Assignment

intro to sql data

 

  • Exercise 1: HistogramExercise 1 in the text: You may use any spreadsheet program. Submit a Word document with a screenshot from your computer showing the histogram. Comment your images with  a sentence or so of description in your  own words  of what you are doing.   Please make sure that your images are large enough and high  enough resolution for the reader to see the text in your queries and the results. 
  • AssignmentExecise 2: Calculating QuartilesExercise 2 from the text: Use any spreadsheet program. Submit a Word document showing a screen shot from your computer with the quartiles underlined or highlighted.  Comment your images with a sentence or so of description in your own words of what you are doing.  Please make sure that your images are large enough and high enough resolution for the reader to see the text in your queries and the results. 
  • AssignmentExercise 3: Central TendencyExercise 3: Use any spreadsheet program. Submit a Word document with a screen shot from your computer showing the highlighted median.  Comment your images with a sentence or so of description in your own words of what you are doing.  Please make sure that your images are large enough and high enough resolution for the reader to see the text in your queries and the results. 
  • AssignmentExercise 4: DispersionExercise 4: Use any spreadsheet program. Using the data provided in the text, submit a Word document with a screen shot from your computer highlighting the range, standard deviation, IQR, and outliers of Add-on Sales.  Comment your images so the viewer knows what you are doing.  Please make sure that your images are large enough and high enough resolution for the reader to see the text in your queries and the results.
  • AssignmentExercise 5: Pearson CorrelationExercise 5: Use any spreadsheet program. Using the data provided in the text, create a scatter plot and calculate the Pearson Correlation Coefficient. Comment your images with  a sentence or so of description in your  own words  of what you are doing.   Please make sure that your images are large enough and high  enough resolution for the reader to see the text in your queries and the results. 
  • AssignmentActivity 2: Exploring Sales DataThere is no activity 1.Activity 2: Use the attached dealerships.csv file and any spreadsheet program. Submit a Word document with a screen shot from your computer of your solutions to questions 2 – 7 in the text. Highlight your results.  Comment your images with a sentence or so of description in your own words of what you are doing.  Please make sure that your images are large enough and high enough resolution for the reader to see the text in your queries and the results.  dealerships.csv

Week 7

 

Create a PowerPoint that contains a FLOWCHART and a PSEUDOCODE for each problem (You may use a different application if PowerPoint is not available).

Use the information below to create a pseudocode (which can be a text-based description for solving the problems) and a flowchart (using flowchart symbols to illustrate how you would program) to solve each problem. Use Microsoft PowerPoint® for Pseudocode and the flowchart (You may use a different application if PowerPoint is not available)..

  • Problem 1: Create a list that contains the months of the year.
  • Problem 2: Create a loop to print the month number and name (do not hard code the month number)

Digital Forensics

1/2.  

Go to the website: https://epic.org/privacy/litigation/ which focuses on civil rights issues and privacy. Pick a case.
Using WORD, in your OWN WORDS, write an ORIGINAL brief essay of 300 words or more  :

  • Summarize the case
  • Give your opinion of the decision.
  • Describe how the case deals with the material in this chapter

2/2.

Describe the plain view doctrine, and why it has such a significant impact on digital forensics? What are three approaches to determining whether the doctrine applies to a specific case? 

MIN 300 WORDS FOR EACH QUESTION (1&2). PLEASE MAKE SURE NO PLAGIARISM.

CC W 16 D

 Select three topics of interest and note:

  • What you learned about the topic
  • Why you selected the topic
  • How you will utilize the topic in the future
  • Also, write a reflection of the material you’ve learned in the course.  What did you like?  What could be improved?

NOTE: You are required to use at least two-peer reviewed sources (besides your textbook) to answer the above questions.   

The 3 topics are :

 Cloud Computing

Virtualization

Cloud Governance 

Discussion question, 350 words and 2 references.

Search the peer-reviewed literature for examples like below. You may select any topic relating to technology that illustrates the potential for really messing things up. Include, in your description, an analysis of what might have caused the problems and potential solutions to them. Be sure to provide supporting evidence, with citations from the literature

Example:   Protection of patient data has become a critical part of the scope of practice of all healthcare professionals. Routine data breaches underscore the importance of training clinical employees in protecting these data. However, beyond exposure to HIPAA regulations, little is done to educate the healthcare student about the risks and vulnerabilities of the online environment as it pertains to health data” (Swede, Scovetta, & Eugene-Colin, 2018).

Discussion and Assignment

 

WEEK 7 – DISCUSSION

In no less than 250 words, describe the difference between a fat AP and a thin AP. What is needed to deploy a thin AP? Are there any security considerations to think about between the 2 different APs?

Week 7 – Discussion

Have you or someone you know ever received a chain letter, phishing message, or some other fraudulent message via email? If so, please share this experience. Explain what type of message it was and what you did to get rid of it.(250 words)

Week 7 Assignment

  • 7.1 What is the basic building block of an 802.11 WLAN?
  • 7.2 Define an extended service set.
  • 7.3 List and briefly define IEEE 802.11 services.
  • 7.4 Is a distribution system a wireless network?
  • 7.5 How is the concept of an association related to that of mobility?
  • 7.6 What security areas are addressed by IEEE 802.11i?
  • 7.7 Briefly describe the five IEEE 802.11i phases of operation.
  • 7.8 What is the difference between TKIP and CCMP?