111

Find a peer-reviewed scholarly journal article discussing big data analytics. Complete a review of the article by writing a 2-3 page overview of the article. This will be a detailed summary of the journal article, including concepts discussed and findings. Additionally, find one other source (it does not have to be a peer-reviewed journal article) that substantiates the findings in the article you are reviewing. You should use Google Scholar to find these types of articles. Once you find the article, you will read it and write a review of it.  This is considered a research article review. Your paper should meet these requirements: 

  • 6 pages APA format 
  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

3 Case Studies

Case Study 2.1

Case Study:

You have just been hired to perform digital investigations and forensics analysis for a company. You find that no policies, processes, or procedures are currently in place. Conduct research to find information, and then create a policy and process document (3 to 4 pages in length) to provide the structure necessary for your lab environment. Be sure to cite your online sources and follow APA formatting.

Writing Requirements

  • 3–4 pages in length  (excluding cover page, abstract, and reference list)
  • At least two peer reviewed sources that are properly cited and referenced
  • APA format, Use the APA template located in the Student Resource Center to complete the assignment.
  • Please use the Case Study Guide as a reference point for writing your case study.

Case Study 3.1

Establish a procedure for your organization on how to validate a new forensics software package. Write 3 to 4 pages outlining the procedure you plan to use in your lab. Be sure to cite references, such as the ISO standard or NIST, to support your procedure. Make sure you use APA formatting.

Writing Requirements

  • 3–4 pages in length  (excluding cover page, abstract, and reference list)
  • Include at least two peer reviewed sources that are properly cited
  • APA format, Use the APA template located in the Student Resource Center to complete the assignment.
  • Please use the Case Study Guide as a reference point for writing your case study.

Case Study 2.1

Address the six questions associated with the chapter two Case study, “From Steve Jobs to Tim Cook – Apple” on page 23 in a three to five page paper (excluding title, abstract, and reference pages). Include at least three peer reviewed sources found in the Potomac Library properly cited and referenced. Assignment must be in 7th edition APA compliance.

Please use this strategy when you analyze a case:

  1. Identify and write the main issues found discussed in the case (who, what, how, where and when (the critical facts in a case).
  2. List all indicators (including stated “problems”) that something is not as expected or as desired.
  3. Briefly analyze the issue with theories found in your textbook or other academic materials. Decide which ideas, models, and theories seem useful. Apply these conceptual tools to the situation. As new information is revealed, cycle back to sub steps a and b.
  4. Identify the areas that need improvement (use theories from your textbook)
    • Specify and prioritize the criteria used to choose action alternatives.
    • Discover or invent feasible action alternatives.
    • Examine the probable consequences of action alternatives.
    • Select a course of action.
    • Design and implementation plan/schedule.
    • Create a plan for assessing the action to be implemented.
  5. Conclusion (every paper should end with a strong conclusion or summary)

Research Proposal

This is the final proposal and needs to be very long of nearly 15 pages. I have been attached the required documents. 

So kindly please check and do it accordingly. 

The data attached is very confidential and should not be used anywhere. 

So kindly please work on them properly. 

week-2

 You are a member of an Information Technology team in a medium-sized organization that is implementing a new technology system that will impact employees, customers, and suppliers.  Your manager has requested that you work with the team to create a communications plan for the project.  She would like to meet with you in two hours to review your thoughts on the key objectives of the communication plan.  What should those objectives be? 

Data visualization-18hr

Select any example of a visualization or infographic, maybe your own work or that of others. The task is to undertake a deep, detailed ‘forensic’ like assessment of the design choices made across each of the five layers of the chosen visualization’s anatomy. In each case your assessment is only concerned with one design layer at a time.For this task, take a close look at the annotation choices:

  1. Start by identifying all the annotation features deployed, listing them under the headers of either project or chart annotation
  2. How suitable are the choices and deployment of these annotation features? If they are not, what do you think they should have been?
  3. Go through the set of ‘Influencing factors’ from the latter section of the book’s chapter to help shape your assessment and to possibly inform how you might tackle this design layer differently
  4. Also, considering the range of potential annotation features, what would you do differently or additionally?

Submit a two-page document answering all of the questions above.  Be sure to show the visualization first and then thoroughly answer the above questions. Ensure that there are at least two-peer reviewed sources utilized this week to support your work.

