VPN

 

What are the main reasons why a VPN is the right solution for protecting the network perimeter? Do they also provide protection for mobile devices?

Policy and legal_Week 12

This quiz is based on the material in Chapter 7 of the text. 

Answer each these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.

1. Describe Digital Literacy (how to know what is real on the web). 

2. None of these people exist. What does this mean to you?

3. Why is Wikipedia more reliable than a paper encyclopedia?

4. How useful are crowd sources answers?

5. What are some drawbacks to crowd sourced answers?

6. Do people generally utilize the diversity of sources on the Internet effectively?

7. How reliant are we and how reliant should we be on getting our news from social media?

8. How do humans remain vigilant when we turn over authority to computers? Have you tried to navigate without gps?

9. If models are simplifications or reality, why do we rely on them?

10. Why was this model, used by Amazon for hiring, wrong?

11. Why did Skynet declare war on the human race?

Assignment Paper (3-5 pages), Presentation(3-5 slides) with references

Please go through the document completely attached for the topic and instructions.

Need a paper of at-least 3-5 pages with references for the topic given in the word document.

Also needed presentation of at-least 3-5 slides with references for the same topic(which is used for paper) in the document.

Note: Text book link is present in the document if needed.

CC Week12 P12

Hello,

i need this paper by 07/29 afternoon.

Strictly No plagiarism please use your own words.

Propose and defend a topic for your project.  

  

How to secure virtualization layer

Write  500 words explaining why this topic is important for your peers to understand. Be focused and specific. Look into the general topic provided in the list in this folder to find something new and interesting to write about. You should do a deep dive into a topic. Do not do a survey. Use the Research Databases available from the Danforth Library not Google. 

Use at least five sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Write in essay format not in bulleted, numbered or other list format. 

Strictly No plagiarism

for PHD Doctorate

 Q3. In this exercise you’ll use R package tidyverse (see chapter 4 of Introduction to Data Science Data Analysis and Prediction Algorithms with R by Rafael A. Irizarry. You need to go through chapter 4 before attempting the following questions. Using dplyr functions (i.e., filter, mutate ,select, summarise, group_by etc. ) and “murder” dataset (available in dslab R package) and write appropriate R syntax to answer the followings: a. Calculate regional total murder excluding OH, AL, and AZ (Hint: filter(! abb %in% x) # here x is the exclusion vector) b. Display the regional population and regional murder numbers. c. How many states are there in each region? (Hint: n ()) d. What is Ohio’s murder rank in the Northern Central Region (Hint: use rank(), row_number()) e. How many states have murder number greater than its regional average (Hint: nrow() ) f. Display 2 least populated states in each region (Hint: slice_min() ) Use pipe %>% operator for all the queries. Show all the output results 

1. Define blockchain. 2. Discuss how enterprise blockchain enriches the definition of blockchain. You are required to cite this week’s assigned readings in your paper. You may also cite external sources if you wish.

 

Discuss the following: 1. Define blockchain. 2. Discuss how enterprise blockchain enriches the definition of blockchain. You are required to cite this week’s assigned readings in your paper. You may also cite external sources if you wish. Use the following headings to organize your paper: Introduction, Question 1, Question 2, Conclusion, References.

Submit your paper as a Word attachment in the discussion forum. I often provide feedback within the paper and will not grade your post unless you submit it as an attachment. Your response to the discussion prompt should contain a minimum of 500 words and it should be submitted no later than Wednesday before 11:59 pm EST.  Your response should be formatted in APA style and reference each of this week’s readings.

The following guidelines are used to grade your discussion papers:

1. Discussion posts are worth 24 points each week. Twenty points for the student’s initial discussion post paper, and 2 points each for peer response posts.  Your two peer replies should contain a minimum of 150 words each and should be submitted no later than Sunday before 11:59 pm EST. 

2. The following point allocations are used to grade all discussion papers: 5 points APA style, 5 points use of required readings, 5 points content, 5 points scholarly writing/grammar/structure. Failure to cite each week’s required readings will result in an automatic 5-point deduction. Failure to provide in-text citations of paraphrased and quoted material will result in an automatic 5-point deduction.

Follow the following writing requirements for all of your discussion prompt responses (note that these writing requirements DO NOT apply to your responses to other students):

Writing Requirements for all Assignments:

  • References MUST be cited within your paper in APA format. Your reference page and in-text citations must match 100%. Papers without in-text citations will earn failing grades.
  • Always include a cover page and reference page with all submissions
  • Your paper must have headings in it. For discussion posts Introduction, Prompt/Question, and Conclusion will suffice as headings.  
  • Provide the EXACT web link for all online sources – do not provide just the home page, but the EXACT LINK – I check all sources
  • No abbreviations, no contractions – write formally
  • Write in the third person formal voice (no first or second person pronouns)
  • Write MORE than the minimum requirement of the word count assigned
  • As always, the word count is ONLY for the BODY of the paper – the cover page, reference page, and / or Appendix (if included) do not count towards the word count for the paper
  • Indent the first line of each new paragraph five spaces
  • Refer to the example APA paper in the getting started folder under the content tab if you need an example. Also, a power is provided under the information tab that addresses APA format.
  • Use double-spacing / zero point line spacing, a running header, page numbers, and left justify the margins.

Paper on IOT Threats to Database Security.

 The next big thing in the present tech savvy world is IOT, Internet of Things, in general sense Internet of things is nothing but the ability of devices to think and communicate with other smart devices over the Internet without any Human Interaction  . Every coin has two sides likewise there are advantage and disadvantages with the use of IOT.  

Paper should be in APA format, should be around 5 papers excluding intro, references, should be in APA format.

Use at least five sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources. 

Write in essay format not in bulleted, numbered or other list format

Data Visualization Week 3

 Please identify a computer system you have recently had experience with (at home, work,etc.); prepare an attached PowerPoint presentation (minimum 8 slides) describing a potential computer security problem related to that system. The target audience is a manager who you are trying to convince to investigate the potential security issues. 

 

Suggestions:

  • Begin with a description of the organization and the computer system you have chosen.
  • Where necessary, you may make assumptions about any specifics – please note these as such in your presentation notes.
  • Draw from the assigned readings (and your independent research) to identify what topics should be included.
  • If you feel that slide information is not self-explanatory, add additional details in the presentation notes.