Practical connection Assignment

Question Description

Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.

Requirements:

Provide a 500 word (or 2 pages double spaced) minimum reflection.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

Share a personal connection that identifies specific knowledge and theories from this course.

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment.

You should NOT, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.

Submit your assignment in pdf file to blackboard (ILEARN).

Policy Development

Question Description

For this discussion you are to explain the roles and responsibilities of those involved in IG policy development.

Select one of the individuals from the following list and discuss what role they play in IG policy development:

IT Security Analyst

IT Security Engineer

IT Audit

IT Risk

Compliance

CISO- Chief Information Security Officer

CIO- Chief Information Officer

CTO – Chief Technology Officer

CEO- Chief Executive Officer

CFO- Chief Financial Officer

CPO- Chief Privacy Officer

Legal

Governmental Affairs

Next, take the role and select a law, standard, or regulation to apply their role. Lastly, find a company that either uses the standard or is subject to the law or regulation.

There are enough standards and roles that no 2 posts should be the same as an effort to cut down on the potential of the class sharing work. No two individuals are to use the same combination in their post. If the same combination is used the second individual will receive a grade reduction.

Respond to 2 other posts from individuals where you share how your role is applies the same regulation, law or standard that the student wrote about.

R programming Tool

Question Description

  1. Download and Install the R Programming tool (Cran) and RStudio a free application onto your PC. Verify successful installation by attaching ONLY the screenshots to display your completion of each software installation (total of two screenshots) and label as a Figure accordingly according to APA guidelines.

Download and install R = https://cran.r-project.org/

Download and install RStudio = https://www.rstudio.com/products/rstudio/download/#download

(2)On each of the screenshot explain briefly about the application, its features, and usage. Identify about ten (10) functions of RStudio and explains its usage?

(3)Deliverable about 2-4 pages. Follow standard APA guidelines. Include a Cover page and auto-generated clickable Table of Content.

The cover page should contain the following: Title, Student’s name, University’s name, Course name, Course number, Professor’s name, and Date. Submit your assignment on or before the due date. Save your assignment as a Microsoft Word document. (Mac users, please remember to append the “.docx” extension to the filename.) The name of the file should be your first initial and last name, followed by an underscore and the name of the ass

p-operation security -practical connection assignment

Question Description

Course Name:Operation Security

Assignment:

Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.

Requirements:

Provide a 500 word (or 2 pages double spaced) minimum reflection.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

Share a personal connection that identifies specific knowledge and theories from this course.

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment.

You should NOT, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.

Research paper- Please follow the requirements and i have attached the chapter 19 also.

Question Description

Chapter 19 introduces the impact of the global digital divide. According to the authors, countries that lag behind the rest of the world’s ICT capabilities encounter difficulties at various levels. In a 1,250 word paper, discuss specific areas, both within and outside eGovernance, in which citizens living in a country that lags behind the rest of the world in ICT capacity are lacking. Include in your discussion quality of life, sustainability, safety, affluence, and any other areas that you find of interest. Your paper will need to adhere to APA standards with 1 inch margins, 12 point Times New Roman font, as well as double-spacing, a title page and a running head. Use Purdue’s OWL or the UOC Library if you’re unsure of these requirements. Or you can email me directly. Additionally, your paper will need to be below 10% for SafeAssign matching. If it comes in above this, I will review, assign you a zero and provide you next steps in the comments and via email.

Assignment 3: Technical Details Task Instructions Summarizing and Explaining Your Design Summarize the site requirements and/or any challenges (changes to the topology as you detailed in assignments 1 and 2) you are attempting to overcome. You

Question Description

Assignment 3: Technical Details Task

Top of Form

Instructions

Summarizing and Explaining Your Design

Summarize the site requirements and/or any challenges (changes to the topology as you detailed in assignments 1 and 2) you are attempting to overcome. You should also provide an updated overall site topology based on your design.

This solution should be comprehensive, and the approach should be justified. Configurations of technologies should be written out to help guide the systems administrators with implementation. In some cases, you may find it necessary to implement additional cabling, which can be done by adding to the supplied topology. Any adjustments to the sites’ topology should be documented and supplied with your submission.

