Computer Science 2023 SQL Server 2008 Analysis Services

2023 1 Briefly explain one key advantage and one key disadvantage to using OLAP technology In other | Assignment Collections

1. Briefly explain one key advantage and one key disadvantage to using OLAP technology. In other words, what is a primary reason a business would want to use the technology and what is one of the primary limitations of the technology.

2. Explain the relationship between a Data Source and a Data Source View. to have more than one Data Source View for a given Data Source? Why or why not?

3. What is the purpose of a Subject Area Diagram and how does it relate to a Data Source View? Does it change anything in the underlying Data Source.

4. What is a Named Calculation? Does it apply at the table level or individual column?

5. Give an example of when it would make sense to define a Named Calculation. Could the transformation from the Named Calculation be done in the underlying Data Source instead? When would you choose one method over the other?

6. What is a Named Query used for? Does it apply at the table level or the individual column?

7. Give an example of when it would make sense to define a Named Query. What would be the advantage/disadvantage of providing this in the underlying database instead of defining it within your OLAP project?

8. Explain what a Dimension Hierarchy is used for. What happens if you have repeated values, like month names, in the hierarchy? How would you fix this to make them all unique?

9. The default usage for a measure is Sum. Explain cases where it would make sense to use “Count of Rows”, “Distinct Count” and “Maximum”.

10. What is the purpose of a Calculated Member? Provide an example of where this type of measure would be useful.

11. In many cases, defining a Named Calculation in the Data Source View or defining a Calculated Member in the cube will produce the same end result. Explain a situation where a Calculated Member would be necessary since it would not work in a Named Calculation.

12. If they underlying database for your project is changed to another vendor, for example, changing from SQL Server to Oracle or DB2, what impact does this have to your project including named calculations, named queries and calculated members.

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Week 6

2023 This first assignment will ask you to put into practice what you have learned | Assignment Collections

 

  •  
    This first assignment will ask you to put into practice what you have  learned about searching the Internet and using Microsoft Word. Since  time management is one of the greatest challenges any college student  will face, you will research ways to improve your time management and  write up your findings using Microsoft Word.
     
    Assignment Requirement:
     
    To successfully complete this assignment, submit one (1) Microsoft  Word document that includes the following information and formatting.
     
    Main Steps:
     
  1. Download the Assignment 1 Sample or PDF version.
  2. Follow the walkthrough instructions here to complete this assignment or download and print the instructions so you can check each item off as you complete it.
  3. Save your document with the following name – CIS105_Assignment1_FirstName_Last Name_Date.docx.
  4. Submit your assignment through the submission button.
  5. Walkthrough Instructions:
     
    Here is a list of everything you need to do to successfully complete Assignment #1. Just check off each item as you go. If you have any questions along the way, contact your professor and they can help you out.
     
  • Create a new Word document. For tips on how to do  this, make sure to review the Getting Started section of your Word  Essential Training video (whichever version is appropriate for you to  view).
  • Write an overview. At the top of your Word document  write an overview of why time management is important to you. (Idea:  You may find it helpful to do your research and research documentation  prior to writing the overview.)
  • Online search. Many people have tips and tricks for  managing their time and it’s important to find new ideas that can help  you. Go online and find three (3) articles or videos that talk about  managing your time. (Idea: Use different search terms: “how to manage my  time,” “time management best practices,” “managing your time as a  student,” or “time management tips.” Think of different search  algorithms. You can use Google, another search engine, or the Strayer  Library.)
  • Create a table. Now, create a table that has four (4) columns and four (4) rows.
  • Fill in the columns of the table. In the left  column of the table, type “Website Title”, in the second column, type  “Source”, in the third column, type “What I Learned”, and in the fourth  far-right column, type “My Reviews”.
  • Now, provide details about each website.  
    • Row 1: What was the name of article/video #1? What  is the source (what is the website name)? What did you learn from  reviewing this site? Did you think it was helpful and why or why not?  (answer in your own words.)
    • Row 2: What was the name of article/video #2? What  is the source (what is the website name)? What did you learn from  reviewing this site? Did you think it was helpful and why or why not?  (answer in your own words.)
    • Row 3: What was the name of article/video #3? What  is the source (what is the website name)? What did you learn from  reviewing this site? Did you think it was helpful and why or why not?  (answer in your own words.)
  • Format your document.  
    • Add a Header that includes:  
      • The course title.
      • Your first and last name.
    • Add a title to the top of the page called “Time Management” or another title of your choice. Bold your title.
    • Add an image or screenshot between the overview and the table. You  could add a screenshot of an actual website you used or an image of a  clock or checklist to represent time management tips.
    • Below the image add a bulleted list of two (2) things you would like to start doing to better manage your time.
    • Add a footer, which includes the date you completed and submitted the assignment.
  • Grading for this assignment will be based on answer quality, logic /  organization of the paper, and language and writing skills, using this rubric.
     
