[Unlocked] Https Www

[Unlocked] Https Www

Watch the following videos and answer the questions below:

Video #1: https://www.youtube.com/watch?v=Tq3Fkg1utHA 

Video #2:  https://www.youtube.com/watch?v=7zQqXwtfQWo 

Video #3:  https://www.youtube.com/watch?v=rL8RSFQG8do 

Video #4:  https://www.youtube.com/watch?v=GrhHMai2d2Y Video #5:  https://www.youtube.com/watch?v=qiQR5rTSshw

What did you learn from Video #1?

What did you learn from Video #2?

What did you learn from Video #3?

What did you learn from Video #4?

What did you learn from Video #5?

[Unlocked] Research Using Capella Library

[Unlocked] Research Using Capella Library

Each of the following terms refers to a theory or model that has been used to explain an aspect of information technology creation, adoption, proliferation, or obsolescence. Select any two of the theories or models to research using Capella library, Internet, and other resources available to you.

Sociotechnical systems theory.

Structuration theory.

Innovation diffusion theory.

Technology acceptance model.

Theory of reasoned action.

Theory of planned behavior.

Human-computer interaction and the usability engineering approach to acceptance.

Social construction of technology theory.

Actor-network theory.

Systems theory.

Activity theory.

Value-sensitive design.

Other—you may select a relevant IT theory or model that is not listed here.

Provide a brief description of your selected theories or models from the list above or have identified on your own. What aspects of information technology can the theory or model help you understand?

Response Guidelines

Return and review the posts of your fellow learners, paying special attention to those who explored theories or models different from your post. Reflect on the experiences you have had as an employee or in an IT professional role. Do any of the theories, either yours or those of your classmates, resonate with you? Might the predictions or tenets of these theories or models have been observable in the way events unfolded in an IT-related scenario? Consider the design, selection, or implementation of IT in an organization. In other words, is there a theory or model that accurately describes your experience? Please explain.

[Unlocked] Follow Apa 7 Guidelines

[Unlocked] Follow Apa 7 Guidelines

 We have discussed how businesses have integrated Big Data Analytics with their Business Intelligence to gain dominance within their respective industry.  Search the school Library and/or Google Scholar for a “Fortune 1000” company that has been successful in this integration. Conduct a literature review of big data analytics with business intelligence within the Fortune 1000 company you researched. In your literature review, you will include details about the Fortune 1000 company you researched, including its approach to big data analytics with business intelligence, what they are doing right, what they are doing wrong, and how they can improve to be more successful in the implementation and maintenance of big data analytics with business intelligence.You are to review the literature on Big Data Analytics and business intelligence for the Fortune 1000 company. Discuss problems and gaps that have been identified in the literature. You will expand on the issue and how researchers have attempted to examine that issue by collecting data – you are NOT collecting data, just reporting on how researchers did their collection.

Paper Layout:

  1. Title Page
  2. Table of contents:
    1. Use a Microsoft Enabled Table of Contents feature.
  3. Background:
    1. Describe the Fortune 1000 company, discuss the problem, and elaborate on their big data analytics and business intelligence approaches. Be sure to include what they are doing right and what they are doing wrong.
  4. Research Questions:
    1. For our topic of big data analytics and business intelligence, what were the research questions that were asked? Be sure to include main research questions from all the literature you are reviewing.
  5. Methodology:
    1. What approach did the researcher use, qualitative, quantitative, survey, case study? Describe the population that was chosen. You will discuss the methodology for all the literature you are reviewing.
  6. Data Analysis:
    1. What were some of the findings, for example, if there were any hypotheses asked, were they supported?
  7. Conclusions:
    1. What was the conclusion of any data collections, e.g., were research questions answered, were hypotheses supported? Be sure to also include how the Fortune 1000 company can improve to be more successful in the implementation and maintenance of big data analytics with business intelligence.

Paper requirements:

  • Be a minimum of 7 pages in length, not including the required cover page and reference pages.
  • Follow APA 7 guidelines. Be sure to conduct research on formatting literature reviews.
  • Your literature review should include a minimum of 8 scholarly peer-reviewed journal articles. The UC Library is a great place to find resources.
  • Be clear and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing. You can use Grammarly for help with your grammar and spelling.

[Unlocked] App Produce Correct Subtotal

[Unlocked] App Produce Correct Subtotal

Create a project called ContractorCaculator.  Refer to the instructions in the textbook.Deliverables for this Project:

  1. Copy of your code for your final/completed project (10 pts) – please submit this as either a Word doc or screenshot
  2. One screenshot that shows a basic (ContractorCaculator Interface) – should look like the screenshot model in our textbook – p.193, Figures 10.27 (20 pts.) (attached)
  3. Another (different) screenshot that shows data input values for “Labor” and “Material” fields (10 pts.)
  4. Another (different) screenshot – a transaction view, that shows results when the “Calculate” button is pushed – I want to verify that your app produce correct Subtotal, Tax and Total results based on input values (30 pts.)

