Workbook lesson

Read Strunk & White chapters that relate to the exercises.
Complete the workbook exercises listed below. Keep in mind that some answers are in the workbook; these exercises are meant to develop you as a writer, so only check these answers after doing the exercises. Otherwise, you ultimately cheat yourself from the learning process.
Type out all of your answers in a Word document or, after you have completed the exercise, submit photos of your completed work via online file submission.

EXERCISE 3.1 (Commas)

EXERCISE 3.2  (Restrictive and non-restrictive clauses )

HW2 – Vaccine Information Websites

Please read Imperfect Vaccination by Read et al i(attached below).  Then imagine the following scenario: you are the head of a web developer and have been requested by a non-profit, your client, to develop a part of their website.  The client wants you to inform their followers about the Marek Disease study and to identify and summarize at least one other study which suggests that the Imperfect Vaccination hypothesis may apply to the popular Covid-19 vaccines; and to identify and summarize at least one other study which suggests that the Imperfect Vaccination hypothesis may not apply to the popular Covid-19 vaccines.  Using the 5 ethical frameworks ( read page 67-95 in the  Ethics for the Information Age.) ,I attached below the Fundamental Principles Alternative List, and your own ethical framework, what are the moral implications of presenting both information that the Imperfect Vaccination hypothesis may or may not be present in common Covid-19 vaccines?

Please include the title of your work and your name at the top of your pdf.  Use 1″ margins, single-space, & an 11-12 pt font.  Identify and summarize your two studies, and cite them in an APA format in the Reference section at the end of your pdf.  Try to have a paragraph for the two studies you summarized, each of the 5 ethical frameworks, the fundamental principles, your own ethical framework, and your conclusion.

Cyber security

Write a research paper of 4 to 5 pages length on Cyber Security. The length of pages does not include references. There must be a separate page for reference. 

Summative Assessment: Backup Policies

Consider yourself responsible for securing the data of your workplace. You must already be aware that this is not as simple as backing up to another hard drive. It is important to have backup tools, processes, and policies for both business continuity and disaster recovery plans. Let’s see how you plan to present your disaster recovery skill! 

For your final playbook, create a 3- to 4-page outline of backup policies in Microsoft Word or Word Compatible for when the data center is inaccessible. 

Each week is a separate playbook and needs to have a cover page and references.

Complete the following in your outline: 

  • List the tools used for backup purposes. 
  • Explain the following: 
  • Where employees should work from that day 
  • How employees can get to their data 
  • The communication methods about updates 
  • Outline step-by-step instructions to recover your databases and telecommunications. 
  • Provide a step-by-step guide to recover and provide any additional company assets. 
  • Discuss policies for backup media storage. 
  • Discuss policies for encryption of backup data. 

Note: Numbered or bulleted steps or guidelines make the document easy for others to follow under potential stressful situations. Paragraphs can be used to help support the steps or guidelines. 

Cite at least 2 resources to support your assignment.

Research Paper

Paper:

 Information Systems for Business and Beyond Questions:

  • Chapter 9 – study questions 1-10, Exercise 3 &4. 

Information Technology and Organizational Learning Assignment:

  • Chapter 7 – Review the section on dealing with multiple locations and outsourcing.  Review figure 7.2 and note how virtual team communications further reiterates the importance of this model.

The above submission should be one-page in length and adhere to APA formatting standards.**Remember the APA cover page and the references (if required) do not count towards the page length**Note the first assignment should be in one section and the second section should have the information from the Information Technology and Organizational Learning assignment.  The paper requirements for the two-pages applies to the second part of the assignment directly related to the  Information Technology and Organizational Learning assignment. 

Firewall Questionnaire

 

  • 12.1 List three design goals for a firewall.
  • 12.2 List four techniques used by firewalls to control access and enforce a security policy.
  • 12.3 What information is used by a typical packet filtering firewall?
  • 12.4 What are some weaknesses of a packet filtering firewall?
  • 12.5 What is the difference between a packet filtering firewall and a stateful inspection firewall?
  • 12.6 What is an application-level gateway?
  • 12.7 What is a circuit-level gateway?
  • 12.9 What are the common characteristics of a bastion host?
  • 12.10 Why is it useful to have host-based firewalls?
  • 12.11 What is a DMZ network and what types of systems would you expect to find on such networks?
  • 12.12 What is the difference between an internal and an external firewall?

Week 4 Discussion Post

 Respond to a scholarly article of your choosing that is related to Identity and Access Management.  The article must be current (within the last 12 months) and should be peer-reviewed.  Please do not source writings that are part of an advertisement or non-scholarly writings.  Your response should be in APA format, with a minimum of 3 comprehensive paragraphs.  A minimum of two APA cited references should be listed for responses and reviews. 

DQ

Think about the last time you utilized a mobile application or attempted to build your own mobile website.  What planning process did you go through before you began your project?  You may have considered the steps or tasks you needed to perform.  You may also have considered the resources and platforms needed for your outcome.  For example, which model fits your business domain needs?  Do you have time constraints that will make completing the web application/site difficult within a reasonable period of time?  You may also have considered the myths that surround developing mobile apps and the difficulties generally associated with mobile app development.

  • Why is mobile development difficult?  Explain
  • How does design & utility make a difference between good vs great websites? Explain
  • How is deciding between a mobile application vs a mobile website an important consideration by developers? Explain.