    Recommended TestOut Skills Labs to review prior to completing this assignment:
     
     
  • 2.2.4 Skills Lab: Create Documents
  • 2.11.4 Skills Lab: Manage References
  • 2.7.5 Skills Lab: Edit Documents
  • 2.8.4 Skills Lab: Insert Illustrations
  • Recommended Lynda.com video to review prior to completing this assignment:
    Different options are listed based on the version of Microsoft Word  you are using (2016 vs. 2013, PC vs. Mac). Note: The Strayer student  laptops come with Microsoft Word 2016 PC version. Note: Review at a  minimum the Introduction and Getting Started chapters of the video.
     
  • Word 2016 Essential Training
  • Word 2013 Essential Training
  • Word for Mac 2016 Essential Training
  • Word for Mac 2011 Essential Training
  • Note: This assignment will be run automatically  through SafeAssign plagiarism detection software and an originality  report will be sent to your instructor. Please make sure that you are  writing in your own words and not copying any information from outside  sources. Please review Strayer University’s Academic Integrity Policy before beginning this assignment.
        

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 ip444

2023 For this assignment you will be taking a step back to reflect on all of | Assignment Collections

For this assignment, you will be taking a step back to reflect on all of the information contained in your procedures manual. You will develop an abstract that highlights the information contained in the procedures manual and that is 150–300 words. Next, in recognizing that one your procedures manual audiences is the advanced or experienced staff member wanting a quick method for looking up information, you are tasked with developing a quick reference guide. You may use lists, tables, and references to pages in the procedures manual for more detail. The quick reference guide should be no more than 5 pages and can be as few as 2 pages.

Follow these steps for this assignment:

  1. Update the procedures manual document title page with a new date and the project name.
  2. Update previously completed sections based on instructor feedback.
  3. Complete the items listed under “New Content” below, and copy it under the sections in the procedures manual document called “Abstract” and “Procedures Manual Quick Reference.”
    • New Content
      • Abstract
        • Develop an abstract summarizing the contents of the procedures manual in 150–300 words.
      • Procedures manual quick reference
        • Develop a quick reference section for advanced users.
  4. Be sure to update your table of contents before submission.
  5. Name the document “yourname_ITDI373_IP4.doc.”

Deliverables

The overall project deliverables are as follows:

  • Procedures manual document shell (in Word format)
    • Title page
      • Course number and name
      • Project name
      • Your name
      • Date
    • Table of contents (autogenerated)
      • This should be on a separate page
      • This should be a maximum of 3 levels deep
      • Fields updated so that the TOC it is up-to-date before submitting your project
    • Section headings (create each heading on a new page with TBD as content, except for sections listed under “New Content” above)
      1. Project Outline
      2. Abstract
      3. Procedures Manual Outline
      4. Procedures Manual Proposal
      5. Procedures Manual Brochure
      6. Procedures Manual Preparation Plan
      7. Procedures Manual
      8. Procedures Manual: Quick Reference

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Database

2023 6 How would you qualify the Street field in the Customer table Qualifying a field name means | Assignment Collections

6. How would you qualify the Street field in the Customer table?

 Qualifying a field name means that you input information in the table name in which the field belongs to and the field name. 

