Questions
earning Objectives and Outcomes Outline the proper steps to be performed in examining a laptop computer...

earning Objectives and Outcomes

  • Outline the proper steps to be performed in examining a laptop computer for evidence of a crime.

Assignment Requirements

You are an experienced digital forensics specialist for DigiFirm Investigation Company. The local police are investigating a man who they suspect is distributing child pornography. They have seized his laptop computer, which runs the Windows 10 operating system. The police are shorthanded and have contracted with DigiFirm to assist with the forensic investigation of the laptop. Chris, your team leader, has asked you to assist with the case.

There are several examinations you can complete on a computer running Windows 10. Before beginning any digital forensics investigation, it’s a good idea to plan your approach.

For this assignment:

Write a report that outlines the steps to be performed in examining the laptop for evidence of the crime, in order of importance. Be sure to explain why certain steps must be performed before others.

Required Resources

  • Course textbook
  • Internet

Submission Requirements

  • Format: Microsoft Word
  • Font: Arial, size 12, double-space
  • Citation Style: Follow your school’s preferred style guide
  • Length: 1–2 pages

Self-Assessment Checklist

  • I researched the process of examining a computer running Windows 10 for evidence.
  • I outlined the steps, in order of importance, to be performed to locate evidence on the computer.
  • I explained why certain steps must be performed before others.
  • I created a professional, well-developed report with proper documentation, grammar, spelling, and punctuation.

In: Computer Science

Wanda of Salty Pawz just doesn’t understand her friend Jamie sometimes. They have been working together...

Wanda of Salty Pawz just doesn’t understand her friend Jamie sometimes. They have been working together since the first dog biscuit came out of the oven, but now that the business is expanding, she can’t seem to get Jamie motivated to compete the tasks she delegates to her. She pays Jamie a salary now, so it’s not like the old days when she was working in exchange for dog treats. She has even given Jamie more responsibility; Jamie now supervises two other employees, a challenge Wanda assumed that Jamie wanted.

One afternoon she stops Jamie in the hallway and asks her if everything is going OK. Jamie responds that things are fine. Later that same week Wanda and Jamie are meeting about an upcoming promotion they are holding at the local animal shelter. Jamie takes a few notes but doesn’t share Wanda’s enthusiasm for the event. Wanda comes right out and asks Jamie if she has lost interest in the business. Jamie shrugs and says no, she is good with everything.

Why do you think Jamie might have lost her motivation and enthusiasm for the business at this point? How could Wanda motivate Jamie more effectively? Make sure the reasons you present are supported by sound motivational theory as established by leaders in the field.

This assignment should be a minimum of one short paragraph and a maximum of two paragraphs. Word totals for this work should be in the range of 200–300 words.

In: Operations Management

Research Basics: Lesson 1 ENGLISH 1021-41 ESSAY FUNDAMENTAL INSTRUCTIONS: Read and watch each web page/video/resource. Type...

Research Basics: Lesson 1 ENGLISH 1021-41 ESSAY FUNDAMENTAL

INSTRUCTIONS:

  • Read and watch each web page/video/resource.
  • Type a summary of the top takeaways/things you learned from each section/link whether they have a video or not. Each paragraph should have complete sentences and there needs to be at least 4 sentences. Think of it as at least one sentence about each of the four top things you learned from each resource you review.
  • So, again, you will type up paragraph for each section/link. Label your paragraphs by each section you are writing about. So, give a heading or label that says: What is Research? Information Cycle, and Planning: Keywords and Search Strings, then add you paragraphs about what you learned in each area. Put these paragraphs all together in ONE WORD DOCUMENT.
  • Label it Research Basics: Lesson 1 and submit it all together to the Research Basics: Lesson 1 assignment folder by April 20 at 11:59 pm.

This week you will be looking at these sections/links:

What is Research?

Information Lifecycle

Planning: Keywords and Search Strings - Learn how to identify keywords from a research topic and format them into search strings.

NOTE: This link may have words on the web page AND a video. Make sure to view and summarize/give top 4 take always from all included content (what you see/read)

In: Operations Management

1. In the 1970s Dr. J Robin Warren used a technique not widely used by pathologists...

1. In the 1970s Dr. J Robin Warren used a technique not widely used by pathologists at the time, which allowed him to make novel observations that ultimately resulted in a new treatment for ulcers. What was this technique?

