discussion

 

Name the three essential elements of a basic structured cabling network? How are they installed and what are the components that are involved with them? 

Search the peer-reviewed literature to identify its potential impact on networking and what measures can be put in place to minimize the effect. 

Assignment

 

Applying all the code on your selected dataset, complete all codes from Chapter 7 Time-dependent graphs. Make sure you submit to this link two things

1. Your report file showing screenshots of all commands from Rstudio GUI

Make sure you show all Rstudio GUIs

2. Submit your R script code

Please go to the below link and download dataset file 

https://www.kaggle.com/puran123/covid19

Breast Cancer DataSet in Data Analysis.

  

Write about the DataSet for Breast Cancer in Data Analytics  – How did you get it? What are the characteristics of data? Paste the code blocks which are executed for the process and the plot graphs. 

Must include – data characteristics, data cleaning, data acquisition and the code blocks.

Total pages – 4-5

Note: PLAGIARISM will be checked by Prof with code and the matter included. 

Useful Links: https://data-flair.training/blogs/project-in-python-breast-cancer-classification/

                      https://www.kaggle.com/lbronchal/breast-cancer-dataset-analysis/code

Lab project work

Week 8 Lab 7 Project

Please, select an organization of your choice and demonstrate how to Create a Scheduled Backup and Replicating System Folders

Note: this is not a theoretical writing, rather an application of the week8 Lab7.

Deliverables:

Titled page,

Table of contents

Project of Objective

Project Snips,

Conclusion

Discussion 55

 

Mr. Bradley Willman Against Superior Court Judge C. Kline

  • The Law enforcement officers are excessively zealous, striving retrospectively to justify their interest in vulnerable, innocent children and imploring the judiciary system’s sympathy.
  • Yet again, most police officers have been convicted for possessing child pornography despite pretense claims as undercover investigators. Masquerading and demonstration to justify the overzealous interest in innocent children, the victim of sex offenders can be counterproductive, as verified in the case against Superior Court Judge Ronald C. Kline.

Preamble

  • Bradley Willman, Canadian vigilante sent a Trojan horse program to California Judge Ronald C. Kline, gained unauthorized access to his computer, and found a diary detailing his sexual fantasies involving children and approximately 100 images alleged to be child pornography. 
  • Judge Kline’s defense team. At first, the team suggested that the intruder may have planted the evidence.
  • Judge Ronald C. Kline. Judge Kline later admitted downloading pornography from the Internet, asserting that one or two pornography images on his computer could be illegal and further stated that he never intended to keep any of the images.
  • Judge Kline’s Defense Team. As the case remains in litigation, the defense team argued that all evidence obtained by Mr. Willman must be suppressed because his actions were criminal and was acting as an agent of law enforcement when he broke into Judge Kline’s computer. 
  • On behalf of Mr. Willman, the prosecuting team denied the allegation that Mr. Willman acted as a police agent but was a cooperative suspect in the case and accused as potential suspect in at least three U.S. Customs Service investigations of child pornography. 
  • Ruling and Consequence.  A federal judge ruled that Mr. Willman acted as a police informant, corrupted all evidence he obtained from Judge Kline’s computer. It is worth noting that the outcome of Mr. Willman’s case against Judge Kline can put forth an across-the-board implication for Judge Kline Defense team and the prosecuting team in the encounter with online informants.
  • Lesson Learned. Before conducting an undercover investigation, investigators must take steps to protect their identity and assumed the position of anonymity, if possible. Also, investigators must use expressly designate computers and mobile devices used in the process of undercover investigations. Investigator Must do so to avoid commingling of evidence, possible allegations of personal pedophilic interests, and permanently circumvent far-reaching implications, shame, and humiliation in court.
    1. Judge Kline later admitted downloading pornography from the Internet, asserting that one or two pornography images on his computer could be illegal and further stated that he never intended to keep any of the images.

Question 1. Describe in detail the plan of action, amplifying steps to submit court appeal on behalf of Judge Ronald C. Kline.

  1. Bradley Willman sent a Trojan horse program to California Judge Ronald C. Kline, gained unauthorized access to his computer, and found a diary detailing his sexual illusions and imaginations involving children and approximately 100 images alleged to be child pornography. However, Judge Kline’s defense team alleged that the evidence was planted by (the Intruder) Mr. Bradley William.

Question 2. Describe in detail the plan of action, amplifying steps to submit court petition on behalf of Mr. Bradley Willman.

200-250 words

 

Kirk (2016) tells us that all requirements and restrictions of a project must be identified.  Select 1 key factor below and discuss why Kirk (2016) states it will impact your critical thinking and shape your ambitions:

People: stakeholders, audience.

Constraints: pressures, rules.

Consumption: frequency, setting.

Deliverables: quantity, format.

Resources: skills, technology

Textbook:http://dl.booktolearn.com/ebooks2/computer/graphics/9781526468925_Data_Visualisation_050a.pdf

Chapter Readings Reflections Journal Chapter 1-3

Need to prepare Chapter Readings Reflections Journal from chapter 1-3 in the attached text book.

The reflection papers should be a minimum of 6 pages (two full pages for each chapter), double-spaced, in proper APA formatting using citations when appropriate.   

Please find attachments contains Text book and referral document about the how the assignment should be.

Each Chapter Reading Reflection should address the following prompts:

Summarize the content of the chapter addressed.

What were some of the highlights in this chapter and learning opportunities?

Share some new ideas and/or thoughts that you developed from the reading of the chapter.

How do you think you can apply this chapter’s concepts into your home, school, personal-life or work environment?

Cloud Computing Discussion 11

  

In 500 words or more, compare DNS failover and cloud failover. 

Use at least three sources. Do not use Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes.

Write an essay for 500 words for the give description?

Investigate whether or not an employee at a local hospital has been accessing patient records and setting information to online pharmacies. It is your first day of the investigation. Put together a list of data sources that must be examined during the investigation.