week 6

minimum 500 words 

Blockchain Technology

What are the implications for Basic Attention Token” (BAT) and Blockstack relative to global marketing?

Encryption Methodologies to Protect an Organization’s Data Paper

 

Assignment Content

  1. Companies are susceptible to losing customer data to cyber-attackers and human errors, so organizations must properly protect their data and network. 

    In this assignment, you will create an Encryption Policy for CIO review. Use the organization you chose in the discussion Classifying an Organization’s Sensitive Data.

    Write a 2- to 2½-page policy, and ensure you:

    • List the organization’s sensitive data that must be protected.
    • Complete a matrix that compares the asymmetric and symmetric encryption methodologies (PKI, TLS, SSL) for protecting data within the network.
    • Describe at least 2 primary threats that could compromise the organization’s data.
    • Describe how the encryption methodologies thats hould be implemented to protect the organization’s sensitive data.
    • Format your citations according to APA guidelines.

re: questions

1. Explain and describe 5 data cleansing techniques involved in data transformation during the data visualization projects. 500 words

2.  What is the difference between discrete and continuous variables? 100 words

3. There are many data collection processes or methods involved in a data visualization project.  Identify five and explain in no more than a paragraph.100 words

4.  Why assessing the data type and size are critical when examining the data during a data visualization project?100 words

5. Date values could be erroneous.  Explain  some common errors you may see with bad date values100 words

6. A common statistical approach to data visualization is univariate.  Explain. 100 words

Business Intelligence week 3

Discussion: I have attached the pdf question which has all the details for discussion

Knowledge and skills paper: Attached the question image.

Please refer to attachments and let me know if u have any questions

Discussion

Compare and contrast the difference of network security within an on-premise environment and a cloud environment. Give some examples of areas that are common and areas that are different.

Why are firewalls so important within an IT environment? What are the different firewalls and are all types still in use today?

List three network threats and list the IT infrastructure domain that the threat may harm. Why/How does those threats harm that particular domain?

Convert the following C++ program into an x86 assembly language program. Make sure to use your “Chapter 8” understanding of advanced functions, parameter passing, and local variables. Post ONLY your ASM file here to Blackboard when complete

 #include

using namespace std;

int IsSemifauxtrifactored(int value)
{
    // Return 1 if a number’s factors/divisors from (value – 1) to 1 sum up to a quarter of the number value
    // Return 0 otherwise

    // A number is called “semifauxtrifactored” if its summed factors/divisors equal a quarter of the number itself
    // Integer division is used, so remainders on the halving can be lost
    // That’s why…

    // 7 is a semifauxtrifactored number
    // 7 divided by 4 with integer division is (7 / 4) = 1
    // 7 % 6 -> 1
    // 7 % 5 -> 2
    // 7 % 4 -> 3
    // 7 % 3 -> 1  
    // 7 % 2 -> 1  
    // 7 % 1 -> 0   FACTOR!
    // 7 is a semifauxtrifactored number since its factors (1) equal a quarter of the number (1)

    // 6 is a normal number
    // 6 divided by 4 with integer division is (6 / 4) = 1
    // 6 % 5 -> 1
    // 6 % 4 -> 2
    // 6 % 3 -> 0   FACTOR!
    // 6 % 2 -> 0   FACTOR!  
    // 6 % 1 -> 0   FACTOR!
    // 6 is a normal number since its factors (1 + 2 + 3) do not equal a quarter of the number (1)
}

int main()
{
    cout << "Enter a value: ";
    int value;
    cin >> value;
    value = IsSemifauxtrifactored(value);
    if (value == 1)
    {
 cout << "The number is semifauxtrifactored!";
    }
    else
    {
 cout << "The number is normal";
    }

    cout << endl;
    system(“PAUSE”);
} 

comparison outline

 

Software engineering tools for soft computing: MATLAB, R Tool and DTREG.  Comparison should focus on how they are able to model neural networks.  Also, pick criteria that compares things they all have in common. 

PS: The outline should look like the sample attached

DS-2

Write an essay discussing sqlmap, an automated tool for sql injection and database takeover in 500 words or more. Why do we need an automated tool for sql injection? 

Do not copy without providing proper attribution. This paper will be evaluated through SafeAssign. 

Write in essay format not in outline, bulleted, numbered or other list format.  

Use the five paragraph format. Each paragraph must have at least five sentences. 

Include an interesting meaningful title.

Include at least one quote from each of 3 different articles. Use the Research Databases available from the Danforth Library, not Google.    P lace the words you copied (do not alter or paraphrase the words) in quotation marks and cite in-line (as all work copied from another should be handled). The quotes should be one  full sentence (no more, no less) and should be incorporated in your discussion (they do not replace your discussion) to illustrate or emphasize your ideas. Each quote must be cited in-line and at the end.