Computer Science
The IS Department |Get Solution
For this assignment you will pick a local, national, or global company and determine the various roles, functions, and careers found in the IS department. Write a paper keeping in mind the three primary responsibilities of information systems. Determine the steps you would take to find employment in the IS field. Discuss the characteristics of leaders and followers, including a compare and contrast between them. This assignment needs to have the following: A cover page (includes student’s name, date, class title, and assignment title) Paper needs to be 1-2 pages (minimum 1 full page), 12 point font, double spaced, and writing is grammatically correct A reference page (If you are referencing information from a textbook or other source, then an APA formatted citation and reference page are necessary) Submit this assignment to the dropbox “Assignment 01.1: The IS Department.” You can navigate to this dropbox by clicking the next arrow at the top right of your screen. This assignment is worth 75 points and will be graded according to the scoring guide below.
The Virtual Machine |Get Solution
I have a 6 GB disk image file for the forensic analysis. I am not able to upload it here as it seems too large to do so. This image file needs to be analyzed for malware using tools like Autopsy. Any other way that I can upload this file? The report should include information to show the following: 1. Does the virtual machine contain a malicious application? 2. If so, what is that malicious application and how does it behave? 3. If so, how was this malicious application installed on the system? 4. If so, are there any indicators that the malicious code is persistent on the virtual machine? 5. Any evidence found, including filename, filepath, and MD5 or SHA1 hash value. 6. Evidence showing where the file originated from. 7. Evidence that the file was executed. Evidence that the file is malicious
Internet Flexibility |Get Solution
The Internet allows us to complete tasks quickly, with the greatest amount of flexibility. We use social media sites for personal and professional communication, use Strayer University online resources to attend further our education, and use email as a basic communication tool in todays world. However, there are people on the Internet who have ulterior motives for connecting with us. The goal of this week’s discussion is to help you spot when you are interacting with suspicious characters on the Internet. Click on the below video or use this CHOOSE A SCENARIO You received an email from what appears to be Strayer University requesting you to login using a link and change your username and password because your account was compromised. You are on a social media website chatting with a friend, but your friend starts to ask questions that they should know the answers to and the conversation seems strange or off. You received a text from what appears to be your bank stating that your account may be compromised and they need key information to verify your identity with your last five transactions. ADDRESS THESE POINTS Welcome: Please provide a greeting to begin your post (e.g. Hello Professors and Peers!). Paragraph 1: What scenario did you choose? Why? How do you know if the communication in your scenario is legitimate? How do you respond to the communication in your scenario (i.e. identify the correct steps to take)? Paragraph 2: What are the repercussions of taking an incorrect action in your scenario? Are the repercussions irreversible? Why or why not? Do you have personal experience with the type of scenario you chose? If so, describe what happened to you and what you learned. If not, did you learn anything new from walking through the scenario you chose? Closing: Sign your post with your preferred name so that my team knows how to address you in the discussion forum. ORGANIZE YOUR POST Make sure that you always organize your post into paragraph format with 200+ words. Create a conversational flow (e.g. talking to someone) with a scholarly tone (i.e. no text talk or slang, spell and grammar check always using a tool such as Grammarly, etc. PEER REVIEW RE: Week 10 Discussion COLLAPSE Overall Rating: 1 2 3 4 5 1 2 3 4 5 Greetings! Facebook has been the center of many accounts being hacked and taken over by seemingly nice strangers that appear to be a friend. If I was chatting with a friend and they started to act strange by asking questions already known or asking/inviting me to participate in Forex or a money scheme I would immediately know someone is impersonating my friend. Recently, on Instagram I received a friend request from someone I was already friends with. I accepted the friendship and reached out to my friend to ask if they created a new page. When it was discovered they didn’t, I immediately reported the fake profile and the profile was deleted. Had I not suspected or known it was fake, the person could have stolen valuable information. Fortunately, the person’s who’s profile that was stolen was my ex husband. After the fake profile was removed, we both had a great laugh; however, we learned a valuable lesson. It’s important to change your passwords often; and, oftentimes, people create fake profiles from downloading someones’ pictures and replicating their information without ever accessing their personal profile. Had the intrusion been Facebook, sensitive information could have been stolen. Therefore, we both decided we would no longer share updated information about our whereabouts, locations and family vacation pictures.
