Access Controls

Physical security, biometric technology, and societal acceptance

 

  • Discuss the strengths/weaknesses of the topic and possible improvements.
  • Use at least one NIST resource as a reference.
  • Use a minimum of 10 peer-reviewed resources.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Discussion 1

Research the following websites to identify current vulnerabilities. Choose two current vulnerabilities. Discuss the risk the vulnerability creates and what would be needed to mitigate those vulnerabilities.

https://www.rapid7.com/db/search

https://securitytracker.com/

https://www.us-cert.gov/ncas/current-activity

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Computer Science Week 1 assignment (Watch video)

 

youtube.com/watch?v=ZKi1CKTRCQM 

For this week’s assignment follow these instructions.

1) Watch this video on AFIS

2) Find and locate a famous fingerprint online. Remember to save it for next week.

3) Drop the fingerprint into a Word document and then using the drawing tool in Word highlight which portions of the fingerprint you believe will be used as markers. And then explain your reasoning in a brief 2-3 paragraph write-up.

Once you have done so, upload the word document. That’s it for the week as you got a lot of reading this week.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Examining Suspicious Email

 

Part 1: Examine the Suspicious Email.txt File

You are an investigator at a major U.S.-based bank, and one of your duties is to monitor outgoing employee emails. The main objective of this monitoring effort is to catch any customer data (such as a Social Security Number [123-45-6789] or email addresses) being removed, which is against company policy.

During your monitoring operations, you find an employee that appears to be emailing a large book, and you decide to give this file further inspection. However, the book appears to be over 48,000 lines of text, and you cannot read each line.

Complete the following steps:

  1. Choose a tool to inspect the above-mentioned file and explain why you chose the particular tool.
  2. Create literal or regular expression searches to look for interesting data.
  3. Show the results of your interesting findings, and recommend further searches on other data based on your results.

Submit all of your searches, the results (even if the search did not yield interesting results), and how you tested to ensure your search was formed or formatted correctly.

Part 2: Examine the Practical Suspicious Email Bonus.csv File
Once again, you are the investigator at the same U.S.-based bank. Your findings from the first monitoring effort have you very concerned, and you have decided to open a case on your subject employee. The next file you have under review is very different from the first, as it contains what appears to be a series of random numbers. Note that the file seems to be very large.

Based on findings from the first file:

  1. Choose a tool to inspect this second file and explain why you chose the particular tool.
  2. Create literal or regular expression searches to look for interesting data.

Show the results of your interesting findings and recommend further searches on other data based on your results.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Unit 2 Discussion: Selection and Iteration structures

Unit 2 Discussion: Selection and Iteration structures

 25      25 unread replies.    34      34 replies.          

All programs can be written using three basic structures. Sequence, Selection, and Iteration. In this unit, we are going to focus on SELECTION (Decision-Making) and ITERATION (Looping) structures.

In your post, you need to cover either SELECTION or ITERATION. You are free to include content about both.

In C programming languages, there are 3 types of selection (or also known as decision-making) structures. IF (single-selection), IF…ELSE (double-selection), and IF…ELSE IF…ELSE or SWITCH (multiple-selection)

In this Unit, you are provided a C program using IF…ELSE IF…ELSE statement as below. 

Type the above code into Dev C++ and run it. Describe what is happening here. Now, modify this program and showcase using SWITCH-CASE statement without modifying the logic of the program.

Make sure to upload your code and that it contains the original IF…ELSE IF…ELSE as well as the one you created using SWITCH…CASE.

In C language, there are three types of iteration/looping structures in the form of statements. WHILE, DO…WHILE, and FOR.

Here’s a program written using WHILE loop structure. 

Type the above code into Dev C++ and run it. Describe what is happening here. Now, modify this program and showcase using any of the other two types of looping structures without modifying the logic of the program.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Using Chapter 10 as a reference, eExplain the concept of information stores. Why is an understanding of how different clients store messaging information critical to the success of an email search?

Using Chapter 10 as a reference, eExplain the concept of information stores. Why is an understanding of how different clients store messaging information critical to the success of an email search?

Write your answer using a WORD document. Do your own work. Submit here. Note your Safe Assign score. Score must be less than 25 for full credit.

You have three attempts.

https://www.youtube.com/watch?v=BCPM0bYkJP0

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Daveweek14

Discuss each question in a paragraph of at least five sentences.

