article

 

Using search engines,  find one (1) recent PEER REVIEWED ACADEMIC ARTICLE involving the use of databases in business. Describe the role of “databases” in the text using your own words. Here is an example of an article citation as I would expect to see it in your write up. The writeup for your citation should be at least one paragraph long (7-9 sentences). 

Source Example:

Ekren, G., & Erkollar, A. (2020). The Potential and Capabilities of NoSQL Databases for ERP Systems. In Advanced MIS and Digital Transformation for Increased Creativity and Innovation in Business (pp. 147-168). IGI Global.

 

  • Your entry on Blackboard should equal about 1-2  pages in length, double spaced, 12 point font Times New Roman.
  • Your paper must contain a UNIQUE topic (see example above). 
  • Your paper must contain a MINIMUM of three unique academic journal articles and research sources. Blogs, Wikis, and Online News Sources will NOT be accepted. 
  • You must cite all references using APA and apply APA Style throughout the entire paper. 10% of your grade is based on APA Style.
  • You must spell check / grammar check your paper. 10% of your grade is based on following this criteria. 

One Page outline of a Term Paper on are there any loopholes in the IT ACT 2000?

 Submit a one page outline with your proposed term paper title, thesis statement, and an outline of the subtopics you will cover in your paper. The term paper details are listed below. ALL TOPICS MUST BE APPROVED. A FAILURE TO HAVE THE TOPIC APPROVED WILL RESULT IN A ZERO GRADE FOR THE TERM PAPER OUTLINE AND THE TERM PAPER. You can send a message with the topic for approval.

This project provides you with the opportunity to increase and demonstrate your understanding of cyberlaw theory and practice. You will need to choose a law(s) that you are interested in researching. The paper must be 4-6 pages in length detailing the below questions. Before completing the below steps, please make sure that the topic is approved.

1. Thesis: What law are you researching (You are to choose a specific law. Please do not choose a topic)? What position do you want to take in regard to your chosen law? You will need to decide if you agree or disagree with the current way the law is written. You can choose to like certain aspects of the law and not others.

2. Background: What is the existing point you want to challenge or support, and how did the law get to be that way (This is where you would need to find cases, background information, etc.)?

3. Inadequacies: What are the deficiencies in the present way of doing things, or what are the weaknesses in the argument you are attacking?

4. Adequacies: Discuss the positive aspects of the law?

5. Proposed Changes: How will we have a better situation, mode of understanding or clarity with what you are advocating? In short, how can the law be improved (or not diminished)? (This is where you have the chance to change the law with your own ideas of how it should be written).

6). Conclusion: Why should and how can your proposal be adopted?

A detailed implementation plan is NOT expected, but you should provide enough specifics for practical follow-up. In making recommendations, you are expected to draw on theories, concepts, and reading 

Use the information below to help with the outline for the term paper

 Are there any loopholes in the IT ACT 2000?

Yes, there are many weaknesses and loopholes revolving around Information Technology Act, 2000 even after the 2008 amendments. They are as follows:

  1. ITA 2000 does not deal with Proper Intellectual Property Protection for Electronic Information and Data. Contentious yet very important issues concerning online copyrights, trademarks, and patents have been left unnoticed by the law, thereby leaving many loopholes.
  2. It does not pay any heed to Domain Name related issues. It does not deal with the rights and liabilities of domain name holders.
  3. It does not cover various evolving forms and manifestations of cybercrimes such as:
  • Cyber theft;
  • Cyberstalking;
  • Cyber harassment;
  • Cyber defamation;
  • Cyber fraud;
  • Chat room abuses;
  • Misuse of credit card numbers.

