ETCM DISCUSSION-3

Topic:  Malicious individuals have discovered several methods to attack and defeat cryptosystems. It’s important that understand the threats posed by cryptographic attacks to minimize the risks to your network systems.

Identify one cryptographic attack and how you can protect against it. 

Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience

 

Discussion should be between 250-to-300 words. 

Reply is nothing but just additional 100-150 words on same topic but as a different paragraph. (I won’t send any replies to you and then you send info on that. NO)

 Time: 36 hours 

Preview the document

discussion q for swarm

1. Find out what Swarm (Links to an external site.) is.

2. Choose several case studies included in the Resources -> Prediction Highlights (Links to an external site.) and Resources -> Case Studies (Links to an external site.).

Pay attention to the question and possible answers described in the case studies.

3. Propose a question that you think Swarm can help you finding the answer.

Submission instructions:

Click on the Discussions -> “Q for Swarm” and create a new thread. You need to include the following information in your post:

  • What is question you want to ask and what are the possible answers (10 points);
  • What category does this question belong to. Category can be one of the following: politics, business, healthcare, and education (2 points);
  • Why do you think it is an important question to ask (3 points);
  • Why do you think collective intelligence can help finding the answer to your question (5 points).

QNO.2. Read the attached Ethics-IV.pdfPreview the document which continues the discussion on how software engineers can actually live up to ethical standards and what is the end goal of an ethical life in software engineering.

Then proceed to answer the questions inside the reading:

  • Questions 6.1 and 6.2
  • Question 7.1

Because for many ethics questions there is no absolutely right or wrong answers as such, your responses will be graded based on completeness and thoughtfulness as opposed to rote or perfunctory ones. There are three grade levels for this assignment based on your responses to all the questions: 20 (no reasoning in responses), 35 (minimal to little reasoning), and 50 (sufficient reasoning and consideration).

Write your answers in a Word file using Times New Roman font (no smaller than 10 pt but no bigger than 12 pt), single spacing, 1″ margins on all sides.

Save your file as Ethics_4_FL where FL is your first and last name initial and Submit.

Summary of topics

There are TWO tasks that you would need to do( they are separate): 

Task 1:

Write a summary of the below points for a  total 300 words (100 words for each question with three research papers as reference)

 1.  What are the business costs or risks of poof data quality? Support your discussion with at least 3 references.

2.  What is data mining? Support your discussion with at least 3 references.

3.  What is text mining? Support your discussion with at least 3 references.

TASK 2:

Write a reply to the two responses in the attached document ( Response 1 and Response 2) with 150 words for each. 

There should be no plagiarism. Attach a plagiarism report with 0 % similarity index. 

Need 2 Page document with proper APA formatting and citations, references and No plagiarism

Assignment: Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course( Telecomm Network Security, Firewalls and VPNs ) have been applied, or could be applied, in a practical manner to your current work environment (software developer in Financial industry). If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Requirements: Provide a 500 word (or 2 pages double spaced) minimum reflection. Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited. Share a personal connection that identifies specific knowledge and theories from this course. Demonstrate a connection to your current work environment. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.

Data management paper

This needed within 8 hours. It a computer assignment with lots of queries and tables. Only experienced writer needed to do this within 7 hours.

Discussion

 

  • Discuss the difference between parametric statistics and nonparametric statistics.
  • Discuss the advantages and disadvantages of nonparametric statistics.
  • Describe the procedure for ranking which is used in both the Wilcoxon Signed-Rank Test and the Wilcoxon Rank-Sum Test

Intro to Data mining

 Answer the following questions. Please ensure to use the Author, YYYY APA citations with any content brought into the assignment.  

For sparse data, discuss why considering only the presence of non-zero values might give a more accurate view of the objects than considering the actual magnitudes of values. When would such an approach not be desirable?

Describe the change in the time complexity of K-means as the number of clusters to be found increases.

Discuss the advantages and disadvantages of treating clustering as an optimization problem. Among other factors, consider efficiency, non-determinism, and whether an optimization-based approach captures all types of clusterings that are of interest.

What is the time and space complexity of fuzzy c-means? Of SOM? How do these complexities compare to those of K-means?

Explain the difference between likelihood and probability.

Give an example of a set of clusters in which merging based on the closeness of clusters leads to a more natural set of clusters than merging based on the strength of connection (interconnectedness) of clusters.

Business Continuity Plan & Disaster Recovery Plan (2 Questions in 24 hours)

 

Course: Business Control and Disaster Recovery plan:

Note: Please write the paper in favor of Computer science students taking the above course

Please write each question in a separate document and make sure no plagiarism.

===================================================

Question 1: (250-300 Words)

 Discuss the advantages and disadvantages of record recovery.  Name at least three key points. 

 

Must contain a properly formatted in-text citation and at least 2 scholarly references. 

===================================================

Question 2: (300-400 Words)

 

What kind of user training should be conducted to deal with the issue of noise. How do you strike a balance between being overwhelmed with false positives and the danger of ignoring true incidents?  What effects would false positives have on an organization?  Make sure to cite your sources.

Assignment should follow all APA rules and include a min. of (1) citation/reference.