Assign 07 - Linux Forensics
Learning Objectives and Outcomes
Assignment Requirements
You are an experienced digital forensics specialist for DigiFirm Investigation Company. DigiFirm is involved in an investigation of a large corporation accused of unauthorized access of a competitor’s database to obtain customer information. The DigiFirm team will be responsible for the forensic investigation of the seized computers that are running Linux.
Chris, your team leader, has asked you to research information and tools that the team can use during the investigations.
For this assignment:
Required Resources
Submission Requirements
In: Computer Science
Read through the Ridgeline Mountain Outfitters (RMO) case study in the text book ( system analysis and design in a changing word). Identify the company's business processes from the key functional areas of their business. DRAW A BUSINESS USE CASE DIAGRAM to show the business processes that take place in the business. The business use case diagram must clearly demonstrate your understanding of their business requirements, and must be sufficient to aid the systems analysts' roles in providing the systems use case diagrams that the designers and developers can use in building the proposed system that can solve the company's overall problems either as a whole or part, in a specified business area. You can provide only one use case diagram where you indicate all the actors and use cases, or you can have multiple diagrams as long as you are able to graphically represent the actors and uses cases and their associations in the business processes that take place in the business. Note that this is a business use case diagram where you have to show your understanding of the business requirements for a proposed business information system for the RMO project.
In: Computer Science
Answer the following application exercise on organization and
visualization of data.
1. You can use Excel.
2. If you use the calculator and perform the exercise manually,
obtain a photo of the process performed using the clipping and
search of your result in Word.
3. Remember to include presentation sheet in APA format.
A sample of 30 employees who work investigating cases of possible
money laundering, answers a survey about the average time in days
we take them analyzes, present findings and recommendations. Next,
your answers are detailed
25 22 20 16 13 16 32 26 13 24 15 15 14 14 54 11 24 24 24 19 17 10
16 48 11 13 20 13 12 24
Summary of this data:
1. Building a frequency distribution table.
2. Building graphical representations: histogram, frequency polygon
and warhead.
3. Calculating the measures of central tendency: mean, mode and
median.
4. Make a comment on what the data related to the average time of
days to solve each case indicate.
In: Math
Group Project
Step 1: Select any four sorting algorithm and two searching algorithms
Step 2: Understand the logic of all the algorithms
Step 3: Create java program and use your sorting/searching source codes and integrate it into your main java project.
Step 4: Create a separate java class for each algorithm
Step 5: Create a random function that generates at least 100000 random integer numbers from 1 to 1 million(No need to print out or store the numbers)
Step 6: Insert start transaction and end transaction for each sorting and searching methods
Step 7: Calculate the time in milliseconds for each sorting and searching class
Step 8: Compare the performance of each algorithm
Project Deliverables
In: Computer Science
Assembly Line Assignment:
This week you are going to design and balance an assembly line. We are going to take the simple task of making cupcakes, break the work up into stations, calculate cycle times for each station, balance the work load between stations, and calculate the efficiency of the operation. The steps for the assignment are below.
1)Design an assembly line to manufacture cupcakes from scratch.
2)Balance the assembly line.
3)Measure the efficiency.
Assignment Format: The best way to do this is Excel. You can use cell borders and insert shapes to build the assembly line. Use the math functions in Excel to balance your line and calculate efficiencies. The final report should be in Word in APA format. Use the following sections.
1)Introduction-how you set up the line, what is done at each station and cycle time. You can cut and paste in your diagram from Excel.
2)Line Balance-what you did to balance the line, you can copy in your Excel work if needed.
3)Efficiency-provide and analyze the operational efficiency.
In: Operations Management
Please make a Python program where the computer chooses a number and the player guesses the number.
You need an input, a random number, if statement, and a while loop.
Please reference these when doing the code:
((random reference))
•>>> import random
•>>> random.randint(1, 100)
•67
((While & if referefence))
•>>> cnum = 3
•>>>while true
•>>> if cnum == 3:
•>>> print(‘correct’)
•>>> break
•>>> elif cnum == 2:
•>>> print(‘incorrect’)
Please prepare a Word document that has the Python code and the screen shot of your output.
