Week 1 Discussions: 1 Identify the five functions every manager must perform and

Week 1 Discussions:
1 Identify the five functions every manager must perform and briefly explain each and what are the three types of supervisory relationships? Explain
2) Identify major problems that could prevent accomplishment of your objective. What contingency planning could be done to avert them or minimize their impact?
Not more than 350 words total. Proper references amd citation with APA FORMAT. Do Plagiarism 

Please complete the questions below. use proper citation and references answer e

Please complete the questions below. use proper citation and references answer each questio. no plagiarism please 
1>What are the characteristics of data in today’s world?
2>What does DBMS stand for and what does it mean?
3>What is the difference between centralized database and a distributed database?
4>What does Extensible Markup Language represent?
5>What is Structural dependence?
6>What is Data independence?
7>What is Data dictionary?
8>List 3 database professional careers and the skills required for each.

  Instructions Submit a one-page proposal. Include the following: Term paper t

 
Instructions
Submit a one-page proposal. Include the following:
Term paper title
Thesis statement
Outline of the subtopics you will cover in your paper. Take a look at this site to help you write a proper outline: 
https://owl.purdue.edu/owl/general_writing/the_writing_process/developing_an_outline/types_of_outlines.html
The term paper details are listed below. ALL TOPICS MUST BE APPROVED. A FAILURE TO HAVE THE TOPIC APPROVED WILL RESULT IN A ZERO GRADE FOR THE TERM PAPER OUTLINE AND THE TERM PAPER.
This project provides you with the opportunity to increase and demonstrate your understanding of cyberlaw theory and practice. You will need to choose a law that you are interested in researching. WARNING: CHOOSE A LAW THAT IS RATIFIED AND WHERE THERE IS AMPLE LITERATURE SUPPORT. DO NOT CHOOSE INTERNATIONAL OR OBSCURE LAWS. The final term paper must a minimum of 5 pages in length containing the below topics. However, before proceeding with the paper, you must have the topic approved. In your outline, include the following topical areas:
Thesis: What law are you researching (choose a relevant cyber law)? What position do you want to take regarding your chosen law? You will need to decide if you agree or disagree with the current way the law is written. You can choose to like certain aspects of the law and not others.
Background: What is the existing point you want to challenge or support, and how did the law get to be that way (This is where you would need to find cases, background information, etc.)?
Inadequacies: What are the deficiencies in the present way of doing things, or what are the weaknesses in the argument you are attacking?
Adequacies: Discuss the positive aspects of the law.
Proposed Changes: How will we have a better situation, mode of understanding or clarity with what you are advocating? In short, how can the law be improved (or not diminished)? This is where you have the chance to change the law with your own ideas of how it should be written.
Conclusion: Why should and how can your proposal be adopted?  

  Instructions Format: Complete the assignment in a Word document and then upl

 
Instructions
Format:
Complete the assignment in a Word document and then upload the assignment for grading.
When assigning a name to your document, use the following format: Lastname-Assignment#.
Make sure to include a title page (with your name and date) and a reference page (with your sources).
Double-space paper, 1-inch margins, 12-point font.
This assignment is due by 2355 EST on Sunday.
When submitting the paper, it will automatically be processed through Turnitin for review.
Instructions:
Use examples from the readings, lecture notes, and outside research to support your answers. Use high-quality sources (no Wikis, blogs, or anonymously authored articles). Be sure to follow APA guidelines for citing and referencing source material. Answer the below questions (250 words for each question):
(250 words + one reputable source) For apps to be featured on the iPhone, developers must build it with Apple’s software development kit and then apply for approval. Apple rejected the Google Voice iPhone App, and further stated that it would not accept any applications that incorporated Google Voice functionality. Apple reasoned that this app duplicates the phone’s core features. It also rejected Google’s location-based app Google Latitude. However, the underlying reason was that Google’s application duplicated core services offered by Apple’s exclusive partner, AT&T. Using your knowledge from the Net Neutrality debate in Forum 1, do you think that government regulators should impose openness rules on mobile app marketplaces? Explain why or why not.
(250 words – sources not required) Plaintiffs filed a class action lawsuit against investment banks alleging that they inflated prices on more than 300 IPOs, causing IPO investors to overpay for stock, and unlawfully benefited these banks through overcompensation of banking commissions and profits made through quick sales of this stock in their own accounts before prices settled into a more realistic valuation. However, IPOs are inherently risking, and valuation is oftentimes difficult to determine by outside investors. Thus, it can be challenging to analyze a company with a stock that is newly issued. Read the following article from the SEC on IPOs and the make an argument for or against the class action lawsuit: https://www.sec.gov/files/ipo-investorbulletin.pdf
(250 words – sources not required) Read the following article on the U.S. Patriot Act, which provided the FBI the ability to secretly conduct a physical search or wiretap on American citizens without probable cause using the FISA law: https://www.aclu.org/other/surveillance-under-usapatriot-act Should this be allowed? Why or why not and support your position.

  Instructions This week’s assignment we are going to be doing a hands-on type o

 
Instructions
This week’s assignment we are going to be doing a hands-on type of assignment. Follow the steps below to successfully complete the assignment.
Step 1: Locate the fingerprint from last week, make sure it is a JPG file. Convert if needed.
Step 2: Download the fpmv_beta_3_0.zip file, unzip the file, then go into the FpMV folder, then into the bin folder, then launch FpMV.exe
Step 3: In FpMV, you will want to load in your famous fingerprint scan JPG, and then use the following settings:
Quality = 0.1, FP Opacity = 75, Min Opacity = 100, FP Brightness and Contrast will vary but try and get the background white and the print black.
Step 4: Copy and paste into the lab document the Minutiae/Points/Markers of the fingerprint. It will vary on the number but I would say 25-60 should be given depending on the quality of the print.
Step 5: Now we get to the fun part. You have been given a fingerprint, Crime-Scene-Print.jpg, that was found at the scene of a triple murder, there are no leads in the case, and the detectives are hoping you can give them the name of the person belonging to the fingerprint. Open that print in FpMV and use roughly the same settings from above.
Step 6: Open another instance of FpMV, and start matching the fingerprints from the Fingerprints folder which is found in the Fingerprints.zip file, which you will need to unzip. Some of the fingerprints can be gotten rid of immediately from visual inspection, then the art of fingerprint analysis begins with the matching of the markers.
Step 7: Import into the Word file the source fingerprint as well as the suspect’s matching fingerprint and make sure you notate the name of the Suspect, which is how the prints are named.
Step 8: Include a few sentences on the assignment, your thoughts on it, etc. And answer the question, Are fingerprints a valid choice of identifying an individual or is there too much ambiguity in fingerprint matching?

  Research some  tools that would be valuable in collecting both live memory ima

 
Research some  tools that would be valuable in collecting both live memory images and  images of various forms off media. Put together a shopping list for your  manager that includes tools needed  to be purchased. Include a price if  applicable.
Answer must be in WORD document.

Define the following terms risk, threat, vulnerability, asset, and impact of los

Define the following terms risk, threat, vulnerability, asset, and impact of loss.  After you define each term identify their role within an organization’s security posture. You must use at least one scholarly resource. Every discussion posting must be properly APA formatted.

  Research some  tools that would be valuable in collecting both live memory ima

 
Research some  tools that would be valuable in collecting both live memory images and  images of various forms off media. Put together a shopping list for your  manager that includes tools needed  to be purchased. Include a price if  applicable.
Answer must be in WORD document.