10.

How do you use an AND criterion to combine criteria in an Access query? How do you use an OR criterion to combine criteria?

12.

In which row of the Access design grid do you include functions? What functions can you use in Access queries?

14.

When sorting data on more than one field in an Access query, which field is the major sort key? Which field is the minor sort key? What effect do these keys have on the order in which the rows are displayed?

16.

When do you use an update query?

 

18.

When do you use a make-table query?

20.

Describe the purpose of the SELECT command in relational algebra.

22.

Describe the purpose of the JOIN command in relational algebra.

 

24.

Are there any restrictions on the tables when using the UNION command? If so, what are these restrictions?

26.

Describe the purpose of the SUBTRACT command in relational algebra.

 

28.

Describe the results of the division process in relational algebra.

 

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Paper Needed Urgent (7 Page)

2023 Scenario You are an employee at D B Investigations a firm that contracts with individuals companies and government agencies | Assignment Collections

 

Scenario

You are an employee at D&B Investigations, a firm that contracts with individuals, companies, and government agencies to conduct computer forensics investigations. D&B employees are expected to observe the following tenets, which the company views as the foundation for its success:

  • Give concerted attention to clients’ needs and concerns.
  • Follow proper procedures and stay informed about legal issues.
  • Maintain the necessary skill set to apply effective investigative techniques using the latest technologies.

Your manager has just scheduled a meeting with an important prospective client, and she has asked you to be part of the team that is preparing for the meeting. The prospective client is Brendan Oliver, a well-known celebrity. Last night, Mr. Oliver’s public relations team discovered that someone obtained three photos that were shot on his smartphone, and tried to sell the photos to the media. Due to the sensitive nature of the photos, Mr. Oliver and his team have not yet contacted law enforcement. They would like to know if D&B can provide any guidance or support related to the investigation—or, at the very least, if D&B can help them prevent similar incidents from occurring in the future. At this time, they do not know how the photos were acquired. The public relations team is wondering if a friend, family member, or employee could have gained direct access to Mr. Oliver’s phone and obtained the photos that way, although the phone is usually locked with a passcode when Mr. Oliver is not using it. In addition, Mr. Oliver emailed the photos to one other person several months ago. He has not spoken with that person in the last few weeks, but he does not believe that person would have shared the photos with anyone else.

Your manager plans to use this initial meeting with Mr. Oliver and his public relations team to establish rapport, learn more about the case, and demonstrate the firm’s expertise. The company sees this as an opportunity to build the future business, regardless of whether they are retained to help with the investigation of this case.

Tasks

To help the team prepare for the meeting, your manager asks you (and your colleagues) to consider and record your responses to the following questions:

  • What is the nature of the alleged crime, and how does the nature of the crime influence a prospective investigation?
  • Based on the limited information provided in the scenario, what is the rationale for launching an investigation that uses computer forensic activities? Would D&B and/or law enforcement need
  • additional information in order to determine if they should proceed with an investigation? Why or why not?
  • What would you share with the client about how investigators prepare for and conduct a computer forensics investigation? Identify three to five key points that are most relevant to this case.
  • What sources of evidence would investigators likely examine in this case? Provide concrete examples and explain your rationale.
  • What should the client, investigators, and others do—or not do—to ensure that evidence could be used in a court of law? Using layman’s terms explains laws and legal concepts that should be taken into account during the collection, analysis, and presentation of evidence.
  • What questions and concerns do you think the client will have?
  • What questions should the team ask the client to learn more about the case and determine the next steps?

Required Resources

  • Course textbook
  • Internet access

Submission Requirements

  • Format: Microsoft Word (or compatible)
  • Font: Arial, 12-point, double-space
  • Citation Style: Follow your school’s preferred style guide
  • Length: 5–7 pages

Self-Assessment Checklist

  • I effectively documented the causes for investigation.
  • I effectively documented key points related to the collection, analysis, and presentation of computer forensic evidence.
  • I successfully identified potential sources of evidence.
  • I summarized laws and legal concepts that apply to this case.
  • I created a professional, well-developed report with proper documentation, grammar, spelling, and punctuation.

Grading Rubric for the Assignment #1:

  • Delivery: Delivered the assignments on time, and correct format: 25 percent
  • Completion: Providing a thoroughly developed document including descriptions of all questions: 25 percent
  • Understanding: Demonstrating a clear understanding of the purpose and writing a central idea with the most relevant facts, details, and/or explanation: 25 percent
  • Organization: Paper is well organized based on the APA format, makes good use of transition statements, and in most instances follows a logical progression including good use of symbols, spacing in output: 25 percent

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Dis 14

2023 Using Campbellsville University library and or other sources read at least four 4 academically reviewed articles on the ethical issues that | Assignment Collections

 

Using Campbellsville University library and/or other sources, read at least four (4) academically reviewed articles on the ethical issues that may arise in information management. Please note that Wikipedia articles will not be accepted for this discussion.

1.    Write a comparative analysis of the articles noting the similarities and differences.

2.    Compare the information in those articles to the materials in Chapter 14 of your textbook. Does the premise of those articles support the overall theme of the materials in Chapter 14 of your textbook? Why or why not?

3.    Discuss what you learned from those articles. In your discussion, give example(s) of your organization handles ethic concerns as they relate to information management.

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Why did Facebook decide to make it more difficult for users to control who has access to the personal information they post on the Web site? 2. Which type of control is of concern to the Facebook users and privacy activists—feed forward, concurrent, o

2023 IT Management Minicase Facebook Users Want to Control More of Their Personal Information DISCUSSION QUESTIONS 1 Why did Facebook | Assignment Collections

IT Management Minicase

Facebook Users Want to Control More of Their Personal Information

 

DISCUSSION QUESTIONS

1. Why did Facebook decide to make it more difficult for users to control who has access to the

personal information they post on the Web site?

2. Which type of control is of concern to the Facebook users and privacy activists—feed

forward, concurrent, or feedback control? (Use the internet to research these concepts)

3. Should Facebook use more control in managing how the information is used among the users

of the social networking Web site? What is the basis of your answer?

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Python Programming Assignment

2023 Update 10 24 The file hashtable py has been updated and now includes some code | Assignment Collections

Update (10/24): 

  • The file hashtable.py has been updated and now includes some code to get started with unittest (go to MS Teams to download it).
  • You will want to download hashtable.py and add onto it, rather than importing it from a new file you create (since you won’t be able to extend the class across separate files).
  • Yes, there is some redundancy between unit tests and the file test_hashtable.py. I am using test_hashtable.py in order to both test and interact with your class (more easily). If your unit tests are thorough/comprehensive, then it will likely look similar to the final version of test_hashtable.py that I will use. 

The tasks in this assignment are to extend the HashTable class that is currently defined in the file “hashtable.py” (located in MS Teams -> General -> Files -> Code). 

By extending it we will increase the functionality of the HashTable class (by adding more methods) and will make it more flexible (e.g. can resize itself as needed) and robust (e.g. no issues/errors when it is full and an item is added). 

The ways to extend the class, and thus the requirements for this assignment are as follows. 

1. Override Python len() function to work with HashTable in a specific way – Using def __len__ will override the Python len() function. The way this is implemented should be to return the number of items stored in the hash table (note: this is *not* the same as HashTable’s “size” field). 

2. Override Python in operator – This will be done using def __contains__ and should be implemented so this operator will then return a boolean when used in statements of the form  54 in myhashtable. For this example, the function should return True if 54 is an existing key in the HashTable instance myhashtable, and False if it is not. 

