R7

Please go through the attachment for assignment details.

1 Discussion question and Questions

Discussion 4.1

Describe the difference between using Statistics and using Summarize functions on a field.

DISCUSSION ANSWER should be at least 100 words with References.

ASSIGNMENT 1:
I. SHORT ANSWERS Limit your answer to no more than 10-20 words

1. Explain the difference between attribute data and spatial data and give an example of each. Do we need to input both data to GIS? Explain your answer

2. Even with the increasing availability of digital sources, why might one still consider tracing from paper sources for a GIS project?

3. What is the difference between “spatial entities” and “continuous fields”? When we use an entity- based approach and a field-based approach. Give examples.

4. Name four DISADVANTAGES of raster data structure (name more for extra points)

1. 

2.

 3.

 4.

5. Describe how would you create a new ArcGIS layer of the rivers (rivers.lyr), that go through three states: Virginia, Maryland and Pennsylvania?

1) 

2)

 3)

6. Describe the steps in reclassifying the generic map of Virginia to the map of population. What steps do you need to do? What layers/data do you need for this?

1)

 2)

 3)

II. MULTIPLE-CHOICE QUESTIONS

 Check or circle the correct answer. 

1. In the World of GIS, another term for the spatial feature (object) is:

 Entity
 Topology
 Attribute
 Raster Grids

2. Which of the following is the example of non-spatial data?

 The number of rooms in an office building
 The path of a highway between two cities
 The vegetation patterns
 The location of supermarkets in Fairfax, VA

3. Which of the following are NOT the advantages of vector data structure?

 Compact data structure
 Accurate graphic representation  Overlay analysis is easy
 Network analysis is easy

III. TRUE AND FALSE QUESTIONS Mark with T=True or F=False the following statements

1. Today success or failure with GIS depends more on technology, but not on the conceptual models of

space

TRUE FALSE

2. GIS analyst spends much more time on creation than on verification a model

 TRUE FALSE

3. In a GIS attribute information and spatial information are linked to each other 

TRUE FALSE

4. Spatial environmental surface analysis and modeling is easy with CAD systems 

TRUE FALSE

5. When you select the spatial feature on a map in ArcGIS, the attribute information about the same feature has to be found and selected separately

TRUE FALSE

ETCM DISCUSSION-3

Topic:  Malicious individuals have discovered several methods to attack and defeat cryptosystems. It’s important that understand the threats posed by cryptographic attacks to minimize the risks to your network systems.

Identify one cryptographic attack and how you can protect against it. 

Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience

 

Discussion should be between 250-to-300 words. 

Reply is nothing but just additional 100-150 words on same topic but as a different paragraph. (I won’t send any replies to you and then you send info on that. NO)

 Time: 36 hours 

4s week 15 assignment EH

In 300 words

Do you feel the benefits of cloud computing are worth the threats and vulnerabilities? Have we arrived at a point where we can trust external agencies to secure our most precious data? Please explain your answer.

Include references, no copy-paste strictly.

Executive Program Practical Connection Assignment

 Course : InfoTech Import in Strat Plan 

Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Requirements:

  • Provide a 500 word (or 2 pages double spaced) minimum reflection.
  • Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.
  • Share a personal connection that identifies specific knowledge and theories from this course.
  • Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 
  • You should not provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.

EDMS Business Requirements

You are ready to prepare the final version of the EDMS business requirements document (BRD) incorporating the assignments you completed and faculty feedback provided for Weeks 1–5. You will present your BRD to the Board of Directors for Hollywood Organic Co-op.

Write at least 4 to 6 pages for the final business requirements document for the new EDMS and prepare an 8- to 10-slide media-rich presentation summary of the BRD to the Hollywood Organic Co-op’s Board of Directors.

Analyze the critical components of your information security program as it relates to Hollywood Organic Co-op. Justify how the security objectives for the EDMS align with the business objectives.

Identify and describe document access controls and best practices, including:

Viewing

Editing

Copy/paste (including screen capture)

Printing

Forwarding e-­mail containing secured e­-documents

Identify, define, and describe document access policies and best practices including:

Text documents

Spreadsheets

Financial statements

E-mail messages

Policy and procedure manuals

Research

Customer and project data

Personnel files

Medical records

Intranet pages

Other sensitive information

Identify, define, and describe all stages of the document life cycle and best practices including:

Creation

Storage

Categorizing

Metadata tagging

Delivery or sharing

Repurposing

Review and reporting archiving and/or destruction

Format citations according to APA guidelines.

Conflict Managment Dis 6

 Hypothetically speaking, you are assigned to a committee of three to decide on a dress code for Campbellsville University Staff and Faculty. All three committee members must agree to pass this policy. In this situation you are one of the two agreeing to a dress code. What steps might you take to gain the cooperation of the third party after the policy has been initiated. 

Need 350 words content.

Vulnerability Assessment

 

Topic: Perform a Vulnerability Assessment of your place of employment or living area. If you use your work area make sure you inform the Security Manager to get permission as to what you are doing. If you live in a gated community inform the security guard of your activities.

Instructions: Please download the Assignment 1 Vulnerability Assessment template (MS Word), which is already in APA 7 format, using size 12 Times New Roman font, 1-inch margins, TOC, Headings and Reference page. If you insert images or tables in your report make sure you label them appropriately according to APA. (click here for link).

For this assignment: The 4 Heading-1s are required. Each Heading-1 must have at least 3 Heading-2s. Each Heading must have at least 2 properly formatted paragraphs with 3 properly formatted sentences each. Once completed name your file: YourName_Assignment_1_Vulnerability_Assessment.docx and submit to the appropriate assignment folder.

Assignment 1 Vulnerability Assessment Template.docx

Also review the additional files attached for detailed information on Vulnerability Assessments.

math

an aqurium is 10m long, 5m wide and 6m deep 

what is the volume of the aquarium?