Discussion 11

 Select from the following list four (4) topics and discuss. Use only 70-words max per topic to discuss and present your answer. 

The discussion questions this week are from Chapter 11 (Jamsa, 2013).
Chapter 11 topics:
  • Define software architecture.
  • Define and describe SOA.
  • Compare and contrast a web page and a web service.
  • Search the Web for companies that offer web services and then describe three to five web services that programmers might integrate into the applications they create.
  • Discuss what it means for a web service to be interoperable.

NOTE: You are required to use at least two-peer reviewed sources (besides your textbook) to answer the above questions.   

Introduction to Data Communication and Networking

  1. write a short research paper on the components and functions on the Internet of Everything
  2. describe the concepts of a ‘smart city’
  3. provide an example of how the internet of everything or a smart city has benefited a community

Writing Requirements

  • The Essay must be 4-5 pages long.
  • Must have an introduction with a clear thesis statement, a body discussing the three main points and a conclusion
  • Conduct research to find relevant information using reliable sources to support your views.
  • (Use at least 2 academic books and 3 scholarly articles from a library database)
  • Use APA Style for in-text citations, and references
  • Turn in the Paper to SMARTHINKING.com before submitting your final paper.
  • Turn in a final paper and the paper with the SMARTHINKING.com tutor comments.
  • APA format (title page, abstract, reference page).

Glb ethics

Topic: 

“Ethical  issues involved in the human Genome Project”

REQUIREMENTS: 

Required topic headings for your paper should include the background surrounding the issue, a historical perspective, current issues that are applicable, legislation dealing with this topic, examples, global dynamics/impact (such as issues, processes, trends, and systems), personal impact from a global perspective, and a summary. These are the topics to be discussed in the term paper

Each paper should contain a reference list of at least five (5) different substantial and quality references. The references and reference citations for the term paper must be to a current event less than 3 years old (a reference with no date (n.d.) is not acceptable). This requires a reference citation in the text of the paper and a reference at the end of the paper to which the reference citation applies.  You must include some information obtained from the reference in your answer. The references must be found on the internet and you must include a URL in your reference so that the reference can be verified.

You cannot use information from the text book or any book/article by the author of the text book as a current event. Make sure that your reference has a date of publication.

The body of the paper should be a minimum of six typed double spaced pages. Your cover page and reference page cannot be counted in this number. You should use the APA format for your reference citations and the reference page.

This course has been designated as a global course which includes the requirement that you must place this term paper in your ManeSync Experiences. A screen shot must be attached to your term paper that you submit for grading to prove that the paper was placed in your ManeSync Experiences. Directions for using ManeSync Experiences are provided in the following document under the Term Paper tab: ManeSync Experiences Instructions.docx

Feel free to use the Communications Skill Center (http://www.tamu-commerce.edu/litlang/CSC/located.htm), Hall of Languages, Room 103, Phone No. 903.886.5280 to assist you with this writing assignment.

Discussion and Assignment

 

WEEK 7 – DISCUSSION

In no less than 250 words, describe the difference between a fat AP and a thin AP. What is needed to deploy a thin AP? Are there any security considerations to think about between the 2 different APs?

Week 7 – Discussion

Have you or someone you know ever received a chain letter, phishing message, or some other fraudulent message via email? If so, please share this experience. Explain what type of message it was and what you did to get rid of it.(250 words)

Week 7 Assignment

  • 7.1 What is the basic building block of an 802.11 WLAN?
  • 7.2 Define an extended service set.
  • 7.3 List and briefly define IEEE 802.11 services.
  • 7.4 Is a distribution system a wireless network?
  • 7.5 How is the concept of an association related to that of mobility?
  • 7.6 What security areas are addressed by IEEE 802.11i?
  • 7.7 Briefly describe the five IEEE 802.11i phases of operation.
  • 7.8 What is the difference between TKIP and CCMP?

ETHICAL DILEMMA PROJECT: POTENTIAL SOLUTIONS AND IMPACTS

Submit in a word document, template attached. Be careful, make sure to avoid plagiarism and to use quotation marks and proper citation as required. Length should be one page. Use APA format for citations and the required References page. Remember that the significant portion of your analysis should be in your own words. Attached is the assignment, template, and prior paper to use as a guide.

Cloud computing_31_1

 Write a 2-3 page paper where you compare and contrast the differences between IDaaS, IaaS and IAM. The submission needs to include a minimal of 3 scholarly resources in APA format.

Please include the reference and citation. Need by 11/01 11:00 am.

Interm1

  For the final project, you will be conducting a forensics investigation using one of the following items:

  1. A smartphone
  2. A network (ideally, a wireless network)

 You may use either for your investigation. However, be aware of legal issues surrounding your data gathering. If you are using any system you do not personally control and have authority to investigate/discover, please get written permission from the owner/operator of the system or refrain from your forensics analysis of that systems and use a personal system. For a network, you can use your own personal home network. For a smartphone, consider using an image from the Internet or a personal device. There could be issues related to using a live, active, personal device (example: corruption of the device). If using a personal device, consider using an old, outdated phone, if available. You will review various forensics tools used with your selected system. Select a tool and use that tool to gather forensics data for analysis. You are simulating the process of gathering this data, so you do not need to investigate a compromised device or system. The project deliverables are as follows:Week 3 – Prepare a two-page paper (double-spaced) that describes the device or system you will investigate and the intended tool you plan to use to conduct your forensics investigation. The interim paper should be in the form of an Executive Summary. Be sure to provide references in APA format.