Use the attached Network Design Proposal Template below to record your work.

Bottom of Form

Wireshark homework

Question Description

1. Do the following:

• Download Wireshark.

• Start Wireshark.

• Turn on Wireshark capture.

• Type a URL in your browser

window (not Wikipedia.org).

• After a few seconds, stop the capture.

• Answer the following questions:

1a. What URL did you use? What

was the IP address of the web

server?

1b. Find the frame in which your

PC sent the SYN packet. List the

source and destination IP ad

dress, the source and destination

port numbers, and the header

checksum.

1c. Select the SYN/ACK packet. List

the source and destination IP ad

dress, the source and destination

port numbers, and the header

checksum.

1d. Select the packet that acknowl

edges the SYN/ACK segment.

List the source and destination

IP address, the source and des

tination port numbers, and the

header checksum.

2. Change the options so that only packets

you send are recorded. Do a capture.

Click on the window containing Wire

shark and hit Alt-Enter. This captures

the window to your clipboard. Paste it

into your homework.

download An APP and answer some questions

Question Description

1. Do the following:

• Download Wireshark.

• Start Wireshark.

• Turn on Wireshark capture.

• Type a URL in your browser

window (not Wikipedia.org).

• After a few seconds, stop the capture.

• Answer the following questions:

1a. What URL did you use? What

was the IP address of the web

server?

1b. Find the frame in which your

PC sent the SYN packet. List the

source and destination IP ad

dress, the source and destination

port numbers, and the header

checksum.

1c. Select the SYN/ACK packet. List

the source and destination IP ad

dress, the source and destination

port numbers, and the header

checksum.

1d. Select the packet that acknowl

edges the SYN/ACK segment.

List the source and destination

IP address, the source and des

tination port numbers, and the

header checksum.

2. Change the options so that only packets

you send are recorded. Do a capture.

Click on the window containing Wire

shark and hit Alt-Enter. This captures

the window to your clipboard. Paste it

into your homework

Home work Q&A

Question Description

1. Identify the dependent variable and independent variables in the Credit

Approval data set.

2. provide a one-paragraph masters-level response describing what you anticipate that

the ctree (conditional inference tree) method will accomplish for the Credit

Approval data? Be specific about the behavior and structure of tree-based

models.

3. Why do we split the dataset into training and test data? Provide a one paragraph,

masters-level response in your own words.

4. interpret the structure of the model including the splitting and leaf nodes in your

discussion. Provide a one-paragraph, masters-level response.

5. Based on the results of your ctree model, which independent variables could

be significant predictors of the dependent variable? Justify why you made

this conclusion by supporting your answer with specific references to the

ctree model itself. Provide a one-paragraph, masters-level response.

6. What differences did you observe between the Apriori association rules

method and the Conditional Inference ctree method? Compar and contrast

at least two characteristics from each method. Provide a one-paragraph,

masters-level response.

7. Do missing values affect the results of the ctree model? Provide a oneparagraph,

masters-level response.

WRITTEN INTERVIEW QUESTIONS PhD candidates should provide an authentic personal statements to each of the five following questions/prompts reflecting on their own personal interest.

Question Description

PhD candidates should provide an authentic personal statements to each of the five following questions/prompts reflecting on their own personal interest. In the event that any outside resources are used, resources should be cited in APA format. Submissions should be a maximum of 500 words or 125 words per question/prompt. It is best to respond to each prompt/question individually for clarity of the reviewer. Documents should be submitted in Microsoft Word format.

PhD IT

  1. What are your research interests in the area of Information Technology? Why do you think it is important to research in this area?
  2. Why did you select to pursue a program at University of the Cumberlands instead of other institutions?
  3. As an individual, what are your strengths and weaknesses? How will these impact you as a doctoral information technology student?
  4. Where do you see the future of Information Technology heading?
  5. How can obtaining a doctorate impact your contribution to the practices of information technology? Where do you see yourself after obtaining a doctorate from UC?