I’m working on a Computer Science discussion question and need guidance to help me study.
300 words discussion post with citations and references in APA format
150 words each two replies
no plagiarism
need turn it in report
APA format
I’m working on a Computer Science discussion question and need guidance to help me study.
300 words discussion post with citations and references in APA format
150 words each two replies
no plagiarism
need turn it in report
APA format
Submit a one page outline with your proposed term paper title, thesis statement, and an outline of the subtopics you will cover in your paper. The term paper details are listed below. ALL TOPICS MUST BE APPROVED. A FAILURE TO HAVE THE TOPIC APPROVED WILL RESULT IN A ZERO GRADE FOR THE TERM PAPER OUTLINE AND THE TERM PAPER. You can send a message with the topic for approval.
This project provides you with the opportunity to increase and demonstrate your understanding of cyberlaw theory and practice. You will need to choose a law(s) that you are interested in researching. The paper must be 4-6 pages in length detailing the below questions. Before completing the below steps, please make sure that the topic is approved.
1. Thesis: What law are you researching (You are to choose a specific law. Please do not choose a topic)? What position do you want to take in regard to your chosen law? You will need to decide if you agree or disagree with the current way the law is written. You can choose to like certain aspects of the law and not others.
2. Background: What is the existing point you want to challenge or support, and how did the law get to be that way (This is where you would need to find cases, background information, etc.)?
3. Inadequacies: What are the deficiencies in the present way of doing things, or what are the weaknesses in the argument you are attacking?
4. Adequacies: Discuss the positive aspects of the law?
5. Proposed Changes: How will we have a better situation, mode of understanding or clarity with what you are advocating? In short, how can the law be improved (or not diminished)? (This is where you have the chance to change the law with your own ideas of how it should be written).
6). Conclusion: Why should and how can your proposal be adopted?
A detailed implementation plan is NOT expected, but you should provide enough specifics for practical follow-up. In making recommendations, you are expected to draw on theories, concepts and reading.
When writing the term paper you must have a minimum of 3-5 outside sources cited and referenced in the paper.
When writing the term paper you must have a minimum of 3-5 outside sources cited and referenced in the paper following APA guidelines.
Create a discussion thread to answer the following question:
The protections from the security software must continue when the device is taken off the network, such as when it is off-grid, or in airplane mode and similar. Still, much of the time, software writers can expect the device to be online and connected, not only to a local network but to the World Wide Web, as well. Web traffic, as we have seen, has its own peculiar set of security challenges. What are the challenges for an always connected, but highly personalized device?
Project risks can/cannot be eliminated if the project is carefully planned. Explain.
What are the major differences between managing negative risks versus positive risks (opportunities)?
Why is slack important to the project manager? What is the difference between free slack and total slack?
Review the document on Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations at https://www.justice.gov/sites/default/files/criminal-ccips/legacy/2015/01/14/ssmanual2009.pdf. Prepare a one-paragraph summary of three challenges you may encounter when executing a search and seizure of digital evidence.
What is a first responders’ toolkit? Describe the procedures for creating a first responder toolkit.
Identify best practices in digital forensic investigations: Perform a web search for best practices in digital forensic investigations. Prepare a list of the top 5 best practices, based on your research. Include links to any resources that you use.
What is an investigative report? Why are the reports important? Who is responsible for the report?
Discussion (Chapter 8): Excel is probably the most popular spreadsheet software for PCs. Why? What can we do with this package that makes it so attractive for modeling efforts?
Questions:
1. How does prescriptive analytics relate to descriptive and predictive analytics?
2. Explain the differences between static and dynamic models. How can one evolve into the other?
3. What is the difference between an optimistic approach and a pessimistic approach to decision making under assumed uncertainty?
4. Explain why solving problems under uncertainty sometimes involves assuming that the problem is to be solved under conditions of risk.
Exercise:
Investigate via a Web search how models and their solutions are used by the U.S. Department of Homeland Security in the “war against terrorism.” Also, investigate how other governments or government agencies are using models in their missions.
1.Assignment – Input Form Assignment
identify and apply the different analysis and design methods for business applications.
Use Wufoo to develop an input form using some of the key fields from your project. Copy (or take a screenshot of) the design and paste it into Word document with a title page.
Provide the resulting URL as well.
Criteria: Design incorporates good choice of colors, text, font, arrangement, and evidence of possible navigation (as in a “submit” button).
Your essay should be 3 pages in length and fully explore all of the following items described above. Include at least 2 outside citations (not including your text) and use proper APA formatting.
Atleast 2 In-line citations and references required.
2. Weekly Memo – Memo should be related to the discussions , assignment and should be one page(citations,references, APA not required).
Relate this weeks assignment and discussions to your work in office/organization.
3.Discussions
1) Why is content awareness important?
2)UX Design Principles – Explain three important user interface design principles.
Each discussion should have atleast 3 paragraphs, 2 inline citations, 2 references. Due by 11/16/2020 .
Plagiarism should be very minimal. I may ask for changes if required.
mukul only please
This project should include what it takes to create an application for a mobile deivce. In this day and age we utilize phone applications on a daily basis and creating one for daily use is no easy task. A programmer would need to understand what is important to the stakeholder utilizing the application and how much work would need be put into the applcation to be sucessful with the stakeholder. The start of the application should start with the idea, the programmer would then do market research, the last item would be marketing the application to right people.
Length: Minimum of 600 words
Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references.
As you consider the reputation service and the needs of customers or individual consumers, as well as, perhaps, large organizations that are security conscious like our fictitious enterprise, Digital Diskus, what will be the expectations and requirements of the customers? Will consumers’ needs be different from those of enterprises? Who owns the data that is being served from the reputation service? In addition, what kinds of protections might a customer expect from other customers when accessing reputations?
select an industry. You may use the same industry you used in earlier discussions, or you may select a new industry.
Please respond to the following in a post of 100 words: