Check Attachment!!
Write an Essay on motivation for pursuing Cyber Security Degree.
Your essay should be 500-800 words, single-spaced, and should address the following prompt: Describe your motivations for pursuing your graduate degree and your ability to be successful in the program.
Python Homework
After running the code I upload, write a code using numpy and panda to sort the stock data by date(month) in recent five years.
Excel 2019 In Practice – Ch 9 Independent Project 9-5
These instructions are compatible with both Microsoft Windows and Mac operating systems.
At Placer Hills Real Estate, commission is split with other agencies based on price groups. You create a one-variable data table to display results for various split rates. Additionally, you create scenarios for selling price and commission and create a histogram about sales.
[Student Learning Outcomes 9.1, 9.3, 9.4, 9.6]
File Needed: PlacerHills-09.xlsx (Available from the Start File link.)
Completed Project File Name: [your name]-PlacerHills-09.xlsx
Skills Covered in This Project
- Build a one-variable data table.
- Use Solver.
- Create and manage scenarios.
- Create a histogram with a chart.
- Open the PlacerHills-09 start file. The file will be renamed automatically to include your name. Change the project file name if directed to do so by your instructor
- Enable the content security warning.
- Review formulas.
- Select cell C14 on the Calculator worksheet. The total commission is calculated by multiplying the selling price by the commission rate.
- Select cell C15. The IFS function checks the selling price (C12) to determine the split percentage (column D) based on the price group.
- Select cell C16. The IFS function checks the selling price (C12) to determine the administrative fee percentage (column E) and multiplies that percentage by the value in cell C15 to calculate the fee in dollars.
- Select cell C17. The net commission is calculated by subtracting the fees from the PHRE amount.
- Build one-variable data tables.
- Select cell C20 and create a reference to cell C15.
- Select cell D20 and create a reference to cell C17. Both formulas depend on cell C12, the one variable.
- Use cell D8 as the column input for the data table (Figure 9-87). (You can use any percentage from column D because its value is replaced by the proposed rates in column B in the data table.)Figure 9-87 Data table setup for commission rates
- Decrease the decimal two times for all values in the data table.
- Name cell ranges.
- Click the Price Solver worksheet tab.
- Click cell C12 and name the range Selling_Price. You cannot use spaces in a range name.
- Name cell C14 as Total_Commission and cell C17 as PHRE_Commission.
- Install the Solver Add-in and the Analysis ToolPak.
- Use Solver to find target PHRE net commission amounts.
- Build a Solver problem with cell C17 as the objective cell. For the first solution, set the objective to a value of 50000 by changing cell C12. Use the GRG Nonlinear solving method. Save the results as a scenario named $50,000.
- Restore the original values and run another Solver problem to find a selling price for a PHRE commission of 75000. Save these results as a scenario named $75,000.
- Restore the original values and run a third Solver problem to find a selling price for a net commission of $100,000. Save these results as a scenario and restore the original values.
- Manage scenarios.
- Show the $50,000 scenario in the worksheet.
- Create a Scenario summary report for cells C12, C14, and C17.
- Create a histogram for recent sales.
- Click the Sales Forecast sheet tab and select cell G13.
- Create a bin range of 10 values starting at 350,000 with intervals of 50,000, ending at 800,000 in cell G22.
- Use the Analysis ToolPak to create a histogram for cells E5:E26. Do not check the Labels box and select the bin range in your worksheet.
- Select cell H3 for the Output Range and include a chart.
- Position and size the chart from cell K3 to cell V19.
- Edit the horizontal axis title to display Selling Price and edit the vertical axis title to Number of Sales.
- Edit the chart title to display Sales by Price Group.
- Select and delete the legend.
- Delete cells G13:G22 (Figure 9-88).Figure 9-88 Histogram and chart for sales data
- Save and close the workbook (Figure 9-89).
- Upload and save your project file.
- Submit project for grading.
assign
Answer the following questions. Please ensure to use the Author, YYYY APA citations with any content brought into the assignment.
For sparse data, discuss why considering only the presence of non-zero values might give a more accurate view of the objects than considering the actual magnitudes of values. When would such an approach not be desirable?
Describe the change in the time complexity of K-means as the number of clusters to be found increases.
Discuss the advantages and disadvantages of treating clustering as an optimization problem. Among other factors, consider efficiency, non-determinism, and whether an optimization-based approach captures all types of clusterings that are of interest.
What is the time and space complexity of fuzzy c-means? Of SOM? How do these complexities compare to those of K-means?
Explain the difference between likelihood and probability.
Give an example of a set of clusters in which merging based on the closeness of clusters leads to a more natural set of clusters than merging based on the strength of connection (interconnectedness) of clusters.
Assignment Portfolio (Subject —- Digital Forensic Evidence)
Assignment 1 ) —– Portfolio Assignments
Preface
Listed below are areas of concentration for MSDF-630 202 Portfolio Assignment. Keep in mind that the portfolio research concentration is an essential segment of the course. Two research topics are created for you, and I hope that your professional effort will be represented in this project. Portfolio projects consist of the following three unique phases:
- Profile.
- Research Question 1
Investigation of Alabi, Time as Alibi and Location as Alibi.
- Research Question 2.
Cybercrime Law, Computer-Integrity Crime, Fraud, and Abuse.
Portfolio Project
Profile: Required
Group 1. Research Question 1
Group 2. Research Question 2
Group 3. Research Question 1
Group 4. Research Question 2
- Each student Must submit two (2) successful completed documents (here):
- Profile
- Collaborative Group Assignment.
Phase 1: Student Professional Profile
- Portfolio
- Full-Name
- Profile
- Status: Graduate or Post-graduate
- Academic areas concentration
- Current Professional Career Path
- Professional Career Path Completion Upon successful completion of your studies at the University of the Cumberlands.
- Research Question 1.
Investigation of Alabi, Time as Alibi and Location as Alibi.
Preamble
Alibi is a Latin acronym, meaning somewhere else and someone other than the culprit. A scenario that identifies the perpetrator of a crime to be someone or somewhere else other than where the crime took place. Criminal activities involving location, login and logout time, illegal behaviors, can be easily tracked by use computer and internet technologies.
- Offenders and their Alabi are often naive and ignore the fact that telephone companies always keep records of the number dialed, the time and duration of the call, and caller’s number.
- Offenders and their Alabi are oblivious and unaware of the fact that credit card corporations keep records of the dates, times, and locations of all purchases, banks keep track of the dates, times, and locations of all deposits and withdrawals, and dates, times, and locations reside on computers for an indefinite period. Customers receive a report each month with detailed information in the form of a bill and financial statement.
- Offenders and their Alabi are often neglectful of the fact that when an e-mail message is sent, the time and originating internet protocol (IP) addresses are noted in the header and log files that contain information of the past and current activities.
Forensic investigator must be vigilant at all times and try to acknowledge and recognize criminal Modus Operandi (MO) motive, intent, and ability to manipulate and change contents of the conclusive evidence and create false Alibi to amplify deceitful schemes. During the investigation of an alibi, the first step is to secure access to the data and information on the computer workstations, file servers, protocol, and network system.
BOOTP is the computer network designed to control and monitor which computers and specific internet protocol (IP) addresses. The BOOTP is a networking protocol used to automatically assign an IP address to network devices from a configuration server. Furthermore, BOOTP is often configured to synchronize their clocks regularly with exactly accurate time satellites and create a log in case of any discrepancies.
Dynamic host configurations protocol (DHCP) server is designed to automatically assign IP address and other information to each host on the network, communicate efficiently with other endpoints. Furthermore, the DHCP system allows anyone to change their clocks and does not keep logs of time changes. A DHCP server enables computers to automatically request IP addresses and networking parameters from the internet service provider (ISP), reducing the need for a network administrator and a user to assign IP addresses to all network devices manually.
Situation 1: Investigation of the Victim, Alibi, and Conspirator.
Alibi defense does not play an essential role in a conspiracy theory. Conspiracy is an agreement between two lawless persons to commit a crime, and one of the parties must agree to engage in an overt act in furtherance of the crime.
Research Question 1:1. Develop a measurable research framework relative to the user computer and internet technologies, criminal Modus Operandi, (MO) motive, intent, conspiracy theory, and dynamic host configurations protocol (DHCP) server to amplify conclusive evidence in court.
Research Question 1:2. To what extent are the significant differences between the Victim and the suspect?
Research Question 1:3. To what extent are the significant differences between the suspect and Alibi
Research Question 1:4. To what extent are the significant differences between Alibi and conspirators?
Situation 2. The Alibi can exercise the constitutional right to remain silent, granting the alibi opportunity to reposition the witness other than the crime scene.
Research Question 1.5. Develop a measurable research framework allowing the forensic investigator to use computer and internet technologies, criminal modus operandi (MO), motive, intent and, bootstrap protocol (BOOTP) to gather data and information on more than one crime scene for the same case.
Situation 3: A Judge can be suspicion of the alibi evidence. The burden of proof often rests on the prosecutor, who must prove that the suspected Alibi is guilty beyond a reasonable doubt. The add-on burden of proof is on the forensic investigator who visited the crime scene.
Research Question 1:6 Develop a measurable research framework relative to criminal modus Operandi (MO) motive, intent, to help forensic investigator’s attempt to bring the suspected criminal to justice, only if the person was guilty.
Research Question 2.
Cybercrime Law, Computer-Integrity Crime, Fraud, and Abuse.
Preamble.
