve network issues.

For this Discussion:

Choose one of special walks: Euler circuit, Hamiltonian cycles, or shortest path tree. Provide an example of how the walk can be used to identify an issue on a network or to solve a routing problem.

DSBDA W 10 A

 This week’s reading centered around Bitcoin Economics.  For this week’s research paper, search the Internet and explain why some organizations are accepting and other organizations are rejecting the use of Bitcoins as a standard form of currency.  Your paper needs to identify two major companies that have adopted Bitcoin technology as well as one that has refused accepting Bitcoin as a form of currency. Be sure to discuss each organization, how they adopted (or why they won’t adopt) Bitcoin, and what recommendations you have for them to continue to support Bitcoin (or why they should support Bitcoin).Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing

ERM W3 D

 

please discuss the following in your main post:.

  • Which case study in the paper was most interesting to you and why?
  • Do you think that ERM is necessary in the contemporary organization and why?

Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA 7)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

Homework

 (1. You need to write carefully considered, grammatically correct, thoughts, Use references where appropriate, Do not plagiarize!! The result of your work will be contained in one word document that contains timestamped screen shots when appropriate. It will be run through safeassign to detect plagirism. Plagiarism will be rewarded with a zero score.)

Normal Forms:

  1. Explain why normal forms were defined. What problems are solved by using them?
  2. Provide an example table that violates at least one normal form and explain how you would rebuild this table to make it comply with it. (Hint: you can use any online tool and take screen shots.)

Foreign Keys:

  1. Explain why foreign keys are used. What problems can be solved by using them? (25 points)
  2. Identify a foreign key from the “classic models” tutorial and:
    1. explain how it works, i.e., which tables does it connect, etc. (12 1/2 points)
    2. what would be the practical implication of removing this foreign key relationship that you chose. Things to consider include: data duplication, data inconsistency, orphaned data, etc. (12 1/2 points)

Survey Of Mobile App Survey

You have a roommate that is interested creating an Android and iOS app.  With good team working ethics, you decide to conduct some research on the latest technology for any software packages or even app services which may be used to create an Android and iOS app.  After conducting research, share a step-by-step process helping your roommate in getting started with the process of creating both an Android and iOS app based upon suggestions for software packages or services.  In addition, and when recommending software and or app services, take into consideration if vendors offering such software packages or services offer any free learning resources and how helpful these resources may be in helping your roommate. Your assignment must follow these formatting requirements:

  • Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
  • The overall document of steps should be around two pages of content with equalized content allocated for coverage of Android and iOS. 
  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. 

Below is how everyone will be assessed for this graded:
1. Created a professional document including general steps of creating an Android app based on available software and service options in the current times along with any learning resources.
2. Created a professional document including general steps of creating an iOS app based on available software and service options in the current times along with any learning resources.
3. Content is in rich descriptive details supported with quality research (Minimum 3 Sources) and properly formatted to APA