bi10 work

1. What is Big Data? Why is it important? Where does Big

Data come from?

2. What do you think the future of Big Data will be? Will

it lose its popularity to something else? If so, what will

it be?

3. What is Big Data analytics? How does it differ from regular

analytics?

4. What are the critical success factors for Big Data

analytics?

5. What are the big challenges that one should be mindful

of when considering implementation of Big Data

analytics?
6 . At teradatauniversitynetwork.com, go to the Sports

Analytics page. Find applications of Big Data in sports.

Summarize your findings.

Need 2 pages
be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) to support the work this week.
All work must be original (not copied from any source).

Intro to programming responses

Provide (2) 200 words response with a minimum of 1 APA references for RESPONSES 1 AND 2 below. Response provided should further discuss the subject or provide more insight. To further understand the response, below is the discussion post that’s discusses the responses. 100% original work and not plagiarized. Must meet deadline.

RESPONSE 1:

An if-then script simply takes an argument from a variable and checks to see if it is true. If it is true, then it executes the parameter. If it is false, then it executes a different parameter which can be another defined variable or an exit condition. Loops repeats the processed if-then program as many times as indicated within the set parameters until an exit condition is reached. The loop needs an exit condition that can be met or it can become an endless loop, or infinite loop. An infinite loop can accidentally use up 100% of your CPU usage that will lock up your device or cause it to crash. Ways to avoid an endless loop is to always make sure to set an exit condition that can be met, or makes sense to the language you are programming in. There may be a “continue” statement with another variable that could be out of place preventing the code to move on and continuously loop. Another way to prevent infinite loops is to set timeout conditions in your code. Also, if you are working with complex loops that have the potential to be endless, you may consider testing your code first through a walk-through program, such as the Python Tutor we will be using in this class and others such as Google Chrome Dev Tools. This will allow you to step through and visualize what your program is doing.

Endless loops can create a denial of service (DOS). You may accidentally DOS yourself! In fact, you can set up a simple script that throws specific types of packets to a single router or switch interface (IP and port range) over and over again causing a denial of service effect. You can also overwhelm firewalls by doing this, especially if they are doing deep packet inspections. There are several quirky vulnerabilities out there listed in the MITRE CVE that has exploits like this already written and tested. Building a virtual range to test these out is a lot of fun and you learn networking quickly.

RESPONSE 2:

This week we learned about variables along with creating loops and if-then scripts. Our textbook, Microsoft WSH and VBScript Programming for the Absolute Beginner, 4th Ed. by Jerry L. Ford, defines a variable as “an individual piece of data such as a name, number, or date that is stored in memory” (2014, p. 85). Variables are the numbers, dates or names in which you are looking for or defining in your scripts. For example, in this week’s practice scripts, fnum, snum, and total were the variables that were being defined. Once we defined are variables, we were able to look more into loops and if-then scripts.

Loops are “collection of statements repeatedly executed to facilitate the processing of large amounts of data” (Ford, 2014, p. 144). Loops could be used to repeat a certain function until the end condition is met. For example, in this week’s practice loop script, we set a up a loop where the program would produce numbers between the first variable, fnum, to the second variable, snum. Once the computer reached snum, the condition was met and the loop ended. The if-then script we learned included a loop, however, the loop would only run if the second number we typed was greater than the first number we chose. If the first number was larger than the second number, the loop would not run. In order to run the loop, the condition must be met prior to the program running the script. The whole purpose of the if-then script is to determine if the argument depicted in the script is accurate based off the variables provided. If the variables make the script accurate then it runs; if not, then it doesn’t run the script.

When creating loops, individuals might incorrectly type an “exit function” or create an improper condition to stop the loop. If this happens, an endless loop could be created. Based off initial research, endless loops are not necessarily dangerous, but rather annoying. Most people can exit an endless loop by doing a hard-exit of the program, or even shutting down their computer. However, some individuals might create an endless loop in order to create a DoS (Denial of Service) attack. DoS attacks are meant to prevent a person from using a certain program, and if someone was stuck in an endless loop, they would not be able to use that program until they manage to exit or stop the loop.

privacy qa

Answer each these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.  

1. What is privacy?

2. What risks, if any, does facial recognition software raise?

3. How much information about you can be found on-line with a simple google search? 

4. How much information about you can be found by searching government and commercial databases?

5. Describe informed consent. 

6. Should secondary use of consumer provided data be available without notice to the consumer?

7. How do data mining and predictive analytics work? 

8. Watch this Science Friday video by Ira Flatow. And, offer your opinion – Are advancing algorithms taking our free will? 

9. Should Facebook be regulated, at least as far as it’s privacy and data policies? 

10. How many public cameras is too many? 

Research Paper: COSO Framework

The COSO framework of internal controls is practiced within companies around the world. The objectives of the COSO framework are closely related to its five components. For this week’s activity, please discuss these five components of the COSO framework. Be sure to include each components’ impact on each of the COSO framework objectives. What do you feel an auditor would most be concerned with during an IT audit? Lastly, discuss suggestions for integrating COSO framework compliance into a company in which you are familiar with. 

Your paper should meet the following requirements:

• Be approximately four to six pages in length, not including the required cover page and reference page.

• Follow APA6 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

300 words with api

 Computerized Operating Systems (OS) are almost everywhere. We encounter them when we use our laptop or desktop computer. We use them when we use our phone or tablet. Find peer reviewed articles that discuss the advantages and disadvantages of at least two different programming languages that are NOT portable across different types of operating systems (Windows, Linux, Unix, Android, z/OS, z/VM, z/VSE, etc). 

Assessment 3: Digital Forensic Report This document supplies detailed information on assessment tasks for this unit.

Students should demonstrate their ability to review and critique the digital forensic hackathons hosted in recent

years and their write-ups. Understanding these digital forensic tasks and their technical solutions will significantly

help students deepen the understanding of the industry’s standard practice and general expectations of forensic

abilities in the job market. Hackathon experiences and achievements have been valuable in the cybersecurity

industry. Students will identify, investigate, and evaluate six forensic hackathon tasks and the associated write-ups.

Students will be assessed on their ability to identify the appropriate tasks and write-ups, reproduce the technical

solutions, justify the technical findings, reflect on the learning experiences, and present a professionally written

essay.

Instructions

Students are required to independently write an essay of approximately 4,000 words and exhibits to support the

findings and a bibliography. This essay should consist of the following parts:

• a professionally made title page with student name and student ID

• an abstract of 200 words capturing the highlights of the findings

• a non-technical section summarizing the six identified hackathon tasks and brief descriptions of their

write-ups along with justifications of their digital forensic relevance

• a non-technical section critiquing the issues of the existing write-ups of each hackathon task in multiple

perspectives

• a technical section reproducing the solutions of the six hackathon tasks by using proper digital forensic

tools with supporting evidence (screenshots)

• a non-technical section reflecting personal learning experiences towards solving these tasks and aligning

these to our curriculum

• conclusion (around 150 words)

• reference (Harvard style)

Disaster Recovery Plan

Submit a report that discusses the techniques used by malware developers to disguise their code and prevent it from being analyzed.  Give suggestions on how these techniques should be classified and ranked in the disaster recovery documentation.

Assignment should follow all APA rules and include a min. of (1) citation/reference.