File

PLECRP

 

The purpose of this assignment is to pick a topic for your research project. 

Your Research Project will be a presentation on some aspect of the surveillance state.  Do a five source annotated bibliography/reference list on the subject. There should be two annotations for each source. In the first write a paragraph of at least five sentences summarizing the thesis of the article. In the second write a paragraph of at least five sentences summarizing your reflections on the thesis of the article. You should do a deep dive into a topic. Do not do a survey. Make use of academic references such as you can find in the Danforth LIbrary research databases 

Use at least five sources.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Write in essay format not in bulleted, numbered or other list format. 

 

Short excerpt on the Surveillance State

Attached Files:

View this before embarking on your Project Research

Research paper correction and need to add bullet points for ppt

Attached file 

1- issue file based on prof comments

2- file 2 where you need to fill the info in point 5 and 6.1

    Point- 5- All the description is correct. No need to do the changes. But same info in down i need in 5 bullet points with same reference and add one more new. 

    Point 6- Need to correct it based on prof comments (check in issue file.) And you also need to put 5 bullets points based on the same text which I need to show in PPT. 

I am preparing the PPT. Same text need it bullet points for PPT. 

Note: Any new references you can add under ref section. 

Very less work. Need to correct and same info in bullet points. 

 

network and security

Compare and contrast Wireshark and GlassWire network monitor & security tools. explaining the benefits and features of each, then decide which of these two choices you would prefer to use if you were the Network Manager. Explain why you made your decision.

JAVA Program

You are tasked with creating a weather data collection program that asks the user for data, and then uses that data to output alerts to the user when certain conditions are met.

The data that is to be collected by the program includes:

  • Temperature in either Fahrenheit or Celisius
  • Percent chance of precipitation. (How great a chance that water will fall from the sky in some form.)
  • Percent Humidity.
  • Time of Sunrise and Sunset.
  • Wind speed.

With this data the program should send out to the user the following alerts when the conditions are met.

  • If temperature is above 90 it is a heat advisory, if above 105 it is a heat warning, if below 32 it is a freeze advisory, if below 20 it is a freeze warning.
  • If precipitation is < 25 % than it is a low chance, if it is between 25 % and 75 % chance then it is a decent chance and if it is greater than 75 % then it is a likely chance of rain. (Pair this with temperature though. If its below freezing it won’t be rain but snow that comes down)
  • If about 80 degrees with low humidity and no precipitation then it is a fire warning.
  • If wind speed is greater than 40MPH then it is a wind advisory. If above 60MPH then it is a wind warning.

There are also a few checks and balances possible.

  • Sunrise should never happen before 5AM and after 8AM
  • Sunset should never happen before 5PM and after 8PM
  • Obviously anything involving percentages should never go above 100% or below 0%

cloud_computing

 Compare between different formal Cloud definition? Based on stale and standards? (include the NIST definitions)

Hint: SP 800-145 September 2011  The NIST Definition of Cloud Computing

write briefly on Cloud Computing Recommendations suggested by NIST .

Hint:  SP 800-146 May 2012  Cloud Computing Synopsis and Recommendations

What are the Key Security and Privacy Issues?

Hints:  SP 800-144 December 2011  Guidelines on Security and Privacy in Public Cloud Computing

 Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research.  Please be sure that journal articles are peer-reviewed and are published within the last five years. The paper should meet the following requirements:

  • 2 pages in length (not including title page or references)
  • APA guidelines must be followed.  The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.
  • A minimum of five peer-reviewed journal articles.

Practical connection

  

Explaining how the work was related to studies.

Need an explantion of Masters in Computer science all the subjects and how its was helpful for my work environment as a Software Engineer/Programer Analyst.

RM-RESEARCH-15

 RESEARCH:

Need this research paper by Saturday USA time. (5 days from now).

Risk management is one of the most important components in empowering an organization to achieve its ultimate vision. With proper risk management culture and knowledge, team members will be “speaking” the same language, and they will leverage common analytical abilities to identify and mitigate potential risks as well as exploit opportunities in a timely fashion. In order to consolidate efforts, the existence of an integrated framework is crucial. This is why an ERM is necessary to the fulfillment of any organization’s goals and objectives.

In your final research project for the course, your task is to write a 7-10 page paper discussing the following concepts:

  • Introduction
  • Why should an organization Implement an ERM application?
  • What are some key challenges and solutions to Implementing an ERM?
  • What is Important for an effective ERM?
  • Discuss at least one real organization that has been effective with implementing an ERM framework or /application.
  • Conclusion, final thoughts for future research
  • Recommendation

Your paper should meet the following requirements:

  • Be approximately seven to ten pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course, the course textbook, and at least ten scholarly journal articles to support your positions, claims, and observations, in addition to your textbook.