Integrity of evidence, cyber-crime, fraud, and abuse are prefaced on the assumption that computer and internet technologies are designed to make life easier for a public and private organization, the judicial system, and forensic investigators; it has, unfortunately, made life incredibly challenging and enduring in all levels of forensic investigation. Cyber-crime, fraud, abuse, are open-ended criminal operations, allowing unauthorized users to obtain information from various sources against a target organization. Naturally, criminals are endowed with extraordinary skills and expertise to break into any organization’s secured network center. Most criminal are have access automated freeware tools available on computer and Internet and breaks into the organization’s secured network system, data, assets, resources, to make forensic investigation exceedingly tricky. Most organizations and the global community are actively using computer and internet technologies to build four walls around security data storage centers, creating an opportunity for forensic investigator’s ability to produce reliable evidence. Similarly, organizations and the global defensive approach require a proactive plan of action to guide against data breach. This section examines the primary federal statutes used to prosecute cybercrime. The focus is on the Computer Fraud and Abuse Act and the statutes criminalizing identity theft, child pornography, and copyright and trademark offenses (Casey, 2011: 86-95).
Computer Fraud and Abuse Act
The Computer Fraud and Act, Abuse is the primary source of federal law related to computer cybercrimes, and approval of the Computer Fraud and Abuse Act (CFAA) in 1986. The amendments were designed to update specific Arts provisions in light of advancements in computer and internet technologies and to address loopholes that existed in earlier versions of the Act. Criminals gaining unauthorized access to a computer, disseminating malware, launching denial of service attacks, trafficking passwords, and using computers and the internet to commit fraud. Criminals are sophisticated and can intentionally use the computer and internet technologies without authorization.
Research Question 2:1. Develop a measurable research framework of hos computer fraud and Abuse Act (CFAA) can play a role during the forensic investigation and impact on conclusive evidence in court.
Research Question 2:2. To what extent can the computer fraud and Abuse Act (CFAA) of 1986 empowers forensic investigation to bring cyber-crime, fraud, and abuse to justice.
Situation 1.
Naturally, criminals often retain extraordinary skills and expertise to break into any
organization’s secured network center. The criminal fully utilizes automated freeware
tools available on computers and the Internet and breaks into the organization’s secured network system, data, assets, resources, and makes forensic investigation exceedingly.
- These extraordinary skills, expertise, and availability of automated freeware tools are creating a considerable obstacle against the forensic investigation process. We are the nation of law.
Question 2:3. Develop a measurable research framework of amendment items needed to strengthen the computer fraud and Abuse Act (CFAA), and expand forensic investigator authority over criminal activities.
Assignment 2 ) —– Attached a document below, please take a look
Assignment 1 is Due on 12/6/2020 and Assignment 2 is due on 12/3/2020
NO PLAGIARISM
FOLLOW APA FORMAT
Need 3 Pages
powerpoint 5
Class Discussion Topics
- Discuss the conditions necessary for a deadlock to occur. If given the option of removing one condition to prevent deadlock, which condition would you eliminate? Why?
2. Discuss different deadlock handling strategies. Which strategies would you like to implement to remove deadlocks in the cases of disk sharing, database sharing, and multiple device allocation? Select a suitable strategy in each case and provide reasons for your choices.
RDBMS CONCEPTS
The use of keys are instrumental in database management. Primary keys allow for distinct records and foreign keys tie records together to create unique relationships between two or more entities and/or tables. In Blockchain, we know that a hash is the equivalent to a key – and makes the chain secure and indisputable (or so we think). Why is it then that with an RDBMS, a primary key and foreign key can still create redundancy, thereby causing data anomalies? Can the same be said about blockchain?
Instructions
- This is a required assignment, worth 15 points. The assignment must be submitted by the due date. Late assignment are not allowed.
- You are required to submit a minimum of two postings. Points will be deducted for not fulfilling this minimum requirement.
- Apply and use the basic citation styles of APA is required. Points are deducted per the rubric for this behavior.
- Do not claim credit for the words, ideas, and concepts of others. Use in-text citation and list the reference of your supporting source following APA’s style and formatting. Points are deducted per the rubric for this behavior.
- Do not copy and paste information or concepts from the Internet and claim that is your work. It will be considered Plagiarism and you will receive zero for your work. A second offense results in a zero for the course. A third is termination from the university.
Job search 3.0
Research project manager’s positions and please post the following. Please do not copy and paste from web sites.
- Find three different job postings in the area you live in for a Project Manager. What are the items in the three job ads that are the same? Are there any major differences? Also, look up how much a project manager earns in your area.
- In your opinion was any of the information that you uncovered in your search interesting or surprising?
- 1000 words
Internet Programming
Internet programming
This is an open book exam. However, each student is expected to work on it alone. Students whose solutions are the same or similar will get a grade of zero!!!
Exam time is 7:30pm to 10:50pm. Read instruction in “CPSC8720FinalExam.pdf”. Submit entire solution in zip file on blackboard before 10:50pm! Exam link will close and you wont be able to submit after that. Wrap up, zip, submit at least 5 minutes before 10:50pm! Submission passed due time will not be accepted! No Exception!