3. Override Python del operator – This is done by  using def __delitem__ and should allow for a key/value pair to be removed from an instance of HashTable (e.g. del h[54]). Think about how you want to handle cases when deleting a key that was involved with collisions. Be sure to include in the documentation for this method any assumptions/restrictions on how this can be used. 

4. Modify exiting put method to resize an instance as needed – The current HashTable implementation is limited in that it is not able to gracefully handle the case when an item is added to already full HashTable instance. This method should be modified to deal with this more gracefully, and should resize the instance for the user. Be sure to include documentation here describing exactly when you choose to resize and how you select an appropriate new size (remember that prime numbers are preferred for sizes, in order to avoid clustering, or an even more severe but subtle issue). 

All of those methods should be clearly documented to describe how and why the implementation is defined as it is. You will also want to use unittest on this assignment. One good use case for unittest will be to add a few items (and maybe even delete) one, and then to use unittest to verify that the slots and data fields are equal to what you expect. All of the extensions that you’ve added should be tested as well.  

Lastly, for grading, you will want to ensure that you’re program can be run through a test script. The test script will look like the code shown at bottom of this assignment description. When it is run we should expect output similar to what is shown in this screenshot.

test_hashtable.py (the final test script will vary slightly from this):

from <<your file name (without .py)>> import HashTable

# instantiate a HashTable object
h = HashTable(7)

# store keys and values in the object
h[6] = ‘cat’
h[11] = ‘dog’
h[21] = ‘bird’
h[27] = ‘horse’

print(“-“*10, “keys and values”, “-“*10)
print(h.slots)
print(h.data)

# check that data was stored correctly
print(“-“*10, “data check”, “-“*10)
if h.data == [‘bird’, ‘horse’, None, None, ‘dog’, None, ‘cat’]:
    print(”    + HashTable ‘put’ all items in correctly”)
else:
    print(”    – items NOT ‘put’ in correctly”)

# check that ‘in’ operator works correctly
print(“-“*10, “in operator”, “-“*10)
if 27 in h:
    print(”    + ‘in’ operator correctly implemented”)
else:
    print(”    – ‘in’ operator NOT working”)

# delete operator
del h[11]

# check that len() function is implemented and works
print(“-“*10, “len() function”, “-“*10)
if len(h) == 3:
    print(”    + ‘len’ function works properly”)
else:
    print(”    – ‘len’ function NOT working”)

# “in” operator (returns a boolean)
print(“-“*10, “len() after deletion”, “-“*10)
if 11 not in h:
    print(”    + ‘in’ operator works correctly after 11 was removed”)
else:
    print(”    – ‘in’ operator OR ‘del’ NOT working”)

# check that data was also removed
print(“-“*10, “data after deletion”, “-“*10)
if h.data == [‘bird’, ‘horse’, None, None, None, None, ‘cat’]:
    print(”    + data is correct after deletion”)
else:
    print(”    – data not correctly removed after deletion”)

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Implementing Network And Personnel Security Measures

2023 The security consulting firm that you work for has been awarded a contract to implement a | Assignment Collections

The security consulting firm that you work for has been awarded a contract to implement a new IT Security Infrastructure to secure the Information Technology data assets of a local government agency.  This agency has many remote workers that are in the field and need to connect back to the agency’s system servers. The remote workers use a wireless network infrastructure to connect their electronic pads to servers located within the local government’s facility. The remote workers have needs to access property records, cite zoning violations electronically, and validate building permits. The public demand to expand IT services has grown faster than its ability to provide an adequately secured infrastructure. In fact, this government entity was previously featured on the news for having minimal security controls and methods for accessing property tax information of citizens. The inadequate security allowed many construction trade businesses to illegally access property records and zoning violations. Your role in this project is to enhance and optimize the security mechanisms for accessing these systems.

