Questions
Assign 07 - Linux Forensics Learning Objectives and Outcomes Research information about Linux forensic investigations and...

Assign 07 - Linux Forensics

Learning Objectives and Outcomes

  • Research information about Linux forensic investigations and appropriate tools.
  • Identify and describe three Web sites that provide highly relevant information to Linux forensic investigations.

Assignment Requirements

You are an experienced digital forensics specialist for DigiFirm Investigation Company. DigiFirm is involved in an investigation of a large corporation accused of unauthorized access of a competitor’s database to obtain customer information. The DigiFirm team will be responsible for the forensic investigation of the seized computers that are running Linux.

Chris, your team leader, has asked you to research information and tools that the team can use during the investigations.

For this assignment:

  1. Research Web sites that provide information or tools for Linux forensic investigations.
  2. Write a report that describes three of the most promising Web sites in detail and discusses why these resources might be helpful in a forensic examination.

Required Resources

  • Course textbook
  • Internet

Submission Requirements

  • Format: Microsoft Word
  • Font: Arial, size 12, double-space
  • Citation Style: Follow your school’s preferred style guide
  • Length: 1–2 pages

In: Computer Science

Read through the Ridgeline Mountain Outfitters (RMO) case study in the text book ( system analysis...

Read through the Ridgeline Mountain Outfitters (RMO) case study in the text book ( system analysis and design in a changing word). Identify the company's business processes from the key functional areas of their business. DRAW A BUSINESS USE CASE DIAGRAM to show the business processes that take place in the business. The business use case diagram must clearly demonstrate your understanding of their business requirements, and must be sufficient to aid the systems analysts' roles in providing the systems use case diagrams that the designers and developers can use in building the proposed system that can solve the company's overall problems either as a whole or part, in a specified business area. You can provide only one use case diagram where you indicate all the actors and use cases, or you can have multiple diagrams as long as you are able to graphically represent the actors and uses cases and their associations in the business processes that take place in the business. Note that this is a business use case diagram where you have to show your understanding of the business requirements for a proposed business information system for the RMO project.

In: Computer Science

Answer the following application exercise on organization and visualization of data. 1. You can use Excel....

Answer the following application exercise on organization and visualization of data.
1. You can use Excel.
2. If you use the calculator and perform the exercise manually, obtain a photo of the process performed using the clipping and search of your result in Word.
3. Remember to include presentation sheet in APA format.
A sample of 30 employees who work investigating cases of possible money laundering, answers a survey about the average time in days we take them analyzes, present findings and recommendations. Next, your answers are detailed
25 22 20 16 13 16 32 26 13 24 15 15 14 14 54 11 24 24 24 19 17 10 16 48 11 13 20 13 12 24
Summary of this data:
1. Building a frequency distribution table.
2. Building graphical representations: histogram, frequency polygon and warhead.
3. Calculating the measures of central tendency: mean, mode and median.
4. Make a comment on what the data related to the average time of days to solve each case indicate.

In: Math

Group Project Step 1: Select any four sorting algorithm and two searching algorithms Step 2: Understand...

Group Project

Step 1: Select any four sorting algorithm and two searching algorithms

Step 2: Understand the logic of all the algorithms

Step 3: Create java program and use your sorting/searching source codes and integrate it into your main java project.

Step 4: Create a separate java class for each algorithm

Step 5: Create a random function that generates at least 100000 random integer numbers from 1 to 1 million(No need to print out or store the numbers)

Step 6: Insert start transaction and end transaction for each sorting and searching methods

Step 7: Calculate the time in milliseconds for each sorting and searching class

Step 8: Compare the performance of each algorithm

Project Deliverables

  • Determine the best and worst sorting and searching algorithm
  • Submit only a single word document with all the screenshots
  • Java Source code
  • Output screenshot that shows the transaction time for each algorithm
  • 6 class files for sorting(4) and searching algorithm(2)
  • 1 class file with main function
  • Conclusion
  • No power points only source code

In: Computer Science

Assembly Line Assignment: This week you are going to design and balance an assembly line. We...

Assembly Line Assignment:

This week you are going to design and balance an assembly line. We are going to take the simple task of making cupcakes, break the work up into stations, calculate cycle times for each station, balance the work load between stations, and calculate the efficiency of the operation. The steps for the assignment are below.

1)Design an assembly line to manufacture cupcakes from scratch.

2)Balance the assembly line.

3)Measure the efficiency.

Assignment Format: The best way to do this is Excel. You can use cell borders and insert shapes to build the assembly line. Use the math functions in Excel to balance your line and calculate efficiencies. The final report should be in Word in APA format. Use the following sections.

1)Introduction-how you set up the line, what is done at each station and cycle time. You can cut and paste in your diagram from Excel.

2)Line Balance-what you did to balance the line, you can copy in your Excel work if needed.

3)Efficiency-provide and analyze the operational efficiency.

In: Operations Management

Please make a Python program where the computer chooses a number and the player guesses the...

Please make a Python program where the computer chooses a number and the player guesses the number.

You need an input, a random number, if statement, and a while loop.

