Sum-Wk-6

Assignment 1

Analyze the advantages and disadvantages of digital signatures. 

Requirement: 

· ****Separate word document for each assignment****

· Minimum 300-350 words. Cover sheets, abstracts, graphs, and references do not count.

· Add references separately for each assignment question.

· Strictly follow APA style. Length – 2 to 3 paragraphs. 

· Sources: 2 References to Support your answer

· No plagiarized content please! Attach a plagiarized report.

· Check for spelling and grammar mistakes!

· $5 max. Please bid if you agree.

Assignment 2

Analyze asymmetric and symmetric encryption. Evaluate the differences between the two of them and which one that you would determine is the most secure.

Requirement: 

· ****Separate word document for each assignment****

· Minimum 3 pages (excluding references and cover page).

· Add references separately for each assignment question.

· Strictly follow APA style. 

· Sources: Minimum of 3 references to support your answer. Properly cite and reference any borrowed resource(s)

· No plagiarized content please! Attach a plagiarized report.

· Check for spelling and grammar mistakes!

· $15 max. Please bid if you agree.

Cloud

Use only 50-words  per topic to discuss and present your answer. The discussion questions this week are from Chapter 14  (Jamsa, 2013).You are required to use at least two sources (besides your textbook) to answer the above questions.

1. Describe how web pages differ from apps and how apps differ from widgets.

2. Discuss why developers say that HTML5 will drive mobile solutions.

Apply: Executive Brief on Audit Findings

 

Assignment Content

  1. For this assignment, you will continue using the Gail Industries Case Study.

    The audit for SCOPE is complete. As the IT manager, it is your responsibility to respond to the audit findings.

    Read the Gail Industries Case Study.

    Review the preliminary findings you identified in the Week 4 assignment. Assume all of your findings were identified by the auditors, including any identified by your instructor, and are in the final audit report.

    Write a 2- to 4-page executive brief to executive leadership on the results of the audit performed in the Week 4 Apply: Audit Evidence assignment. Include your management response to each finding (how it will be resolved). This may include creating new policies, procedures, and controls. You may consider if you will accept the finding and choose not to act because it is a single incident and not likely to recur. Justify each response in relation to reducing associated risks.

    This week’s readings provide guidance on formatting this information.

    Submit your assignment.

Digital forensics

  

Digital forensics is often summarized in four phases (e.g., collection, preservation, analysis, and reporting). We have learned this already.

However, I think it’s important for you to be aware of how there are many different excellent models out there that seek to break down digital forensics in a series of flowcharts/phases / moving parts. Then Chapter 14 talks about the different trends and future directions.

So, I am attaching a couple research papers. Please check out them out in which can be found in the Supplemental Materials folder.

Some of the models out there are very specific e.g., for network forensics, triage, or cybercrime.

I would like you to read these papers – who knows you may see a model that resonates well with you. This can be helpful if you are asked to consult on what is the right model that should be followed in a particular legal matter in today’s brave new world.

Instructions

Now that you have reviewed the different models of digital forensics, what are your thoughts about the author’s proposed model? Do you agree or disagree? Do you have a preference for the other models and if so, what is your preference and why? Note – there are NO right or wrong answers here. I value your insights.

APA Format

Need 1 Page without references page

Plagiarism report

 !!! RESEARCH DOCUMENTS ATTACHED !!!! 

 !!! NEED 2 ANSWERS FOR THIS QUESTION WITH 0% PLAGIARISM!!!! 

Intro To Data Mining

What is an attribute and note the importance?

What are the different types of attributes?

What is the difference between discrete and continuous data?

Why is data quality important?

What occurs in data preprocessing?

In section 2.4, review the measures of similarity and dissimilarity, select one topic and note the key factors.

1. Review the following request from a customer: We have a need to reed it to. The current system has a whole bunch of reports, but no way for the user to update them by themselves without getting IT involved.

  

1. Review the following request from a customer:

We have a need to replace the aging Signage Application. This application is housed in District 4 and serves the district as well as two other districts. We would like a new application that can be used statewide to track all information related to road signs. The current system is old and doesn’t do most of what we need it to. The current system has a whole bunch of reports, but no way for the user to update them by themselves without getting IT involved. We also can’t create our own reports, on-demand, when we need to. Currently, data is entered into the application manually by Administrative Staff, but in the future, we would like to be able to take a picture of the road sign using a phone app, and have it automagically populate the database with geospatial location and other information. We thought about having a Smart Watch interface, but we don’t need that. Also, the current method does not have any way to manage the quality of the data that is entered, so there is a lot of garbage information there. There is no way to centrally manage security access, with the existing application. We want to get real time alerts when a sign gets knocked over in an accident and have a dashboard that shows where signs have been knocked over across the state. This is kind of important, but not super-critical. We need to store location information, types of signs, when a new sign is installed, who installed it, etc. We plan to provide the phone app to drivers in each district who will drive around, take pictures of the signs, and upload them to the database at the end of each day, or in realtime, if a data connection is available. Back in Central Office, reviewers will review the sign information and validate it. A report will be printed every month with the results and a map. There are probably other things, but we can’t think of anything else right now.

2. List the main goal(s) of this request

3. Write all the user stories you see (include value statements and acceptance criteria, if possible)

4. Prioritize the user stories as

a. Critical

b. Important 

c. Useful

d. Out of Scope

5. Are the user stories sufficiently detailed? If not, what steps would you take to split them/further define them?

6. What are the known Data Entities?

7. Is there an implied business process? Draw an activity diagram or a flow chart of it

8. Who are the actors/roles?

9. What questions would you ask of the stakeholders to get more information?

10. What technology should be used to implement the solution?

11. What would you do next as the assigned Business Analyst working on an Agile team?

No SQL Research Paper

NO SQL Research paper – APA format

Create a use case scenario: design a distributed environment using Mango, Cassandra, Hadoop, MySQL for an imaginary project.  The design must include Input information, Data Storage, and Data Distribution.

You can use any use case scenario from the internet, however, you will ll have to be able to explain landscape and data flow.

A Data Flow diagram is a must.

Sorting Data Structure

 This assignment consists of two parts:

Part 1: When you write an email to your family, the email is sent  over the Internet. Before the message is sent, it is broken into many  data packets. These data packets are numbered consecutively, but they  are out of order while transferred over the network. The packets need to  be sequenced when they reach the destination computer so your family  can read your message. Discuss how you would sort these packets with two  kinds of sort algorithms.

Part 2: Choose one sort algorithm from the ones covered in this  module and write a program to sort students’ GPA in descending order.  After you are done, send the original Java code along with screenshots  of the result.

Assignment Expectations

  1. Discuss and explain clearly why you chose these two kinds of algorithm.
  2. Use numbers to demonstrate how these algorithms work. Hint: Create a series of numbers to represent the data packets.

Admission questions

it even asks about my background so I have written little about myself in the a file so please do review it before answering questions.