in this assignment you will identify a baseline of security on your own computer and explore how it can be improved this week focuses on administrative security microsoft windows and apple macintosh mac offer tools to allow you to better manage the s

Complete the following:

In this assignment, you will identify a baseline of security on your own computer and explore how it can be improved. This week focuses on administrative security. Microsoft Windows and Apple Macintosh (Mac) offer tools to allow you to better manage the security on a home computer.

  • For Microsoft Windows: Click the link to visit the website related to Microsoft Baseline Security Analyzer (MBSA) and download MBSA: https://www.microsoft.com/en-us/download/details.aspx?id=7558
    Run MBSA on your computer. Create a Microsoft Word document sharing the results of the scan on your computer and attach it to your post in the Discussion Area.
  • For Apple Macintosh: If you are using a Mac instead of a PC, you will need to identify a vulnerability scanner that works with your version of Mac OS. One example of this type of tool repository can be found at: http://sectools.org/tag/vuln-scanners

Determine the security updates that apply to your computer. Compile a list of security updates for your computer and provide a summary of the vulnerabilities they prevent from being exploited. Provide a summary of the course of action you have taken to secure your computer. If your computer is up-to-date in terms of recommended patches and configuration changes, choose three of the optional enhancements that would apply to your operating system (OS) version and summarize why they would be beneficial.

Respond to the following after you have completed your analysis.

Answer the following questions:

  • What are the biggest threats to a personal computer (PC)? Justify your answer. Have any of these threats been detected on your machine?
  • Why is virus protection so important on a PC? How does spyware compare to viruses as a threat to your personal information? Explain your reasoning.
  • What steps can be taken to make your PC more secure? Outline at least two steps. What areas of security do these steps address? Run the test again with any corrections to the system to resolve the identified problems and explain the steps you took to improve security on your system.
  • What are the biggest threats to a PC and Mac? Are they significantly different? Explain your answer using examples.

information technology 146

Hello,

I have an assignment, so please read the brief well after that make 7 questions for the defense please.

I need the questions to be clear for defense.

Thanks

class-discussion-102

The response to the facilitator’s original post should be a minimum of 250 words. The student’s initial post must be supported by at least 2 reference(s).

Approved sources for this course include the course textbook and scholarly articles from the Bethel library databases. No other source information is acceptable. Everything must be in own words.

this is a commemorative presentation you will pay tribute to a person group place institution monument or event which you feel greatly influenced one of the following movements

Oral Presentation

This is a commemorative presentation. You will pay tribute to a person, group, place/ institution, monument or event, which you feel greatly influenced one of the following ‘movements’:

  1. a) Women’s Rights Movement (1960s and 70s – and arguably continuing today); or
  2. b) Civil Rights Movement (1950s and 60s – and arguably continuing today).

Commemorative speaking pays tribute and brings accolades to the subject. This is not a biography or historical documentary. You must use all proper conventions of public speaking, including a speaking outline, verbal and nonverbal techniques, and all elements of introduction, main points, and conclusion. The presentation will last 5 minutes. Submit your outline, presentation slides (PowerPoint, Keynote or Prezi), and a video recording of the presentation (which will be completed in-class during your presentation) to Canvas for assessment using the Dialogues of Learning Oral Communication Grading Rubric.

You are required to present on the day and time, which you sign up for in class. No exceptions. If you are absent during the class where presentation dates and times were secured, your professor will assign the same.

You are required to be present in class during all student presentations. Not just your own. Failure to be present during a presentation day will result in a 15 point deduction per occurrence.

Upload both your slides and speaking outline to Canvas by 11:59pm on Monday, April 29. Late submissions will NOT be assessed for credit. Upload the video of your presentation to Canvas by the end of the day you present.

Upload your video recording (completed in class during your presentation) to LiveText by no later than 11:59pm on the date in which you presented. Without this video your presentation may not be assessed.

Information contained in your slides must be properly cited in APA format.

i-just-need-a-short-comment

THIS WAS THE QUESTION

Student feedback is very important to us at Potomac, please list anything that would like to see changed in this course and how it will improve the learning experience for students.

I JUST NEED A SHORT COMMENT FOR STUDENTS REPLIES

THE STUDENT 1 REPLAY:

After the weeks of this course I can’t say that I left with any problems or un answered questions. Ms. Wells has been a tremendous teacher for this class period. This class was a great refresher in the English grammar and composition s it made me go over information that I may have forgotten long ago. If I could say one thing it would be us going over more literature but at the same time. I can’t complain as this was a great course.

THE STUDENT 2 REPLAY :

This class was really interested. In English I really enjoyed because professor Wells she taught us very nicely and everything in detail so we understood everything. In this class our professor he treat us nicely too and I love to learn from professor Wells every time in for my English class. I really enjoyed this class and really it she is a nice professor. Thanks professor Wells

i need a good tutor book review

In general, the review should be between 500-1000 words long. § The structure is that of an essay (introduction – main body – conclusion). § Start with the most obvious information, e.g. author(s) / editor(s), their affiliation, publisher, year of publication, which edition it is, if it is a textbook or a research text. § In an introduction paragraph briefly summarise what the book is all about – reading the blurb at the back of the book cover might be useful for this … § Provide an overview of the structure of the book (look at the content page!) § Highlighting particular features, e.g. the use of case studies, the text’s international focus, the inclusion of review questions after each chapter, if there are many diagrams / photos / maps, if the book is well indexed. § Discuss in more detail a particular aspect featured in the book and evaluate the way the author(s)’ have approached / presented this aspect. You can, for example, use quotations from the book to illustrate your point. Remember, you are not to discuss the content of the book as such, but assess the way it is presented! § Summarise your assessment (e.g. appraisal of the book’s strengths and weaknesses) and conclude with a recommendation or otherwise to your fellow students.

will provide book

motivating behaviors with work related rewards

Your final paper should be 4-6 pages not including the APA title page, abstract and reference page. ï‚· Your paper must include APA formatting, citations and references. ï‚· You are required to cite from your text chapter six and two additional scholarly sources (academic books or peer-reviewed journal articles)

discussion question 1227

Discussion 1

  • Explain how ITPM best practices can align the IT portfolio with business requirements in order to create the greatest possible value for the organization.
  • Assess the systems development life-cycle (SDLC) and explain how the life cycle, when executed properly, can maximize business value. Note: All stakeholders point of view should be considered.
  • Post two times for full credit.
  • Use an SWS or APA reference.

