Data Gathering Instrument

 

Data Gathering Instrument

Task: Create one (1) instrument that could be used to gather data for your mock dissertation topic. (cyber secuirty)
The instrument should be designed to be exactly how it would be deployed to collect data. Since instrumentation usually goes through several steps of field testing, for purposes of this assignment you can submit a deployment-ready draft of your instrument without field testing it. Be sure the instrument collects data appropriately to measure your research question.  If your study will not use an instrument to collect data because your data is archival and already exists, you will discuss your process for data retrieval. 

Ladder of Abstraction

  1. Read pp. 82-95 from Language in Thought and Action by S. I. Hayakawa and Alan R. Hayakawa. (OCLS)
  2. Create a ladder of abstraction for your operating paradigm as described by Hawakaya and Hayakawa. 
  3. Post your ladder for class review and comment.

Read from this link: https://medium.com/@tombarrett/up-and-down-the-ladder-of-abstraction-cb73533be751

450 words with in-text and 3 main references

A3

Attached is the document contains the question. Include at least 4 APA formatted references (and APA in-text citations). The assignment is 3 pages in length. Go through the word document for further details.

software antivirus

  

Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references. In-text citations as required.

Question: 

Since it is so dangerous, why would designers install software into the kernel at all (or make use of kernel software)? If you were an antivirus designer or maker, what other methods do you utilize to prevent virus?[700 words]

Python Requests Library( Module)

Needed description of Requests Library Functions.( 1 or 2 pages)

Important point i needed, Examples for about Requests Library Functions.  In that examples if you use name one of them supposed to be BURAK. 

i needed those examples on WORD PAGE AND ORIGINAL CODING FILES.

4s week 15 assignment EH

In 300 words

Do you feel the benefits of cloud computing are worth the threats and vulnerabilities? Have we arrived at a point where we can trust external agencies to secure our most precious data? Please explain your answer.

Include references, no copy-paste strictly.

case study

 

Please read the Filecoin case study (see HBS Coursepack) and answer the following questions with substantive answers in a cohesive essay. Your paper should be at least 3 pages in length. Use proper grammar, spelling, citations, etc.

To get you started:

1. How did Filecoin conduct its ICO?2. How is Filecoin’s ICO similar to and different from:    a) an equity IPO?    b) a crowdfunding initiative on, for example, Kickstarter, Indiegogo, GoFundMe?3. What are the pros and cons of Filecoin conducting a fundraising through an ICO?4. Why should investors be attracted to Filecoin?5. Why should be wary of Filecoin?6. Why are regulators encouraging or opposing ICOs?7. What have some regulators done in response to ICOs?

Compose your essay in APA format, including the introduction and conclusion, and in-text citations for all sources used. In addition to your 3 page (minimum) essay, you must include an APA-style title page and reference page. Click the assignment link to compare your work to the rubric before submitting it. Click the same link to submit your assignment.