Write a four to five (4-5) page paper in which you:

1. Create an information flow diagram, using Visio or Dia, which:
     a. Illustrates how remote users will securely connect to the government agency’s network.  
     b. Illustrates the patch of network devices that data packets must travel to get from server to remote user’s device and back to  

         server.
         Note: The graphically depicted solution is not included in the required page length.

2. Provide an equipment list of network security devices that would be needed to ensure the integrity and sensitivity of private 

    information. In this list:
    a. Propose at least two (2) vendor brands per each device and the associate costs required to procure these items.
    b. Identify the functionality each device serves and the expected benefits the government agency should experience upon the 
        successful installation of this equipment.

3. Develop a maintenance plan that should be recommended to the government agency to ensure having the latest security measures

    available within the network in which you:
    a. Describe the risks associated with not fulfilling the activities outlined within your maintenance plan.
    b. Indicate specific activities, personnel / resources required, and frequency of execution.

4. Recommend at least four (4) physical security measures that could be developed to ensure the electronic perimeter of electronic 

    assets.

5. Recommend at least two (2) physical security vendors that could achieve the four (4) security measures you identified. Justify your
    recommendations with your response.

6. Evaluate and consider activities that the Human Resources Department could perform in order to complement and instill security 

    from within the organization. Provide a rationale with your response.

7. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality 

    resources. 

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
  • Include charts or diagrams created in Visio or one of its equivalents such as Dia. The completed diagrams / charts must be imported into the Word document before the paper is submitted.

The specific course learning outcomes associated with this assignment are:

  • Describe and apply the 14 areas of common practice in the Department of Homeland Security (DHS) Essential Body of Knowledge.
  • Describe best practices in cybersecurity.
  • Describe system, application, network, and telecommunications security policies and response.
  • Evaluate the ethical concerns inherent in cybersecurity and how these concerns affect organizational policies.
  • Use technology and information resources to research issues in cybersecurity.
  • Write clearly and concisely about topics associated with cybersecurity using proper writing mechanics and technical style conventions.

 

 

Points: 100

Case Study 2: Developing the Forensics, Continuity, Incident Management, and Security Training Capacities for the Enterprise

Criteria

 

Unacceptable

Below 60% F

Meets Minimum Expectations

60-69% D

 

Fair

70-79% C

 

Proficient

80-89% B

 

Exemplary

90-100% A

1a. Determine how defined roles of technology, people, and processes are necessary to ensure resource allocation for business continuity.

Weight: 10%

Did not submit or incompletely determined how defined roles of technology, people, and processes are necessary to ensure resource allocation for business continuity.

Insufficiently determined how defined roles of technology, people, and processes are necessary to ensure resource allocation for business continuity.

Partially determined how defined roles of technology, people, and processes are necessary to ensure resource allocation for business continuity.

Satisfactorily determined how defined roles of technology, people, and processes are necessary to ensure resource allocation for business continuity.

Thoroughly determined how defined roles of technology, people, and processes are necessary to ensure resource allocation for business continuity.

1b. Explain how computer security policies and data retention policies help maintain user expectations of levels of business continuity that could be achieved.
Weight: 5%

Did not submit or incompletely explained how computer security policies and data retention policies help maintain user expectations of levels of business continuity that could be achieved.

Insufficiently explained how computer security policies and data retention policies help maintain user expectations of levels of business continuity that could be achieved.

Partially explained how computer security policies and data retention policies help maintain user expectations of levels of business continuity that could be achieved.

Satisfactorily explained how computer security policies and data retention policies help maintain user expectations of levels of business continuity that could be achieved.

Thoroughly explained how computer security policies and data retention policies help maintain user expectations of levels of business continuity that could be achieved.

1c. Determine how acceptable use policies, remote access policies, and email policies could help minimize any anti-forensics efforts. Give an example with your response.

Weight: 10%

Did not submit or incompletely determined how acceptable use policies, remote access policies, and email policies could help minimize any anti-forensics efforts; did not submit or incompletely gave an example with your response.

