Human service professionals are expected by the NOHS Ethical Standards to advocate for social justice. In this project, you will be researching contemporary social justice issues and choosing one as a focus on your project. After describing the issue and its impact on the affected population, you will create a plan of advocacy to eradicate the issue.
Mac OS Forensics
2 PAGES, Arial Font, double space
You are an experienced digital forensics specialist for DigiFirm Investigation Company. One of your clients is a small music production company. One day you receive a phone call from Andrea, the owner, and president of the music company. Andrea believes one of her employees, a sound technician, has been stealing intellectual property from the company. She thinks he is copying original music scores and then selling them to upstart musicians, claiming that he wrote them. Andrea checked the employee’s computer the previous night and thinks he has been deleting the files to cover his tracks. He uses an Apple computer. There are several tools available for recovering files that have been deleted from an Apple computer including:
- Disk Drill, https://www.cleverfiles.com/disk-drill-win.html
- Mac Undelete, http://www.macundelete.com/
- Free Undelete Mac, http://www.freeundeletemac.com
For this assignment:
- Research the three specific tools that can aid in recovering deleted Mac OS files.
- Write a report about the capabilities of each tool.
- Briefly describe what can and cannot be retrieved from the Mac OS operating systems.
- Recommend one of the tools for use in this case and justify your recommendation.
modern computer network.
– Tittle – WIRELESS NETWORK.
– How is wireless network effecting modern computer networking.??
– 5 pages
– outline of paper required.
– use valid reference 4-5 reference. (intext citation)
– 5 page paper (just writing) reference and outline id not counted.
– NO PLAGIARISM
Product and Market Strategy
define and discuss the product life cycle and apply this to your redefined or new product or service. Estimate how much time your product will stay in each phase of the lifecycle and define why you are making this assessment?
Draw a representative graph of your product/service lifecycle.
Your initial response to the discussion question should be 250-300 words. You must have at least one course (our text) and one non-course scholarly/peer reviewed source in your initial posting. Sources require in-text citations and must be incorporated into the body of the post in addition to a full APA citation at the end of the post.
Graph Link: https://www.youtube.com/watch?v=Nq7Zj18DJU8&t=2s
Professor remarks:
This is the prompt for this week’s discussion:
After reviewing this week’s resources, define and discuss the product life cycle and apply this to your redefined or new product or service. Estimate how much time your product will stay in each phase of the lifecycle and define why you are making this assessment?
Draw a representative graph of your product/service lifecycle.
Note: Because of the importance of the visual of the graph, no credit will be given to the discussion board assignment if this is missing.
You did not include a graph. Moreover, you did not apply the PLC to your new product or service.
Mutli-factor Authentication
Need below Answers in a word document with a minimum of 4-5 lines for each question in APA format.
- What is multifactor authentication and what are some examples?
- Ending all online crime is not a realistic goal, but simple steps can massively reduce the likelihood you’ll be the next victim. Explain how multifactor authentication works.
- List 5 reasons to turn on multifactor authentication?
- Provide at least two additional links to articles related to multifactor authentication(Need Citations as well).
Assignment on Linux 5
Do the following assignment based on the attach document. execute the commands. Post a screenshot of all the work on a word document. All commands use to execute the process most be seen and should enable another person get the same results. Mini project 2 is just a sample of how the work should look like.
computer architecture
Viruses and other malware often exploit bugs known as buffer overflows in widely used software. One method of preventing these exploits in software running on current Windows versions is Data Execution Prevention (DEP).
investigate buffer overflows and DEP.
- How does DEP prevent malicious attacks via buffer overflows?
- Is it always effective?
- Why might a user or administrator disable DEP?
Discuss some of the “Software Engineering ” constraints that must be overcome in order build a successful system.
Search the peer-reviewed literature for examples of this. You may select any topic relating to technology that illustrates the potential for really messing things up. Include, in your description, an analysis of what might have caused the problems and potential solutions to them.
Be sure to provide supporting evidence, with citations from the literature
Should be more than 350 words
Assignment 300 words
Do some research on Threat Response software. Find one particular software package to investigate.
- What does the software do?
- What are it’s major features?
- What kind of training is required?
- How much does the software cost?
Do not do the same software as everyone else.
computer part2
- Describe the benefits of solid-state drives
answer in 3 to 4 line