IT 472 week 3

DQ3:

  • The Unified Modeling Language (UML) was accepted as the standard language
    for object development. Give examples of a static model and a dynamic model
    in UML. How are the two kinds of models different?
  • Some experts argue that object-oriented techniques are simpler for novices to understand and use than are DFDs and ERDs. Do you agree? Why or why not?

Very important: Upload your discussion to Uni check for plagiarism check before you can submit for grading. The discussion that are not submitted to Uni check will not be graded until I see the Uni check report.

Please follow the rubric provided for weekly discussions. Formatting structure and APA is a must.

Not more than 350 words total. Respond to at least two other students (150 words each peer)!!

Design and analysis of algorithm

A sequence is a palindrome if it reads the same whether we read it from left to right or right to left. For instance, A C G G G G C A is a palindrome.

A G T C M C T G A is a palindrome of length 9.

Problem:

Here  is a set of characters.

S A G E S R A D A R U K M Y G Y M D T O P S P O T B S

1. Find the longest palindrome or sequence in the set. 

2. Write your own algorithm to explain how to arrive to the solution. Illustrate your answer. Your algorithm should work with any set of characters.

program cycle and concept of

  

Using program cycle and concept of top- down modular approach and pseudocode to design a suitable, write program using loops, conditionals, and file processing concept for Eversoft Eraser Company has a list of its customers’ names(not necessarily in alphabetical order) and telephone numbers in a file named customer with records of the following form: last name, first name, phone number
a. Allow the user to input a last name; then search the file and display all names and phone numbers corresponding to that last name.
b. Load the file into parallel arrays and display the list of customers’ names and phone numbers in alphabetical order.(Raptor can be used for part b of this program)

Exp22_Word_Ch01_Cumulative_Kite

Exp22_Word_Ch01_Cumulative_Kite

Exp22 Word Ch01 Cumulative Kite

Word Chapter 1 Cumulative – Kite

  

Project Description:

As an engineering student, you and a few friends are considering forming a club to compete in various kite-flying competitions. You are using Word to prepare a short summary in the form of an informative flyer for distribution campus-wide, encouraging student interest. In the process, you will apply various formatting and readability features, and will ensure an error-free and informative document.

     

Start Word. Download and open   the file named Exp22_Word_Ch01_Cumulative_Kite.docx.   Grader has automatically added your last name to the beginning of the   filename.

 

Display nonprinting characters.   Insert text from Info.docx in the   blank paragraph at the top of the last column on the page. Remove the two   blank paragraphs after the inserted text in the last column on page 1.

 

By viewing a document as   multiple pages, you will often identify problems with layout or placement of   objects. When working on a page in Print Layout view, you are less likely to   consider its placement within the document as a whole, so it may be   beneficial to view a lengthy document in the multiple page arrangement   occasionally.
 

  View the document in Multiple Pages. Apply Title style to the heading Kite High Fliers. Modify the Title style to center alignment and   bold. Return to 100% view.

 

Insert a hard return after the   title, Kite High Fliers, and type Join Us! (Include the exclamation point.) Select Join Us! and change the font size of   the subtitle to 20.

 

Create a new style using text in   the first body paragraph (beginning with Go   fly a kite!), calling the new style Body Paragraph. The style should be available   in the current document only. Apply the Body Paragraph style to all other   body paragraphs in the document. Do not apply the style to the heading lines.   Do not apply the style to the last two lines in the document giving contact   information.

 

Insert a blank paragraph before   the second to last line in the document, containing the word Contact.

 

Select all body paragraphs   (including the last two lines of contact information) that follow the two   heading lines and change the number of columns to 2. Ensure that a line   displays between the columns. 

 

Change the document theme to Slice and change the theme colors to Red. If the theme is not available,   use the theme file that is included in the downloaded files for this project.

 

An informal document like a   flyer often includes a page border for a bit of color and style.
 

  Add a Box page border, selecting the third line style (dashed). The color is   Orange, Accent 2 (row 1, column 6), and the line weight is 1 pt. Apply the   page border to the whole document.

 

Replace all occurrences of Kite High Fliers with High Fliers. Three replacements should be   made.

 

Identify a synonym for the word controller in the first body   paragraph. Ensure that you are replacing controller,   not controllers. The synonym you   select should begin with the letter m.   Replace the word in that paragraph.

 

Check the word count. If the   number of words is greater than 700, remove the entire third body paragraph   (beginning with The High Fliers).   However, make that change only if the word count exceeds 700

 

Select the Proofing group in   Word Options and select Show readability statistics. Check the document for   spelling and grammatical errors. Hadzicki   is not misspelled, so ignore that error. Ignore all grammatical and   conciseness errors, with the exception of replacing the word that where it may be flagged. All   hyphenated words are correct, so ignore any related errors. Note the number   of sentences (not the average) for use in the next item.

