written assignment

 

Law enforcement professionals and investigators use digital forensic methods to solve crimes every day. Locate one current news article that explains how investigators may have used these techniques to solve a crime. Explain the crime that was solved and the methods used to determine how the crime was committed. Some examples of crimes solved may include locating missing children, finding criminals who have fled the scene of a crime, or unsolved crimes from the past that have been solved due to the use of new techniques (such as DNA testing).

JAVA

  1. Write a computer program that prompts the user for a number, creates an array for that number of random integers, and then usees the bubble sort to order the array. The program should print out the array prior to the call to the sorting algorithm and afterwards. You can write the program in either Java, C++, C#, or whatever language you are most comfortable in. Do Not use an API from the language library. Write the program to perform the sort.
  2. Repeat 1 but use selection sort this time. Again, write out the program for the selection sort. DO not use the language library.

1 and 2 are primarily intended to make sure that your algorithms work.

Once you are convinced your programs work, do the following

  1. Write a computer program that prompts the user for one number, n for the number of items in the array to sort, and create and sort 1000 different arrays of this size timing the run to get an average time to sort an array of this size. Then do the following:Initiate a variable running_time to 0
    Create a for loop that iterates 1000 times.
    In the body of the loop,
    Create an array of n random integers
    Get the time and set this to start-time (notice the sort is started after each array is built. You want to time the srt process only). You will have to figure out what the appropriate command is in the programming language you are using to find the time (Important: Do not start the timer until after the array is created).
    Use bubble sort to sort the array
    Get the time and set this to end-time Subtract start-time from end-time and add the result to total_time
    Once the program has run, note
    The number of items sorted
    The average running time for each array (total_time/1000)
    Repeat the process using 500, 2500 and 5000 as the size of the array. 
  2. Repeat 3 using selection sort.
  3. You now have 6 data points ( the averages from the three array sizes for the two sort algorithms) Create a spreadsheet showing the results of 3 and 4 and create a graph to graphically represent the information. Show both sort algorithms on the same graph for comparison.
  4. Write a one page document explaining the results, bearing in mind that both algorithms have a complexity of O(n^2) and what you know about complexity analysis. Use your knowledge of complexity analysis to explain your results.

Please submit

  1. Program code for 1 
  2. Program code for 2 
  3. Program code used in 3 and the results of the three program runs
  4. Program code used in 4 and the results of the three program runs
  5. The spreadsheet created in 5
  6. The report. In the report, say which machine you ran the experiments on (type of processor, RAM, etc). Explain your experiment and why you feel you received the results you observed.

essay

Project:  You are starting a new company and want to ensure organizational success through operational efficiency and strategic vision.  The plan for this project is to understand where there is a need in the market to create a new product/ service, understand the components that need to be addressed or factored when managing operational efficiencies (to include resource management), and present the work as though asking for approval to proceed with the project.  Friday we will start the basic research and find an organization to create and market, Saturday the team will work on the paper, Sunday the paper will be finalized and the presentation will be completed.

Before the class leaves for the evening, your team must select an organization and create a one-page overview noting the following information:

Your task tonight is to determine where there is a gap in the market or area for a niche market can note:

  1. The market, the name of the company, why you feel as though there is a niche or area for you to succeed in the market.
  2. Research other companies in the same market and note why they aren’t providing the services you are offering and contrast them to the goods or services your company is going to offer.

Data

You have been asked by management (manufacturing, healthcare, retail, financial, and etc. ) to create a demo using a data analytic or BI tool. It is your responsibility to download and produce outputs using one of the tools. You will need to focus your results on the data set you select.  

Ensure to address at least one topic covered in Chapters 1-5 with the outputs. The paper should include the following as Header sections.

Introduction History of Tool [Discuss the benefits and limitations] 

Review of the Data [What are you reviewing?] 

Exploring the Data with the tool Classifications Basic Concepts and Decision Trees Classifications 

Alternative Techniques Summary of Results References

Ensure to use the Author, YYYY APA citations with any outside content.

Types of Data Analytic Tools

https://www.octoparse.com/blog/top-30-big-data-tools-for-data-analysis/ Excel with Solver, but has limitations R Studio Tableau Public has a free trial Microsoft Power BI Search for others with trial options

Examples of Dataset

https://www.forbes.com/sites/bernardmarr/2016/02/12/big-data-35-brilliant-and-free-data-sources-for-2016/#4b3e96f1b54d

Case Study

 This week you learned more about the core Compute, Networking, Storage, and Database services in AWS. Amazon publishes customer case studies to show how their customers use and benefit from their services. For this week’s assignment, use the AWS Customer Success page (Links to an external site.) to search for case studies.  Select at least two (3) or more customer case studies. Each case study will include multiple AWS or Amazon services, and you do not need to include all of the services mentioned. In your own words, discuss how each customer used the service. If you include a service that has not been discussed in this course, include a description of that service within your response. Your assignment should be 3 pages in length and in APA format. At a minimum, your reference page should include links to the Amazon customer case studies you selected. 

ethical hacking

 Answer below two questions:

1)Ethical Hacking 

a) Explain in your own words what “FOOTPRINTING” (or digital reconnaissance) is and how you would go about gathering the information you need to determine the location of a recently stolen late model car that was last seen in the parking lot of our college.

b) After responding to the weekly discussion topic on FOOTPRINTING, you now have an idea as to how to conduct a digital investigative project. For this assignment, you are asked to develop your own crime scenario. Explain the incident that occurred, and then list the steps you would follow to solve this case (examples might include: a lost child, an unauthorized charge on your credit card, an unidentified charge made with your EZ PASS, etc.). Just add a reference link at the end.