[Unlocked] Response Guidelines Post Detailed

[Unlocked] Response Guidelines Post Detailed

Virtualization technology is fundamental in enabling the development and operation of cloud computing services. Virtualization technology has evolved quickly; these days, we are not only virtualizing desktops and servers but also networks and even entire data centers.

Discuss the relative advantages and disadvantages of virtualization, particularly as it relates to enterprise networking and cloud computing. Ideally, you will speak from your own professional experience. If you do not have any professional experience related to virtualization technology, then please base your discussion on your own research and be sure to include citations.

Response Guidelines

Post detailed comments or questions to at least two other learners and explain how their insights helped to inform your understanding of the benefits and risks of virtualization.

[Unlocked] Friend Simply Responded “

[Unlocked] Friend Simply Responded “

 Legal Outline

Kladimir Gav Butin (KGB), a Russian citizen studying history and political theory at George Washington University, is still bitter about the Cold War and the collapse of the Soviet Union. Determined to take down the United States, KGB sends an email to a friend of his who works for the Russian Foreign Intelligence Service (which conducts much of Russian’s foreign intelligence operations). Before coming to the US, KGB and his friend would often talk about doing everything in their power to destroy the United States. In his email, KGB offers, on behalf of Russia, to steal classified information of the U.S. government. The friend simply responded “Great.” Excited, KBG asks his girlfriend, who works for the CIA, to provide him classified information relating to the U.S.’s dealings with Russia since the 2014 Crimean crisis. When the girlfriend refused, KGB took the girlfriend’s security badge, snuck into the CIA building, stole a classified file relating to actions taken by the U.S. government against Russia post Crimea, and emailed the information to his friend. Unknown to KGB, the CIA has the entire incident on camera, in which it was able, to a 50% match, identify KGB as the likely culprit.The CIA alerts the Department of Justice Counter Espionage section, which handles all espionage prosecutions, of the incident, and together the CIA and Counter Espionage section—through the Attorney General—file a FISA application with the FISC to wiretap KGB’s phone and review all his emails. The application states that KBG is a Russian citizen studying in the United States and that the government wants to place a wiretap on KGB’s cell phone and review KGB’s email account, [email protected]. In addition, the application outlines the break-in of the CIA office and the 50% likelihood of KGB being the culprit, and further states that “the surveillance is needed to gain additional evidence to determine whether to prosecute KGB for espionage”; the application further states that the government “wants to determine where KGB (or whomever the culprit is) is sending the classified information, considering that the information he stole related to classified intelligence information about Russia.”Review chapters 20 and 21, including the statutory definitions of key terms in FISA outlined in Rosen. You are a clerk for FISC Judge Boller. He asks you to make a legal outline that outlines the relevant law and analyzes whether he should approve the application to conduct electronic surveillance of KGB according to the state of law (1) before the Patriot Act was passed and In Re Sealed Cases was decided and (2) after the Patriot Act was passed and In re Sealed Cases was decided. 
The Outline should be organized based on the questions asked and should have headings that clearly walk through each step of the analysis. Indicate the applicable legal rules by typing, “Rule:” before the rule. Do the same for “Analysis” and “Conclusion.” The outline need not be in complete sentences; bullet points are preferred. Be concise but thorough. 

[Unlocked] Military Purposes ” Great

[Unlocked] Military Purposes ” Great

 

ISIS/ISIL is waging all-out war on Iraq. Pursuant to a request from the Iraqi government for military aid, the U.S. Congress passed the “ISIS Authorization of the Use of Military Force,” which authorized the President “to use all necessary and appropriate force against ISIS, it members, agents, and collaborators in order to prevent any future acts of international terrorism against Iraq or the United States by ISIS, its members, agents, and collaborators.” Pursuant to this AUMF, the U.S., under direction of the President, secured Baghdad with ground troops and forced ISIS to retreat to Syria, where the majority of the fighting now takes place. ISIS still desires to take over Iraq and occasionally conducts covert operations in and around Baghdad.

During a ground invasion in Syria, U.S. armed forces captured Enemy Combatant, an Iraqi citizen, on the battlefield. U.S. forces immediately transferred Enemy to Abu Ghraib prison, in Baghdad. Prior to sending troops to Iraq, the US entered into a lease agreement with Iraq, which, “for the duration of hostilities,” “consigned all facilities and land located at Abu Ghraib prison owned by Iraq, for use by the United States for military purposes.” Great Britain, which also sent troops to Iraq to fight ISIS, also uses part of Abu Ghraib prison for military purposes.
When captured, Enemy carried a rifle, a pad of paper, and a pen. The U.S. soldier that captured Enemy issued a sworn declaration stating that Enemy was firing shots at U.S. armed forces and was captured during, and from the middle of, a battle against ISIS. After being transferred to Abu Ghraib, the Combatant Status Review Tribunal, composed of two senior U.S. military officers, conducted a hearing and unanimously determined that Enemy was an enemy combatant. At the hearing, Mr. Combatant was provided a “personal representative” and allowed the opportunity to call witnesses; he called none. Instead, he continuously repeated, “I am a journalist.” Based on the declaration of the solider that captured Enemy and the testimony of another solider, the CSRT determined Enemy to be an enemy combatant and ordered that he be detained until hostilities were over.
Enemy filed a writ of habeas corpus in the District Court for the District of Columbia. The writ came to Judge Boller. You are a clerk for district Judge Boller. Judge Boller asks you to write a memorandum discussing whether (1) he should grant the writ (in other words, does the constitutional right of habeas corpus apply at Abu Ghraib prison based on the cases in this Unit?) and (2) whether the President has authority to detain Enemy. (Note: the second question can and should be answered in a paragraph or two.) See the syllabus for the due date of this assignment. Organize your memo by providing an introduction and then having a separate section for each question. 

