Computer Science
Output Interpretation
This assignment will be an application of the underlying considerations of output interpretation to the research problem, research questions, and hypotheses from the Week 2 assignment ( Gender Preference in Human Interactions Research Plan) . I have attached the assignment from week 2, along with the original article for reference. In a scholarly document, address the following prompts as you speculate on the possibility of reviewing output from that planned study from week 2. 1. Present an upgraded version of the research problem, research questions, and hypotheses. Based on feedback from my professor, he stated that the research problem was not clearly stated in the week 2 assignment. He also stated that my original research questions were too general. 2. Discuss possible sources of uncertainty: sampling error , researcher bias, reliability and validity of the instrument . 3. Assume one of the hypotheses js actually true , and your study produces that result . What does that mean to your study ? 4. Assume one of the hypotheses is actually true ,but you study causes you to reject that hypothesis . What does that mean to your study ? 5. Suppose the results are statistically significant (p<0.005 and the null hypothesis is rejected),but the effect size is very small. How would that influence your interpretation ?
Digital Forensics
you work as a forensics investigator for the local police department. You have a friend who is having marital issues. your friend spouse may be using his smartphone to chat with other women. Your friend says she has his phone, but it is locked with a password or personal identification number (PIN). She wants you to use your forensics skills to gain access so she can divorce him and take everything. what would be the legal implications of you breaking the password of the phone and giving your friend unrestricted access to her spouses phone? Is this something you would consider doing?
Website Hosting Companies
You will research website hosting options and compare and contrast three possible hosting companies. You will explore the features as well as the cost of each company. This analysis will afford you the opportunity to become familiar with options available beyond the classroom. You will also include a short discussion about content managers and WYSIWYG authoring tools. Finally, you will conduct research to identify trends in website development. Assignment Instructions Identify three website hosting companies you would like to learn more about. Compare the features of the three hosting companies in a table. Include at least five features of each hosting company. Some examples of features include: Price Amount of space given Number of email addresses Number of domains hosted on one account Contract restrictions Advertisements Templates or scripts available Shopping cart or other add-ons Write a summary below your table that identifies which of the three hosting companies you think is the best option and why. Identify a content manager and a website development application. List three advantages and three disadvantages of each approach to website development. Summarize your research, describing which tool you prefer and why. Research current trends in website development to include ways developers try to attract an audience and ensure fresh content. You will demonstrate effective strategies to find and document this research in a discussion of your findings. Following APA citation guidelines, you will ensure your discussion demonstrates the following: Effective use of paraphrasing Using information in ways that are true to original context Understanding of information in research material that is common knowledge versus information that is copyrighted requiring proper citation Ability to apply ethical reasoning to the use of published, confidential, and/or proprietary information Assignment Requirements The body of your paper should be 2-3 pages in length formatted per APA guidelines. Assignment should follow the conventions of Standard English (correct spelling, grammar, and punctuation) and should be free of APA formatting errors. Your paper should be double-spaced, using Arial, Courier, or Times New Roman 12-point font. Be sure to include a title and a references page per APA formatting guidelines. Viewpoint and purpose should be clearly established and sustained, and the paper should be well ordered, logical, and unified, as well as original and insightful. In addition to fulfilling the specifics of the assignment, you should follow APA citation style. Directions for Submitting Your Assignment Submit your Assignment document to the Dropbox. Review the rubric before beginning this activity.
Regulatory Compliance
For this assignment, you will demonstrate your understanding of any three information security regulation compliances among the following: HIPAA, PCI-DSS, FISMA, FERPA, SOX, and GLBA. Discuss the purpose of each of the three regulations. What problem(s) is each one addressing? How do they approach the storage and transmission of data and how to handle vulnerabilities? For each of the regulations, select an organization that you believe is required to comply with that regulation. Give a brief description of the organization. *Why do you believe the regulation applies to that organization? *What legal issues might the organization be opening itself up to if it does not comply? Your paper should be 750 to 1375 words (3 to 5 pages), double spaced. Support your response with at least two outside sources, and be sure to cite them using APA format.