4. It does not touch upon antitrust issues.

5. It is not explicit about the regulations of electronic payments.

And the biggest flaw is the improper implementation of the cyber laws as the police stations are not well equipped with the required technology and technical skills associated with them.

cc-10

 
Describe in 500 words discuss the scope of a cloud computing audit for your business. 

ns-12-p

  • 12.1 List three design goals for a firewall.
  • 12.2 List four techniques used by firewalls to control access and enforce a security policy.
  • 12.3 What information is used by a typical packet filtering firewall?
  • 12.4 What are some weaknesses of a packet filtering firewall?
  • 12.5 What is the difference between a packet filtering firewall and a stateful inspection firewall?
  • 12.6 What is an application-level gateway?
  • 12.7 What is a circuit-level gateway?
  • 12.9 What are the common characteristics of a bastion host?
  • 12.10 Why is it useful to have host-based firewalls?
  • 12.11 What is a DMZ network and what types of systems would you expect to find on such networks?
  • 12.12 What is the difference between an internal and an external firewall?

Legislated Privacy concerns

 

Go to the website: https://epic.org/privacy/litigation/ which focuses on civil rights issues and privacy. Pick a case.

Using WORD, in your OWN WORDS, write an ORIGINAL brief essay of 300 words or more  :

  • Summarize the case
  • Give your opinion of the decision.
  • Describe how the case deals with the material in this chapter

Object oriented with java

 

This assignment is for you to gain hands-on experiences of our weekly (week 9) covered topics including Queue, Heap, and Priority Queue. In this assignment, you need to write Java programs that meet the following requirements:

=== Basic Requirements (100 ‘pts) ===

1) (50 ‘pts) Implement a MyQueue class that supports the following interfaces within O(1) time:

1.1) int size(); //return the total number of stored elements
1.2) boolean isEmpty(); //return if the queue is empty
1.3) void offer(E val); //enqueue an element val for generic type E
1.4) E poll(); //remove head and return the removed value, return null if isEmpty()
1.5) E peek(); //return head, return null if isEmpty()

2) (50 ‘pts) Based on our class demonstration of MinHeap implementation, write a MaxHeap class that at least supports all the queue interfaces stated above as in 1).

=== Bonus (20 ‘pts) ===

a) (10 ‘pts) In the above requirement 2) MaxHeap, can you implement a class method: heapify(E[] arr) that takes in an array input, and transfer that array into a max heap?

b) (10 ‘pts) Inspired by the above practices, now revisite Leetcode 912. Sort An Array, this time use heap sort to conquer this coding challenge. Make sure your submission passes all Leetcode test cases. 

dmdis1

 

  • Using search engines and find two different recent articles involving data mining. Describe the role of “data mining” in the story using your own words.

Based on this weeks lectures take an inventory of door and window locks in your living area or place of work to identify areas of concern and improvement. Remember to get permission from security.

 Please download the Assignment 3 Door and Window Lock Assessment  template (MS Word), which is already in APA 7 format, using size 12  Times New Roman font, 1-inch margins, TOC, Headings and Reference page.  If you insert images or tables in your report make sure you label them  appropriately according to APA. Once completed name your file:  YourName_Assignment_3_Door_and _Window_Lock_Assessment.docx and submit  to the appropriate assignment folder. Also review any additional files  attached for more information.   

1 Discussion Case Study And Lab work

Discussion 6.1

Compare and contrast simple random sampling and systematic sampling. List the strengths and weaknesses of each concept.

Discussion ( 150 words Excluding the references)

Case Study 6.1  – Full 3 Pages In length excluding References.

  • Read the following Case Study
    Case 8.3 Delivery Times at Snow Pea Restaurant
  • Write a summary analysis and answer the questions. 

Writing Requirements

  • 3 pages in length  (excluding cover page, abstract, and reference list)
  • APA format, Use the APA template located in the Student Resource Center to complete the assignment.
  • Please use the Case Study Guide as a reference point for writing your case study.

Lab 5

Complete the following problems by Thursday

Chapter 7 

C8 and C9 -PAGE NUMBER 321

Chapter 8 –

Problem #35 – PAGE Number 360

the assignment must be an APA formatted paper with embedded excel files

Lab work Should be in word Documents with clear explanation and References with Excel file screen shots in word document……