Instructions attached!!
Impact of Emerging Technology
Technology is constantly evolving. Even if the slide deck had been made the day this assignment was due, something new would have come out in the meanwhile. Make a prediction about how a specific “new” technology will impact your work, personal life, or the future of the aerospace industry as a whole.
- Identify a new technology you think will have a significant impact and describe it in general terms, citing at least one credible specific source.
- Predict a significant impact this technology will have on your work, your personal life, or on the future of the aerospace industry as a whole.
- Identify a potential obstacle in the adoption of this technology within the next five years (cite at least one credible specific source).
This assignment uses TurnItIn to check for originality (to ensure it is not plagiarized). As this is partially an assessment of your ability to apply MS Word skills, the document must be submitted in .docx format.
Cloud_computing_week5
Discussion Topic: Define and describe a SAN vs. NAS. Name one applicable purpose of each and why.
Paper:
Write a paper on cloud-based data storage. The following are the items to discuss in the paper:
- Describe how cloud-based data storage works.
- List the pros and cons of cloud-based data storage.
- List the pros and cons of a cloud-based database.
Paper requirements:
- Minimum 900 words (excluding title page, table of contents, and references pages)
- Minimum of 3 references
- Format your paper consistent with APA guidelines
FINAL PROJECT
Write a 7-page research paper (cover and reference page inclusive) on the topic
“What is the importance of simulation in public policy making and the four approaches for implementing policies in the public domain?”
1200-1500 word count
From the topics covered in the course in the last 6 weeks, pick one of the topics listed below, write a 1200 – 1500 word paper describing the topic and recent developments (in the past 3 years).
Mobile Marketing
Mobile Entertainment
Data Visualization
Supply Chain / Logistics Automation
Provide a minimum of four scholarly references in your paper (cited and referenced in APA format). All references must be from 2016 or later.
– Double space your paper
– The paper must use APA format (6th edition)
– 1200 – 1500 words, plus 1 cover (title) page, plus 1 page for references.
Business_intelligence_week6
Discussion : Please find attachment below
Knowledge and skills paper : Please find attachment below
WSUS and Windows Defender/ DHCP
Discussion Question 1:
Describe a role that WSUS and Windows Defender play in securing a Windows Network Infrastructure. What should the policy be to keep the nodes on your network updated with the latest security updates?
Discussion Question 2:
Describe in detail some of the aspects of DHCP related to Windows Server 2016 including leases, scopes, and commands, etc. Explain how DHCP is installed and configured on Windows Server 2016.
Portfolio Assignment – Disaster Recovery Plan
Create a Disaster Recovery Plan for either the organization they work for or one they wish to work for in the future. The plan will follow the template/example provided.
Should request prior authorization of the company to be addressed to ensure that all students are working on unique companies.
Even though this is a technical document, for academic purposes, all sources should be cited and referenced.
You may modify some of the sections per the company they have selected but all students will need to complete a DR Plan for the Portfolio Requirement.
SafeAssign should be turned on and reviewed since it will flag a lot of the common elements but we want to make sure the students are writing the content from scratch.
assignment
FORENSIC DESIGN ASSESSMENTS
This task relates to a sequence of assessments that will be repeated across Chapters 6, 7, 8, 9 and 10. Select any example of a visualisation or infographic, maybe your own work or that of others. The task is to undertake a deep, detailed ‘forensic’ like assessment of the design choices made across each of the five layers of the chosen visualisation’s anatomy. In each case your assessment is only concerned with one design layer at a time.
For this task, take a close look at the colour choices:
- Start by identifying all the applications of colour deployed, listing them under the headers of 1) data legibility, 2) editorial salience, and 3) functional harmony.
- How suitable are the choices and deployment of these colours? If they are not, what do you think they should have been?
- Go through the set of ‘Influencing factors’ from the latter section of the book’s chapter to help shape your assessment and to possibly inform how you might tackle this design layer differently
- Also, considering the range of potential applications of colour, what would you do differently or additionally?
Assignment Link: http://book.visualisingdata.com/chapter/chapter-9
Discussion and Assignment
Discussion
In no less than 250 words, explain what is meant by an IDS and an IPS. How are they different? How are they connected to a network? List a few examples of IDS/IPS tools that are currently on the market.
Week 11 Assignment
- 11.1 List and briefly define three classes of intruders.
- 11.2 What are two common techniques used to protect a password file?
- 11.3 What are three benefits that can be provided by an intrusion detection system?
- 11.4 What is the difference between statistical anomaly detection and rule-based intrusion detection?
- 11.5 What metrics are useful for profile-based intrusion detection?
- 11.6 What is the difference between rule-based anomaly detection and rule-based penetration identification?
- 11.7 What is a honeypot?
- 11.8 What is a salt in the context of UNIX password management?
- 11.9 List and briefly define four techniques used to avoid guessable passwords.
Discussion
Do you believe that all data should be encrypted? Many computing professionals think this is a good idea. But a small number of computing experts feel that no data should be encrypted—that all data and software should be openly available to anyone who wants it. Explain your answer (whether you believe all data should or should not be encrypted).
Internet Research – Wk 11
In this module, you learned that random numbers (or, at least, pseudorandom numbers) are essential in cryptography, but it is extremely difficult even for powerful hardware and software to generate them. Go online and conduct research on random number generators. What are the different uses of these tools besides cryptography? How do they work? Explain your answer using your own words in 2-3 paragraphs