Question 4

Q1 Using the five paragraph format, discuss US life expectancy gap visualization.  This paper should be single spaced. It should have a meaningful title. It must include 3 quotes from the text or from expert sites found in the library’s research databases or from the text. They should be cited properly in APA format. 

  

Q2 According to Healy, ‘Putting categorical variables on the y-axis to compare their distributions is a very useful trick’. Using the five paragraph format, explain what he means. This paper should be single spaced. It should have a meaningful title. It must include 3 quotes from the text or from expert sites found in the library’s research databases or from the text. They should be cited properly in APA format.

Q3 https://www.youtube.com/watch?v=hVimVzgtD6w&t=522s View this video from Hans Rosling. Using the five paragraph format, discuss what you learned from the video. This paper should be single spaced. It should have a meaningful title. It must include 3 quotes from expert sites found in the library’s research databases or from the text. They should be cited properly in APA format.

Q4 Using the five paragraph format, write a proposal for a visualization project that you will submit for your master’s thesis. This paper should be single spaced. It should have a meaningful title. It must include 3 quotes from the text or from expert sites found in the library’s research databases or from the text. They should be cited properly in APA format. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

IT 640 Milestone One Guidelines and Rubric Overview

Within an organization, the dependability of network infrastructures has become top priority. The fundamentals of how this infrastructure works within the organization requires a systems thinking mindset and the ability to properly develop an analysis plan. You have been tasked with analyzing the current network architecture of the organization and determining any key changes that should occur as the organization prepares for future growth. You will evaluate traffic patterns to determine critical aspects of your business and provide basic insight into what should be done to the network from a capability aspect and from a security viewpoint as the organization prepares for future growth. Ultimately, you will recommend a design for the future network architecture of the organization.

Prompt

For this milestone, you will create a project analysis plan. Your plan will identify the network applications of the current network including a description of how the current network is designed by explaining how the different layers of the Open Systems Interconnection (OSI) model relate to each other within the network.

Refer to the following files when completing this milestone:

To complete this assignment, address the following critical elements:

  • Identify the network applications that are a part of the current network.
  • Identify and label the components of the network with the appropriate OSI network layer(s) (refer to the Organizational Network Diagram – Current file)
  • Provide a nontechnical description of the role and functions of key components, including routers, switches, and firewalls.
  • Provide a brief analysis of the current network configuration in terms of day-to-day business operations. Consider the following questions as a guide to your analysis:
    • What is the impact of losing connectivity between the Dallas router and the Memphis router? Which applications might be impacted between locations?
    • What is the risk of just having a single router or switch within the Memphis office?
    • How effective is the firewall in the current network?
  • Summarize the project requirements and deliverables

What to Submit

Your assignment should be 1 to 2 pages in length with double spacing and should conform to academic writing standard expectations for mechanics, content organization, and use of APA style.

See attached additional resources.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Question 3

please answer below questions(Plagiarism applies) 

  1. What is a data model?
  2. What is a high-level conceptual data model?
  3. What is an entity? An attribute? A relationship?
  4. List and briefly describe the common record-based logical data models.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

s3/31

Many people say that threat modeling is exponentially expensive:

  • Can the entire system be threat modeled?
  • If not, how would you objectively decide which parts of the system to model?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

CBSC 630 Case Study 5.1

 

Conduct additional research and write a 3 to 4 page paper explaining the steps you would take in detecting and removing a trojan horse from a computer system.. 

Writing Requirements

  • 3–4 pages in length  (excluding cover page, abstract, and reference list)
  • Include at least two peer reviewed sources that are properly cited

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

discussion

 

Database Tables vs Views
Discuss the similarities and the differences between database tables and database views. Provide examples of circumstances that may require creating views.

Discussion Guidelines
You must provide an original response of 300+ words of your own 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

AI and iOS Apps

Q1 (Chapter 10): There have been many books and opinion pieces written about the impact of AI on jobs and ideas for societal responses to address the issues. Two ideas were mentioned in the chapter – UBI and SIS. What are the pros and cons of these ideas? How would these be implemented?

Q2 (Chapter 11): Explain how GDSS can increase some benefits of collaboration and decision-making in groups and eliminate or reduce some losses.

