online paper

 

  • Kuhn, M. (2019, March 27). The caret package. Github. https://topepo.github.io/caret/

 Outline for Assignment 1

  • Refer to the Documenting Research Guide for assistance in organizing your research and developing your outline.
  • You can find this guide in the Useful Information folder, as well.

 Using the research guide and the assignment 1 instructions, develop your outline. Submit the outline in an MS Word document file type. Utilize the standards in APA 7 for all citations or references in the outline. Ensure that the document includes your name. Do not include your student identification number. You may use the cover page from the student paper template, but it is not required.

 The assignment 1 instructions are at the bottom of this content folder.Submit your outline on or before the due date.By submitting this paper, you agree:

(1) that you are submitting your paper to be used and stored as part of the SafeAssign™ services in accordance with the Blackboard Privacy Policy;
(2) that your institution may use your paper in accordance with UC's policies; and
(3) that the use of SafeAssign will be without recourse against Blackboard Inc. and its affiliates.

2 Individual Questions

Question 1:

Do some basic research on security certifications.  See https://www.giac.org/.  Write a brief summary of certifications that are open.  Consider if any of the certifications would be valuable for your career.
Investigate and report on exam options. Write 200-300 words

Question 2: both are in a separate document 

 Final Project Name: Efficient Disaster Recovery 

1.  A brief abstract describing your final project. (200words) 

2.  Final Project Research paper. 700-1000 word, double spaced, written in APA format, showing sources, and a bibliography

Example:

How to Write an Abstract (https://www.scribbr.com/apa-style/apa-abstract/)

How to write a research paper (https://owl.purdue.edu/owl/purdue_owl.html)

BSW W9

In 200 words,

Do a bit  if research into File Inclusion Vulnerability.

  • What is it?
  • Why is it dangerous?
  • What is the difference of low and remote inclusion?
  • What methods can me employed to prevent a security breach?
  • What programming languages are vulnerable to this type of attack.

Paper 7

 

Paper Section 1: Reflection and Literature Review

Using Microsoft Word and Professional APA format, prepare a professional written paper supported with three sources of research that details what you have learned from chapters 13 and 14.  This section of the paper should be a minimum of two pages. 

Paper Section 2:  Applied Learning Exercises

In this section of the professional paper, apply what you have learned from chapters 13 and 14 to descriptively address and answer the problems below.  Important Note:  Dot not type the actual written problems within the paper itself.

  1. Go to cloudera.com, MapR.com, hortonworks.com, or marklogic.com or in combination to find at least three customer case studies on Hadoop implementation, and then discuss the commonalities and differences of these cases.
  2. Search the job search sites like monster.com, careerbuilder.com, and so forth. Find at least five job postings for data scientist. Identify the key characteristics and skills expected from the applicants and based on what you are learned in this class, how high is your motivation now to seek these types of career choices?
  3. Important Note:  With limited time for a college class, perfection is not expected but effort to be exposed to various tools with attempts to learn about them is critical when considering a career in information technology associated disciplines.

Important Note:  There is no specific page requirement for this section of the paper but make sure any content provided fully addresses each problem.

Paper Section 3:  Conclusions (Part 1)

After addressing the problems, conclude your paper with details on how you will use this knowledge and skills to support your professional and or academic goals. This section of the paper should be around one page including a custom and original process flow or flow diagram to visually represent how you will apply this knowledge going forward.  This customized and original flow process flow or flow diagram can be created using the “Smart Art” tools in Microsoft Word.

Paper Section 4:  Overall Course Conclusions and Reflection (Part 2)

After the primary conclusion of this paper, extend this conclusion into an overall class conclusion and reflection providing at least 500 additional words of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current or future work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.

Paper Section 5:  APA Reference Page

The three or more sources of research used to support this overall paper should be included in proper APA format in the final section of the paper.

Discussion

Assignment Requirements

Submit a summary of your learning as a bulleted list that explains the relevance of RCSA policies.

Submission Requirements

  • Format: Microsoft Word
  • Citation Style: APA

Self-Assessment Checklist

  • I provided a list of reasons why RCSA policies are necessary requirements.
  • I provided a strong case for policy creation for RCSA.
  • I participated in the discussion and worked as part of a group.

summary paper, 1000 words

This is the link to the paper: https://arxiv.org/pdf/1602.04938.pdf

After you read the paper you will summarize the paper in 1000 words.

While summarizing the paper you should be answering few questions throughout your summary.

1. What is the problem?

2. Why is it interesting and important?

3. Why is it hard? (E.g., why do naive approaches fail?)

4. Why hasn’t it been solved before? (Or, what’s wrong with previous proposed

solutions? How does this differ?)

5. What are the key components of the approach and results? Also include any

specific limitations.

6. Can you think of counterexamples for examples given?

7. Is the approach clearly described? Can you outline the steps or summarize the

approach?

8. Does the work address the problem stated earlier in the paper? How?

9. Does the approach seem objective? Clearly state how?

10. Wrap up your paper by answering What is the conclusion of the research?

reputation service

  

Length: Minimum of 600 words

Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references.

As you consider the reputation service and the needs of customers or individual consumers, as well as, perhaps, large organizations that are security conscious like our fictitious enterprise, Digital Diskus, what will be the expectations and requirements of the customers? Will consumers’ needs be different from those of enterprises? Who owns the data that is being served from the reputation service? In addition, what kinds of protections might a customer expect from other customers when accessing reputations?

QUALITATIVE Journal

 

Need a QUALITATIVE Journal, The topic is up to you as long as you choose a peer-reviewed, academic research piece. 

Please use APA formatting and include the following information:

  • Introduction/Background:  Provide context for the research article.  What led the author(s) to write the piece? What key concepts were explored? Were there weaknesses in prior research that led the author to the current hypothesis or research question?
  • Methodology:  Describe how the data was gathered and analyzed.  What research questions or hypotheses were the researcher trying to explore? What statistical analysis was used?
  • Study Findings and Results:  What were the major findings from the study? Were there any limitations?
  • Conclusions:  Evaluate the article in terms of significance, research methods, readability and the implications of the results.  Does the piece lead into further study? Are there different methods you would have chosen based on what you read? What are the strengths and weaknesses of the article in terms of statistical analysis and application? (This is where a large part of the rubric is covered.) 
  • References