DS dis-10

Discuss the advances in Neural Networks and how ANN, CNN work to classify image datasets more effectively. 

 

write in 500 words use APA format.  

Everything in APA format.

On time Delivery 

Plagiarism free.

Database management system

  

Given the relational model below, using your ADU ID and SQL statements.

List all your courses of the last term [0.5 pt.]

List the instructors’ names of these courses in descending order [0.5 pt.]

List all courses of the last term that have no prerequisite [0.5 pt.]

List all courses of the last term with grade above ‘C’ [0.5 pt.]

Determine the CSIT department of the last term courses [1 pt.]

Define the courses of the last term that have more than one section [1 pt.]

Display the sections of the courses above that are offered in your location (‘Abu Dhabi’ or ‘Al-Ain’) [1 pt.]

Please attach your last semester schedule details for crosschecking. 

Discussion

 

In 250 words or more, please answer the following. Include references and citations when/if applicable 

  1. What enterprise resource planning (ERP) systems are in use by your company? 
  2. What modules are in use in each ERP?
  3. How did the company justify more than one ERP, if applicable?

Discussion 66

 

Murder Case

Preamble

An organization system administrator was labeled as the key suspect in a homicide case. The accused claimed that he was at work at the time of the murder. 

Police Intervention

The police asked his employer to help them verify his alibi. Unpredictably, the same organization, occasionally trained law enforcement personnel to investigate computer crimes and was eager to help in the investigation. 

Collaborative Strength: 

The organization worked with police to assemble an investigative team, seized the suspect computers in his office and residence, and backup tapes on a file server managed by his employer. All of these evidence were stored in a room to where only members of the team had access. 

Harsh Situation

At the initial stages, the operation appeared reasonably well documented, but the reconstruction process was a disaster. The investigators made so many omissions and mistakes that one computer expert when reading the investigator’s logs, suggested that the fundamental mistake was that the investigators locked all of the smart people out of the room. The investigators, in this case, were unaware of the situation and unwilling to admit the slip-up.

As a result of the investigators’ omissions and mistakes, the suspect’s alibi could not work together. Digital evidence to support the suspect’s alibi was identify later but not by the investigators. If the investigators had sought expert assistance to deal with a large amount of digital evidence, they might have quickly confirmed the suspect’s alibi rather than putting him through years of investigation and leaving the murderer to go free.

Lesson Learned

  • The case amplifies forensic investigators’ requirements to obtain fundamental knowledge of computers, compatible operating systems, and application software programs.
  • Forewarning forensic investigators to seek the assistance of the system administrator during the criminal investigation. 

Scenario 

  • You have been retained as a Deputy Technology officer at the University and charged with the responsibility of developing an Acceptable User Policy for the department of computer science based on this murder case.
  • Question 1
  • Use the AUP to amplify the advantages and disadvantages of investigators’ quarterly training on most currently used operating systems such as Microsoft Windows, Macintosh, UNIX, Linux, Sun System, and more. 

Scenario 2

  • The investigators, in this case, were unaware of the situation and unwilling to admit the slip-up. As a result of such omissions and mistakes, the suspect’s alibi could not work together. Digital evidence to support the suspect’s alibi was identify later but not by the investigators. If the investigators had sought expert assistance to deal with a large amount of digital evidence, they might have quickly confirmed the suspect’s alibi rather than putting him through years of investigation and leaving the murderer to go free.
  • Question 2 “Investigators allowed the Murderer to go free.”

2:1. Defend the impasse of the investigator’s unwillingness to admit the slip-up?

2:2 Use the Acceptable User Policy to amplify why the murderer was allowed to go free and penalties for violations.

USE The Following attached file, called Technology Acceptable User Plolycy

Cyber Security

 The answer will be checked for plagiarism. 

  1. Discuss OSINT, how it works, and its role in the realm of social engineering.
  2. Why is it difficult to detect fileless malware on a traditional anti-virus tool? Explain.
  3. What are the major ingredients which you would consider if you have been 
    tasked to develop an incident response (IR) plan from the scratch?
  4. What is Cyber Threat Intelligence (CTI)? Explain the difference between Cyber Threat Intelligence and Cyber Intelligence.
  5. What is SCDA security and what are the biggest security/risk concerns of these systems?

 The answer will be checked for plagiarism.

 

coso

 

The COSO framework of internal controls is practiced within companies around the world. The objectives of the COSO framework are closely related to its five components. For this week’s activity, please discuss these five components of the COSO framework. Be sure to include each components’ impact on each of the COSO framework objectives. What do you feel an auditor would most be concerned with during an IT audit? Lastly, discuss suggestions for integrating COSO framework compliance into a company in which you are familiar. 

Your paper should meet the following requirements:

• Be approximately 2-4 pages in length, not including the required cover page and reference page.

• Follow APA6 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations,

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Infotech Importance in Strategic planning

 If you have you been involved with a company doing a redesign of business processes, discuss what went right during the redesign and what went wrong from your perspective. Additionally, provide a discussion on what could have been done better to minimize the risk of failure. If you have not yet been involved with a business process redesign, research a company that has recently completed one and discuss what went wrong, what went right, and how the company could have done a better job minimizing the risk of failure. 

AD

Explain three different ways that freedom of expression is limited in spite of the unequivocal language of the First Amendment.
Explain how common law state court rulings prompted Congress to pass the Communications Decency Act. What does the CDA do?
What constitutional and statutory protections of privacy existed before the Internet became prevalent?