Insufficiently determined how acceptable use policies, remote access policies, and email policies could help minimize any anti-forensics efforts; insufficiently gave an example with your response.

Partially determined how acceptable use policies, remote access policies, and email policies could help minimize any anti-forensics efforts; partially gave an example with your response.

Satisfactorily determined how acceptable use policies, remote access policies, and email policies could help minimize any anti-forensics efforts; satisfactorily gave an example with your response.

Thoroughly determined how acceptable use policies, remote access policies, and email policies could help minimize any anti-forensics efforts; thoroughly gave an example with your response.

2. Suggest at least two (2) models that could be used to ensure business continuity and ensure the integrity of corporate forensic efforts. Describe how these could be implemented.

Weight: 10%

Did not submit or incompletely suggested at least two (2) models that could be used to ensure business continuity and ensure the integrity of corporate forensic efforts; did not submit or incompletely described how these could be implemented.

Insufficiently suggested at least two (2) models that could be used to ensure business continuity and ensure the integrity of corporate forensic efforts; insufficiently described how these could be implemented.

Partially suggested at least two (2) models that could be used to ensure business continuity and ensure the integrity of corporate forensic efforts; partially described how these could be implemented.

Satisfactorily suggested at least two (2) models that could be used to ensure business continuity and ensure the integrity of corporate forensic efforts; satisfactorily described how these could be implemented.

Thoroughly suggested at least two (2) models that could be used to ensure business continuity and ensure the integrity of corporate forensic efforts; thoroughly described how these could be implemented.

3. Explain the essentials of defining a digital forensics process and provide two (2) examples on how a forensic recovery and analysis plan could assist in improving the Recovery Time Objective (RTO) as described in the first article.

Weight: 10%

Did not submit or incompletely explained the essentials of defining a digital forensics process; did not submit or incompletely provided two (2) examples on how a forensic recovery and analysis plan could assist in improving the Recovery Time Objective (RTO) as described in the first article.

Insufficiently explained the essentials of defining a digital forensics process; insufficiently provided two (2) examples on how a forensic recovery and analysis plan could assist in improving the Recovery Time Objective (RTO) as described in the first article.

Partially explained the essentials of defining a digital forensics process; partially provided two (2) examples on how a forensic recovery and analysis plan could assist in improving the Recovery Time Objective (RTO) as described in the first article.

Satisfactorily explained the essentials of defining a digital forensics process; satisfactorily provided two (2) examples on how a forensic recovery and analysis plan could assist in improving the Recovery Time Objective (RTO) as described in the first article.

Thoroughly explained the essentials of defining a digital forensics process; thoroughly provided two (2) examples on how a forensic recovery and analysis plan could assist in improving the Recovery Time Objective (RTO) as described in the first article.

4. Provide a step-by-step process that could be used to develop and sustain an enterprise continuity process.

Weight: 10%

Did not submit or incompletely provided a step-by-step process that could be used to develop and sustain an enterprise continuity process.

Insufficiently provided a step-by-step process that could be used to develop and sustain an enterprise continuity process.

Partially provided a step-by-step process that could be used to develop and sustain an enterprise continuity process.

Satisfactorily provided a step-by-step process that could be used to develop and sustain an enterprise continuity process.

Thoroughly provided a step-by-step process that could be used to develop and sustain an enterprise continuity process.

5. Describe the role of incident response teams and how these accommodate business continuity.

Weight: 5%

Did not submit or incompletely described the role of incident response teams and how these accommodate business continuity.

Insufficiently described the role of incident response teams and how these accommodate business continuity.

Partially described the role of incident response teams and how these accommodate business continuity.

Satisfactorily described the role of incident response teams and how these accommodate business continuity.

Thoroughly described the role of incident response teams and how these accommodate business continuity.

6a. Suggest two (2) awareness and training efforts that could assist in preventing anti-forensic efforts.