History Of The Internet
The final project will involve a small investigation into the growth of the Internet. It should include a very brief introduction to the development of Arpanet and the Internet, a (not as) brief discussion of its privatization, and some statistics showing how the number of users has grown since its beginning (at least back to 1985).In the essay, I would also like a graph showing the growth of the Internet plotting number of users over the years
System Vulnerabilities
In a brief and concise paper of 3 to 4 double-spaced pages (750 to 1100 words), provide specific recommendations to address the network system security vulnerabilities identified in the previous section, paying close attention to the users (authentication and authorization), web applications, and browsers. Explain why these recommendations are important in addressing the identified network system vulnerabilities. Incorporate a minimum of three references (two external and one internal). Provide in-text citations and reference accordance to APA guidelines.
Security Metrics Program
A small e-commerce shop is building its security metrics program. You are asked to help in selecting the metrics that should be measured. The table on pages 4 and 5 of the document, Building a Security Metrics Program, provides examples of different metrics that an organization can use to assess their security posture and measure security activities associated with their infrastructure. Discuss which of the metrics you think would be applicable in this scenario. How is each one important to the security metrics program? What examples of operational security KPIs are applicable? Your paper should be 750 to 1375 words (3 to 5 pages), double spaced. Support your response with at least two outside sources, and be sure to cite them using APA format.
The IS Department
For this assignment you will pick a local, national, or global company and determine the various roles, functions, and careers found in the IS department. Write a paper keeping in mind the three primary responsibilities of information systems. Determine the steps you would take to find employment in the IS field. Discuss the characteristics of leaders and followers, including a compare and contrast between them. This assignment needs to have the following: A cover page (includes student’s name, date, class title, and assignment title) Paper needs to be 1-2 pages (minimum 1 full page), 12 point font, double spaced, and writing is grammatically correct A reference page (If you are referencing information from a textbook or other source, then an APA formatted citation and reference page are necessary) Submit this assignment to the dropbox “Assignment 01.1: The IS Department.” You can navigate to this dropbox by clicking the next arrow at the top right of your screen. This assignment is worth 75 points and will be graded according to the scoring guide below.
The Virtual Machine
I have a 6 GB disk image file for the forensic analysis. I am not able to upload it here as it seems too large to do so. This image file needs to be analyzed for malware using tools like Autopsy. Any other way that I can upload this file? The report should include information to show the following: 1. Does the virtual machine contain a malicious application? 2. If so, what is that malicious application and how does it behave? 3. If so, how was this malicious application installed on the system? 4. If so, are there any indicators that the malicious code is persistent on the virtual machine? 5. Any evidence found, including filename, filepath, and MD5 or SHA1 hash value. 6. Evidence showing where the file originated from. 7. Evidence that the file was executed. Evidence that the file is malicious
IS Implementation
Group Project IS Implementation Report In Week 6, you collated the findings of several interviews. This week, the group leader will submit a report that analyzes the possible ways that the case studies and theories you studied in Weeks 14 could have made IS implementation better in the organization you selected. The report should contain: Introductions of the theories studied in the previous weeks ( This is the only question assigned to me to answer). Your report from Week 6, presenting the findings from the interview A description of the IS issues in the organization under study and the possible ways that the case studies and theories you studied in Weeks 14 could have made IS implementation better A conclusion about the relationship between the theories studied and the experiences of the organization An appendix with information about the company selected by the group and the questionnaire you developed for the interview After you have completed this week’s part of the project, it is time to compose the final Group Project Report that you will submit. Compile a 10- to 12-page Project Report in APA style that is divided into three parts: an introduction, a body, and a conclusion. In the body of the Project Report, you will include the submissions that you created in Weeks 47. Use the Groups area in the online classroom, or make alternative arrangements for collaboration with your group members. An appropriate collaboration tool for this Group Project might be the Wiki. You can find many sites on the Internet on which you can use a Wiki to collaborate on a document as a group. Submit your Project Report in the online classroom by Day 7
Use Promo Code: FIRST15