Wk 7

Assignment 1

Multilayer User Access Control

Learning Objectives and Outcomes

Ø Identify what implementation method(s) can be used to incorporate multilayer access control

Ø Describe and how each method benefits multilayered access control.

Assignment Requirements

Read the worksheet named “Multilayer User Access Control” and address the following:

Using what you have learned about building a multilayer access control system, identify what implementation method(s) can be used and how each method benefits multilayered access control.

Requirement: 

· ****Separate word document for each assignment****

· Minimum 300-350 words. Cover sheet, abstract, graphs, and references do not count.

· Add reference separately for each assignment question.

· Strictly follow APA style. Length – 2 to 3 paragraphs. 

· Sources: 2 References to Support your answer

· No plagiarized content please! Attach a plagiarized report.

· Check for spelling and grammar mistakes!

· $5 max. Please bid if you agree.

  

Assignment 2

Please refer to the “Access Control.zip” file (includes previously done homework) to complete this assignment.

Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied or could be applied, in a practical manner to your current work environment.

You can use Access Control topics. 

Requirements:

o ****Separate word document for each assignment****

o Provide a 500-word minimum reflection.

o Use of proper APA formatting and citations. 

o Share a personal connection that identifies specific knowledge and theories from this course. 

o Demonstrate a connection to your current work environment. 

o You should NOT, provide an overview of the assignments assigned in the course. The assignment asks that you reflect on how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.  

o No plagiarized content please! Attach a plagiarized report.

o Check for spelling and grammar mistakes!

o $8 max. Please bid if you agree.

  

Assignment 3

From Chapter 8 – textbook attached “Introduction-to-Data-Mining-2nd-Edition-by-Pang-Ning-Tan.pdf”

Answer the following question – 

Consider the mean of a cluster of objects from a binary transaction data set. What are the minimum and maximum values of the components of the mean? What is the interpretation of components of the cluster mean? Which components most accurately characterize the objects in the cluster?

Requirements:

· ****Separate word document for each assignment****

· Minimum 300-350 words. Cover sheet, abstract, graphs, and references do not count.

· Add reference separately for each assignment question.

· Strictly follow APA style. Length – 2 to 3 paragraphs. 

· Sources: 2 References to Support your answer

· No plagiarized content please! Attach a plagiarized report.

· Check for spelling and grammar mistakes!

· $5 max. Please bid if you agree.

  

Assignment 4

Refer to chapter 8 and 9. Textbook attached – “Introduction-to-Data-Mining-2nd-Edition-by-Pang-Ning-Tan.pdf”

Answer the following questions. Please ensure to use the Author, YYYY APA citations with any content brought into the assignment. 

1. For sparse data, discuss why considering only the presence of non-zero values might give a more accurate view of the objects than considering the actual magnitudes of values. When would such an approach not be desirable?

2. Describe the change in the time complexity of K-means as the number of clusters to be found increases.

3. Discuss the advantages and disadvantages of treating clustering as an optimization problem. Among other factors, consider efficiency, non-determinism, and whether an optimization-based approach captures all types of clusterings that are of interest.

4. What is the time and space complexity of fuzzy c-means? Of SOM? How do these complexities compare to those of K-means?

5. Explain the difference between likelihood and probability.

6. Give an example of a set of clusters in which merging based on the closeness of clusters leads to a more natural set of clusters than merging based on the strength of the connection (interconnectedness) of clusters.

Requirements:

· ****Separate word document for each assignment****

· Answer all 6 questions. Cover sheet, abstract, graphs, and references do not count.

· Add reference separately for each assignment question.

· Strictly follow APA style. Length – 2 to 3 paragraphs. 

· Sources: 2 References to Support your answer

· No plagiarized content please! Attach a plagiarized report.

· Check for spelling and grammar mistakes!

· $8 max. Please bid if you agree.

