In this homework assignment, you are going to use Cluster Analysis and Decision Tree induction algorithm on a weather forecast problem. It is a binary classification problem to predict whether or not a location will get rain the next day.
Explain a situation where using a keyloggers may be used in either a legitimate (legal) way or used as a tool for criminals.
Please write a 350 words essay
Keystroke logging, often referred to as keylogging or keyboard capturing, is the action of recording (logging) the keys struck on a keyboard, typically covertly, so that the person using the keyboard is unaware that their actions are being monitored. Explain a situation where using a keyloggers may be used in either a legitimate (legal) way or used as a tool for criminals.
Malware: Threats and Impacts
Prepare a report to address all aspects of the “Malware Threats and Impacts”.
Scenario #3 (Team Building, Solution Building, and Release Management)
Before you begin this assignment, be sure you have read the “XYZ Corporation Case”.
Please refer to the attachments to complete your scenario #3 assignment
Overview of Scenario #3 Task Assignment
Refer to the News post from the instructor and use the Lecture Notes and assigned readings to better understand assignment requirements that follow. Your task assignment is to develop for this Agile project scenario four deliverables:
1. Product Vision (Vision Box & Elevator Test Statement) – Deliverables: 1) Group discussions in the Workgroup Discussion forum; 2) Product Vision PowerPoint Submitted (MS PowerPoint recommended) (4-slide presentation of the front, back, and left side, and right side of a box (with no top and bottom);
2. Project Data Sheet (PDS) – Deliverables: 1) Group discussions in the Workgroup Discussion forum; 2) Project Data Sheet Submitted (MS Word recommended); (Please see P105 of the PDF (Agile Project Management Creating Innovative Products.pdf) attached to this assignment for additional details.
3. Agile PM Release Plan (for a 4-month project with 4 monthly sprints). Deliverables:
1) Release plan and iteration discussions in the Workgroup Discussion forum; 2) Release Plan (MS Word or MS PowerPoint recommended);
4. Team Building and Evaluation Narrative. In this narrative, you will describe how your team came together or did not, and who did what and an overall score for each team member. Be sure to describe who did the work products and how work assignments were decided. 1) Team building posts in the Workgroup Discussion forum, including appropriate role playing (Scrum Master, Product Owner, or Team Coordinator); 2) Team Building and Evaluation Narrative (MS Word recommended). Note: A form is not provided. It’s up to you to develop this narrative and /or scoring table you think are appropriate. However, each team member needs to use the same scoring method and table as determined by the team. Note: You will reuse the scoring method/table for Scenario #4.
Case study
Develop and present a paper that demonstrates you have learned and know how to apply the learning objectives in this course; if you use your discussion question responses, PA and CLA1 assignments, you should be able to encompass all of the learning objectives. Be sure to provide examples of all the elements that you have learned.
PA :
Describe three approaches to detecting errors, including how they work, the probability of detecting an error, and any other benefits or limitations.
CLA1:
You have been hired by a small company to install network infrastructure with shared storage. The office has 15 users. The accounting department, which has one user, does not want to be on the same network as the operation network and does not want to share the storage with any other users.
Please consider the following Technology or some of it:
- Windows Server and AD
- DHCP
- SubNet Mask
- NAS
- Print Server
Please provide diagrams of at least two design options. Discuss and compare the advantages and disadvantages of each proposed design and justify your recommendations. Consider cost, security, on-going maintenance, adding new users, printing, log-in, and Internet connection to all users.
Short research paper for PHD. Please read below before bidding. APA 7th edition format
Journal articles focus on transformational leadership and knowledge and knowledge sharing within an organization, please review these concepts and answer the following questions:
How do trustworthy and ethical leaders enhance knowledge sharing in organizations? How does this impact the rate of information technology implementations? How does this impact data management within organizations?
How does servant leadership assist with transferring knowledge in an organization?
When thinking about data analytics, how does transformational leadership assist with building good data structures?
Please be sure that journal articles are peer-reviewed and are published within the last five years.
The paper should meet the following requirements:
3-5 pages in length (not including title page or references)
APA guidelines must be followed. The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.
A minimum of five peer-reviewed journal articles.
The writing should be clear and concise. Headings should be used to transition thoughts.
200-250 words
Kirk (2016) tells us that all requirements and restrictions of a project must be identified. Select 1 key factor below and discuss why Kirk (2016) states it will impact your critical thinking and shape your ambitions:
People: stakeholders, audience.
Constraints: pressures, rules.
Consumption: frequency, setting.
Deliverables: quantity, format.
Resources: skills, technology
Textbook:http://dl.booktolearn.com/ebooks2/computer/graphics/9781526468925_Data_Visualisation_050a.pdf
Research Paper
5. How has information technology supported the development of facial recognition software and the current issues related to its use?
C language, CS.
A postfix expression is an expression in which each operator follows its operands. Table 13.4 shows several examples of postfix expressions. The grouping marks under each expression should help you visualize the operands for each operator. The more familiar infix expression corresponding to each postfix expression is also shown. The advantage of the postfix form is that there is no need to group subexpressions in parentheses or to consider operator precedence. The grouping marks in Table 13.4 are only for our convenience and are not required. You may have used pocket calculators that require the entry of expressions in postfix form. Use an adaptation of your stack library from Project 3 to write a program that simulates the operation of a calculator by scanning an integer expression in postfix form and displaying its result. Your program should push each integer operand onto the stack. When an operator is encountered, the top two operands are popped, the operation is performed on its operands, and the result is pushed back onto the stack. The final result should be the only value remaining on the stack when the end of the expression is reached.
week 6 individual
Minimum 600 words
This assignment should be in APA format and have to include at least two references.
Since it is so dangerous, why would designers install software into the kernel at all (or make use of kernel software)? If you were an antivirus designer or maker, what other methods do you utilize to prevent virus?