EH week8 P8

 

Hello,

i need this paper by 10/14 afternoon.

Strictly No plagiarism please use your own words.

Locate an article on a system breach (Target stores, Sony Pictures, US Government, and many more).In 3-4 paragraphs, briefly explain the situation and what kind of information was compromised. How large was the breach and how long did it take to find the problem. Include a link to any of your Internet resources.

Make sure Strictly No plagiarism content should not match and even the reference should not match in plagiarism 

Management Information Systems6

 

Product Idea and Search Engines/Electronic Marketing

After reviewing the assigned reading materials, complete the following activities:

1.  Develop a product service idea.

A. Describe the product/service including the benefits of using the product/service

B. Discuss the potential customers for this product/service

2.  Based on the nature of the product/service, recommend at least 3 possible ways to market the product electronically. Your suggestions must include at least one search engine. Describe your recommendations and discuss the advantages and disadvantages of each

Cyber security Managment

 

Answer each these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.

1. what do each of these terms refer to: copyright, patent, trademark, trade secret?

2. Why is intellectual property entitled to legal protection? 

3. Why did copyright laws become stricter and more punishing in the late 20th century?

4. What is the Fair Use doctrine?

5. Make an argument for legalizing the copying of music or software. 

6. Do I or don’t I own the books on my Kindle? If I own them, why can’t I transfer them? If I don’t own them, what is my legal right to them?

7. What was the 1984 Sony Supreme Court case about?

8. Was Napster responsible for the actions of its users?

9. Why did the court find in favor of Diamond in the Rio case? 

10. What is Digital Rights Management?

Python challenge 2

  • In this challenge, you are tasked with helping a small, rural town modernize its vote counting process.
  • You will be give a set of poll data called election_data.csv. The dataset is composed of three columns: Voter ID, County, and Candidate. Your task is to create a Python script that analyzes the votes and calculates each of the following:
    • The total number of votes cast
    • A complete list of candidates who received votes
    • The percentage of votes each candidate won
    • The total number of votes each candidate won
    • The winner of the election based on popular vote.
  • As an example, your analysis should look similar to the one below:
    Election Results ------------------------- Total Votes: 3521001 ------------------------- Khan: 63.000% (2218231) Correy: 20.000% (704200) Li: 14.000% (492940) O'Tooley: 3.000% (105630) ------------------------- Winner: Khan ------------------------- 
  • In addition, your final script should both print the analysis to the terminal and export a text file with the results.

RESEARCH PAPER USING organization that has leveraged Cloud Computing technologies in an attempt to improve profitability or to give them a competitive advantage.

For this project, select an organization that has leveraged Cloud Computing technologies in an attempt to improve profitability or to give them a competitive advantage.  Research the organization to understand the challenges that they faced and how they intended to use Cloud Computing to overcome their challenges.  The paper should include the following sections each called out with a header. 
• Company Overview:  The section should include the company name, the industry they are in and a general overview of the organization. 
• Challenges: Discuss the challenges the organization had that limited their profitability and/or competitiveness and how they planned to leverage Cloud Computing to overcome their challenges. 
• Solution:  Describe the organization’s Cloud Computing implementation and the benefits they realized from the implementation.  What was the result of implementing Cloud Computing?  Did they meet their objectives for fall short? 
• Conclusion:  Summarize the most important ideas from the paper and also make recommendations or how they might have achieved even greater success.

Requirements:

The paper must adhere to APA guidelines including Title and Reference pages.  There should be at least three scholarly sources listed on the reference page.  Each source should be cited in the body of the paper to give credit where due.  Per APA, the paper should use a 12-point Time New Roman font, should be double spaced throughout, and the first sentence of each paragraph should be indented .5 inches.  The body of the paper should be 3 – 5 pages in length.  The Title and Reference pages do not count towards the page count requirements.

Discussion and Assignment

Discussion

 

  1. Discuss what power in the context of leadership is and how it relates to bullying within organizations.  Also note how this impacts productivity.
  2. Discuss what organizational culture is and how it impacts work productivity.  Also, note how organizational culture impacts the success of innovation implementation.
  3. How does culture impact leadership? Can culture be seen as a constraint on leadership?

