Assignment

 Chapter 3 –discussion question #1-4 & exercise 12 (choose any two)

When submitting work, be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) to support the work this week.
All work must be original (not copied from any source). 

Discussion: 

1. How do you describe the importance of data in analytics?

Can we think of analytics without data? Explain.

2. Considering the new and broad definition of business

analytics, what are the main inputs and outputs to the

analytics continuum?

3. Where do the data for business analytics come from?

What are the sources and the nature of those incoming

data?

4. What are the most common metrics that make for

analytics-ready data?

Exercise:

12: Go to data.gov—a U.S. government–sponsored data

portal that has a very large number of data sets on a

wide variety of topics ranging from healthcare to education,

climate to public safety. Pick a topic that you

are most passionate about. Go through the topic- specific

information and explanation provided on the site.

Explore the possibilities of downloading the data, and

use your favorite data visualization tool to create your

own meaningful information and visualizations.

Interpersonal communication

For your essay interview/talk with someone you have a close relationship with (such as spouse, friend, sibling, student advisor, etc.) about how you communicate or are labeled. Use the Johari Window Diagram to diagram how you communicate with them. What would you both put in the four quadrants? What insights can you draw from this diagram and how does that person see you? Was this your reflected appraisal of yourself? How did things move from the Hidden quadrant to the Open quadrant, or from your Blind to Open quadrant, with that person?

Essay and assignment

  

  1. Write an essay (500 Words)

discussing sqlmap, an automated tool for sql injection and database takeover in 500 words or more. Why do we need an automated tool for sql injection?

Use the five paragraph format. Each paragraph must have at least five sentences. 

Include an interesting meaningful title.

Include at least one quote from each of 3 different articles. 

USE : https://libguides.nec.edu/az.php not google.

  1. Assignments (300 Words)

Learning About Cookies as Spyware.

Research what kind of information cookies store. You might find the following websites helpful:

www.allaboutcookies.org/ 

www.howstuffworks.com/cookie1.htm

Using WORD, write an ORIGINAL brief essay of 300 words or more describing cookies and the way they can invade privacy.

Safe Assign is software that verifies the originality of your work against on-line sources and other students.

Note your Safe Assign score. Continue submitting until your Safe Assign score is less than 25. For your first written assignment, you have unlimited times to retry your assignment.

Submit references separately (or add as text) otherwise they cause the Safe Assign score to increase.

paper

 

This week, you have read about server virtualization and cloud computing in chapter 6 of your textbook. For your written assignment this week, complete a case study of the organization you work for (use a hypothetical or “other” organization if more applicable) that will address the following prompts:

 • Describe the organization’s environment, and evaluate its preparedness for virtualization.

• Explain Microsoft (or another product) licensing for virtualized environments.

• Recommend a configuration for shared storage; make sure to discuss the need for high availability and redundancy for virtualization for the organization.

• Explain Windows Azure capabilities for virtual machines and managing a hybrid cloud, including Windows Azure’s Internet as a Service (IaaS) and storage capabilities

Make a recommendation for cloud computer use in the organization, including a justification for your recommendations.

Submit your midterm research paper as a single document. Your paper should meet the following requirements:

• Be approximately four to six pages in length (1200-1800 words), not including the required cover page and reference page.

• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Assessment 3: Digital Forensic Report This document supplies detailed information on assessment tasks for this unit.

Students should demonstrate their ability to review and critique the digital forensic hackathons hosted in recent

years and their write-ups. Understanding these digital forensic tasks and their technical solutions will significantly

help students deepen the understanding of the industry’s standard practice and general expectations of forensic

abilities in the job market. Hackathon experiences and achievements have been valuable in the cybersecurity

industry. Students will identify, investigate, and evaluate six forensic hackathon tasks and the associated write-ups.

Students will be assessed on their ability to identify the appropriate tasks and write-ups, reproduce the technical

solutions, justify the technical findings, reflect on the learning experiences, and present a professionally written

essay.

Instructions

Students are required to independently write an essay of approximately 4,000 words and exhibits to support the

findings and a bibliography. This essay should consist of the following parts:

• a professionally made title page with student name and student ID

• an abstract of 200 words capturing the highlights of the findings

• a non-technical section summarizing the six identified hackathon tasks and brief descriptions of their

write-ups along with justifications of their digital forensic relevance

• a non-technical section critiquing the issues of the existing write-ups of each hackathon task in multiple

perspectives

• a technical section reproducing the solutions of the six hackathon tasks by using proper digital forensic

tools with supporting evidence (screenshots)

• a non-technical section reflecting personal learning experiences towards solving these tasks and aligning

these to our curriculum

• conclusion (around 150 words)

• reference (Harvard style)

discussion api

 Name the three essential elements of a basic structured cabling network? How are they installed and what are the components that are involved with them? 