 

Modify document properties to   include Mason Gibbons as the author, replacing any existing author. Click in or select   the Comments box and type the number of sentences you noted in Step 15. You   should type only the number, no words.

 

Save and close Exp22_Word_Ch01_Cumulative_Kite.docx.   Exit Word. Submit the file as directed.

Packet Tracer & Discussion 1 [43]

Instructions

Write 1 thread of at least 250 words. You must support your  assertions with at least 1 citation in current APA format. Acceptable  sources include Cisco material, the Bible, and scholarly journals. You  must also reply to the 2 threads below. Each reply must be at  least 100 words.

Topic: Hierarchal TopologyQuestion/Prompt: At your workplace or school,  research to determine 1–5 network devices in your hierarchal model.  Create a simple network topology using Packet Tracer software. Place 1–5  devices at the appropriate levels of the Cisco three-layer hierarchical  model design. The model must include:

  1. A labeled hierarchical model ( Access layer, distribution layer, and core layer);
  2. Labeled Type, vendor, and model of the devices (ie. Cisco 2911 series router) ; and
  3. 1 Simulated cloud, 1 PC per subnet to represent a subnet of devices.

If you are unable to do research at your workplace or school, or you  do not have one to research, then create your own hierarchical model.  Share your .pka in the Discussion Board Forum. Do you agree with the way  the network is designed? If so, explain why. If not, state 1 way to  improve the design and why you would make improvements.

Replies(100 words each)Thread 1 Reply

  Signal flow

        From my understanding we are only a fraction of the pie. We do not  have full access of the network we fall under. The hierarchy can be  related to how the infantry is broken down to fire teams of 4. Yet in an  a platoon theres about 100 people which means theres about 20 fire  teams, creating 20 fire team leaders reporting to the Platoon Sgt who  then reports to the Platoon Commander and then he passes it to the  Company Commander etc. The purpose of having multiple bosses helps to  not overload the main boss with meaningless questions or information not  protaining to them. The way our network is design is to  mitigate unnecessary mistakes made on the network, only affecting us at  our level not disrupting the entire network enterprise.  It also brings a  sense of organization, structure, and management. If anyone has the  proper (AAA) Authorization, Authentication, and Access to be in our  domain to can be part of all broadcasting that may be informative to  them. Also file sharing and the access to the share drive on lower  networks can help not overload the pipeline to the higher echelon of the  network. If you don’t have any business with management or the boss  then just avoid it, communicate between those at your level and later  with the proper authorities your message Will make it to Mr.CEO. The  Hierarchical Model we use in the military could improve if there was a  way to communicate with everyone that shares your Military Occupational  Specialty, is the only improvement I would try to implement

Thread 2 Reply 

 Importance of Redundancy  

      Since  I was not able to examine a network at school or work, I went to a  small business owned by a family member to see what kind of setup they  had. It turned out that only three employees worked there, so they only  had a very simple point-to-point architecture that consisted of a modem,  a router, and a switch (attached packet- “Office Hierarchy”). Because  of the limited budget and needs, I believe this basic setup fulfilled  their needs adequately. However, one of the downsides of this setup is  that each device is a single point of failure. A key factor of network  stability is implementing redundancy (Yeh & Fiondella, 2017). There  is no device redundancy on this network. As such, I decided I would make  a second diagram that implemented redundancy (“Three Tier Hierarchy”),  even though realistically it would not be possible to implement in the  business I examined. Another benefit that this setup provides is  additional scalability if the company were to hire more employees. In  its current state, this company only has one small switch, meaning the  amount of traffic that can flow through is extremely limited, and it  would be unwise to try to add a lot more users to this network. The  high-capacity switches used in the “Three Tier” diagram would allow more  users to easily connect in. Another way to identify that the smaller  network is not scalable is not only to see if its hardware exceeds its  userbase, but also to ask: If I were to expand my company, would I need  to raze my entire network design and start over? In this case, the  answer is yes—a significant size increase would mean that a fully  different scalable topology, such as a virtual bus, would need to be  created. The business could not function with its current topology. In  conclusion, because the business has not grown in size for fifty years  and is not planning to, I see no need for them to change anything;  however, I would advise them to place a high priority on keeping their  security up-to-date because of the vulnerability of the point-to-point  network.