HW

 

Literature Review

(Outcome 3,4): 4 hours

· Critique quality of the literature reviews conducted for two different types of studies- a quantitative and qualitative research.

· Identify and discuss the research questions, sampling and sampling sizes, research designs (qualitative vs. quantitative), hypothesis, data collection methods, and research findings.

· Discuss the credibility of the sources and the research/researchers findings.

· 400-word minimum/550-word maximum without the references.

· Minimum of 3 references (the course textbook must be one of the references) in APA format, must have been published within last 3-5 years.

Security Trends and Legal Issues

 

Final Project

For the final project, write a paper exploring themes at the intersection of technology and policy. Select one of the following topics:

•  Methods for reducing the level of international cybercrime

•  Coping with the fragility of and lack of security on the Internet

•  Establishing norms of national behavior in cyberspace, in peace and conflict

•  Developing national legal support for norms

•  The role and importance of declaratory national policies for cyberspace

•  Creation of international risk mitigation frameworks

•  Development of strategies that encourage international agreements

•  Assess the risk of catastrophic attacks on national infrastructure.

•  Should cyberspace be treated as a potential battlefield?

•  Explore the impact of commercial cyber-espionage on advanced economies.

•  Contrast European and American approaches to privacy on the Internet.

•  Explore freedom of expression via the Internet within autocratic regimes.

•  Must freedom of speech and association in cyberspace be sacrificed for cybersecurity?

Prepare an 8 – 10 paged paper that fully discusses the policies, events and technology for your selected topic using the brainstorming and analysis methodology. You should use current events, laws/regulations, technology and methods to support your opinion in your paper. You must include at least 5 reference resources. You should include a title page, table of contents, and reference page. Format your paper consistent with APA guidelines.

learning journal continued

 

Modify your program from Learning Journal Unit 7 to read dictionary items from a file and write the inverted dictionary to a file. You will need to decide on the following:

  • How to format each dictionary item as a text string in the input file.
  • How to covert each input string into a dictionary item.
  • How to format each item of your inverted dictionary as a text string in the output file.

Create an input file with your original three-or-more items and add at least three new items, for a total of at least six items.

Include the following in your Learning Journal submission: 

  • The input file for your original dictionary (with at least six items).
  • The Python program to read from a file, invert the dictionary, and write to a different file.
  • The output file for your inverted dictionary.
  • A description of how you chose to encode the original dictionary and the inverted dictionary in text files.

Security Chapter 2

Develop a draft of Chapter 2 where you clearly provide a well developed introduction and other sections relevant to your topic. This should be your first complete draft of Chapter Two.

Topic :  The Smart Phone as a Dangerous Technology 

APA format with references needed.

Review all of your references. Are all references in APA format? Do all in-text citations have an associated reference in the reference list? 

500 words

Pricing Strategy

 What are some of the difference between demand influences and supply influences on our pricing decisions? After reviewing this week’s resources and your research, consider the challenges marketers face as they seek to balance supply and demand.  Increased prices typically result in lower demand and vice versa.  However, this is not always the case.  Identify a product in which a price increase or decrease resulted in the opposite demand and explain the factors why. 

Your initial response to the discussion question should be 250-300 words. You must have at least one course (our text) and one non-course scholarly/peer reviewed source in your initial posting.  Sources require in-text citations and must be incorporated into the body of the post in addition to a full APA citation at the end of the post.  

Company Name: Walmart

Product: Same product which have been used last week.

References:

 

Blog:

How to Price Your Product: 5 Common Strategies

https://www.bdc.ca/en/articles-tools/marketing-sales-export/marketing/pricing-5-common-strategies

 

Blog:

How to Choose a Pricing Strategy for Your Business

https://quickbooks.intuit.com/r/pricing-strategy/6-different-pricing-strategies-which-is-right-for-your-business/

Cybersecurity

                                                      MY TOPIC IS OSPF

The Term Paper for this class is worth 200 points and it requires you to do a research  and write a 2000 (8 pages in a word process of DOUBLE SPACE OF FONT SIZE 12) word report describing one of the following TCP/IP routing protocols, RIPV2, OSPF or EIGRP. The paper will include the following:

. The history of the protocol chosen:

. The programmable parameters of the protocol and how they affect traffic flow:

. The major differences between the routing protocol chosen and the others that were not chosen:

. How the chosen protocol can be used in a modern day routed network environment

NO PLAGIARISM AND REFERENCES OR WORKS CITED TOTALLY DIFFERENT FROM THOSE EIGHT (8) PAGES HOWEVER RUBIC DETAIL IS EMBEDDED IN THE UPLOAD FILE AS A SORT OF GUIDELINES IN THE COURSE OF THIS PAPER.

Admissibility of Evidence

Describe the plain view doctrine, and why  it has such a significant impact on digital forensics? What are three approaches to determining whether the doctrine applies to a specific case.

Use your own words and do not copy  the work of another student.