Assignment

 

  1. Provide a high-level overview/ summary of the case study
  2. Note how constructive intentionality impacts innovation implementations
  3. Find another article that adds to the overall findings of the case and note how attribution-based perspective enhances successful innovation implementations.  Please be explicit and detailed in answering this question.

computer

 

  1. How does the logical topology differ from the physical topology?
  2. What advantages of the logical star topology have as compared to the logical bus topology?
  3. What is the OSI model? Why is it important for understanding networking?
  4. What is the difference between connectionless and connection-oriented services?
  5. How does TCP differ from UDP?
  6. How does SSH differ from Telnet? How does HTTPS differ from HTTP?
  7. Why are wires twisted together in twisted pair cables?
  8. You have an installation that requires Cat 5 cabling. Which cable ratings could you use for the installation?
  9. Is twisted pair cable more immune to EMI than coaxial cable?
  10. What advantages do fiber optic cables offer over twisted pair cables and other media choices? What are the disadvantages of implementing fiber optic cables?
  11. What is the difference between single-mode and multimode cables?

 Think about how you use a computer.  Could you use Linux instead of Windows or MAC OS as your primary OS? Other than personal preference, explain why you can or cannot. 

Paper 7

 

Paper Section 1: Reflection and Literature Review

Using Microsoft Word and Professional APA format, prepare a professional written paper supported with three sources of research that details what you have learned from chapters 13 and 14.  This section of the paper should be a minimum of two pages. 

Paper Section 2:  Applied Learning Exercises

In this section of the professional paper, apply what you have learned from chapters 13 and 14 to descriptively address and answer the problems below.  Important Note:  Dot not type the actual written problems within the paper itself.

  1. Go to cloudera.com, MapR.com, hortonworks.com, or marklogic.com or in combination to find at least three customer case studies on Hadoop implementation, and then discuss the commonalities and differences of these cases.
  2. Search the job search sites like monster.com, careerbuilder.com, and so forth. Find at least five job postings for data scientist. Identify the key characteristics and skills expected from the applicants and based on what you are learned in this class, how high is your motivation now to seek these types of career choices?
  3. Important Note:  With limited time for a college class, perfection is not expected but effort to be exposed to various tools with attempts to learn about them is critical when considering a career in information technology associated disciplines.

Important Note:  There is no specific page requirement for this section of the paper but make sure any content provided fully addresses each problem.

Paper Section 3:  Conclusions (Part 1)

After addressing the problems, conclude your paper with details on how you will use this knowledge and skills to support your professional and or academic goals. This section of the paper should be around one page including a custom and original process flow or flow diagram to visually represent how you will apply this knowledge going forward.  This customized and original flow process flow or flow diagram can be created using the “Smart Art” tools in Microsoft Word.

Paper Section 4:  Overall Course Conclusions and Reflection (Part 2)

After the primary conclusion of this paper, extend this conclusion into an overall class conclusion and reflection providing at least 500 additional words of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current or future work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.

Paper Section 5:  APA Reference Page

The three or more sources of research used to support this overall paper should be included in proper APA format in the final section of the paper.

802.11x phones with a cellular system

 

The CEO of your selected industry has asked you to explore the possibility of replacing the wireless 802.11x phones with a cellular system. Explain the security program described, the differences in core architecture between different generations of cellular and mobile network technologies, the end-to-end delivery of a packet and/or signal, and what happens with the hand-off at each step along the communications path to the CEO.

Overview detailing the following:

  1. Various smartphone generations and technologies (e.g., GSM, WCDMA, CDMA2000, LTE).
  2. Recommendation for embedded smartphone operating systems (e.g., iOS, Android).
  3. Changes to existing networking infrastructure.
  4. Implementation of mobile protocols, logical channels, and encryption standards.
  5. Using mobile-unique identifiers and location-based services to track device and data input validation.

Your recommendations should cover the feasibility of using cellular systems to enter secure data into proposed databases.