Unit 4.1 Discussion: Critiquing Presentations

Unit 4.1 Discussion: Critiquing Presentations

After watching the speeches, “First World Problems” and “ How Guinea Pigs Help Autistic Children” in the unit resources, critique the effectiveness of each speaker’s organization and delivery.  

How did the choices made by the speaker impact the level of engagement you had with each speech? 

Some areas to comment on are: an engaging introduction, smooth transitions, credible evidence to support main ideas, concise conclusion with memorable ending, varied tone of voice, eye contact and other body language.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

(1,200 words) Find various (current, i.e. posted within the last month) online job positions related to the field of information/technical security and describe each job position

 Find various (current, i.e. posted within the last month) online job positions related to the field of information/technical security.  Describe each position in detail, the skills required for the position, and the purpose of the skills? How do the skills/requirements for these positions differ, and why?  

 1200 Words – Exclude references!! 

 

***no Plagiarism, APA format***

!!!! No money Negotiations after accepting the Bid !!!!!!!

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Operational Excellance

This week we focus on the productivity paradox.  Please define the productivity paradox and explain current thinking on this topic

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Wk 3 – Apply: Hacking Threats

Assignment Content

  1. This week, your flooring sales and installation company client wants you to explain the different kinds of attack threats their business faces from hackers.

    Write a 1- to 2-page memo or create a 1- to 2-page table that summarizes attack threats from hackers to any business, noting which are applicable to your client’s business; how the vulnerabilities in a system can be exposed; and countermeasures that can mitigate against threats from attack.

    Describe sniffing attacks, identify a protocol that is vulnerable to sniffing, and suggest appropriate countermeasures.

    Describe session hijacking, provide an example of a specific threat from session hijacking, and recommend appropriate countermeasures for the threat. 

    Describe spoofing, provide an example of a specific threat from spoofing, and recommend appropriate countermeasures for the threat. 

    Describe poisoning attacks, provide an example of a specific threat from a poisoning attack, and recommend appropriate countermeasures for the threat. 

    Describe denial-of-service (DoS) attacks, explain the threat from DoS attacks, and recommended countermeasures that can prevent them.

    Format your references according to APA guidelines.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Artificial Intelligence

What are the intelligent agents of AI? Write the agents and environments of artificial intelligence What are the nature of the environments and structure of the agents.?

 Requirement 

APA format. You must include 3 scholarly reviewed references that are DIRECTLY related to the subject. 

Pages : 3 ( 1000 words)

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Advanced Operating Systems Discussion

The control of the serialization of memory management is difficult in a “Virtual Memory” and especially when “Virtual Machines” are included. Discuss how an operating system manages “computer memory in both single and multiple OS instances”. Add discussions about how some of the problems have been addressing including respective advantages and disadvantages. 

Follow these instructions:

Main Discussion : 100 Points( 600 Words)

4 Responses : Each Response 200 words 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

DDoS, LDAP, Cyber security

 Please  explains what is a DDOS using a LDAP Reflection attack ( class – cyber security ). Imp and need within 24 hours please 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Need detailed Paper on the Following Topic….format should be in IEEE Format

Topic:  Combined Wireless Network Intrusion Detection Model Based on Deep Learning 

Instructions:

The term paper it should be of professional quality and be in the format of an IEEE transaction style. 

Figures must be clear and drawn by you. 

Proper citation of references must be embedded in the term paper. All term report should be printed in 8.5x11in format, 10 size, time new roman font, two-column, about 8 pages, left, right, top, bottom margin 1 inch, and contain the following:

1. Title page.

2. Abstract (summary of the paper).

3. Introduction (problem motivation, background materials, related work, summary of objectives and methods).

4. (i) Description of existing algorithms/protocols for survey papers; 

   (ii) system model, assumptions, and/or formal problem formulation for research-oriented papers.

5. (i)   Comparison   among   existing   algorithms/protocols   and   discussion   on   possible improvements/enhancements; 

  (ii) project results (derivation, proof, justification, or detailed

design/simulation) in one or more numbered sections for research-oriented papers.

6. Conclusions (evaluation of results, suggestions for improvements, or future work).

7. References must follow IEEE Transactions format (at least 10 references). Proper citation of

references must be embedded in the term paper.

8) please have some diagrams as well…

One of the example is attached for reference….

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

2 Discussions and 3 Case Studies

Discussion 4.1 (Cyber)

Due: Initial Post due Wednesday, Replies due Sunday

Provide the requirements of the Sarbanes-Oxley Act.  Do you think this Act is good or bad?  Explain your answer and uses sources to support your points. 

Discussion 4.1 (Hacking)

Due: Initial Post due Wednesday, Replies due Sunday

What are some things you should consider when using Python as a Hacking tool?  Why?  What things should you avoid?  Why? 

Case Study ( Cyber Crime)

Due: Sunday, End of Module by 11:55 p.m. EST

  • Individual Paper:
    • In chapter 8 you should have read about the Federal Information Security Management Act (FISMA).  Assume that this Act hasn’t been enacted yet and you are the one that is in charge of either getting this Act passed or in charge of making sure this act doesn’t get passed (You are pro FISMA or against FISMA).  In a 4 to 5 page paper describe FISMA, list the pros and cons, and make a decision on your support or non-support for the act.  Make sure you follow APA format and cite all of your sources.
  • Team Presentation:
    • Build a PowerPoint presentation on what you just discussed in your paper about FISMA.  Your presentation should contain 10 to 20 slides including the title and reference slides.  When you present your project remember that you are trying to convince people to either approve or disapprove FISMA.

Writing Requirements: 

  • Team PowerPoint presentation 10-20 slides
  • 4-5 page paper in APA format, for citations and refereneces

Intro to Python Completion 

Due: Sunday, End of Module by 11:55 p.m. EST

Midterm Requirements

  • Individual Paper:
    • We will be completing the Intro to Python Primer. Your goal will be to write a 3 to 4-page paper where you discuss the use of Python in the field of Data Analytics.         

Writing Requirements: 

  • 4-5 page paper in APA format, for citations and references

Paper (Individual) Python Used in Hacking

  • Individual Paper:
    • Write a 3 to 4-page paper where you discuss the uses of Python in hacking. This will require you to find an article on the use of Python in Hacking and explain how the article covers the use of Python in the hacking process.       

Writing Requirements: 

  • 4-5 page paper in APA format, for citations and references

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Android Platform

Developers should develop as if they expect their app to be available to all Android devices.

  • Besides cost, why should mobile app developers target the Android platform?
  • Why is Android competition to itself?
  • Describe key ingredients needed to create mobile applications on the Android platform. 
  • What improvements are made to mobile development by use of Google’s Android Studio SDK?

Need 2-3 Pages

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now