Discussion 2

  • Evaluate the service delivery models. Select the options that, in your opinion, are most efficient together regardless of industry. Additionally, select the models that work best in particular industries. Justify your response.
  • Determine how a company’s selection of a Service Delivery Model could impact business value. Provide an example to justify your response.
  • Post two times for full credit.
  • Use an SWS or APA reference.

discussion-board-minimum-400-words-and-please-include-references-in-apa-format

  • Compare and contrast the federal legal definitions of the terms threats (terrorists) and hazards with the legal definitions of the same terms from your state of residence.
  • Highlight and discuss similarities and differences with posts from classmates.
Instructions:

Model Answer

The student identifies the legal (based upon U.S. Code [USC]) definitions of all terms using the USA PATRIOT Act of 2001, the Homeland Security Act of 2002, the Stafford Act of 1984 as amended, appropriate Homeland Security Presidential Policy Directives (HSPDs) and other authoritative source references to include the DHS and/or FEMA. The student conducts a research effort of his or her state of residence, identifies appropriate state legislative acts, and provides state approved and legislated definitions of these terms. Responsive posts highlight identified similarities and differences within students’ posts.

final project data show instructor the data

THIS ASSIGNMENT MUST BE COMPLETED ON EXCEL FILE

Final Project Data Step 2

Now that you have an idea of what you want to pursue, make sure you have data that you can work with.

Consider assembling four, or five charts in a “Data Dashboard” type display. You may recall the classroom example of “Business Intelligence Tools” from Microsoft: https://powerbi.microsoft.com/

No one can duplicate the very busy “Data Dashboard” on the website but, it can be fun and educational to develop our own display/dashboard of Charts!

Many Students in the past have used the following sites with good results:

https://catalog.data.gov/dataset

http://education.state.mn.us/MDE/Data/

The librarians can help you out as well. If you can’t meet with one here are some detailed steps to follow.

http://research.library.gsu.edu/c.php?g=115466&p=4929607

30 more sites to explore with a quick description.

1. Government and political data

Data.gov: This is the go-to resource for government-related data. It claims to have up to 400,000 data sets, both raw data and geo spatial, in a variety of formats.

The only caveat in using the data sets is you have to make sure you clean them, since many have missing values and characters.

Socrata is another good place to explore government-related data. One great thing about Socrata is they have some visualization tools that make exploring the data easier.

City-specific government data: Some cities have their own data portals setup to browse through city-related data. For example, at San Francisco Data you can browse through everything from crime statistics to parking spot available in the city.

The UN and UN-related sites like UNICEF and the World Health Organization are rich with all kinds of data, from mortality rates to world hunger statistics.

The Census Bureau houses a ton of information about our lives around income, race, education, population and business.

2. Data aggregators

These are the places that house data from all kinds of sources. Sometimes it’s easier to find something here related to a specific category.

Programmable Web: A really useful resource to explore API’s and also mashups of different API’s.

Infochimps have a data marketplace that offers thousands of public and propietary data sets for download and API access, in a wide range of categories, from historical Twitter and OK Cupid data, to geo locations data, in different formats. You can even upload you own data if you like.

Data Market is a good place to explore data related to economics, healthcare, food and agriculture, and the automotive industry.

Google Public data explorer houses a lot of data from world development indicators, OECD and human development indicators, mostly related to economics data and the world.

Junar is a great data scraping service that also houses data feeds.

Buzzdata is a social data sharing service that allows you to upload your own data and connect and follow others who are uploading their own data.

3. Social data

Usually, the best place to get social data for an API is the site itself: Instagram, GetGlue, Foursquare, pretty much all social media sites have their own API’s. Here are more details on the most popular ones.

Twitter: Access to the Twitter API for historical uses is fairly limited, to 3200 tweets. For more, check out PeopleBrowsr, Gnip (also offers historical access to the WP Automattic data feed), DataSift, Infochimps, Topsy.

Foursquare: They have their own API and you can get it through Infochimps, as well.

Facebook: The Facebook graph API is the best resource for Facebook.

Face.com: A great tool for facial recognition data.

4. Weather data

Wunderground has detailed weather information and also let’s you search historical data by zip code or city. It gives temperature, wind, precipitation and hourly observations for that day.

Weatherbase has detailed weather stats on temperature, rain and humidity of nearly 27,000 cities.

5. Sports data

These three sites have comprehensive information on teams, players coaches and leaders by season.

Football

Baseball

Basketball

ESPN recently came up with its own API, too. You have to be a partner to get access to their data.

6. Universities and research

Searching the work of academics who specialize in a particular area is always a great place to find some interesting data.

If you come across specific data that you would like to use, say, in a research paper, the best way to go is to contact the professor directly. (That is how we got the data for our What are the Odds piece, which is one of the most-viewed infographics on the web.)

One university that makes some of the datasets used in its courses publicly available is UCLA.

7. News data

The New York Times has a great API and a really good explorer to access any article in the publication. The data is returned in json format.

The Guardian Data Blog regularly posts visualizations and makes data available through a Google docs format. The great thing about this is that that the data has already been cleaned.