Select one:

a. The use of a fistula to see inside the stomach

b. The use of a high-power microscope

c. The use of a stain for visualizing bacteria

2. Darwin's observations in the Pampas grasslands of Argentina led him to the conclusion that

Select one:

a. species change through time.

b. species change with geographical distance.

c. the Earth must be much older than was widely believed at the time.

d. climate alone cannot account for the distribution of species.

e. similar species tend to be geographically clustered.

3. Which of the following historical figures argued that species were not fixed, i.e. able to change over time into new species?

Select one:

a. Cuvier

b. Aristotle

c. Hutton

d. Lamarck

e. Linnaeus

Monarch butterflies belong to the genus Danaus, the order Lepidoptera, the class Insecta and the family Nymphalidae. All members of the family Nymphalidae have brush-like hairs on their lower legs. The same brush-like hairs will be found on the lower legs of any other member of

Select one:

a. the genus Danaus

b. the class Insecta

c. All of these

d. the order Lepidoptera

The scientific name of the dove tree is Davidia involucrata Baillon. The word "Baillon" in this name is

Select one:

a. the subspecific epithet

b. the genus

c. the authority

d. the specific epithet

In: Biology

Question 1 (25pts): Consider the string “data and program analytics”. Write a program to perform the...

Question 1 (25pts):

Consider the string “data and program analytics”. Write a program to perform the following actions

  • Find the index of the character ‘p’ in the given string
  • Print the character which is present at index number seven
  • Find the length of the String
  • Split the string at every occurrence of a whitespace
  • Replace the word “data” in the original string with “information” using a standard string manipulation function. Your output after the manipulation should be “information and program analytics”

Question 2 (15 pts):

List1 = [3, 4, 5, 20, 5]

  • Find the index of the second 5
  • Find the last element of this list

Question 3 (15 pts):

Set1 = {1, 2, 3, 4}, Set2={4, 5, 6}

  • Print all elements that appear in both sets
  • Print those elements that appear in either set
  • Print all elements that appear in Set1 but not Set2

Question 4 (15 pts):

L = [('',), (), ('apple', 1), (), ("Paul", "Merage', 2020, "MSBA212"), ("d")]

Write a Python program to remove an empty tuple(s) from a list of tuples.

Expected outcome is:

[('',), ('apple', 1), ('Paul', 'Merage', 2020, 'MSBA212'), 'd']

Question 5 (15 pts):

  • Reverse words in the string "one apple a day keeps the doctors away" and print the new string
  • Sort the words in the string "one apple a day keeps the doctors away" alphabetically and then print the new string.

Question 6 (15 pts):

Two given lists [1,2,4,8,5,10] and [2,4,5,8,12,15], write a program to make a list whose elements are intersection of the above given lists.

In: Computer Science

To be done in Python 3.7 Some Web sites impose certain rules for passwords. Write a...

To be done in Python 3.7

Some Web sites impose certain rules for passwords. Write a function that checks whether a string is a valid password. Suppose the password rules are as follows:

  • A password must have at least eight characters.

  • A password must consist of only letters and digits.

  • A password must contain at least two digits.

Write a program that prompts the user to enter a password and displays valid password if the rules are followed or invalid password otherwise.

  • A password cannot contain the word ‘password’
  • A password cannot end with ‘123’

Your program should define a class called Password, which is in its own file called password.py. You should have another file called assn13-task2.py that has code the creates and uses a Password object. All input and print functions should be in in this file. Your program will prompt the user for a password, and after completing will ask the user if they want to enter another. The program should only ever create one instance of Password. Your Password class should have at least the following:

  • setPassword() method
  • isValid() method
    • This should return a Boolean
  • getErrorMessage() method
    • This should return a string that indicates all problems with the password
    • It should be called if isValid() returns False
    • The isValid() method can generate this string as it tests each password requirement
      • Hint: create a private instance variable called __message to save it
    • Example return string
      • “must have 8 characters\nmust have at least 2 digits\ncannot end in 123”

In: Computer Science

What are the two things that mankind is doing that result in increasing levels of antibiotic resistance?