Project Assignment

 

Write a 6-8 page paper (deliverable length does not include the title and reference pages)

  • What are the principles and limitations to an individual’s right to privacy?
  • What are the trade offs between security and privacy?
  • What is the issue of freedom of speech versus the protection of children online?

Due: Assignment is due on the day stated in  the Course Schedule

  • Provide three articles to substantiate the above three questions.
  • Use APA format to provide a citation for each of the articles you read.
  • Suggestion: Use a search engine (Google) and keywords.

YD

Scenario Summary: 
This scenario covers a contract dispute situation. The contract in question is an agreement between Systems Inc. and Big Bank. Please review the contract located in Scenario Summary of the “You Decide” page to familiarize yourself with the specifics of the contract.
Your Role/Assignment:
You are the manager of a large data processing project. Your company, Systems Inc., worked very hard to obtain a contract with Big Bank to do the data conversions from their recent acquisition, Small Bank.  The bank met with several companies to discuss who would do the best work on the contract. During your meeting with Big Bank, you told them that you had “never missed a conversion deadline.” At  the time, your company had never missed a conversion deadline, but the company had only done three conversions. You also told them that “your data processing systems were the fastest around.” After months of negotiation, Big Bank signed the contract. The President of Big Bank said, “We like fast, and you guys are fast. We choose you.”
You started work on the data conversion immediately (ahead of contract). According to the contract, your team was responsible for ensuring that the new bank’s data was converted to Big Bank’s data processing system. The contract involved six large conversions. The first involved converting Big Bank’s savings accounts; the second,  its checking accounts;  the third,  its investment portfolio;  the fourth,  its credit card operations;  the fifth,  its mortgage portfolios;  and the sixth,  its large business loans. Your team completed four of the six conversions without a problem. The fifth task, the largest and most important, has encountered numerous problems. Some problems have been based on personnel issues on your part and other issues have been based on the bank’s failure to provide you with necessary information. One issue resulted when the conversion was delayed for over one week. The data to be converted was formatted differently than the bank’s previous specifications provided.  For that reason, the data conversion fields needed to be changed.  A provision in the contract required your company to receive the approval of four individuals  before making any changes to the conversion data fields, and one of those four people, Glenda Givealot, was out of the country doing missionary work in an area of the world that did not have cell phone reception.   Another issue arose when the conversion was supposed to occur. Because of the change in the timeline, the conversion schedule had to change. The weekend the conversion was rescheduled to occur, an ice storm struck the state where your data processing computers were housed. Your facility lost electricity for three days, causing the conversion to be delayed once again.  
Questions:
1. Question: (17 points) 
Can Big Bank’s President rescind the contract?  Under what circumstances can a contract be rescinded by either party?  What facts have to be alleged and proven?   What is the result of a contract that is rescinded?
Solution:
2. Question: (16 points) 
Big Bank’s President also threatens legal action.  What potential causes of action could you foresee him bringing in court?  Would he be successful?  Why or why not?   What arguments could Systems Inc. raises in its defense?  What are Big Bank’s potential damages?
Solution:
3. Question: (17 points) 
Review the facts provided and the sample contract.  What provisions of the contract could you cite to support an argument that it is not in Big Bank’s best interest to rescind the contract?  What facts could you cite to support an argument that Big Bank be responsible for some of these issues and/or not in compliance with the contract?
Solution:
4. Question: (16 points) 
In this situation amicable resolution of problems is greatly preferred by your company.   Would this be true in all contract disputes? In what situations would you decide to  litigate?  Why would you decide to move to litigation rather than attempt to reach an  amicable resolution?
Solution:
5. Question: (17 points) 
There are 3 types of contract performance: 1)complete performance;  2)  substantial performance;  and 3)  material breach.  Describe the differences (and similarities) among the three, and explain some of the legal ramifications for one or more of these types of performances. (For example, what happens if one party performs completely but the other party performs only substantially?)  Give examples from outside readings or experiences in your career or personal business life.
Solution:
6. Question: (16 points) 
What are the two most important concepts from this exercise that will help you in future contract negotiations?
Solution:
Solution answers must be at least one half page each.  Show each question on a separate page.