Cloud Computing and Digital Forensics

1.) In 500 words or more, consider this statement: For cloud computing to become multi-jurisdictional, it must be separated from politics.

Use at least three sources. Use the  Research Databases available from the Danforth Library not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.   Stand alone quotes will not count toward the 3 required quotes.Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. Write in essay format not in bulleted, numbered or other list format. 

2.) Do a bit of research on the hearsay rule in legal proceedings. In your own words, explain the hearsay rule and describe how it relates to the concept of an expert witness. Write a short paper, 200-300 words.

EH week9 P9

 

Hello,

i need this paper by 10/21 afternoon.

Strictly No plagiarism please use your own words.

Using the following link as your reference, select TWO and explain the differences

(viruses, worms, trojans, and bots).

What Is the Difference: Viruses, Worms, Trojans, and Bots?

( https://tools.cisco.com/security/center/resources/virus_differences)

 400 words

Make sure Strictly No plagiarism content should not match and even the reference should not match in plagiarism 

PHP,HTML,CSS,SQL

 Create web pages for your database using PHP. You should have one page that will return all the information from the database. You should create additional pages or however you want to handle it that will allow you to do various queries of your database. You should be able to retrieve and insert data. For extra credit, include functionality to delete data from your database. I will be looking for these features. Feel free to handle those functions however you feel is best for your project.
Create an html form that will allow you to enter in new information for the database. The information should be handled by a PHP script that will take the data and input it into the database.
The interface doesn’t have to look real pretty at this point. That will be done in the next phase. If you want to go ahead and make things look nice, feel free to do so.
If you have not yet created a home page, create a home page that contains links to each of the web pages you create to access your database. On each of the database pages create a button (link) to go back to the home page. Your project must have more than one page; your home page should have links to other pages to perform operations on the database. Some appropriate picture or image should be on the home page that relates to you project. Make your project look as professional as possible. You may want to show it during a interview. 

BI Week 15 Assignment

Complete the following assignment in one MS word document:

Chapter 13- discussion question #1-4 & exercise 3 & 4 & 6

When submitting work, be sure to include an APA cover page and include at least two APA formatted eferences (and APA in-text citations) to support the work this week. All work must be original (not copied from any source).

Discussion 1. Compare the IoT with regular Internet.

Discussion 2. Discuss the potential impact of autonomous vehicles on our lives.

Discussion 3. Why must a truly smart home have a bot?

Discussion 4. Why is the IoT considered a disruptive technology?

Exercise 3. AT&T is active in smart city projects. Investigate their activities (solutions). Write a summary.

Exercise 4. It is said that the IoT will enable new customer service and B2B interactions. Explain how.

Exercise 6. Find information about Sophia, a robot from Hanson Robotics. Summarize her capabilities.

Cryptography Reflection

Assignment:

Provide  a reflection of at least 500 words (or 2 pages double spaced) of how  the knowledge, skills, or theories of cryptography course have been applied, or  could be applied, in a practical manner to your current work  environment. If you are not currently working, share times when you have  or could observe these theories and knowledge could be applied to an  employment opportunity in your field of study.

Requirements:

· Provide a 500 word (or 2 pages double spaced) minimum reflection.

·  Use of proper APA formatting and citations. If supporting evidence from  outside resources is used those must be properly cited.

· Share a personal connection that identifies specific knowledge and theories from this course.

·  Demonstrate a connection to your current work environment. If you are  not employed, demonstrate a connection to your desired work environment.

·  . The assignment asks that you reflect how the knowledge and skills obtained through meeting cryptography course objectives were applied or could be applied in the workplace.

plagiarism report must

BI-14

 Discuss the current business process in a specific industry. 

Note the following:

-The current business process itself.
-The industry the business process is utilized in.
After explaining the current situation, take the current learning from the course and:
Explain a new technology that the business should deploy. 

Be specific, don’t only note the type of technology but the specific instance of technology.  (For example, a type of technology is smart automation a specific type of automation is automated light-dimming technology).

Note the pros and cons of the technology selected.

Note various factors the business should consider prior to deploying the new technology.

The above submission should be three pages in length.  Remember the total length does not include the APA approved cover page or the references.  There should be at least three APA approved references to support your work