Write A Essay 19505497

Using the Web or other resources, find out what your state’s laws are regarding cyber stalking.

Write a brief essay describing those laws and what they mean.

(I am from Arizona )

Encryption 19620565

  

Name(s): _________________________________________________________

Any data that is sensitive or critical for business or military purposes should be encrypted. But what does it mean to be encrypted. What does encrypted data look like? In this lab we will look at data which is unencrypted and data that is encrypted. We will use a tool called GNS3 to simulate two routers that are connected via a point-to-point link. We will run data through this link while looking at the packets going through it. The tool we will use to view the data is Wireshark which is probably the most important tool we as network engineers have in our toolbelt. Let’s answer the following questions as we go through the lab.

Ÿ 1. What is the cleartext data that is being sent in the ping between the two PCs? _____________________

Ÿ 2. What is the protocol used for the ping utility? ____________________

Ÿ 3. How many ping messages do you see? _____________________ Why? ________________________________________________________________________

Ÿ 4. Is this data encrypted or unencrypted? _____________________________

Ÿ 5. Now let’s make a change in the router. What types of messages do you see now? Does it look the same as the messages we saw before we made the change to the router? ________________________

Ÿ 6. What protocol do you see now? ____________________

Ÿ 7. Are you still able to see the source and destination MAC address? __________What layer is this you are looking at the MAC address in? _____________

Ÿ 8. Are you still able to see the source and destination IP address? __________What layer is this you are looking at the IP address in? _____________ 

Ÿ 9. Can you see the cleartext data you saw before? ____________________________

Ÿ 10. Explain the ESP protocol. Does what we see in Wireshark make sense? Write a paragraph answering these two questions.

Government Global Economy And Electronic Innovation And The Government

write a short research paper for a peer-reviewed research paper that pertains to the week’s assigned reading.  This will be a detailed summary of the research paper and what you gained from the research. If you have a difficult time, Google Scholar is a wonderful location to find these types of articles:

https://scholar.google.com/

Once you find the article, you will simply read it and then write a review of it.  Think of it as an article review where you submit a short overview of the article.

Your paper should meet the following requirements:

• Be approximately 2-3 pages in length, not including the required cover page and reference page.

• Follow APA6 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

*All outside sources must be referenced and cited in your paper.  All papers will be reviewed with a plagiarism software. Any references not properly referenced and cited will result in a 0 on your paper. Multiple violations will result in a failure.

Change Readiness 19505729

Here is a questionnaire for you to take on your “Change Readiness”. Provide feedback on how it relates to you and your style.

http://www.ecfvp.org/files/uploads/2_-change_readiness_assessment_0426111.pdf

Need Help In Answering Discussion Question For The Course Information Technology Importance In Strategic Planning

 Why is it important for business strategy to drive organizational strategy and IS strategy? What might happen if the business strategy was not the driver? 

Note:  At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the Library. Use proper citations and references in your post. 

Note: please follow APA format

  APA Formatting Information

Please review the attached links for APA guidance.

https://sites.umuc.edu/library/libhow/apa_examples.cfm 

Below are some helpful tips to keep in mind as you write your papers in this course.

For in-text citations, the citation needs to go inside the end of the sentence. For example: This is my sentence on APA formatting (APA, 2016).

For references, this list should start on a new page at the end of your document with a hanging indent (the title of the page should be References). You do not need to include the retrieved date. Here are some examples:

Start your paragraph with an indent (tab).

Smyth, A. M., Parker, A. L., & Pease, D. L. (2002). A study of enjoyment of peas. Journal of Abnormal Eating, 8(3), 120-125. Retrieved from http://www.articlehomepage.com/full/url/

Bernstein, M. (2002). 10 tips on writing the living Web. A List Apart: For People Who Make Websites, 149. Retrieved from http://www.alistapart.com/articles/writeliving

De Huff, E. W. (n.d.). Taytay’s tales: Traditional Pueblo  Indian tales. Retrieved from  http://digital.library.upenn.edu/women/dehuff/taytay/taytay.html

Use section and sub-section headings.