­­­­Lecture Homework Assignment (LHA) #4

Bio 2010 Microbiology

Print Name: _________________________                                       Section # ________

Virulence Factors:

There are two classes of bacterial exotoxins that are based on their target. Identify the two classes of exotoxin and the target for each. (1/2 pt. ea.; 2 pts. Total)

Type of Exotoxin                                              Target

Other than exotoxins, name two virulence factors associated with bacterial pathogens. (½ pt. ea.; 1 pts. Total)

Foodborne Disease:

Differentiate between the following types of foodborne disease in terms of (1/2 pt. ea.; 3 pts. Total):

i) what is ingested; ii) relative length of incubation period; iii) relative duration of period of illness. (NOTE: For answers ii) and iii), do NOT give specific number of hours, days, etc., but rather the relative length of time compared to each other.

Intoxication:

i)

ii)

iii)

Foodborne infection:

i)

ii)

iii)

Name two pathogens (Genus & species) for each of the two types of foodborne disease. (½ pt. ea.; 2 pts. Total)

Intoxication:

1.)

2.)

Foodborne infection:

1.)

2.)

Antibiotic Resistance:

What are the two things that mankind is doing that result in increasing levels of antibiotic resistance? (Answers should be one word each.) (1/2 pt. ea.; 1 pt. Total)

1.)

2.)

Penicillin, cephalosporin, monobactams, and carbapenums all belong to the same class of antibiotics, based on a common molecular structure in each. 1.) What is the name of this chemical structure?   2.) On the basis of this molecular structure, what is the name given to the class of enzymes that cleaves it? (Hint: The term is generic to all of these enzymes. Do not provide names that only apply to a single antibiotic.)   3.) Draw a picture of this structure and only this structure, and label each atom. (1/2 pt. ea.; 1 ½ pt. Total)

1.)

2.)

               

                3.)

Penicillin inhibits what metabolic process in susceptible bacterial cells? Be specific. (Hint: This is an example of one of the five ‘mechanisms of resistance,’ of certain bacteria against certain antibiotics. It also is the basis of the Ames Test, to determine potential chemical carcinogens.) (1 pt. Total)

Viruses:

Identify, in the correct order, the steps during the replication of an enveloped animal virus. (½ pt. ea.; 3 pts. Total)

Transfer of genes from one bacterium to another may be accomplished by incorrect assembly of bacteriophage that contain gene(s) from the original host bacterium. This process is known as what? One word answer. (1 pt. Total)

What are the three ‘Golden Rules’ of genetics that also apply to viruses? (1/2 pt. ea.; 1 ½ pt. Total)

1.)

2.)

               

                3.)

Immunity: Match the Immunological Process with the best description of the Type of Immunity elicited. Each Immunological Process can be used only one time, but the Type of Immunity may be associated with more than one Immunological Process. (1/2 pt. ea.; 3 pts. Total)

Type of Immunity

Immunological Process

          11. Artificially-acquired, Passive immunity

A. Complement Activation by Alternative Pathway

          12. Artificially-acquired, Active immunity

B. Infectious disease

          13. Naturally-acquired, Passive immunity

C. Transfer antibodies from another immune animal

          14. Naturally-acquired, Active immunity

D. Vaccination

           15. Non-specific immunity

E. Breastfeeding neonate

F. Phagocytosis of complement opsonized antigen

(microbiology home work assaignment)

In: Biology

There are two classes of bacterial exotoxins that are based on their target. Identify the two classes of exotoxin and the target for each.

­­­­Lecture Homework Assignment (LHA) #4

Bio 2010 Microbiology

Print Name: _________________________                                       Section # ________

Virulence Factors:

There are two classes of bacterial exotoxins that are based on their target. Identify the two classes of exotoxin and the target for each. (1/2 pt. ea.; 2 pts. Total)

Type of Exotoxin                                              Target

Other than exotoxins, name two virulence factors associated with bacterial pathogens. (½ pt. ea.; 1 pts. Total)

Foodborne Disease:

Differentiate between the following types of foodborne disease in terms of (1/2 pt. ea.; 3 pts. Total):

i) what is ingested; ii) relative length of incubation period; iii) relative duration of period of illness. (NOTE: For answers ii) and iii), do NOT give specific number of hours, days, etc., but rather the relative length of time compared to each other.

Intoxication:

i)

ii)

iii)

Foodborne infection:

i)

ii)

iii)

Name two pathogens (Genus & species) for each of the two types of foodborne disease. (½ pt. ea.; 2 pts. Total)

Intoxication:

1.)

