I have two quetions please go through below

1)

 

This week’s journal articles focus on empowering leadership and effective collaboration in geographically dispersed teams, please answer the following questions:

  1. How do geographically dispersed teams collaborate effectively?
  2. Please find at least three tools on the market that teams can use to collaborate on a geographically dispersed team.  Please note the pros and cons of each tool. 
  3. Based on the research above, note which tool you would select if you were managing the geographically dispersed team and why.

Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research.  Please be sure that journal articles are peer-reviewed and are published within the last five years.

The paper should meet the following requirements:

  • 3-5 pages in length (not including title page or references)
  • APA guidelines must be followed.  The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.
  • A minimum of five peer-reviewed journal articles.

The writing should be clear and concise.  Headings should be used to transition thoughts.  Don’t forget that the grade also includes the quality of writing.

2) Choose any two questions  Discussions Initial post (goal: by Weds) + 2 responses (100-300 words). 

 Discussion #1: What is an artificial neural network and for what types of problems can it be used? Discussion #2: Compare artificial and biological neural networks. What aspects of biological networks are not mimicked by artificial ones? What aspects are similar?

 Discussion #3: What are the most common ANN architectures? For what types of problems can they be used?

 Discussion #4: ANN can be used for both supervised and unsupervised learning. Explain how they learn in a supervised mode and in an unsupervised mode. 

Assignment

 

Consider Table 5.3: System-Level Attack Objectives. please find the attachment

Pick three attacks from the table and for each one identify the best assessment tools /controls to prevent or mitigate the impact of those attacks,  support your answers with real life example.

Programming Java Database

 Assignment-4 

Create the user interface shown below in WindowBuilder. 

Write a Java program to do the following: 

When the user clicks on the “Display Records Button, read all the records from the product table in demo.db 

Display the data in the TextArea below the Button, one line per record. 

Separate each field in the record by a comma. 

Sample output:(Note this is NOT the actual data in the table) 

Hammer,200,7.99 

Nalis,500,0.78

Bolts,300,1.23

Nuts,300,1.12 

Part 5 – Monitoring and Team Roles

 

Assignment Content

  1. Based on your previous work in the previous weeks, create a 700-word entry in your Database Management Plan.

    Consider the previous week’s creation of standards for database administration and explain the following in your entry:  

    • How performance will be monitored and tuned 
    • How backups will happen 
    • How data quality will be monitored and improved 
    • How information should be secured, etc.  
    • How all of the standards are important to the business from a user perspective
    • Also, include the following from this week’s learning: 
    • Explanations of how individual team roles will need to contribute to managing historical data via data warehouses and data marts
    • Recommendations of techniques for designing an effective data warehouse
    • Submit your assignment.

PCI Compliance

In 500 words or more, explain PCI compliance to the database administrator at a large retailer. Consider the consequences for non-compliance. 

Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. 

Write in essay format not in bulleted, numbered or other list format. 

cloud computing service

You are the CIO of ABC Corp a government contracting corporation that prioritizes security. You are tasked with moving the development team’s resources to the cloud. You need to provide a report to top leadership justifying the type of cloud solution that would be appropriate for this move. Provide the following in your report.

  1. Describe the MOST appropriate cloud service and research justification of its appropriateness.
  2. Select a Cloud Deployment model and research justification of its appropriateness.
  3. What are some of the pros and cons of both the cloud service and model you selected?

Paper should be in APA format, with at least two scholarly resources, and at least 1000 words.

ETHICAL DILEMMA PROJECT: POTENTIAL SOLUTIONS AND IMPACTS

Submit in a word document, template attached. Be careful, make sure to avoid plagiarism and to use quotation marks and proper citation as required. Length should be one page. Use APA format for citations and the required References page. Remember that the significant portion of your analysis should be in your own words. Attached is the assignment, template, and prior paper to use as a guide.

Discussin week 7

Initial Post

“Why do we need to understand data visualisations? There is more and more data around us, and data are increasingly used in decision-making, journalism, and to make sense of the world. One of the main ways that people get access to data is through visualisations, but lots of people feel like they don’t have the skills and knowledge to make sense of visualisations. This can mean that some people feel left out of conversations about data.” – http://seeingdata.org/developing-visualisation-literacy/

Please conduct the following activity located at the following address:

http://seeingdata.org/developing-visualisation-literacy/rate-these-visualisations/

Tell us what you think of the visualisations that we used in our focus group research. Instructions below!

What to do

  1. Look at the visualisations by clicking on the images below. You can choose to open the visualisation in a NEW tab or window (we recommend this) or view it in a pop-up window if you prefer to stay on this page. Some are interactive (i) and some are static (s).
  2. Place the images on the grid. When you’ve looked at one, go to the grid and position the image according to whether you liked or didn’t like and learned or didn’t learn something from the visualisation (‘learning something’ could also mean confirming something you already knew). Only place the visualisations that you have looked at onto the grid. Click SUBMIT.
  3. Compare your views with others. You can compare your responses to the visualisations with those of others, by clicking COMPARE.

Choose three of your favorite visualisations. Post a 3 – 5 sentence summary of why you chose the visualisations. What caught your attention? Were they effective in presenting the provided data? If possible, explain how you would you do to improve the visualization?

Reply Post

When replying to a classmate, offer your opinion on what they posted and the visualisations they chose. Using at least 3 – 5 sentences explain what you agree or disagreed with their evaluation of the visualisations.

paper

 

Industry experts believe blockchain is a technology that has the potential to affect the business of most IT professionals in the next five years. Pick an industry you feel will be most affected by blockchain and how blockchain may be used in that industry. As an IT manager, how would you embrace blockchain? For instance, how would training occur for your team, what strategies might you use, what security methods may you recommend be used?

Your paper should meet the following requirements:

• Be approximately four to six pages in length, not including the required cover page and reference page.

• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Assignment

  

Week 8 Quiz

Answer the following questions from Chapter 5 in the text with a paragraph that contains at least five sentences. Include the question and number your answers accordingly.

1. With all the stories about millions and millions of bytes of personal data having been exposed, why is their still any faith at all in the Internet?

2. How has the term hacking changed meaning over the years?

3. What is the most dangerous hacker tool?

4. From the news: How were NSA’s hacker tools  compromised? 

5. What was the vulnerability in the Target Breach?

6. What do you think of hactivism?

7. How did Stuxnet work? 

8. What was the Arpanet?

9. Deep brain stimulation is a treatment for Parkinson’s disease. Medical devices such as these are now becoming accessible through the web. Consider the dangers (threat surface)?

10. What is the Red Team?

Wagner 

Week Eight Assignment

You are the web master of a college website. You share a server with other school departments such as accounting and HR.

Based on this chapter, create at least five security-related rules for staff members who are adding web pages being added to your site. Include a justification and explanation for each rule. Rules should relate to college, staff and student, and system information security.

Write your answer using a WORD document. Do your own work and use your own words. Submit here. Note your Safe Assign score. Score must be less than 25 for full credit.

You have three attempts.