History Of The Internet |Get Solution
The final project will involve a small investigation into the growth of the Internet. It should include a very brief introduction to the development of Arpanet and the Internet, a (not as) brief discussion of its privatization, and some statistics showing how the number of users has grown since its beginning (at least back to 1985).In the essay, I would also like a graph showing the growth of the Internet plotting number of users over the years
Security Metrics Program |Get Solution
A small e-commerce shop is building its security metrics program. You are asked to help in selecting the metrics that should be measured. The table on pages 4 and 5 of the document, Building a Security Metrics Program, provides examples of different metrics that an organization can use to assess their security posture and measure security activities associated with their infrastructure. Discuss which of the metrics you think would be applicable in this scenario. How is each one important to the security metrics program? What examples of operational security KPIs are applicable? Your paper should be 750 to 1375 words (3 to 5 pages), double spaced. Support your response with at least two outside sources, and be sure to cite them using APA format.
Regulatory Compliance |Get Solution
For this assignment, you will demonstrate your understanding of any three information security regulation compliances among the following: HIPAA, PCI-DSS, FISMA, FERPA, SOX, and GLBA. Discuss the purpose of each of the three regulations. What problem(s) is each one addressing? How do they approach the storage and transmission of data and how to handle vulnerabilities? For each of the regulations, select an organization that you believe is required to comply with that regulation. Give a brief description of the organization. *Why do you believe the regulation applies to that organization? *What legal issues might the organization be opening itself up to if it does not comply? Your paper should be 750 to 1375 words (3 to 5 pages), double spaced. Support your response with at least two outside sources, and be sure to cite them using APA format.
Technology Reliance |Get Solution
In this assignment, you will write an argumentative essay on the following topic: Technology has become an essential component of our society. Some people feel that we have become too reliant upon technology to help us accomplish day-to-day tasks. From spell-check in a word processor to an artificial intelligence performing a Google search, there is little doubt that our culture, as well as our future, is almost completely overshadowed by technology. While some people feel uneasy about such a reliance upon technology, others embrace the digital future and feel we should go even further. What is your position? Do you feel that technology reliance is beneficial or detrimental to individuals, families, and society as a whole? Write an essay that supports your position. Your essay should total about 800-1000 words. Argumentation is a rhetorical style which calls for a change in the attitude and/or conducts on the part of the reader. An argumentative paper attempts to change the readers mind and to convince the reader to agree with the point of view or opinion of the writer. Make sure that you avoid the logical fallacies. Here is the suggested format for your essay: Introduction Logical proof of your position Acknowledgment and refutation of opposing views Conclusion The essay should adhere to the following requirements: Be double-spaced Use at least three sources, Follow MLA documentation style Be at least 800 to 1000 words Utilization of the citation feature in MS Word to generate references and Works Cited page is highly recommended Must addressing the essay prompt. Write an essay that argues about technology over-reliance. Addresses topic with enthusiasm and conviction and shows knowledge of subject matter. Writer narrowed discussion to one or two specific technological topics and reasoned from that point.
Analyzing Data |Get Solution
Option 1: For anyone new to Excel 1. Complete this screenshot tutorial introductory_excel.pdf using this sample data: data.xlsx . NOTE: There’s been some confusion in the past because the first few pages of the PDF document are all explainer, without directions. Keep reading and at page 6, it will start having directions for things you should do in the Excel file. 2. Save your Excel sheet and submit your work. 3. Submit a brief reflection. I haven’t used this assignment before and I want to know what you thought of it – was it easy/hard? What aspects of it were useful? What aspects of it were not? What pieces needed more explanation? Were there pieces that felt too basic? Do you feel like you will use what you learned here? Approximately how long did it take you? Any thoughts you have on it, please share them. Note: I’ve provided what I hope are helpful comments throughout on the PDF in blue. Some of them are general; some of them are specifically to redirect Mac users, since this guide was created from a PC. If you are using a ChromeBook, and therefore Google Sheets, several elements of this assignment won’t work for you. Contact me for an alternative. Option 2: Some experience with Excel This option is intended for folks who have a little experience with excel. If you are already comfortable with basic excel navigation this option takes you into a little more detail not just the mechanics of where to click, but also thinking about why you do what calculations when (and how). It provides two data from which to chose to analyze, guided by the questions provided on a worksheet. 