Assignment

 

Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be include at least two references.

As you consider the reputation service and the needs of customers or individual consumers, as well as, perhaps, large organizations that are security conscious like our fictitious enterprise, Digital Diskus, what will be the expectations and requirements of the customers? Will consumers’ needs be different from those of enterprises? Who owns the data that is being served from the reputation service? In addition, what kinds of protections might a customer expect from other customers when accessing reputations?

It636week1

1.  Prepare a one page (minimum) paper on the use of Data Mining in the retail industry. You may use the internet for additional sources. Please double space your paper and cite your sources. 

2.  Prepare a one page paper on chapter 2, the Development of a Data Mining Study by briefly explaining the phases of a data mining project. You may use the internet for more information. Please double space your paper and cite your sources. 

discussion-1

 Write an essay on fractional ownership and it’s relation to cloud computing. Use at least one example from another industry .Provide cited sources.

Computer Science Jenkins

Hello,

I do have a small project of mine for automation. In general, I do have automation Framework and have Jenkins installed in Linux and I do have two nodes Win7 and Win10. Selenium Grid and Hub installed and running successfully.

I do have knowledge and skillset of using the automation project with Java,Maven,Selenium and Cucumber. I need someone’s help in configuring Jenkins for Maven project and connecting two node machines to it to run my small project of automation via GitLab trigger setup as well.

There is no requirement document, and I am looking for someone who can deliver quality of work and I can work things around in Tutor’s comfort zone. I am in EST, but I am looking for reasonable price. If tutor is from India and have some knowledge in especially Jenkins, Maven, Java, Selenium, Selenium Grid. Please don’t hesitate to contact me.

I am new in this platform. Looking for help 🙂

Apply Analytical CRM

  

Assignment Content

  1.     At this point you may have a sense of how companies are using CRM practices and systems as tools to increase success; your knowledge of using CRM technology to understand customers may be increasing. 

    This week, you explored how customer-related data can be transformed with analytics into more usable and accessible information.

    Assignment Instructions

    1. Review the Assignment Deliverables section below. You will need this information to pick an appropriate company from the Case Report Resources (below), University Library, or the Internet.
    2. Choose a company from the Case Report Resources, University Library, or the Internet that is appropriate for the assignment deliverables. Not all cases may provide all the explicit details you are seeking. You may need to assume information. Please make a note in your assignment indicating the information that is assumed.
    3. Imagine that you are an IS or IT manager for the company you chose. Write a case report with 700 to 1050 words that includes the requirements listed under Assignment Deliverables. 
    4. Assignment Deliverables
      Include the following:
    • Describe what the case is about, give the important elements of the history of the situation, and specify the key problem or issue of the case, e.g. what decision has to be made by which manager. This is your introduction
    • Discuss how the company can apply analytical CRM to transform customer-related data into actionable insight for either strategic or tactical purposes.
    • Analyze how the company did or can explore customer-related data.
    • Analyze how the company did or can explore a database integration.
    • Include the most important information from the case in your conclusion.
    • Include a reference to the case and cite the reference in APA format.

 

Case Report Resources 

Case Report Resources are success stories that customer companies have had with 3 popular CRM providers: 

Submit your assignment

PHP chatroom

I have a chat room page that I need help with. I have a login page that is supposed to take the users first and last name and on submit take them to the chat.html page. then when the user types a message it shows the users name above the message.

practical connection paper on cloud computing

Develop a paper describing how the knowledge, skills or theories of this course (cloud computing) have been applied or could be applied, in a practical manner to your current work environment as an IT consultant working for an organization of your choice.

(topics eg: understanding cloud comp types, cloud services models, saas, paas, iaas.

Requirements: 

Provide a 500-word (2 pages). 

APA format.

Computer Science- Dictionary Attack with and without Password Salt program

 PowerPoint of the Slides is attached below.

Check the slides “OS Security II,” pg. 4-8. You are to implement a Dictionary Attack with and without Password Salt program in either C/C++ or Python.

If you are not familiar with measuring execution time in C++, see the following website:

https://www.geeksforgeeks.org/measure-execution-time-function-cpp/

If you are not familiar with measuring execution time in Python, see the following website:

https://stackoverflow.com/questions/1557571/how-do-i-get-time-of-a-python-programs-execution

See the following steps.

1. Accept a user password of length N as keyboard input to your program. You can determine your own length N.

2. Compute the hash of the password from step 1.

Your hash function H() is simply the checksum. (See Assignment 2)

3. Now you become an attacker and try to find the password of length N.

Try every combination of length N password and for each combination, compute the hash and compare to the hash of the password from step 2.

Measure execution time.

4. Now let’s reinforce our password using the password salt. Accept an arbitrary non-negative integer number as keyboard input to your program.

5. Compute the hash of the concatenated password salt and password from step 4 and step 1. To compute the password salt portion of the checksum, you can treat the entire password salt as EITHER a single integer OR multiple one-byte integers.

6. Now you become an attacker and try to find the concatenated password salt and password.

Try every combination of an arbitrary non-negative integer number and length N password and for each combination, compute the hash and compare to the hash from step 5.

Measure execution time.

NOTE: your program should have separate functions for the checksum and the two dictionary attacks with and without the password salt by the attacker.

 Explain your program appropriately using comments the source code. 

Discussion 300 WORDS MINIMUM

 

One of the most important skills we learn as adults is information literacy and the ability to evaluate sources and recognize if these sources are accurate.

For this week’s forum, we are exploring websites that check information for bias, misinformation, and possible fake news misinformation. Go to the following websites and review the methodology they use to test information for accuracy.

After you have looked over these websites and reviewed the methodology of each website, please answer the following:

  • Which website do you find has the best way to review information for accuracy?
  • Do any of these websites have any gaps in their methodology?
  • Why is it important for everyone to be able to evaluate information?