Module 5 Journal Article Analysis

 Each student will select one of the key terms listed below and conduct a search of Campbellsville University’s online Library resources to find 1 recent peer reviewed article (within the past 3 years) that closely relate to the concept. Your submission must include the following information in the following format:

Key terms:

Influence as it Relates to Negotiation

Persuasion as it Relates to Negotiation

Power as it Relates to Negotiation

Pressure as it Relates to Negotiation

DEFINITION: a brief definition of the key term followed by the APA reference for the term; this does not count in the word requirement.

SUMMARY: Summarize the article in your own words- this should be in the 150-200 word range. Be sure to note the article’s author, note their credentials and why we should put any weight behind his/her opinions, research or findings regarding the key term.

ANALYSIS: Using 300-350 words, write a brief analysis, in your own words of how the article relates to the selected chapter Key Term. An analysis is not rehashing what was already stated in the article, but the opportunity for you to add value by sharing your experiences, thoughts and opinions. This is the most important part of the assignment.

REFERENCES: All references must be listed at the bottom of the submission–in APA format

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Case Project 8.3

You work for a mid-size corporation known for its inventions that does a lot of copyright and patent work. You’re investigating an employee suspected of selling and distributing animations created for your corporation. During your investigation of the suspect’s drive, you find some fileswith the unfamiliarextension .xde. The network administrator mentions that other xde files have been sent through an FTP server to another site. Describe your findings after conducting an Internet search for this file extension.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Linux Ubuntu assignment

 Problem Statement DOMAIN: Linux Fundamentals Focus: Development Tom needs to create user accounts for new joiners Jane and Jack in his system and give them permission to view and edit common repositories. He needs to create a cron job to delete empty files and directory every day at 00:00 am and need to upgrade the system every week on Tuesday 6:00 am. As part of his role he also needs to monitor system usage (CPU load, Memory usage, disk usage, network usage, active logged in users). He needs to install Git as SCM in a remote system and put system usage data there. He would need to fetch the data on remote server and needs to maintain the remote server from his desktop as well. He also needs to restrict users to access youtube from this machine. Approach to Solve: 1. Tom creates user accounts for Jane and Jack in his system. 2. Separate home directories are created for each of the three users. 3. They have a common repository script where every user has access to view and edit files. 4. Tom installed git as the SCM in a remote system. 5. He set a chron job to delete empty files and directory from /tmp folder at 00:00 am. 6. He set a chron job to upgrade the system every week on Tuesday 6:00 am. 7. Tom creates a script which has functionalities to display CPU load, Memory usage, disk usage, network usage, active logged in users. 8. He puts them in git repository. 9. He runs the scripts to get data for remote server to check and maintain the remote server from his desktop. 10. He restricts users to access youtube from this machine. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Research paper Digital Forensics tool

Conduct graduate-level, academic research on the following topics and draft a five pages , APA paper summarizing your research results. The paper counts for 300 points of the 1,000 total course points.

1)What is the state of cybersecurity viz. digital forensics as its function to mitigate risk and solve incidents?

2)What are some of the prominent, open-course digital forensics tools that the field deploys to help conduct forensics investigations? What are some missed opportunities that the industry reflects?

3) What are some recent (within last five years) DF successes? Describe two to five incidents that were solved, or partially solved, by digital forensics practitioners. These could be criminal cases or civil cases, such as contract disputes, intellectual property theft, divorces, even. You should be thinking about this part of the research as demonstrating case studies that highlight the importance of forensics to cybersecurity.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Cloud Benchmarking (5-pages)

 

Competency

Evaluate cloud application benchmarking and tuning procedures.

Scenario

You are the cloud engineer for a construction company. Your company stores their complex architecture drawings on the public cloud.

The company has created a web application that allows clients to review the architecture drawings from this public cloud. The architectural drawings are large, which causes performance issues. Clients need to download the large files on their computers, causing an impact on the web site and creating client computer performance issues.

You are aware of benchmarking tools which can evaluate cloud service performances. Your manager asks you to compare some of these tools and recommend one to be implemented.

Instructions

Provide a proposal to your leadership to recommend a benchmarking tool and cloud services application. The proposal should include the following points.

  • A list of available cloud benchmarking tools
  • A comparison of this list
  • An explanation of the importance of benchmarking
  • A License Model for cloud benchmarking tools
  • The steps used to evaluate the performance of benchmarking tools
  • A description of the different ways to tune cloud services for improving performance

Be sure to use a professional tone and check your spelling and grammar.

Include a minimum of 5 scholarly resources

Length

Microsoft Word, 5-6 pages

Grading Rubric – Must answer all below to PASS

Word document is 5 or more pages.

5 scholarly references provided; documented correctly.

A list of available cloud benchmarking tools has been provided.

Full, robust, and detailed description of available cloud benchmarking tools.

Full, robust, and detailed explanation of the importance of benchmarking.

Full, robust, and detailed description of a License Model for cloud benchmarking tools.

Full, robust, and detailed explanation of the steps used to evaluate the performance of benchmarking tools.

Full, robust, and detailed explanation of the different ways to tune cloud services for improving performance.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

appliancewarehouse case study 10

 ERP   Carlie Davis <[email protected]>July 19, 2020   

Hi J,

We just got some very exciting news! We heard that the owner is planning to open up two more Appliance Warehouse stores in the next 2 years. Isn’t that amazing?