2.)

Foodborne infection:

1.)

2.)

Antibiotic Resistance:

What are the two things that mankind is doing that result in increasing levels of antibiotic resistance? (Answers should be one word each.) (1/2 pt. ea.; 1 pt. Total)

1.)

2.)

Penicillin, cephalosporin, monobactams, and carbapenums all belong to the same class of antibiotics, based on a common molecular structure in each. 1.) What is the name of this chemical structure?   2.) On the basis of this molecular structure, what is the name given to the class of enzymes that cleaves it? (Hint: The term is generic to all of these enzymes. Do not provide names that only apply to a single antibiotic.)   3.) Draw a picture of this structure and only this structure, and label each atom. (1/2 pt. ea.; 1 ½ pt. Total)

1.)

2.)

               

                3.)

Penicillin inhibits what metabolic process in susceptible bacterial cells? Be specific. (Hint: This is an example of one of the five ‘mechanisms of resistance,’ of certain bacteria against certain antibiotics. It also is the basis of the Ames Test, to determine potential chemical carcinogens.) (1 pt. Total)

Viruses:

Identify, in the correct order, the steps during the replication of an enveloped animal virus. (½ pt. ea.; 3 pts. Total)

Transfer of genes from one bacterium to another may be accomplished by incorrect assembly of bacteriophage that contain gene(s) from the original host bacterium. This process is known as what? One word answer. (1 pt. Total)

What are the three ‘Golden Rules’ of genetics that also apply to viruses? (1/2 pt. ea.; 1 ½ pt. Total)

1.)

2.)

               

                3.)

Immunity: Match the Immunological Process with the best description of the Type of Immunity elicited. Each Immunological Process can be used only one time, but the Type of Immunity may be associated with more than one Immunological Process. (1/2 pt. ea.; 3 pts. Total)

Type of Immunity

Immunological Process

          11. Artificially-acquired, Passive immunity

A. Complement Activation by Alternative Pathway

          12. Artificially-acquired, Active immunity

B. Infectious disease

          13. Naturally-acquired, Passive immunity

C. Transfer antibodies from another immune animal

          14. Naturally-acquired, Active immunity

D. Vaccination

           15. Non-specific immunity

E. Breastfeeding neonate

F. Phagocytosis of complement opsonized antigen

microbiology assignment

In: Biology

micro biology home work

­­­­Lecture Homework Assignment (LHA) #4

Bio 2010 Microbiology

Print Name: _________________________                                       Section # ________

Virulence Factors:

There are two classes of bacterial exotoxins that are based on their target. Identify the two classes of exotoxin and the target for each. (1/2 pt. ea.; 2 pts. Total)

Type of Exotoxin                                              Target

 

 

 

Other than exotoxins, name two virulence factors associated with bacterial pathogens. (½ pt. ea.; 1 pts. Total)

Foodborne Disease:

Differentiate between the following types of foodborne disease in terms of (1/2 pt. ea.; 3 pts. Total):

i) what is ingested; ii) relative length of incubation period; iii) relative duration of period of illness. (NOTE: For answers ii) and iii), do NOT give specific number of hours, days, etc., but rather the relative length of time compared to each other.

Intoxication:

i)

 

ii)

 

iii)

 

Foodborne infection:

i)

 

ii)

 

iii)

 

Name two pathogens (Genus & species) for each of the two types of foodborne disease. (½ pt. ea.; 2 pts. Total)

Intoxication:

1.)

2.)

Foodborne infection:

1.)

2.)

Antibiotic Resistance:

What are the two things that mankind is doing that result in increasing levels of antibiotic resistance? (Answers should be one word each.) (1/2 pt. ea.; 1 pt. Total)

1.)

2.)

Penicillin, cephalosporin, monobactams, and carbapenums all belong to the same class of antibiotics, based on a common molecular structure in each. 1.) What is the name of this chemical structure?   2.) On the basis of this molecular structure, what is the name given to the class of enzymes that cleaves it? (Hint: The term is generic to all of these enzymes. Do not provide names that only apply to a single antibiotic.)   3.) Draw a picture of this structure and only this structure, and label each atom. (1/2 pt. ea.; 1 ½ pt. Total)

1.)

