Computation

 

Estudie las siguientes lesiones en GCFAprendeLibre (Informática Básica 1-20).

Prepare y suba un documento con las palabras de vocabulario y sus definiciones. Solo la palabra y la definición o descripción presentada en la lección.

Ejemplo:

Palabra o FraseDefinición o DescripciónTarjeta de vídeoProcesa toda la información que ves en el monitor. La mayoría de los equipos tienen una tarjeta integrada en la placa base en lugar de tener una tarjeta de video separada.

Lecciones: Informática Básica 1-20

Vocabulario:

Hardware
Software
Sistema operativo
Laptop
Desktop
Ratón
Monitor
USB drive
CPU
Tarjeta madre
RAM
Disco Duro

Discussion week

As the modern database grows bigger and bigger, many organizations are moving away from a relational store and looking towards NoSQL design. There is a desperate need to consider storage and file structure as part of physical design principles. If you were implementing a new database system for an ERP or CRM that required a minimum of 100 TB of storage per year, what would you consider as you plan your physical design?

Instructions

This is a required assignment, worth 15 points. The assignment must be submitted by the due date. Late assignment are not allowed. 

You are required to submit a minimum of two postings. Points will be deducted for not fulfilling this minimum requirement.

Apply and use the basic citation styles of APA is required. Points are deducted per the rubric for this behavior.

Do not claim credit for the words, ideas, and concepts of others. Use in-text citation and list the reference of your supporting source following APA’s style and formatting. Points are deducted per the rubric for this behavior.

Do not copy and paste information or concepts from the Internet and claim that is your work. It will be considered Plagiarism and you will receive zero for your work. A second offense results in a zero for the course. A third is termination from the university.

Discussion: Security Breach Evaluation

 

Learning Objectives and Outcomes

  • Analyze the given case study on security breach.
  • Recommend controls to avoid an enterprise security breach.

Assignment Requirements

Read the attached text sheet named “Local Breach of Sensitive Online Data” and address the following:

Using what you have learned about security breaches, describe what measures should have been taken by the educational service and test preparation provider to avoid the security breach mentioned in the text sheet.

Operating System (Computer Science)

You need to have set up your Class DevBox Environment (see the Getting Started section) before starting this assignment.

The assignment description is attached and is also available in your repository subdirectory named assg03. Follow the assignment instructions and submit the required tar.gz submission file to this MyLeoOnline dropbox by the due date. You should only submit the assg03.tar.gz for this assignment, no other files should be submitted. Use the make submit target to create the correct submission file:

$ make submit

For this assignment you should have git, vagrant and virtual box setup in your computer. Please visit the following link provided by my professor for these setup.

https://bitbucket.org/dharter/csci430-os-sims

And the assignment is attached below.

Discussion

 After reading chapter 4, evaluate the history of the Data Encryption Standard (DES) and then how it has transformed cryptography with the advancement of triple DES.  The initial post must be completed by Thursday at 11:59 eastern.  You are also required to post a response to a minimum of two other students in the class by the end of the week.  You must use at least one scholarly resource.  Every discussion posting must be properly APA formatted. 

P_Task

  

Demonstrate how BUSINESS INTELLIGENCE course has connected and put into practice within the career as software developer(UI Developer)

Assignment: Share a personal connection that identifies the specific knowledge, skills, or theories of BUSINESS INTELLIGENCE course has connected and  demonstrate how this course have been applied, in a practical manner to your current work environment or workplace as software Developer(UI Developer).

Requirements:

Provide a 500 word (or 2 pages double spaced). proper APA formatting, at least 2 references and in-text citations. If supporting evidence from outside resources is used those must be properly cited. 

Plain View Doctrine

 Describe the plain view doctrine, and why it has such a significant impact on digital forensics? What are three approaches to determining whether the doctrine applies to a specific case?Need in a word document with no less than 250 words. 

Discrete Probability Distributions (Binomial)

An archer hits a bull’s-eye with a probability of 0.09, and the results of different attempts can be taken to be independent of each other. If the archer shoots nine arrows, calculate the probability that: (a) Exactly two arrows score bull’s-eyes. (b) At least two arrows score bull’s-eyes. What is the expected number of bull’s-eyes scored?

IP WK7

 

Q1. Provide a Reflection on the  Chapter 7: Scope Planning. Identify what you thought was the most important concept(s), method(s), term(s), and/or any other thing that you felt was worthy of your understanding.  200 words

Also, provide a graduate-level response to each of the following questions:

Q2. The sponsor for a project you have been managing sends you an email that he would like to make a small change to the project.  What is your response and why? 175 words

 

Q3. A potential client wants you to be project manager for the construction of a new house, but she is vague about the details.  List a few questions you could ask her to gain a better understanding of the scope of the project. 175 words

Q4. Problem set:  Use the template attached . Instructions for this exercise are provided within the attached exercise template.  200words