  1. Give an example from the book where insufficient testing was a factor in a program error or system failure.
  2. What was one cause in the delay in the completing of the Denver Airport.
  3. Why didn’t the healthcare.gov website work at first?
  4. What is one characteristic of high reliability organizations?
  5. Describe the potential risks of alert fatigue in EHR systems.
  6. What were 2 common factors in both the Therac-25 case and the space shuttle disaster.
  7. What does design for failure mean?

the book was A gift of fire by sare baase

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Week5- Case Study —–Assignment for Data Mining

Introduction briefly

  

Assignment #3 (100 point)

Students are required to submit the assignment 3 to your instructor for grading. The assignments are on the assigned materials/textbook topics associated with the course modules. Please read the following instruction and complete it to post on schedule.

1. Consider the data set shown in Table 5.20 (439 page). (Chapter 5)

(a) Compute the support for itemsets {e}, {b, d}, and {b, d, e} by treating each transaction ID as a market basket.

(b) Use the results in part (a) to compute the confidence for the association rules {b, d} −→ {e} and {e} −→ {b, d}. Is confidence a symmetric measure?

(c) Use the results in part (c) to compute the confidence for the association rules {b, d} −→ {e} and {e} −→ {b, d}.

2. Consider the transactions shown in Table 6.15, with an item taxonomy given in Figure 6.15 (515 page). (Chapter 6)

(a) What are the main challenges of mining association rules with item taxonomy?

(b) Consider the approach where each transaction t is replaced by an extended transaction t_ that contains all the items in t as well as their respective ancestors. For example, the transaction t = { Chips, Cookies} will be replaced by t_ = {Chips, Cookies, Snack Food, Food}. Use this approach to derive all frequent itemsets (up to size 4) with support 70%.

(c) Consider an alternative approach where the frequent itemsets are generated one level at a time. Initially, all the frequent itemsets involving items at the highest level of the hierarchy are generated. Next, we use the frequent itemsets discovered at the higher level of the hierarchy to generate candidate itemsets involving items at the lower levels of the hierarchy. For example, we generate the candidate itemset {Chips, Diet Soda} only if {Snack Food, Soda} is frequent. Use this approach to derive all frequent itemsets (up to size 4) with support 70%.

3. Consider a data set consisting of 220 data vectors, where each vector has 32 components and each component is a 4-byte value. Suppose that vector quantization is used for compression and that 216 prototype vectors are used. How many bytes of storage does that data set take before and after compression and what is the compression ratio? (Chapter 7).

Conclusuion

Grading Rubric for the Assignment #3:

· Delivery: Delivered the assignments on time, and in correct format: 25 percent

· Completion: Providing a thoroughly develop the document including descriptions of all questions: 25 percent

· Understanding: Demonstrating a clear understanding of purpose and writing a central idea with mostly relevant facts, details, and/or explanation: 25 percent

· Organization: Paper is well organized, makes good use of transition statements, and in most instances follows a logical progression including good use of symbols, spacing in output: 25 percent

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Data Mining Exercise 2: Analytics Data Environment

Instructions

Prepare a depiction of an analytics data environment typical to an online retailer. Include a data warehouse repository that depicts various sources of available data. Also include at least one data mart that is sourced at least in part from the data warehouse.

  1. Source Data Systems: Identify at least two source data systems that are typical to an online retailer and that might be useful to a data mining initiative to better understand the retailer’s customers.
  2. Data Warehouse: Describe the contents of a data warehouse typical to an online retailer, emphasizing sources (transactional system, supply chain management system, etc.) and data subject areas (sales, customer, supply, etc.).
  3. Data Mart: Identify the benefits and limitations of a data mart that is sourced from the warehouse to support customer analytics for a typical online retailer.
  4. External Data: Identify a source of external data a typical online retailer might wish to include in a customer analytics data mart. What benefit is gained by the addition of this external data? What challenges are presented by the integration of this external data source?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

capstone exercise The Morris Arboretum in Chestnut Hill, Pennsylvania tracks donors in Excel. They also use Excel to store a list of plants in stock.

  

Capstone Exercise

The Morris Arboretum in Chestnut Hill, Pennsylvania tracks donors in Excel. They also use Excel to store a list of plants in stock. As donors contribute funds to the Arboretum, they can elect to receive a plant gift from the Arboretum. These plants are both rare plants and hard-to-find old favorites, and they are part of the annual appeal and membership drive to benefit the Arboretum’s programs. The organization has grown, and the files are too large and inefficient to handle in Excel. You will begin by importing the files from Excel into a new Access database. Then you will create a table to track donations, create a relationship between the two tables, and create some baseline queries.

