Cyber Law

 Research frequency-division multiplexing. Identify three everyday examples of FDM use. For each of these examples show how FDM is used and it works. Summarize your findings in a brief paper. 

Instructions:

 In these writing assignments, there is not a “right or wrong” answer. Rather, cases provide a vehicle for you to demonstrate your understanding and ability to apply course concepts. You must use at least two appropriate sources (other than your course textbook) that are properly cited; do not solely use the case itself to support your position. You are strongly encouraged to use the following outline so that your analysis is organized appropriately:

  • Identify both the key issues and the underlying issues. In identifying the issues, you should be able to connect them to the principles which apply to this situation.
  • Discuss the facts which affect these issues. The case may have too much information. In your discussion, you should filter the information and discuss those facts which are pertinent to the issues identified above.
  • Discuss your proposed solution/recommendation to the problem and include how you would implement it. What actions would you propose to correct the situation, based on the knowledge you have gained in this course? Be sure to support your recommendation by citing references in the text and in the supplementary readings. You should also draw on other references such as business periodicals and journals. Remember that an ANALYSIS is more than simply a SUMMARY of the Writing Assignment.
  • Discuss follow-up and contingency plans (if necessary). How will the organization know that your proposed solution is working? What should they do if it does not work?
  • Word count is 400 words, not including references and figures. References should be in the APA style. 

practical connection

it is a priority that students are provided with strong educational programs and courses that allow them to be servant-leaders in their disciplines and communities, linking research with practice and knowledge with ethical decision-making.

This Practical assignment is a written assignment where students will demonstrate how this course research has connected and put into practice within their own career. Assignment: (you have 2 weeks to complete this assignment)

Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment.

If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Requirements:Provide a 500 word (or 2 pages double spaced) minimum reflection.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

Share a personal connection that identifies specific knowledge and theories from this course.

Demonstrate a connection to your current work environment.

If you are not employed, demonstrate a connection to your desired work environment. 

You should NOT, provide an overview of the assignments assigned in the course.

The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.

For example, you have already reviewed many valuable concepts.  I have listed the chapters that we have already covered in the last 5 weeks.  How will these concepts help you in the future with your career?  

Also, review the objectives of this course in our syllabus. For example, explain the basic concepts of data mining?  How can you apply this knowledge?  

Interm1

  For the final project, you will be conducting a forensics investigation using one of the following items:

  1. A smartphone
  2. A network (ideally, a wireless network)

 You may use either for your investigation. However, be aware of legal issues surrounding your data gathering. If you are using any system you do not personally control and have authority to investigate/discover, please get written permission from the owner/operator of the system or refrain from your forensics analysis of that systems and use a personal system. For a network, you can use your own personal home network. For a smartphone, consider using an image from the Internet or a personal device. There could be issues related to using a live, active, personal device (example: corruption of the device). If using a personal device, consider using an old, outdated phone, if available. You will review various forensics tools used with your selected system. Select a tool and use that tool to gather forensics data for analysis. You are simulating the process of gathering this data, so you do not need to investigate a compromised device or system. The project deliverables are as follows:Week 3 – Prepare a two-page paper (double-spaced) that describes the device or system you will investigate and the intended tool you plan to use to conduct your forensics investigation. The interim paper should be in the form of an Executive Summary. Be sure to provide references in APA format. 

discussion

 

search for a recent article on data mining. 

Describe the role of a data mining in that article in your own words.

Give specific examples of how techniques like classification and clustering has been applied in that particular case study.

IS331 COMPUTER NETWORKING

                                                                      TERM PAPER

                                                                       TOPIC: EIGRP (Enhanced Interior Gateway Routing Protocol)

 

The term paper for this class is worth 200 points, and it requires you to do a research and write a 2500 word paper describing one of the following TCP/IP routing protocols, RIPv2, OSPF or EIGRP. The paper will include the following:

  • The paper must have a distinct and well written Introduction, Supporting Body and Conclusion;
    • In the body include the following
      • The history of the protocol chosen;
      • The programmable parameters of the protocol and how they affect traffic flow;
      • The major differences between the routing protocol chosen and the others that were not chosen;
      • How the chosen protocol can be used in a modern day routed network environment.

