Course Reflective Paper

 

Assignment 1 – Reflective Paper

Provide a reflection of at least 500 words (2 pages double spaced excluding Title and Reference pages) that summarizes what you feel are the most important or interesting concepts you have learned so far in this Cloud Computing course.  Would be good to include an insight as to whether the learning was new to you or reinforced knowledge that you already had.

Requirements:  Provide a 500-word (2 or more pages double spaced not counting the title and reference pages) paper.  The paper should include a title page, body pages, and reference page.  An abstract and introduction is not required for this assignment.  Correct use of APA guidelines for sources and citations is required. If supporting evidence from outside resources is used those must be properly cited.

Please refer to the attached text books for the cloud computing course.

Computer security

Use a search engine to find the names of five different cyber viruses.

Using WORD, write a short paragraph on each.

Use your own words and do not copy  the work of another student.

Attach your WORD document here.

Developing visualization latency

nitial Post

“Why do we need to understand data visualizations? There is more and more data around us, and data are increasingly used in decision-making, journalism, and to make sense of the world. One of the main ways that people get access to data is through visualizations, but lots of people feel like they don’t have the skills and knowledge to make sense of visualizations. This can mean that some people feel left out of conversations about data.”http://seeingdata.org/developing-visualisation-literacy/

http://seeingdata.org/developing-visualisation-literacy/rate-these-visualisations/

  1. Choose three of your favorite visualizations from above link . 
  2. Post a 3 – 5 sentence summary of why you chose the visualizations. What caught your attention? Were they effective in presenting the provided data? 
  3. If possible, explain what you would do to improve the visualization?

Reply Post

When replying to a classmate, offer your opinion on what they posted and the visualizations they chose. 

Using at least 3 – 5 sentences explain what you agree or disagree with their evaluation of the visualizations.

Business Intelligence Week 5 Assignment

Paper Section 1: Reflection and Literature Review

Using Microsoft Word and Professional APA format, prepare a professional written paper supported with three sources of research that details what you have learned from chapters 7, 8, 9, and 10.  This section of the paper should be a minimum of two pages. 

Paper Section 2:  Applied Learning Exercises

In this section of the professional paper, apply what you have learned from chapters 7, 8, 9, and 10 to descriptively address and answer the problems below.  

  1. Survey and compare and possibly test some text mining tools and vendors. Start with clearforest.com and megaputer.com. Also consult with dmreview.com to further identify some text mining products to explore and even test?
  2. Survey and compare and possibly test some Web mining tools and vendors. Identify some Web mining products and service providers that could potentially be useful in a work environment you may want to be part of.
  3. Investigate via a Web search how models and their solutions are used by the U.S. Department of Homeland Security in the “war against terrorism.” Also investigate how other governments or government agencies are using models in their missions.
  4. Search online to find vendors of genetic algorithms and investigate the business applications of their products and even possibly test them where applicable. What kinds of applications are most prevalent and why?

 Paper Section 3:  Conclusions

After addressing the problems, conclude your paper with details on how you will use this knowledge and skills to support your professional and or academic goals. This section of the paper should be around one page including a custom and original process flow or flow diagram to visually represent how you will apply this knowledge going forward.

Case study

You have been hired by a small company to install a backbone to connect four 100base-T Ethernet LANs (each using one 24-port hub) and to provide a connection to the Internet. Develop a simple backbone and determine the total cost (i.e., select the backbone technology and price it, select the cabling and price it, select the devices and price them, and so on). Prices are available at www.datacommwarehouse.com, but use any source that is convenient. For simplicity, assume that category 5, category 5e, category 6, and fiber-optic cable have a fixed cost per circuit to buy and install, regardless of distance, $50, $60, $120, and $300, respectively. 

Bus Cont Plan&Disas Recov Plan 110

What kind of user training should be conducted to deal with the issue of noise. How do you strike a balance between being overwhelmed with false positives and the danger of ignoring true incidents?  What effects would false positives have on an organization?  Make sure to cite your sources 

Data encryption Standard

evaluate the history of the Data Encryption Standard (DES) and then how it has  transformed cryptography with the advancement of triple DES. You must use at least one scholarly resource.  Every discussion posting must be properly APA formatted.

Use the textbook for added reference

Quiz

Please provide single answers should be sufficient in the text box.2-7 Questions problems is attached in the screenshot.

1)What algorithm is commonly used in the second stage of triple encryption?

2)Provide the answer for Problem 7.14.a.i on pages 221-222 of your text.

3)Provide the answer for Problem 7.14.a.iii on pages 221-222 of your text.

4)Provide the answer for Problem 7.14.a.v on pages 221-222 of your text.

5)Provide the answer for Problem 7.14.a.vii on pages 221-222 of your text.

6)Provide the answer for Problem 7.14.b.ii on pages 221-222 of your text.

7)Provide the answer for Problem 7.14.b.vi on pages 221-222 of your text.