Discussion Board Chi-Square Analysis

 

Within the Discussion Board area, write 300–500 words that respond to the following questions with your thoughts, ideas, and comments. This will be the foundation for future discussions by your classmates. Be substantive and clear, and use examples to reinforce your ideas.

It is frequently presumed that as individuals get older, they become more politically conservative. A political science student wants to verify this postulate. Using secondary data, the student ran a Chi-Square analysis of the age group (18–35, 36–55, 56–80) and self-described political affiliation (liberal, moderate, or conservative). The results of his analysis are provided in the tables below, but the student is having difficultly explaining the results.

  • Describe the overall findings of the Chi-Square in the output, including the cell contributions, based upon the standardized residuals.
  • What conclusions can the student make concerning this postulate?

cloud_computing_week8

 Discussion Topic: Define the advantages and disadvantages of securing cloud-based solutions. 

Paper:

Write a paper on securing the cloud. The following are the items to discuss in the paper:

  • Define and discuss the data wiping process.
  • Discuss how a cloud-based solution provider may reduce the risk of a DDoS attack.
  • Define and discuss hyperjacking attacks.
  • Define and discuss guest-hopping attacks.

Paper requirements:

  • Minimum 1200 words (excluding title page, table of contents, abstract, and references pages)
  • Minimum of four (4) references
  • Format your paper consistent with APA guidelines
  • When submitting the assignment, please ensure you are submitting as an attached MS Word document.

Module 2 Questions

  1. Why should an organization have IT security policies and procedures?  Provide details to support your answer. Include references to support your answer in APA format. 
  2. Should an organization’s IT security policies and procedures be documented?  Provide details to support your answer. Include references to support your answer and reason in APA format.  
  3. Why do you think an education / training program is necessary for the IT support staff?  Provide details to support your answer. Include references to support your answer and reason in APA format. 

Please use online references. Do not use books or journals.

Policy and legal

Answer each these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.

1. What kind of speech was the First Amendment written to protect?

2. Does the First Amendment apply only to spoken words?

3. What does it mean that laws regulating speech must be content neutral?

4. Why are common carriers prohibited from controlling the content of the material they carry? 

5. How does the Supreme Court determine whether material is obscene?

6. Why have attempts to censor the Internet failed in the US?

7. Why not just ban spam? 

8. Why did Facebook ban Alex Jones and Louis Farrakan?

9. Should websites that show how to 3d print guns be banned? 

10. According to the Supreme Court ‘anonymity is a shield from the tyranny of the majority’. What does that mean? 

Order # 9200

Title:

Conflict

Paper type

Coursework

Deadline

12th Nov 2017 @ 19:36:25 PM … ( Elapsed! :: -1079 Days, -6 Hrs, -55 Min )

Paper format

APA

Course level

Undegraduate

Subject Area

Technology

# pages

1   ( or 300 words Minimum)

Spacing

Double Spacing

Cost

$ 4

# sources

4

Paper Details

Reference: Pluralsight video “Conflict Resolution in the Workplace” by Stephen Haunts

Research a current domestic or international conflict in the cyber domain.

As a way of checking for your understanding of the nature of conflict as described in the video, write a 1/2-page to 1-page methodology for resolving the conflict using Microsoft® Word that addresses the following:

*Identify the reason for the conflict and the opposing forces

*Accurately identify the key political figures that impact the outcome or resolution of the conflict

*If you were involved with the resolution of the conflict, what style of conflict resolution would you use–the competing shark, the collaborating owl, the avoiding turtle, the accommodating teddy bear, or the compromising fox–and why?

*Do you think in our current political environment we may take the easy way out and try to sweep the conflict under the rug?

*There is one simple widely used method to resolve common conflict that goes by the acronym DESC that stands for Describe, Express, Specify, Consequences. Do you think this method could be used to resolve the conflict you identified? Do you think methods for conflict resolution in the workplace are the same as geological conflicts? Why or why not?

Submit your assignment using the Assignment Files tab.

Data Mininig

 

Search for a recent article on data mining. 

Describe the role of data mining in that article in your own words.

Give specific examples of how techniques like classification and clustering has been applied in that particular case study.

With References

Week 5 discussion

Operating System Forensics”

  • Use the Internet or the Strayer Library to research at least one commonly used Linux-based system forensics software tool. Describe the tool’s primary uses, strengths and weaknesses, competing products, costs, system requirements, and whether military, law enforcement and / or private corporations use the tool. Provide a link to the tool. Discuss the difference between open source (free ) tools and those that are purchased. From your research, which tool is more efficient? Justify your answer.

Research Paper

Course: Introduction to Blockchain and Crypto-currency.

Length: Minimum of 5000 words for paper.

Using the University Digital Library or the Google scholar website locate articles discussing Blockchain Technology or crypto-currencies.

1. Discuss with your teammates what kind of subject you want to research. 

2. Pick a subject related to Blockchain or Cryptocurrencies.
3. Work on an outline for your research paper.
4. Do a power point presentation that consists of at least 10 slides.

Your final document should include an Abstract and a Conclusion. This assignment should be in APA format and have to include at least 12 references.

Execute Summary

The proposal will consist of the executive summary, communication plan, proposal introduction, policies and procedures, proposed solutions to the security vulnerabilities, and plans to continuously monitor the organization for malicious behaviors. 

I have the communication plan and policies and procedures. I just need a two page executive summary