assigment

 Homework #3 MCIS 5103: Advanced Programming Concepts Instructor: Dr. Justin L. Rice Due Date: 3/1/2023  Please refer to the code in the Appendix (pages 3 – 4) to answer the following questions.  1. Write the output for each section of print statements. (10 points) 2. Which Rectangle constructor does instance box1 call? Why? What concept does this demonstrate? Explain [in  four sentences or less].(10 points) 3. Which Rectangle constructor does instance box2 call? Why? What concept does this demonstrate? Explain [in  four sentences or less]. (10 points) 4. Which Rectangle constructor does instance box3 call? Why? What concept does this demonstrate? Explain [in  four sentences or less]. (10 points) 5. What is the connection between box2 and box4? What happens (memory wise) when both box2 and box 4 are  declared null? Explain [in three sentences or less]. (20 points) 6. In the Main class, there are two variables named z. What is the difference between the two variables? What  concept does the output of the last three print statements demonstrate? Explain [in four sentences or less]. (20 points) 7. In the Rectangle class, explain the implementation of the Rectangle(int l, int w) constructor. Explain [in four  sentences or less]. (10 points) 8. In the Rectangle class, explain the implementation of the Rectangle(Rectangle other) constructor. Explain [in  four sentences or less]. (10 points) APPENDIX RectangleVolume.java public class RectangleVolume { public int length; public int width;  public int height;  public RectangleVolume(int l, int w, int h) {  length = l;  width = w;  height = h;  }  public RectangleVolume(int l, int w) {  this(l, w, 5);   }  public RectangleVolume(RectangleVolume other) {  this(other.length, other.width, other.height);   }  public int calcVolume(){  return length * width * height;   } } Main.java class Main {    static int z;  public static void main(String[] args)  {    RectangleVolume box3 = new RectangleVolume(3,4,5);  RectangleVolume box1 = new RectangleVolume(box3);  RectangleVolume box2 = new RectangleVolume(3,4);  RectangleVolume box4 = box2;    box1 = null;  System.out.println(“n”);    System.out.println(“box(l,w,h) = (” + box3.length + “,” + box3.width + “,” + box3.height + “)”);  System.out.println(“box(l,w,h) = (” + box4.length + “,” + box4.width + “,” + box4.height + “)”);  System.out.println(“box(l,w,h) = (” + box2.length + “,” + box2.width + “,” + box2.height + “)”);    box2 = null;    System.out.println(“n”);    z = 34;  System.out.println(“z = ” + z);  int z;  z = box3.calcVolume();  System.out.println(“z = ” + z);  System.out.println(“z = ” + Main.z);  } } 

discussions

  Reducing delays in software development process 

 

Assignment Directions: Describe how you will resolve disconnection between the major IT functions of software development, quality assurance, and technology operations in your organization.

In a word document, discuss the assigned topic concisely in approximately ten sentences.

General requirements and instructions to complete your assignment

  • Use the IEEE format to cite any material you take directly from a source or paraphrase.
  • Type your responses in a Microsoft Word document.
  • Upload and submit your paper to the assignment drop box by Sunday at 11:00 p.m.
  • A rubric will be used to assess your responses.

Paper on 5g Technology

Paper on (5g Technology)-> topic 

Paper should include these points

1) Describe the product/service in detail and the ethical challenges.- how it evolve, what is it? how it works, why there are ethical issues and challenges. 

 2) Draw support from the references.  

 3) Include Four or more references.  

Follow these instruction carefully.

This paper needs to be at least 5 pages (excluding title page, references), single-spaced, single-column, and 11pt Times Roman font. Each page has a 1-inch margin on all sides. The first line of each paragraph must indent by 0.25in. 

A small example will look like this 

Our group has decided to research and tackle on the topic 5G wireless technology. Every new generation of wireless network delivers faster speed and more functionality to our smartphones. The 1G introduced us to the first cell phones, 2G introduced us texting, 3G brought us online, and 4G is delivering the speeds that everybody enjoying today. This was a small history of mobile network and how it is growing in the time. 5G network or the fifth generation of wireless technology that promises to more than just a faster network and is now available nationwide in US. 5G is the combination of five new different technology millimeter waves, small cell, massive MIMO, Beamforming, Full Duplex to connect everything and everyone with high performance speed. It is stated that the capacity of 5G network is to provide data transfer rates faster than a blink of an eye. This a great technology that is helping us to connect with our family and friends from anywhere without a wired connected. But there are also many ethical issues that 5G has faced during the invention and still facing it. One of the biggest reasons 5G is on the controversial news is because of the health risk from its wireless radiation. There are many articles debating how 5g will affect not only humans but also animals. Once 5g is everywhere and connected to everything it will be easy hackers to invade your privacy. For every 5g equipped thing there is chance of losing user personal information.

Data visualization

what is chart.js , when you would use it.  Next, find a website that uses the method or should use the method. Explain why ( explain about ecosystem, opensource javascript library ease of use, chart types, plugins mainly annotation and zoom plugin etc)

References
Websites that use chart.js 

https://www.wappalyzer.com/technologies/javascript-graphics/chart-js

https://github.com/chartjs/awesome

Assignment

 

Conduct your own social engineering experiments.

1) While at a restaurant, convenience store, bank, place of business, or any shopping location, ask you waiter or waitress, bartender, server, sales clerk, or cashier personal questions about their family or their interests.How much information are you able to obtain about this person you do not know?

Name, address, age, religion, political beliefs, place of birth, pets, hobbies, number of children, type of car they drive, or any other information you think you can obtain.

Write your findings in either a list or in paragraph form.