2) Information Assurance: Describe three authentication types and give an example of each. Your post should be at least 350 words.

DR- Discussion 5 response

Search “scholar.google.com” or your textbook. Discuss what role end-users typically play in incident reporting? Should end-users be encouraged to report suspicious occurrences? Why or why not? Tell me in your own words, please. What factors typically influence the end-user decision to report (or not report) a potential incident?  

 I am adding my classmate’s response for the above question. You will have to write response for each post in 150 words. No references needed.  

Discussion 1:

The end-users need to have to become motivated for certainly the document event that is actually suspicious, this final user’s help in every situation. The end-users are probably included that is actually crucial disclosing the cases or supplying an analysis separation legal representatives concern, the end-users execute an element that is key basically any kind of concern factors mentioning. Completion individuals disclose possesses more important they may discover in that situation to make sure that your end-users perform element that is vital the disclosing incidents considering that they begin to know scenarios directly or. Security prevails for each singular organization, due to the fact that security matter the organization will definitely certainly not act as disregard ever then the organization will definitely reside in the threat destination just in case the organization operates negligence or any type of overlook in dilemmas of security. Each and each correct time the application form kind could be accessibility that is having a visa or Mastercard application or nearly any function will definitely be accessing a database (Krouss et al., 2016).

The organization is heading to be actually attempting for the purpose of examining the points being major concerns to your initiation worrying the occasion. At that point, there is less option for occurring happenings in case employees in an organization use a recurring company offered a network in a substandard volume including for instance just for workplace work except for particular use. The files concerning the individual that is ultimate certainly be influenced given that using the deal completion individuals have considerably even more advantages. Keeping applications being cloud-based personal computer program that is personal computer bodies are going to work to mention happenings specifically by end-users. Data collection duty concerning the network is one of the elements that are primary effects to disclose end-users with the whole occasion coming from the affair (Macrae, 2016).

———————————————————————————–

Discussion 2:

 

Incident-reporting systems (IRSs) are systems for announcing near misses or adversarial events to engage legitimate improvement.”

“End users are the most essential bit of an episode report. They are the onlookers of the occurrence and can give the most fundamental information. End users are depended upon to give anyway much detail as could be normal about the occurrences that they watch, similarly as to shield related confirmation, and to make themselves open to offer assistance as the episode response progresses.”

End-users must be encouraged to report episodes as it can expect a critical activity to hinder murders, theft, bad behaviors, etc.

In the here and now when the mechanized world is growing so rapidly, there may in like manner be a peril as specific users may misguidedly report occurrences that aren’t going on.

This can furthermore, be thwarted by executing laws against such people.

A decent ought to be collected and should be encouraged among people to report questionable episodes to make an overall population a better spot than live.

This marvel can be commonly used in medicals workplaces to be given as and when required yo the soonest. It might be used to enlighten and thwart criminal cases additionally, yet a lot of factors sway the consideration of users.

“A couple of segments which sway the end-customer decision to report (or not report) a possible episode:

● Availability of the episode response bunch the openness of the organization bunch impacts the end-customer in the two distinct manners. In case the episode report bunch is responsive, by then, the users will come to them with their requests.

● Security of end-customer – People will in general assistance others if the relationship of such a risk is less towards them. In the event that security is ensured, the end-customer will report the occurrence.

● No savage authorities in the response gathering If people won’t trust the experts, they are answering to makes it futile for someone to contribute time and tries”

Scholarly Abstract Assignment

 

Create a 1-2 page single-spaced Analysis of Research abstract published scholarly articles related to a topic you selected in 2.2. (topic  cybersecurity)

Brevity and being concise are important as this analysis is intended to be a brief summation of the research.

Each abstract must therefore consist of the following in this order:

1. Bibliographic Citation – use the correctly formatted APA style citation for the work as the title of your abstract, displaying the full citation in bold font.

2. Author Qualifications – name and qualification of each author conducting the research

3. Research Concern – one paragraph summary of the reason for the overall research topic

4. Research Purpose Statement AND Research Questions or Hypotheses – specific focus of the research

5. Precedent Literature – key literature used in proposing the needed research (not the full bibliography or reference list)

6. Research Methodology – description of the population, sample, and data gathering techniques used in the research

7. Instrumentation – description of the tools used to gather data (surveys, tests,interviews, etc.)

8. Findings – summation of what the research discovered and the types of analysis that were used to describe the findings (tables, figures, and statistical measures)

Additional information on writing scholarly abstracts can be found via this link

See completed example