2.)

               

                3.)

Penicillin inhibits what metabolic process in susceptible bacterial cells? Be specific. (Hint: This is an example of one of the five ‘mechanisms of resistance,’ of certain bacteria against certain antibiotics. It also is the basis of the Ames Test, to determine potential chemical carcinogens.) (1 pt. Total)

Viruses:

Identify, in the correct order, the steps during the replication of an enveloped animal virus. (½ pt. ea.; 3 pts. Total)

 

 

 

 

Transfer of genes from one bacterium to another may be accomplished by incorrect assembly of bacteriophage that contain gene(s) from the original host bacterium. This process is known as what? One word answer. (1 pt. Total)

 

 

What are the three ‘Golden Rules’ of genetics that also apply to viruses? (1/2 pt. ea.; 1 ½ pt. Total)

1.)

2.)

               

                3.)

Immunity: Match the Immunological Process with the best description of the Type of Immunity elicited. Each Immunological Process can be used only one time, but the Type of Immunity may be associated with more than one Immunological Process. (1/2 pt. ea.; 3 pts. Total)

Type of Immunity

Immunological Process

          11. Artificially-acquired, Passive immunity

A. Complement Activation by Alternative Pathway

          12. Artificially-acquired, Active immunity

B. Infectious disease

          13. Naturally-acquired, Passive immunity

C. Transfer antibodies from another immune animal

          14. Naturally-acquired, Active immunity

D. Vaccination

           15. Non-specific immunity

E. Breastfeeding neonate

 

F. Phagocytosis of complement opsonized antigen

 

In: Biology

This assignment concerns the idea of "private equity," a notion that is very important to the...

This assignment concerns the idea of "private equity," a notion that is very important to the financial strategy of firms. We had a brief discussion on Blackrock, which is a private equity firm. Many companies have recently been bought by private equity, including Dell. Private equity firms argue that they can re-engineer the firm without shareholders breathing down their neck.

But private equity can be a very dangerous thing. Private operators buy companies by borrowing money, then load the debt on the companies books, strip it of all value, and leave it to go bankrupt. A particularly egregious case involved the Simmons mattress company, and the same might be unfolding at Toys R Us.

In his 2014 letter to investors, Warren Buffet had warned about the ethics of this phenomenon:

Families that own successful businesses have multiple options when they contemplate sale. Frequently, the best decision is to do nothing. There are worse things in life than having a prosperous business that one understands well. But sitting tight is seldom recommended by Wall Street. (Don’t ask the barber whether you need a haircut.)

When one part of a family wishes to sell while others wish to continue, a public offering often makes sense. But, when owners wish to cash out entirely, they usually consider one of two paths.

The first is sale to a competitor who is salivating at the possibility of wringing “synergies” from the combining of the two companies. This buyer invariably contemplates getting rid of large numbers of the seller’s associates, the very people who have helped the owner build his business. A caring owner, however – and there are plenty of them – usually does not want to leave his long-time associates sadly singing the old country song: “She got the goldmine, I got the shaft.”

The second choice for sellers is the Wall Street buyer. For some years, these purchasers accurately called themselves “leveraged buyout firms.” When that term got a bad name in the early 1990s – remember RJR and Barbarians at the Gate? – these buyers hastily relabeled themselves “private-equity.”

The name may have changed but that was all: Equity is dramatically reduced and debt is piled on in virtually all private-equity purchases. Indeed, the amount that a private-equity purchaser offers to the seller is in part determined by the buyer assessing the maximum amount of debt that can be placed on the acquired company.

Later, if things go well and equity begins to build, leveraged buy-out shops will often seek to re-leverage with new borrowings. They then typically use part of the proceeds to pay a huge dividend that drives equity sharply downward, sometimes even to a negative figure.

In truth, “equity” is a dirty word for many private-equity buyers; what they love is debt. And, because debt is currently so inexpensive, these buyers can frequently pay top dollar. Later, the business will be resold, often to another leveraged buyer. In effect, the business becomes a piece of merchandise.

So workers and customers suffer, while financiers make money.

***In this assignment, please write a 500-word analysis of private equity. Give your essay an original title. You can be pro-private equity or anti. I want you demonstrate how well you understand this concept. would you please elaborate and elucidate it thanks.

In: Finance