Weight: 10%

Did not submit or incompletely suggested two (2) awareness and training efforts that could assist in preventing anti-forensic efforts.

Insufficiently suggested two (2) awareness and training efforts that could assist in preventing anti-forensic efforts.

Partially suggested two (2) awareness and training efforts that could assist in preventing anti-forensic efforts.

Satisfactorily suggested two (2) awareness and training efforts that could assist in preventing anti-forensic efforts.

Thoroughly suggested two (2) awareness and training efforts that could assist in preventing anti-forensic efforts.

6b. Determine how having a knowledgeable workforce could provide a greater level of secure behavior. Provide a rationale with your response.

Weight: 10%

Did not submit or incompletely determined how having a knowledgeable workforce could provide a greater level of secure behavior; did not submit or incompletely provided a rationale with your response.

Insufficiently determined how having a knowledgeable workforce could provide a greater level of secure behavior; insufficiently provided a rationale with your response.

Partially determined how having a knowledgeable workforce could provide a greater level of secure behavior; partially provided a rationale with your response.

Satisfactorily determined how having a knowledgeable workforce could provide a greater level of secure behavior; satisfactorily provided a rationale with your response.

Thoroughly determined how having a knowledgeable workforce could provide a greater level of secure behavior; thoroughly provided a rationale with your response.

6c. Outline the steps that could be performed to ensure continuous effectiveness.

Weight: 5%

Did not submit or incompletely outlined the steps that could be performed to ensure continuous effectiveness.

Insufficiently outlined the steps that could be performed to ensure continuous effectiveness.

Partially outlined the steps that could be performed to ensure continuous effectiveness.

Satisfactorily outlined the steps that could be performed to ensure continuous effectiveness.

Thoroughly outlined the steps that could be performed to ensure continuous effectiveness.

7. 3 references

Weight: 5%

No references provided

Does not meet the required number of references; all references poor quality choices.

Does not meet the required number of references; some references poor quality choices.

Meets number of required references; all references high quality choices.

Exceeds number of required references; all references high quality choices.

8. Clarity, writing mechanics, and formatting requirements

Weight: 10%

More than 8 errors present

7-8 errors present

5-6 errors present

3-4 errors present

0-2 errors present

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Discussion

2023 Discussion Read Chapter 9 scenario and address the following question UW adopted | Assignment Collections

 Discussion

Read Chapter 9 scenario, and address the following question

“UW adopted a committee structure to administer its ERM. Would such a structure work in private industry or is a Chief Risk Officer required?”

Instructions for Initial Posts:

After reading the scenario, start a new discussion thread to address the discussion topic. 

Discussion Requirements:

Must:

  • Be 4 paragraphs in length
  • Be supported by the required textbook and at least two additional references

Points deducted if the submission: 

  • Does not use the required textbook as one of the two reference sources 
    • You CANNOT use Wikipedia, LinkedIn articles, blogs, paid vendors, certification websites, or similar sources in academic writing. You CAN use reputable industry articles from publications similar to ComputerWeekly, PCMag, Wall Street Journal, New York Times, or similar sources. Academic journals and popular industry articles are accessible in the university’s library databases and Google Scholar. All references should not have a publication date older than 2005.
  • 1. Does not respond to the question(s) thoroughly meaning with at least 4 paragraphs
  • 2. Primarily consists of bullet points
  • 3. Uses statements such as “I have gone through your post,” “I have gone through your discussion,” “adding a few more points,” “based on my knowledge,” “according to me,” “as per my knowledge,” or similar
  • 4. Contains contractual phrases, as an example “shouldn’t” “couldn’t” or “didn’t,” or similar
  • 5. Uses vague words or phrases such as “proper,” “appropriate,” “adequate,” “it is obvious,” “it is clear,” “in fact,” or similar to describe a process, function, or procedure
  • As an example, “proper incident response plan,” “appropriate IT professional,” “adequate security,” or similar. These words are subjective because they have different meanings to different individuals.

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now