1. Read Herzog – Analyzing Data.pdf and Herzog – Visualizing Data.pdf Note: If you’d like to work along with the readings, the data sets being used can be found here: https://study.sagepub.com/herzog 2. Select which of these sample data sets you’d like to work with: 2018 NCAAF Coach and Asst. Coach Salaries.xlsx federalelections2016.xlsx If you’d like to use a different data set, let me know. 3. Download the Data Analysis & Visualization Worksheet.docx 4. Work through the questions on the worksheet for your analysis. Submit your completed worksheet & the spreadsheet with your analysis via Blackboard. 5. Also submit a brief reflection on your experience with this assignment. Im always playing with this assignment to figure out what works best so I want your feedback! What aspects of it were useful? What aspects of it were not? What pieces needed more explanation? Were there pieces that felt too basic? Do you feel like you will use what you learned here? Approximately how long did it take you? Any thoughts you have on it, please share them. Option 3: For anyone who is a pro in Excel, or who wants more experience and practice coding There are several coding languages that are frequently used for data analysis. If you are already a pro in Excel, or just interested in getting some more experience with coding, you can use this option to learn R for data analysis. Python is another frequently used language for data analysis, but it requires a little more work to get situated, so I’ve opted for R here. If you are curious, here is an infographic about Python vs. R. If Python is it for you, talk to me and we can discuss what that option might look like. There are several steps to this assignment 1. Complete lessons 1 & 2 of the R codecademy course. (Note, there are Pro/paid elements skip those). 2. Download RStudio, and R. A few notes about these steps: For RStudio, I did Desktop because I didn’t notice Server. I can’t speak to how Server is different. Just make sure you are using the open source one, not one of the paid options) For downloading R: yes, I realize the site looks like a strange relic of the 90s, but don’t let that cause dismay. It’s legit. 3. Watch the three BasicBasics Videos from R-Ladies Sydney (in BasicBasics 1, BasicBasics2, and BasicBasics 3), to get to know RStudio, and get up and running. (I recommend you follow along with her to import the packages. Everything else is up to you if you want to just watch or work with her. Note: The first half of the third video is really important, but the second half isnt as relevant to what we are doing so you dont have to keep watching. 4. Download the DiscoveryTechnologyR Zip folder below. In this folder you’ll find an R Studio project, a data set and a script file. Open the project file in RStudio and complete the directions provided in the script as #comments with your code. 5. Save the project, zip your project folder and upload it to Blackboard. 6. Submit a brief reflection on your experience with this assignment. This is a new option for this assignment so I want your feedback! What the documentation provided sufficient to accomplish the assignment? Approximately how long did it take you? Would you have liked to see more covered (like data visualization)? Would you have liked to see less covered? Any thoughts you have on it, please share them DiscoveryTechnologyR.zip A few notes: I am new to R too, which means that any challenges you encounter, I probably encountered them too while getting situated, so ask for help! Many many times the reason my code didn’t work was because of a typo I struggled with piping cause I was doing it wrong. To save you from the trouble I had let me share what I figured out now: When they teach variable naming its always at the beginning. I put it after the piping but that doesn’t work, you gotta do it before the piping. For example chosen_cols <- artists %>% select(-country,-year_founded,-albums) head(chosen_cols)
Components Of MIS |Get Solution
Describe 5 components of MIS and apply them to a specific context in your field of study. What risks do you think need to be managed? How?
In-house Development |Get Solution
Congratulations. Your project has been staffed and you are about to meet with the team for the first time. Initial impressions are important and youll need visuals for your presentation. Create a slide show (in PowerPoint or similar software) in which you address the following, in this order: Goals: What the project hopes to accomplish. Critical Success Factors: Identify at least four different stakeholders; for each, list at least two things that the stakeholder requires in order to deem the project successful. Acquisition strategy: Should the system be built in house, created by a contractor, purchased off the shelf and customized, or leased as a service? Explain your rationale. Resources: For in-house development, what people and skills are required and what development life cycle do you recommend? Otherwise, identify three candidate organizations that can deliver the system. System functions: In a table format, summarize the types of users for the system; the business reason(s) each would use the system; the ways that the system supports each of these needs and how this support differs from the current system. Connectivity: Provide a diagram that shows how the system will connect to the other information systems and what data flows among them. Security: List the most serious cybersecurity threats and vulnerabilities of the new system. Suggest strategies to address them. Mobility: Identify the systems capabilities for mobile use. Include a title and summary slide. Use one slide for each of the preceding eight points. Include speaker notes or audio narration that explains each slide more fully.
Use Promo Code: FIRST15