Create a New Database

You will examine the data in the Excel worksheets to determine which fields will become the primary keys in each table and which fields will become the foreign keys.

· a. Open the a02c1Donors Excel workbook, examine the data, and close the workbook.

· b. Open the a02c1Plants Excel workbook, examine the data, and close the workbook.

· c. Create a new, blank database named a02c1Arbor_LastFirst. Close the new blank table created automatically by Access without saving it.

Import Data from Excel

You will import two Excel workbooks into the database.

· a. Click the External Data tab and click Excel in the Import & Link group.

· b. Navigate to and select the a02c1Donors workbook to be imported.

· c. Select the First Row Contains Column Headings option.

· d. Set the DonorID field Indexed option to Yes (No Duplicates).

· e. Choose DonorID as the primary key when prompted and accept the table name Donors.

· f. Import the a02c1Plants workbook, set the ID field as the primary key, and then change the indexing option to Yes (No Duplicates).

· g. Accept the table name Plants.

· h. Change the ID field name in the Plants table to PlantID.

· i. Open each table in Datasheet view to examine the data. Close the tables.

Create a New Table

You will create a new table to track the donations as they are received from the donors.

· a. You will create a new table in Design view and save the table as Donations.

· b. Add the following fields in Design view and set the properties as specified:

o • Add the primary key field as DonationID with the Number Data Type and a field size of Long Integer.

o • Add DonorID (a foreign key) with the Number Data Type and a field size of Long Integer.

o • Add PlantID (a foreign key) as a Number and a field size of Long Integer.

o • Add DateOfDonation as a Date/Time field.

o • Add AmountOfDonation as a Currency field.

· c. Switch to Datasheet view, and save the table when prompted. You will enter data into the table in a later step. Close the table.

Create Relationships

You will create the relationships between the tables using the Relationships window.

· a. Open the Donors table in Design view and change the Field Size property for DonorID to Long Integerso it matches the Field Size property of DonorID in the Donations table. Save and close the table.

· b. Open the Plants table in Design view and change the Field Size property for PlantID to Long Integerso it matches the Field Size property for PlantID in the Donations table. Save and close the table.

· c. Identify the primary key fields in the Donors table and the Plants table and join them with their foreign key counterparts in the related Donations table. Enforce referential integrity and cascade and update related fields. Save and close the Relationships window.

Add Sample Data to the Donations Table

You will add 10 records to the Donations table.

· a. Add the following records to the Donations table:

   

Donation ID

Donor ID

Plant ID

Date of Donation

Amount of Donation

 

10

8228

611

3/1/2018

$150

 

18

5448

190

3/1/2018

$ 55

 

6

4091

457

3/12/2018

$125

 

7

11976

205

3/14/2018

$100

 

1

1000

25

3/17/2018

$120

 

12

1444

38

3/19/2018

$ 50

 

2

1444

38

4/3/2018

$ 50

 

4

10520

49

4/12/2018

$ 60

 

5

3072

102

4/19/2018

$ 50

 

21

1204

25

4/22/2018

$120

· b. Sort the Donations table by the AmountOfDonation field in descending order. Close the table.

Use the Query Wizard

You will create a query of all donations greater than $100 in the Donations table.

· a. Add the DonorID and AmountOfDonation fields from Donations (in that order).

· b. Save the query as Donations Over 100.

· c. Add criteria to include only donations of more than $100.

· d. Sort the query results in ascending order by AmountOfDonation.

· e. Run the query.

· f. Save and close the query.

Create a Query in Design View

You will create a query that identifies donors and donations.

· a. Create a query that identifies the people who made a donation after April 1, 2018. This list will be given to the Arboretum staff so they can notify the donors that a plant is ready for pickup. The query should list the date of the donation, donor’s full name (LastName, FirstName), phone number, the amount of the donation, and name of the plant they want (in that order). Add the tables and fields necessary to produce the query.

· b. Sort the query by date of donation in descending order, then by donor last name in ascending order.

· c. Run, close, and save the query as Plant Pickup List.

Copy and Modify a Query in Design View

You will copy a query and modify it to add and sort by a different field.

· a. Copy the Plant Pickup List query and paste it using ENewsletter as the query name.

· b. Open the ENewsletter query in Design view and delete the DateofDonation column.

· c. Add the ENewsletter field to the first column of the design grid and set it to sort in ascending order, so that the query sorts first by ENewsletter and then by LastName.

· d. Run, save, and close the query. Close the database and exit Access. Based on your instructor’s directions, submit a02c1Arbor_LastFirst.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now