cloud myths

 

Review in 500 words or more the video above called Cloud Security Myths.

Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources.   Stand alone quotes will not count toward the 3 required quotes.

Write in essay format not in bulleted, numbered or other list format.

Differences & Similarities Between Windows, Linux and Mac (infographic, table, or chart listing)

Create an infographic, table, or chart listing the similarities and differences between Windows, Linux, and the MAC OS X.  Include the following areas: Functionality, Graphical User Interface, Security, User Access, Encryption, etc. Include an introductory paragraph describing your graphic, table, or chart. 

Feel free to be creative in how you develop this assignment. You can complete this using any application you have available, such as Word, PowerPoint, Visio, etc. Your submission should have proper attention to formatting, spelling, grammar, and punctuation. It should be in a format easily viewed on a standard Windows PC.

bi assignment 9

 1. How does prescriptive analytics relate to descriptive

and predictive analytics?

2. Explain the differences between static and dynamic

models. How can one evolve into the other?

3. What is the difference between an optimistic approach

and a pessimistic approach to decision making under

assumed uncertainty?

4. Explain why solving problems under uncertainty sometimes

involves assuming that the problem is to be solved

under conditions of risk.

5. Investigate via a Web search how models and their

solutions are used by the U.S. Department of Homeland

Security in the “war against terrorism.” Also investigate

how other governments or government agencies are

using models in their missions.

2 pages
be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) 

SA

  

If you were to explain to a family/friend about Information technology, what would you say is its importance in today’s world, and what are future trends in Information Technology (IT)?

Assignment

Go online and research some tools that would be valuable in collecting both live memory images and images of various forms off media. Put together a shopping list for your manager that includes tools needed  to be purchased. Include a price if applicable.

Write your answer using a WORD document. Do your own work. Submit here. Note your Safe Assign score. Score must be less than 25 for full credit.

Youtube link:  https://www.youtube.com/watch?v=ehRCA8eYJzk 

2page apa foramt report on history of cryptography and its evolution

 In the initial milestone writing assignment, you will evaluate the history of cryptography from its origins.  Analyze how cryptography was used and describe how it grew within history.  The writing assignment requires a minimum of two written pages to evaluate the history.  You must use a minimum of three scholarly articles to complete the assignment.  The assignment must be properly APA formatted with a separate title and reference page.  

incident in the news

in a future career you may have to present to senior leadership in a non-technical way to get the incident details across. This is an opportunity to investigate what is happening out there in the cybersecurity world.

Research any previous incident in the news and provide an explanation of what happened in PowerPoint (4 slides). Please provide a minimum of 3 references. 

resume

1. Submit your Resume Draft and Reference Page as one Word document. Please use the above resources to assist you in creating your Resume with Reference Page.

2. Submit your Cover Letter after reading the instructions on the attached document and review the template. Your cover letter should contain three paragraphs.