See this website for more help with APA formatting: https://owl.english.purdue.edu/owl/resource/560/01/

Readings:

Chapter 1, “The Information Systems Strategy Triangle

Dent, A. (2015). Aligning IT and business strategy: an Australian university case study. Journal of Higher Education Policy & Management, 37(5), 519–533. Retrieved from  https://doi.org/10.1080/1360080X.2015.1079395

I have also attached the pdf file for your reference.

Assignment 19516371

 

1.)Go online and search for information that relates to ethical hacking (white hat or gray hat hacking). Choose one of these areas explain why a company might benefit from hiring someone to hack into their systems.

Your assignment should be 3-4 paragraphs in length

2.) Search the Internet and locate an article that relates to the topic of HACKING and summarize the reading in your own words. Your summary should be 2-3 paragraphs in length and uploaded as a TEXT DOCUMENT 

 3.)Select one type of cryptography or encryption and explain it in detail. Include the benefits as well as the limitations of this type of encryption. Your summary should be 2-3 paragraphs in length and uploaded as a TEXT DOCUMENT. Click the link above to submit your work 

4.)Explain Footprinting,  For this assignment, you are asked to develop your own crime scenario. Explain the incident that occurred, and then list the steps you would follow to solve this case (examples might include: a lost child, an unauthorized charge on your credit card, an unidentified charge made with your EZ PASS, etc.). 

350 Word Email 3 Sources

 

Read the following scenario:

Mary is a business student and is considering purchasing a new computer. She is looking for a recommendation on what to purchase to meet her needs. Mary is studying business with a finance minor. She will be doing data analysis on a regular basis using spreadsheets. She will need to write papers and collaborate with a team of students. In addition to her school work, Mary likes to listen to music, play computer games, surf the web, and store her pictures and movies in the cloud.

Write a minimum 350-word email to Mary in which you recommend key hardware and software requirements that will provide the needed functionality.

Include the following recommendations in your analysis: Minimum hardware specifications Peripherals Key software applications Key utilities to consider Security protocol related to security concerns 

Cite a minimum of three website resources where the information was found.

Copy your email to Mary, including citations, into a Microsoft® Word document.

Organizational Theory Ja8

Pick one of the following terms for your research: authority, competition, confrontation, dependency, empowerment, intergroup conflict, negotiation, organizational politics, power, or rational model.

Instructions

Your submission must include the following information in the following format:

DEFINITION: A brief definition of the key term followed by the APA reference for the term; this does not count in the word requirement.

SUMMARY: Summarize the article in your own words- this should be in the 150-200 word range. Be sure to note the article’s author, note their credentials and why we should put any weight behind his/her opinions, research or findings regarding the key term.

DISCUSSION: Using 300-350 words, write a discussion, in your own words the way the article relates to the selected chapter Key Term. A discussion is not rehashing what was already stated in the article, but the opportunity for you to add value by sharing your experiences, thoughts and opinions. This is the most important part of the assignment.

REFERENCES: All references must be listed at the bottom of the submission–in APA format

Producer Consumer Problem 19762825

 Define an integer buffer with the size of 32 and implement a circular queue data structure that is used by producers and a consumer. Next, you will need to initialize the mutex lock and semaphores. In this assignment, you will use two semaphores where one indicates a full queue and the other indicates an empty queue. The producer function is used to insert a random number between 0 and 10 to the queue. The consumer function is used to remove a number from the queue in a FIFO fashion. In addition, inside the loops of the producer and consumer functions, add a random delay between 0 and 2 seconds to simulate various lengths of processes. In addition, you are required to use 2 producers and 1 consumer for this assignment where 0 and 2 are producers and 1 is consumer (3 threads). Finally, your code should run forever. 

Data Mining Weka

  Clean and prepare the attached data file for use in Weka as an .arff file. Show your steps. (Make sure that the label is in the last column.) Compare class determination using Random Forest and Random Tree.  Compare the value of a hold out set to k-fold cross validation for validating the model. Suggest a filter to be used to improve validation results. Explain your answer..  For one model, find the weakest attribute. Explain how you found it. Submit all answers and screen shots in one Word Document named DMFinal1_yourname.