Querries

  

1. please describe at least two cryptocurrencies with applicable examples. Discuss some similarities and differences. Lastly, discuss if you have any experience using any cryptocurrencies (300 Word).

2. Do you feel that countries and companies need explicit strategies for technology development, given the tremendous amount of largely spontaneous creativity that occurs today, often in areas where new technologies are not expected to exert a great influence?  Why or why not? (300 Word)

ETCM-RESEARCH-DISCUSS-7

DISCUSSION:

Should be between 250-to-300 words. 

DUE DATE: Wednesday End of Day USA time (3 days from now)

Reply: I need 2 replies. Reply is nothing but just additional 100-150 words on same topic but as a different paragraph. (I won’t send any replies to you and then you send info on that. NO) 

DUE DATE: Saturday End of Day USA time (6 days from now)

Topic:

Web server auditing can go a long way in enforcing tighter security and ensuring business continuity. The power of log data is tremendous. Web server logs record valuable information pertaining to usage, errors, and other important security events. Using a specialized auditing tool can be extremely helpful during the audit of web servers. In your discussion this week, please discuss the methods of identifying weak web server configurations and how to mitigate them for a secure web server. Possible concepts to include are SSL certificates, HTTPS usage, attack surface, SQL injection, vulnerability migration, and least privilege. In at least one of your peer responses, provide an overview of how to audit the web server’s security and implement best practices.

Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail

RESEARCH:

Need this research paper by Friday USA time. (5 days from now).

7 pages without references and  cover page. Follow APA 7 format and citations.

TOPIC:

Develop a disaster recovery plan for an organization. There are many different templates available online for you to use as reference and guidance. Your plan should cover the following sections (these sections detail the elements in a DR plan in the sequence defined by industry compliance standards ISO 27031 and ISO 24762): 

  1. Important: This section should summarize key action steps (such as where to assemble employees if forced to evacuate the building) and list key contacts with contact information for ease of authorizing and launching the plan.
  2. Introduction
  3. Roles and Responsibilities
  4. Incident Response
  5. Plan Activation
  6. Document History
  7. Procedures

Your paper should meet the following requirements:

  • Be approximately seven pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least four scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Journal Assignment

 Required Textbook: Tapscott, D., &Tapscott, A. (2016). Blockchain revolution: how the technology behind bitcoin is changing money, business, and the world. Penguin. 

Discussion:

 You installed and set up a Bitcoin Wallet last week(watch the above link). Do you plan to use your wallet to buy or sell merchandise or services? If so, what do you plan to do with your Bitcoin? If not, describe why you don’t want to use Bitcoin. Will your plans change in the future? 

Write 200 words paper.

N Discussion

Please review the following two papers:

Dickson, B. (2019). How to Keep Your Bitcoin Safe. PC Magazine, 37. 

Retrieved from http://search.ebscohost.com/login.aspx?direct=true&AuthType=shib&db=f5h&AN=138901618&site=eds-live

Ruslina, E. (2019). Legal Protection for Bitcoin Users in E-Commerce Transactions. Journal of Internet Law, 23(4), 3–6.

Retrieved from: http://search.ebscohost.com/login.aspx?direct=true&AuthType=shib&db=buh&AN=139556416&site=eds-live

Discuss the “Legal Protection for Bitcoin users in E-Commerce.” Provide use cases as examples and citations.

You must do the following:

 1) Create a new thread. As indicated above, please discuss “Legal Protection for Bitcoin users in E-Commerce”.

2) Select AT LEAST 3 other students’ threads and post substantive comments on those threads. Your comments should extend the conversation started with the thread.

ALL original posts and comments must be substantive. (I’m looking for about a paragraph – not just “I agree.”)

RUBRICS

  1. Total grade points: 300/300
  2. Create a new thread. As indicated above, please discuss “Legal Protection for Bitcoin users in E-Commerce”. 50/50
  3. AT LEAST 3 other students’ threads and post substantive comments on those threads. Your comments should extend the conversation started with the thread. 150/150
  4. Conclusions & References: States a conclusion that is a logical extrapolation from the analysis of evidence/data presented. 100/100pt
  5. Conclusion = 50; References = 50

Also I need comments for posting to 3 other students which should be atleast 150 words each comment.

Discussion 2 Business Intelligence

Question 1:

Why are the original/raw data not readily usable by analytics tasks? What are the main data preprocessing steps? List and explain their importance in analytics. and

Question 2:

What are the privacy issues with data mining? Do you think they are substantiated?

Write a “Post” with a word content of 200-300 words for each question and copy the Post into a Word doc. 

700 words discussion:According to Gilbert and Troitzsch (2015) what is the definition of the core of microsimulation from this context?

Chapter 14 – According to Troitzsch (2005), microsimulation could be described as a form of variant and social simulation that can be seen to be located between and contrasted with system dynamics — with a macro focus and low complexity — on one side, and agent-based modeling — with a behavioral focus often relying on notional rules — on the other (Gilbert and Troitzsch, 2005).  Following these collective research revelations by these authors who share the same ideas, what is the definition of the core of microsimulation?

Question: According to Gilbert and Troitzsch (2015) what is the definition of the core of microsimulation from this context?

Identify and name the definition of the core of microsimulation,

provide a  clear narrative  to support your response based of this case study — Not a general definition from the Internet.

CAR202- Characteristics of an expert in my field

Instructions

Each field or industry will have its own aspects and skills that will define an expert in the field.  For this assignment, you should: 

  • Find a source (journal article, book, web blog, etc.) that addresses the specific skills and characteristics needed to be an expert and successful in that field.  Briefly (one paragraph) identify the main findings from this source, specifically the characteristics needed. 
  • Identify the experience and expertise you have that allow you to meet each suggested characteristic needed.  Frame your response as you would in an interview if you were seeking to frame yourself as an expert. 

Instructions: 

  • Your assignment should be approximately500 words in length (typically, two double-spaced pages), not counting cover page, reference list page, appendices, figures, or tables.  
  • Your assignment should include a title page and a reference list page, and be completed in Times New Roman 12-point font, double-spaced, with appropriate header, page numbers, one-inch margins, and meet all other requirements of APA Stylebook.  
  • Please use at least one appropriate scholarly reference for the basis of your paper, formatted in the most current APA format.  
  • Please refer to the rubric associated with this assignment for detailed guidance about expectations and grading.   
  • Please submit this assignment through in D2L by 11:59PM Central Time on Sunday. 

FTK imager lite & Autopsy

1) What type of device or system did you select to conduct your forensics investigation?

2) What tool did you use for the data capture? 

3) What did you learn from the experience?

· No Plagiarism 

· APA Format required

· Each Answer Should be 350 words without References.

!!! NEED 2 ANSWERS FOR THIS QUESTION WITH 0% PLAGIARISM!!!!

!!! One Answer using FTK IMAGER LITE Tool !!! 

!!! Second Answer using Autopsy Tool !!! 

AI

Artificial Intelligence and Machine learning are very popular today and help to solve many functions. For example, AT&T has embedded the artificial engine IBM Watson into the ticketing system to help solve customers problems on the first call. This AI engine simulates solutions based on million bits of information from past history. 

In 80 words or more what do you think is a disadvantage with AI systems?