In light of this news, I started to wonder how we might best accommodate our growth through our computerized systems. We will be increasing our workforce, inventory, and revenues with this expansion. I think that we might need to implement an enterprise resource planning system to better coordinate all of our various departments and stores. In fact, I think it might make sense to implement this system prior to the second store opening.

Could you research the various ERP systems on the market and make a recommendation which system we should consider? Make sure to compare at least three systems before making a recommendation.

Thanks.

Carlie

______

 SIM: Network   Carlie Davis <[email protected]>July 20, 2020   

Hi J,

As we design our new SIM system, I was thinking about the news of the two new future stores. Then, I started thinking about scalability. How scalable do we need our new system to be? What system requirements should we add with regards to scalability issues?

Furthermore, how do you think we should set up our computer network? Is there a topology that you think would be most appropriate for AW? Do you think we need online processing or do you think batch processing would be adequate? So many questions still to answer!

Let me know your thoughts on these issues.

Carlie

_______

 Security   Carlie Davis <[email protected]>July 21, 2020   

Hi Joseph,

The programmers and database admin have asked about the security requirements for this system. I don’t think that we’ve discussed these requirements. I’d like for you to think through the classes of users (Appointment setters, Technicians, Part Department, Management, Customers) and what type of access they require. Also, how do you think we need to protect the technician’s machines and the server?

Security is such an important issue now. There have been so many security breaches recently with our competitors.

Please provide this information as soon as you can. Thanks!

Carlie

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

DM WA-5

 

1. Consider the data set shown in Table 5.20 (439 page). (Chapter 5)

(a) Compute the support for itemsets {e}, {b, d}, and {b, d, e} by treating each transaction ID as a market basket.

(b) Use the results in part (a) to compute the confidence for the association rules {b, d} −→ {e} and {e} −→ {b, d}. Is confidence a symmetric measure?

(c) Repeat part (a) by treating each customer ID as a market basket. Each item should be treated as a binary variable (1 if an item appears in at least one transaction bought by the customer, and 0 otherwise). Use this result to compute the confidence for the association rules {b, d} −→ {e} and {e} −→ {b, d}.

.

2. Consider the transactions shown in Table 6.15, with an item taxonomy given in Figure 6.15 (515 page). (Chapter 6)

(a) What are the main challenges of mining association rules with item taxonomy?

(b) Consider the approach where each transaction t is replaced by an extended transaction t_ that contains all the items in t as well as their respective ancestors. For example, the transaction t = { Chips, Cookies} will be replaced by t_ = {Chips, Cookies, Snack Food, Food}. Use this approach to derive all frequent itemsets (up to size 4) with support 70%.

(c) Consider an alternative approach where the frequent itemsets are generated one level at a time. Initially, all the frequent itemsets involving items at the highest level of the hierarchy are generated. Next, we use the frequent itemsets discovered at the higher level of the hierarchy to generate candidate itemsets involving items at the lower levels of the hierarchy. For example, we generate the candidate itemset {Chips, Diet Soda} only if {Snack Food, Soda} is frequent. Use this approach to derive all frequent itemsets (up to size 4) with support 70%.

3. Consider a data set consisting of 220 data vectors, where each vector has 32 components and each component is a 4-byte value. Suppose that vector quantization is used for compression and that 216 prototype vectors are used. How many bytes of storage does that data set take before and after compression and what is the compression ratio? (Chapter 7) 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Forensic Assignment 9

Digital forensics is often summarized in four phases (e.g. collection, preservation, analysis and reporting). We have learned this already.

However, I think it’s important for you to be aware of how there are many different excellent models out there that seek to break down digital forensics in a series of flowcharts / phases / moving parts. Then Chapter 14 talks about the different trends and future directions.

So, I am attaching one research paper that does just that and it is a great read. Please check out the Forensic Models.pdf found in the Supplemental Materials folder.

 Some of the models out there are very specific e.g. for network forensics, triage, or cybercrime. It’s all fascinating. Then the article proposes a new one Generic Computer Forensic Investigation Model (GCFIM).

I would like you to read this – who knows you may actually see a model that resonates well with you. This can be helpful if you are asked to consult on what is the right model that should be followed in a particular legal matter in today’s brave new world.

Instructions

Now that you have reviewed the different models of digital forensics, what are your thoughts about the author’s proposed model? Do you agree or disagree? Do you prefer the other models and if so what is your preference and why? Note – there are NO right or wrong answers here. I value your insights. No more than 2 pages please.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Portfolio assignment – Bus Cont Plan&Disas Recov Plan (ISOL-632)

 I need the document according to the attached template with the requirements mentioned below. Thanks.

Students will create a Disaster Recovery Plan for either the organization they work for or one they wish to work for in the future.  The plan will follow the template/example provided.

 Student should request prior authorization of company to be addressed to ensure that all students are working on unique companies.

Even though this is a technical document, for academic purposes, all sources should be cited and referenced.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Final

In the last week of class, we are going to complete a reflection activity. This discussion topic is to be reflective and will be using your own words and not a compilation of direct citations from other papers or sources. You can use citations in your posts, but this discussion exercise should be about what you have learned through your viewpoint and not a re-hash of any particular article, topic, or the book. Items to include in the initial thread:

  • “Interesting Assignments” – What were some of the more interesting assignments to you?
  • “Interesting Readings” – What reading or readings did you find the most interesting and why?
  • “Interesting Readings”“Perspective” – How has this course changed your perspective?
  • “Course Feedback” – What topics or activities would you add to the course, or should we focus on some areas more than   others? 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now