Please reference these when doing the code:

((random reference))

•>>> import random

•>>> random.randint(1, 100)

•67

((While & if referefence))

•>>> cnum = 3

•>>>while true

•>>> if cnum == 3:

•>>> print(‘correct’)

•>>> break

•>>> elif cnum == 2:

•>>> print(‘incorrect’)

Please prepare a Word document that has the Python code and the screen shot of your output.

Here is a sample output screen.

What is your guess? 97

Too high

What is your guess? 6

Too low

What is your guess? 82

Too high

What is your guess? 23

Too low

What is your guess? 64

Too high

What is your guess? 46

Too high

What is your guess? 35

Too low

What is your guess? 40

Too high

What is your guess? 37

Too low

What is your guess? 39

Too high

What is your guess? 38

Correct !

>>>

In: Computer Science

Assignment task Use your favorite search engine to find details about (1) virus/piece of malware. Upload...

Assignment task

Use your favorite search engine to find details about (1) virus/piece of malware. Upload an MS Word or .PDF document that summarizes each of the following

Item 1: Introduction - What is meant by malware/viruses? What is their history? Are malware and/or viruses recent developments in computer technology or have they been around for a while? What piece of malware/virus are choosing to write about and why?  

Item 2: Virus/Malware details:

  1. Name of malware/virus
  2. When and where was this virus/malware first discovered?
  3. How prevalent is this virus/malware? Is it regionalized by geography or business sector? Is it worldwide? How many computers/victims has it claimed?
  4. What has been the impact of this particular virus/malware? Has it damaged computers/data? Has it caused the loss of revenue or reputation? Has it physically damaged anything?
  5. Description of the virus/malware:

What specifically does the virus/malware do? How does it infect targets? What does it do once it infects a host? Does it change registry settings, does it leave behind malicious code, etc...? Is it destructive? If so how?

In: Computer Science

If you hold a spoon in front of your face so that you see your image...

If you hold a spoon in front of your face so that you see your image in the bowl of the spoon, your image is upright when you hold the spoon close to your face, but inverted when you hold the spoon far away.

Construct the correct explanation why this change occurs.

Place the terms on the left to the appropriate blanks on the right to complete the sentences.

The spoon acts like a ____________   mirror. Light from your face is focused by the mirror.

If you are very close to the spoon (within the focal length) then the light rays ___________.

If you are farther from the spoon (beyond the focal length) then the light rays ___________.

Word Bank:

Converging

Diverging

From an inverted image

Are converged somewhat
------------------------------------------------------------------------------------------------

You are using a converging lens to look at a splinter in your finger. The lens has a 9.0 cm focal length, and you place the splinter 6.7 cm from the lens.

How far from the lens is the image?

Express your answer to two significant figures and include the appropriate units. Enter positive value if the image is on the other side from the lens and negative value if the image is on the same side.

In: Physics

You are to name your package assign1 and your file Palindrome.java. Palindrome Class Palindrome - testString...

You are to name your package assign1 and your file Palindrome.java.

Palindrome Class

Palindrome

- testString : String

+ Palindrome (String)

+ isPalindrome (): boolean

The method isPalindrome is to determine if a string is a palindrome. A palindrome, for this assignment, is defined as a word or phrase consisting of alphanumeric characters that reads the same frontwards and backwards while ignoring cases, punctuation and white space. If there are no alphanumeric characters, the string is considered a palindrome. The method should return true if it is a palindrome and false otherwise.

Notice – there is no main, no input and no output for this assignment. You are limited to the following Java library classes.

- String
- Character

Here are the restrictions on this method. Up to 20% penalty if not followed.

1. You may NOT return from the inside of a loop.
2. You may NOT break from the inside of a loop.
3. You may use ONLY ONE loop (either while or do-while).

4. You may NOT copy the String to another String.
5. You may NOT process the String more than one time (only make one pass

through it).
6. You must STOP processing as early as possible (when you find that it is or is not

a palindrome). In other words, using a for loop is not a good solution.

In: Computer Science

Given the code snippet below, complete this program by: Displaying the data (temperatures) Displaying the minimum...

Given the code snippet below, complete this program by:

  1. Displaying the data (temperatures)
  2. Displaying the minimum temperature value
  3. Displaying the maximum temperature value
  4. Displaying the mean temperature

SUBMIT THE PYTHON FILE (.PY) NOT SCREENSHOT, WORD DOCUMENT ETC. IF YOUR SUBMISSION IS NOT A .PY FILE, AUTOMATIC ZERO.

#Code snippet below. Copy this into your favorite IDE and complete the tasks

import numpy as np

import pandas as pd

temps = np.random.randint(60, 101, 6)

temperatures = pd.Series(temps)

2.

Write a python program that asks the user to enter

a number of quarters, dimes, nickels and pennies and then outputs the monetary value of the coins in the format of

dollars and remaining cents. YOUR PROGRAM MUST HAVE AT LEAST ONE FUNCTION.

3.

USE THE python TextBlob library to create a language translation application. Your application should accept at least two input from the user. The first input should be the text to be translated (your program should accept any language). The second should be the language to translate to. At minimum, your program should be able to translate to 10 different languages.

Your program must have at least one python function.

In: Computer Science