Entries by Dr Joseph

Python Api Weather Py

In this example, you’ll be creating a Python script to visualize the weather of 500+ cities across the world of varying distance from the equator. To accomplish this, you’ll be utilizing a simple Python library, the OpenWeatherMap API, and a little common sense to create a representative model of weather across world cities. Your first […]

C Basic

1.Ask the user the name of the item to be used in the calculations. 2.  Ask the user the current price of the item. 3.  Ask the user for the number of years that they have to pay for the item. 4.  Ask the user for the interest rate. 5.   If the user does […]

Rootkit Malware

Cybercriminals use many different types of malware to attack systems. Write about Rootkit using your own words, explain how to defend yourself against it in 350 words.

Cyber Security Planning And Mgmt Week 8

Week 8 – DiscussionWhat do you think is the single greatest physical threat to information systems? Fire? Hurricanes? Sabotage? Terrorism? Discuss this question and provide support for your answer. (300 words) Writing Assignment – WK 8Some organizations prohibit workers from bringing certain kinds of devices into the workplace, such as cameras, cell phones, and USB […]

Question 20206

1) Using the following link as your reference, select TWO and explain the differences (viruses, worms, trojans, and bots). https://tools.cisco.com/security/center/resources/virus_differences  2) Conduct your own social engineering experiments. i) While at a restaurant, convenience store, bank, place of business, or any shopping location, ask you waiter or waitress, bartender, server, sales clerk, or cashier personal questions […]

Information Governance 19553297

W1: Research Question Research Question Each week, view the video lectures under Learning Activities to learn about the parts of the research paper. This week, you will learn about the Research Question and the Case. Purpose The purpose of this assignment is to select the research question for your research paper assignment. Description The research […]

Ehdb 6

In 250 words.   Explain in your own words what type of information can be obtained by using network scanning techniques and why it is an important intelligence gathering process.

Assignment 19575775

Assignment:  Subject : Data Science & Big Data Analy Provide a reflection of at least 300 words of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or […]

Please Read The Question In Below Comment Section 19606551

Milestone 2 Fiat Chrysler, you will outline your  marketing objectives, describe any research you would do, and describe  your target market(s). Paper length: 2 pp. not including title page  and references. (Attached milestone 1 doc) Write an essay of at least  2 pages with APA format. Write an essay format not in bulleted, numbered or […]

Discussion Team Management 19567313

Team Leadership/Management Style Part 1: According to the Sarin and O’Connor (2009) article, certain style and goal structures of team leaders have a strong influence on internal team dynamics.  Based on your research within the article and textbook, as well as your own experience, what team leader management style would be most effective in leading a […]