homework help 13

Topic – Computer crimes

Your Research Project on the surveillance state consists of two parts:

1 A Powerpoint presentation consisting of at least 12 slides not including title and references.

2. 750 word research  paper with at least 3 sources.

You must include at least 3 quotes from your sources enclosed in quotation marks and cited in-line. 

There should be no lists – bulleted, numbered or otherwise. 

Write in essay format with coherent paragraphs not in outline format.

Do your own work. Zero points will be awarded if you copy other’s work and do not cite your source or you use word replacement software. 

Discussion

omposition deals with the overall readability and meaning of the project.  As noted by Kirk (2016), the topic of composition is divided into project-level and chart-level composition. Select one component of either project composition or chart composition and discuss.

cpt reflection 08/14

 Subject Name:  Operational Excellence 

Assignment:
Provide a reflection of at least 500 words of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.

Requirements:

Provide a 500 word (or 2 pages double spaced) minimum reflection.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

Share a personal connection that identifies specific knowledge and theories from this course.

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment.

You should NOT, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace. 

Malicious Software

1. What are three broad mechanisms that malware can use to propagate?

2. What are four broad categories of payloads that malware may carry?

3. What are typical phases of operation of a virus or worm?

4. What mechanisms can a virus use to conceal itself?

5. What is the difference between machine-executable and macro viruses?

6. What means can a worm use to access remote systems to propagate?

7. What is a “drive-by-download” and how does it differ from a worm?

8. What is a “logic bomb”?

9. Differentiate among the following: a backdoor, a bot, a keylogger, spyware, and a rootkit? Can they all be present in the same malware?

10. List some of the different levels in a system that a rootkit may use.

11. Describe some malware countermeasure elements.

12. List three places malware mitigation mechanisms may be located.

13. Briefly describe the four generations of antivirus software.

14. How does behavior-blocking software work?

15. What is a distributed denial-of-service system?

and discuss on hacking tools (200 Words)

R language Assignment and discussion

 

Assignment:

Now that you have R installed on your computer, you will begin to get some experience (hands-on) with the software. For this assignment, you are exposed to just 4 features of R: Arithmetic Operations; Operations on vectors; the Recycle Rule for adding/subtracting vectors; and Creating a S3 Class Object. A separate screen shot is required for execution of each feature. Open R (either command line or RStudio). Enter code that will handle the following (show all code, comment for each code line and the computed results in your screen shots). These are instructions; do NOT just write the instructions – actually show this within R and capture a readable screen shot to show that it works properly!!

Screen shot 1: Arithmetic Operations

assign a value of 144 to x

assign a value of 6 to y

add x and y

subtract y from x

multiply x times y

divide x by y

find the square root of x

Screen shot 2: Operations on vectors

create a vector (afc) and assign values 2,6,3

create a vector (nfc) and assign values 6,4,2

add afc and nfc

Screen shot 3: Recycle Rule for adding and subtracting vectors

assign values 2,1,8,3 to vector x

assign values 9,4 to vector y

add x to y

notice the warning message – use the Recycle Rule for adding vectors; then

add x to y and show results

subtract 1 from x – apply the Recycle Rule for subtracting vectors; then

subtract y from x and show results

Screen shot 4: Create an S3 Class Object

create a list – with components: name = Your name, date = today’s date, and score = score you desire on Assignment 2.

name the class as “graduate student”

Save the screen shots as a MS Word document (*.docx).

Discussion:

Why are statistical programming languages important to data scientists? What are some advantages and disadvantages the R programming language has over the other main statistical

programming languages (i.e. Python, SAS, SQL)?

When replying to a classmate, offer your opinion on what they posted comparing the R programming language to the other statistical programming languages. Using at least 3 – 5 sentences,

explain why you agreed or disagreed with their evaluation of the different statistical programming languages.

Requirements: as per question

(IT and Organization Learning)

  • Review the section on the definitions of maturity stages and dimension variables in the CEO Technology Best Practices Arc.  Define each of the maturity stages and performance dimensions.  What are the key concepts from each section? 

Complete the assignment using narrative paragraphs and explain your thoughts and findings in detail. Adhere to APA format requirements and do not use lists or bullets. Use Times New Roman 12 font, double-spaced. Include a coversheet with your name, class ID and the title of the assignment. Your submission needs to be at least one page in length. The coversheet, figures, tables, and reference list doesn’t count toward the page count. Post the assignment as one MS Word document by the due date in the syllabus. Do not submit any other format such as PDF. Please provide and cite two references IAW APA.

assignment

 

Answer the following questions. Please ensure to use the Author, YYYY  APA citations with any content brought into the assignment.  

For sparse data, discuss why considering only the presence of  non-zero values might give a more accurate view of the objects than  considering the actual magnitudes of values. When would such an approach  not be desirable?

Describe the change in the time complexity of K-means as the number of clusters to be found increases.

Discuss the advantages and disadvantages of treating clustering as  an optimization problem. Among other factors, consider efficiency,  non-determinism, and whether an optimization-based approach captures all  types of clusterings that are of interest.

What is the time and space complexity of fuzzy c-means? Of SOM? How do these complexities compare to those of K-means?

Explain the difference between likelihood and probability.

Give an example of a set of clusters in which merging based on the  closeness of clusters leads to a more natural set of clusters than  merging based on the strength of connection (interconnectedness) of  clusters.

Research paper dissertation chapter 2

  

Identify 3 articles and provide a summary of each within about 250 of more words. Provide the articles in proper APA format and a brief summary below it.

Article 1

Summary 1

Article 2

Summary 2

Article 3

Summary 3

While working on the articles, try to cover the below information so that can be transferred to dissertation template. The goal is to complete Chapter 2 section:

– Assumptions/Biases

– Significance of the Study

– Delimitations

– Limitations

– Definitions of Terms

– General Overview of the Research design

– Summary of Chapter One

– Organization of Dissertation (Proposal)

Access control assignment 7

Discuss how Access Control takes into account human nature of their employees to protect the system. 

Length, 2 – 3 pages.

All paper are written in APA formatting, include title and references pages (not counted). Must use at least two references and citations.

Please reference the rubric for grading.