[Unlocked] Congress Recently Passed Another

[Unlocked] Congress Recently Passed Another

 . 

Ulysses S. Citizen (U.S. Citizen or U.S.), a United States citizen and long-time resident of Norfolk, VA, works at the Norfolk shipyard as a civilian. He is fed up with the United States government and decides he wants to join Al Qaeda in the ongoing war against the United States. (Note: Congress recently passed another Authorization of the Use Of Military Force which authorized the President to “use all necessary and appropriate force against Al Qaeda.”)

Unsure of how to proceed, U.S. begins doing Google searches for, “Ways to Join Al Qaeda.” Through his google searches and personal connections, U.S. finds a phone number for Alkida Leader (Al), Al Qaeda’s third in command. U.S. calls Al, who is in Pakistan, and asks to join Al Qaeda and help wage war against the United States. Somewhat hesitant that U.S. might be a double agent, Al does not invite U.S. Citizen to train with Al Qaeda armed forces in Pakistan, which all new recruits who join Al Qaeda must do. Instead, Al instructs U.S. that he could serve Al Qaeda best by bombing Norfolk, blowing up ships and killing as many civilians as possible. Al explains to U.S. Citizen that Norfolk has been a top, strategic target for Al Qaeda since the war started, but Al Qaeda has not yet had the opportunity to attack it. Thus, Al told U.S. that if he was successful, Allah would be pleased and U.S. could become a full-fledged member of Al Qaeda, with no limitations. Over the next few weeks, to prepare him for the attack, U.S. and Al spoke every day on the phone. On the phone calls, Al instructed U.S. in the ways of Al Qaeda and its beliefs, which U.S. eagerly accepted. Excited for his opportunity to serve Al Qaeda, U.S. constructs a bomb. U.S. then drives the bomb to the shipyard, uses his badge to enter, then places a brick on the gas pedal and sends the car and bomb into the shipyard. The bomb explodes as planned. One ship is damaged and 500 civilians are killed. (Note: targeting and killing civilians is a clear violation of the laws of war.) Immediately, U.S. Citizen is arrested. While detaining U.S. Citizen, the government gets a warrant to search U.S.’s apartment. During the search, the government learns of U.S.’s Google searches and phone calls to Al. U.S. recorded his first conversation with Al so he could listen to it over and again to make sure he did exactly what Al Qaeda wanted. Accordingly, the President orders that U.S. be tried in a military commission at Guantanamo Bay under the Military Commissions Amendment Act. This Act, passed by Congress one year prior to U.S Citizen’s arrest, authorized the President to “try by military commission, in accordance with the laws of war, anyone who is (1) part of Al Qaeda and (2) violates the law of war while engaging in hostilities against the United States.” “Hostilities” is defined in the Act as “any conflict subject to the laws of war.” The Amendment also gave the President broad discretion and authority to set the rules of procedure governing the military commissions

Question: Can U.S. Citizen be tried by the military commission under the Constitution and laws of the United States? Make arguments on both sides as to why or why not U.S. cannot be tried by the military commission. To answer this question, rely on the material studied in Unit 7, the statutes provided in the fact pattern, and other relevant cases or legal principles studied throughout the course. Explain Supreme Court cases in detail

[Unlocked] Legal Landscape Regarding “

[Unlocked] Legal Landscape Regarding “

 Senator Boller wants to understand the legal landscape regarding “torture,” particularly as it applies to detainees at Guantanamo Bay. Accordingly, he asks you to make an outline that summarizes/briefs United States v. Charles Emmanuel, explaining the issue in the case, the rules provided, the legal background regarding the law on torture, and the constitutionality of the law at issue. The outline should next explain what constitutes torture from a legal standpoint, including the elements necessary to prove torture and a discussion on the differences, if any, between the definition of torture under the Convention Against Torture and under U.S. law. The outline should utilize headings and subheadings and be organized by issue. Complete sentences are not required, but ensure that you are clear.  

[Unlocked] Using Justice Jackson ’

[Unlocked] Using Justice Jackson ’

Using Justice Jackson’s tripartite framework, argue (1) whether Korematsu was correctly decided from a legal/constitutional perspective and (2) whether you agree with the decision from a personal standpoint. Without in any way offering an opinion of my own, I encourage you to try your best to separate your legal analysis from your personal feelings. Include biblical arguments to support your answer. (200 words)