Each response should be 300 words. There must be at least one APA formatted reference (and APA in-text citation) to support the thoughts in the post.  Do not use direct quotes, rather rephrase the author’s words, and continue to use in-text citations. Please refer to Textbook: Business Intelligence and Analytics ISBN: 9780135192016

Q3 Answer the following questions in a separate word document consisting of 2-3 pages with at least one APA formatted reference (and APA in-text citation) to support the thoughts in the post. 

1. When compared to the web world where some popular apps could get away with mediocre design, why do mobile apps face a higher design bar?

2. Compare and contrast native mobile app design versus standard desktop app design.  Discuss considerations for choosing one over the other.  Elaborate on main advantages vs disadvantages.

3. Discuss the importance of data persistence

4. Why is it important to persist mobile application data in a database?

5. Why is navigation using tables an important aspect of mobile app development?

To answer the Q3 please refer to Textbook – Title: Mobile App Development for iOS and Android by Authors: Jakob Iversen and Michael Eierman.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Cloud computing

 In this project, you will make narrated presentation to convince the BallotOnline management of the value of migrating the organization’s existing IT infrastructure and services to a public cloud. You will learn about cloud computing technology and services and how organizations can take advantage of this trend.Your supervisor, Sophia, BallotOnline’s director of information technology, has tasked you with creating a presentation that will convince the executives that using cloud-based computing to accommodate Ballot Online future growth rather than trying to expand the current infrastructure will help the company do business faster and at lower cost while conserving IT resources.   Question: you will prepare your presentation for the Ballot Online executives. This presentation should present them with a compelling business case and cover the benefits and possible drawbacks of adopting cloud infrastructure, data on cloud economics, and a demo of some basic cloud capabilities.  Your presentation will include an executive summary along with the following steps: 

  • Overview of cloud computing
  • summary of service and deployment models
  • summary of cloud compute and storage infrastructure components
  • advantages and disadvantages
  • economic analysis
  • IT business requirements (provide a concise description of what each bullet should ensure)
  • SWOT analysis

 Please use power point to answer the question and add references  

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Unit 4 Lab: Remote and Local Exploitation and Enumerating Hosts Using Wireshark, Windows, and Linux Commands

 

Conduct research and cite supporting sources in APA format where appropriate.

  1. Discuss one measure that organizations can take to protect themselves from each of these attacks – ARP poisoning and MAC flooding. Summarize how you conducted active scanning in the lab “Enumerating Hosts Using Wireshark, Windows, and Linux Commands.” 
  2. Describe one tool/technique or command for enumerating 1. Netbios, 2. SNMP and 3. DNS on windows machines.
  3. Describe three Linux commands along with syntax that you can use to enumerate Linux systems.
  4. What is the difference between an auxiliary module and an exploit module in Metasploit? Give an example of a Metasploit post exploitation module along with syntax and description.
  5. Research and find a Metasploit exploit for Android® devices. Describe the exploit and its various Metasploit options. Discuss what a user can do to protect themselves from the exploit.
  6. Here is a hypothetical entry from the /etc/shadow file. Answer the following questions based on this entry:

naina:$1$nfqpGleOffcp0i:13000:0:30:7:1::

  1. Which algorithm was used to hash the password?
  2. What is the maximum number of days the password is valid?
  3. What is the date that this account will expire?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Case Study 4

Your task is to analyze the case titled “Amber by Infeedo:  The CEO’s Virtual Assistant….”  Please use “The Student Guide to the Case Method” to perform this analysis. This is supposed to be an analysis, not a summary of the case. It should analyze: What is the background of the company? What is the problem they are facing? What are potential solutions? Which is the best solution and why?Your are expected to adhere to the following:

  1. Apply research in your analysis using at least two published sources for each of Steps B – D.
  2. Use APA format, 12-pt font, Times new Roman.
  3. Paper should be around 8-10 pages double-spaced including title and Bibliography
  4. Create a title page with your name, course number and name, and date submitted.
  5. Append a Bibliography page for the cited research.
  6. Use major headings that coincide with the steps outlined in Section 4 of “The Student Guide….”
  7. Apply sub-headings sparingly and for further structuring as necessary.
  8. Submit your document in Word format only, please.
  9. No plagiarism

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now