Here is a sample output screen.
|
What is your guess? 97 Too high What is your guess? 6 Too low What is your guess? 82 Too high What is your guess? 23 Too low What is your guess? 64 Too high What is your guess? 46 Too high What is your guess? 35 Too low What is your guess? 40 Too high What is your guess? 37 Too low What is your guess? 39 Too high What is your guess? 38 Correct ! >>> |
In: Computer Science
Assignment task
Use your favorite search engine to find details about (1) virus/piece of malware. Upload an MS Word or .PDF document that summarizes each of the following
Item 1: Introduction - What is meant by malware/viruses? What is their history? Are malware and/or viruses recent developments in computer technology or have they been around for a while? What piece of malware/virus are choosing to write about and why?
Item 2: Virus/Malware details:
What specifically does the virus/malware do? How does it infect targets? What does it do once it infects a host? Does it change registry settings, does it leave behind malicious code, etc...? Is it destructive? If so how?
In: Computer Science
If you hold a spoon in front of your face so that you see your image in the bowl of the spoon, your image is upright when you hold the spoon close to your face, but inverted when you hold the spoon far away.
Construct the correct explanation why this change occurs.
Place the terms on the left to the appropriate blanks on the right to complete the sentences.
The spoon acts like a ____________ mirror. Light from your face is focused by the mirror.
If you are very close to the spoon (within the focal length) then the light rays ___________.
If you are farther from the spoon (beyond the focal length) then the light rays ___________.
Word Bank:
Converging
Diverging
From an inverted image
Are converged somewhat
------------------------------------------------------------------------------------------------
You are using a converging lens to look at a splinter in your finger. The lens has a 9.0 cm focal length, and you place the splinter 6.7 cm from the lens.
How far from the lens is the image?
Express your answer to two significant figures and include the appropriate units. Enter positive value if the image is on the other side from the lens and negative value if the image is on the same side.
In: Physics
You are to name your package assign1 and your file Palindrome.java.
Palindrome Class
Palindrome
- testString : String
| + Palindrome (String)
+ isPalindrome (): boolean |
The method isPalindrome is to determine if a string is a palindrome. A palindrome, for this assignment, is defined as a word or phrase consisting of alphanumeric characters that reads the same frontwards and backwards while ignoring cases, punctuation and white space. If there are no alphanumeric characters, the string is considered a palindrome. The method should return true if it is a palindrome and false otherwise.
Notice – there is no main, no input and no output for this assignment. You are limited to the following Java library classes.
- String
- Character
Here are the restrictions on this method. Up to 20% penalty if not followed.
1. You may NOT return from the inside of a loop.
2. You may NOT break from the inside of a loop.
3. You may use ONLY ONE loop (either while or do-while).
4. You may NOT copy the String to another String.
5. You may NOT process the String more than one time (only make one
pass
through it).
6. You must STOP processing as early as possible (when you find
that it is or is not
a palindrome). In other words, using a for loop is not a good solution.
In: Computer Science
Given the code snippet below, complete this program by:
SUBMIT THE PYTHON FILE (.PY) NOT SCREENSHOT, WORD DOCUMENT ETC. IF YOUR SUBMISSION IS NOT A .PY FILE, AUTOMATIC ZERO.
#Code snippet below. Copy this into your favorite IDE and complete the tasks
import numpy as np
import pandas as pd
temps = np.random.randint(60, 101, 6)
temperatures = pd.Series(temps)
2.
Write a python program that asks the user to enter
a number of quarters, dimes, nickels and pennies and then outputs the monetary value of the coins in the format of
dollars and remaining cents. YOUR PROGRAM MUST HAVE AT LEAST ONE FUNCTION.
3.
USE THE python TextBlob library to create a language translation application. Your application should accept at least two input from the user. The first input should be the text to be translated (your program should accept any language). The second should be the language to translate to. At minimum, your program should be able to translate to 10 different languages.
Your program must have at least one python function.
In: Computer Science