determine the ip addresses

 

Using IPConfig

  • Open your command prompt or DOS prompt.
  • Type in ipconfig
  • Write down your computer’s IP address, default gateway, and subnet mask.

  • Use ping to determine the ip address of www.nec.edu
  • Use ping to determine the ip address of www.ricksphp.com

Disaster recovery plan

Create a Disaster Recovery Plan for either the organization they work for or one they wish to work for in the future. The plan will follow the template/example provided

Data Science and Big Data

 

The Final Portfolio Project is a comprehensive assessment of what you have learned during this course.  

The Final Project has two parts: Limitations of Blockchain and Emerging Concepts.

Blockchain continues to be deployed into various businesses and industries. However, Blockchain is not without its problems.  Several challenges have already been associated with the use of this technology.  Identify at least 5 key challenges to Blockchain. Additionally, discuss potential solutions to these challenges. Lastly, please discuss if we will see the limitations to blockchain be reduced or mitigated in the future.  

There are several emerging concepts that are using Big Data and Blockchain Technology. Please search the internet and highlight 5 emerging concepts that are exploring the use of Blockchain and Big Data and how they are being used.

Conclude your paper with a detailed conclusion section which discusses both limitations and emerging concepts. 

The paper needs to be approximately 6-8 pages long, including both a title page and a references page (for a total of 8-10 pages). Be sure to use proper APA formatting and citations to avoid plagiarism.

Your paper should meet the following requirements:

• Be approximately 6-8 pages in length, not including the required cover page and reference page.

• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course, the course textbook, and at least four scholarly journal articles from the UC library to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Wk 5 – Apply: Backup Policies

Assignment Content

  1. Securing company data is not as simple as backing up to another hard drive. It is important to have backup tools, processes, and policies for both business continuity and disaster recovery plans.

    In the final section of your playbook, create a 3- to 4-page outline of backup policies for when the data center is inaccessible.

    Include the following in your outline:

    • A list of tools used for backup purposes
    • An explanation of the following:
    • Where employees should work from that day
    • How employees can get to their data
    • The communication methods about updates
    • A step-by-step guide to recover your databases and telecommunications
    • A step-by-step guide to recover and provide any additional company assets
    • A description of policies for backup media storage
    • A description of policies for encryption of backup data
    • Note: Numbered or bulleted steps/guidelines make the document easy to for others to follow under potential stressful situations. Paragraphs can be used to help support the steps/guidelines.

      Cite at least two resources within the assignment in APA format.

Chryptography and business intelligence

question 1. compare and contrast two fundamental security design principles. Analyze how these principles and how they impact an organizations security posture. minimum 300 words and Must be APA format.

Q 2. Discuss the process that generates the power of AI and discuss the differences between machine learning and deep learning.should be 250-300 words.must be at least one APA formatted reference (and APA in-text citation) to support the thoughts in the post.  Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations.

Q3. Survey the literature from the past six months to find one application each for DSS, BI, AND ANALYTICS. Summarize the applications on one page and submit it with the exact sources. Must be APA format.

Q4. Find information about IBM Watson’s activities in the healthcare field. write a report. Must be APA format and must one page.

Q5. Discuss the difficulties in measuring the intelligence of machines. Must be APA format and one page.

Q6. In 2017, McKinsey & Company created a five-part video titled “Ask the AI Experts: What Advice Would You Give to Executives About AI?” View the video and summarize the advice given to the major issues discussed. 

Q7.5.Watch the McKinsey & Company video (3:06 min.) on today’s drivers of AI at youtube.com/ watch?v=yv0IG1D-OdU and identify the major AI drivers. Write a report.

Q8. Explore the AI-related products and services of Nuance Inc. (nuance.com). Explore the Dragon voice recogni- tion product.

All must be APA format. from question 3 to 8 must be each one page.

Bus Cont Plan&Disas Recov Plan (ISOL-632-A01)

The case

Your Chief Executive Officer, Your Chief Operations Officer, and your Chief Information Officer were killed when a tornado hit your organizational headquarters. All these employees were considered 3 of the top experts in industry and represented a combined total of 60 years of experience. 

  1. You need to develop a business continuity plan to address the void in leadership as a result of this tragedy. 
  2. You need to develop a formal succession plan. 
  3. You need to develop a strategic knowledge management plan. 

The final paper will be 10 – 15 pages (not including your cover page and reference page) double spaced 12 point Times Roman New in APA format. You must use a minimum 20 different references, which could include your course textbook. Wikipedia  is not an acceptable source of reference 

CSCI 457 Assignment 4 – Address book

 Please develop an app to show the list of all branches of an organization. The branches should be located at different places. You can choose whatever organization you like, and it can be either realistic or fictional. For example, Walmart stores, KFC restaurants, Global Defense Initiative (fictional) bases, etc. Requirements: • The list of the branches should be displayed in a table. • The cells in the table must have a colorful background. You may use any color except black, white, and gray. • Each cell of the table should contain a thumbnail of that branch, with its name and city. • When the user taps on a cell, a new view will pop up, showing the location of the branch on the map. • The pin on the map should contain a thumbnail of the branch, with its address. • On the top-right corner of the map, there should be a button. When the user taps the button, the map should be closed, and the program shall return to the table of the branches. (Hint: Use unwind in Lecture 12.) • When you submit this assignment, please compress the entire project folder into a single zip file and upload it to the submission link. You can find more hints in Lectures 10, 11, 12, and 13. 

Data incident

Pick a data incident in the news; it can be one of the well-known or smaller incidents(Zoom would be great).   Create a plan to show how you would respond and describe some risk-mitigating items that if they were in place may have stopped this incident. (3-4 pages)

Security controls

Discuss the following, supplying citations to support any information that you provide.  Do not include your opinion, only what you can support with a citation.  Address the following topics.

  1. Describe operating system hardening
    1. Define it
    2. Why is it done?
    3. What steps are usually done in a Windows environment?
  2. Describe system restoration methods and procedures
    1. Define it
    2. Why is it needed?
    3. What tools and approaches are recommended?
  3. Describe network security controls
    1. Define it
    2. Why is it needed?
    3. What steps, tools, and policies are used to secure networks?
  4. Describe incident response teams and the role of evidence
    1. What are incident response teams and why do they exist?
    2. How does evidence collection relate to incident response teams?
    3. Discuss evidence
      1. Describe why evidence is collected,
      2. How it should be collected
      3. What can happen if it is collected or handled in an inappropriate way

For all writing assignments ensure that you do the following:

  • Write 1000 to 1500 words in APA format.
  • Utilize at least five scholarly references. 
  • Note that scholarly references do not include Wikipedia, .COM websites, blogs, or other non-peer reviewed sources. 
  • Utilize Google Scholar and/or the university library. 
  • Do not copy and paste bulleted lists.  Instead, read the material and in your words, describe the recommendation citing the source. 
  • Review the rubric to see how you will be graded.
  • Plagiarism will result in a zero for the assignment. 
  • The second instance of plagiarism will result in your failure of this class.
  • If you use a source, cite it.  If you do not, it is plagiarism.