THAT IS TEN PAGES IN DOUBLE SPACE EXCLUDING WORKS CITED AND NO PLAGIARISM. THE INSTRUCTIONS FOR THE ASSIGNMENT EMBEDDED IN THE UPLOAD FILE.

homework computer

File submission: Word processor document creation lab

 

Objective of the activity

Through this activity the student will reinforce the concepts and skills learned in the module

Instructions

The academic goal of this assignment is to apply the skills learned in the previous module

What are we going to do?

In this activity the students will practice the use of templates and text editing

How are we going to do the job?

Download the Welcome to Word template. Preview the document

Then follow the instructions in the document. Save it with the name Welcome to Word_your name. For example: Welcome to Word_Maria Oliveros

Upload your work to the platform.

If you have any doubts about how to do the job, go through the material in the textbook, the tutorials and the simulations given.

Deliverable

The activity is individual. The work must be delivered on time, without spelling or grammatical errors. The works will be submitted to the tool to detect similarity of content (now Urkund). Submit the answers in a Word document, Times New Roman, size 12. You must include the references in APA format, three years old or less.

Basic review resources

Microsoft. (2018). Word for Windows Training. Retrieved from https://support.office.com/es-es/article/word-for-windows-training-7bcd85e6-2c3d-4c3c-a2a5-5ed8847eae73 (Links to an external site.)

Supplemental Review Resource

Hoisington, C., Freund, S., Vermaat, M., Pratt, P. J.,. Last, M. Z., Schmieder, E., Sebok, S. L., Starks, J. (2016). Shelly Cashman series Microsoft Office 365 & Office 2016: Introductory. Cengage.

cmgt-410

 

One of the most important documents in a project is the kickoff presentation. Because this document formally begins, or “kicks off,” project development, it can only be created after the project has been planned, approvals have been obtained, and personnel are in place. A good kickoff presentation communicates succinctly to all attendees what needs to be accomplished to complete the project, in what order, and by whom. It sets expectations and, ideally, energizes project team members. The desired outcome of a project kickoff presentation is for team members to begin tackling the first defined project tasks and know whom to contact if they encounter delays. 

For this assignment, you will create a kickoff presentation in Microsoft® PowerPoint® based on the draft project plan you created in the Week 1 Project Plan Draft individual assignment. 

To complete this assignment:

Review the “Kickoff Presentation” section in Ch. 9, “Communication; Project Communication Strategy; from Project Kickoff to Daily Meetings,” of The Complete Software Project Manager: Mastering Technology from Planning to Launch and Beyond. 

Create an 8- to 9-slide project kickoff presentation in Microsoft® PowerPoint® similar to this Project Kickoff sample template. The kickoff presentation you create should include details pertaining to the project you defined in the Week 1 Project Plan Draft assignment, including budget details as appropriate. Specifically, your presentation should include:

  • A high-level project definition
  • Business case (a description of the business problem/opportunity the plan is designed to solve/exploit)
  • Project approach
  • Description of team members and roles
  • Project scope
  • Out of scope
  • Timeline
  • Budget and budget reporting
  • Risks, cautions, and disclaimers 

BI-2

1.Go to teradatauniversitynetwork.com and find the paper titled “Data Warehousing supports corporate Strategy at First American Corporation” (by Watson, Wixom, and Goodhue). Read the paper and answer the  following questions:
(a) What were the drivers for DW/BI project in the company?

(b) What Strategic advantages were realized?

(c) What operational and tactical advantages were achieved?

(d) What were the critical success factors for the implementation?

2. Go to http://analytics-magazine.org/issues/digital-editions and find the jamuary/february 202 edition titled “Special Issue: The future of Healthcare” Read the article “Predictive Analytics- Saving lives and lowering medical bills” Answer the following questions:
(a) what problem is being addressed by applying predictive analytics?

3. Find information about IBM watsons activities in the healthcare field.write report.( (limit to one page of analysis for this part 3 question )

Total of 2-3 pages

be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations)