Discussion

 

digital preservation can be defined as the long-term, error-free storage of digital information, with means for retrieval and interpretation, for the entire time span the information is required to be retained.  Though this assessment holds true to the authors, business organizations continue to face significant challenges in meeting their LTDP needs, especially those organizations whose primary mission is to preserve and provide access to permanent records.

Looking at your identified industry for your paper, what considerations would have to be made in developing a long-term archival plan for a company within that industry?

Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

CBSC 630 Case Study 5.1

 

Conduct additional research and write a 3 to 4 page paper explaining the steps you would take in detecting and removing a trojan horse from a computer system.. 

Writing Requirements

  • 3–4 pages in length  (excluding cover page, abstract, and reference list)
  • Include at least two peer reviewed sources that are properly cited

net working

  

Your uncle who owns a security company requested your presence at his office to discuss about information technology. The intention of your uncle to purchase three desktop, two laptop computers and a printer. The security firm wants to establish a local area network (LAN) for the benefit of the company and its staff.

1 Explain the factors that should be considered for your uncle to purchase the computer.

2 Explain to your uncle the security measures that must be put in place to prevent virus.

3 Why your uncle wants to establish a LNA but not other type of network.

4 List down the LAN devices and network media needed for the creation of this LAN. 

Discussion paragraphs on Topic : Bitcoin Pyramid Schemes Wreak Havoc on Brazil's 'New Egypt'

write your complete draft of your discussion section:

  • Activity: Discussion, Para. 1
  • Activity: Discussion, Para. 2
  • Activity: Discussion, Para. 3

references Zhang, Y., Yu, W., Li, Z., Raza, S., & Cao, H. (2021). Detecting Ethereum Ponzi schemes based on improved LightGBM algorithm. IEEE Transactions on Computational Social Systems, 9(2), 624–637. https://doi.org/10.1109/tcss.2021.3088145Al-Nsour, E., Weshah, S., & Dahiyat, A. (2021). Cloud accounting information systems: Threats and advantages. Accounting, 7(4), 875-882. https://doi.org/10.5267/j.ac.2021.1.021Boylan, D. H., & Hull, J. E. (2022). Have Accounting Information Systems significantly helped in detecting fraudulent activities in accounting? The Journal of Applied Business and Economics, 24(3), 45-56. https://doi.org/10.33423/jabe.v24i3.5191

Week9AssignmentOrganLeadership

 

Read the Innovation at International Foods Case Study on pages 234-238 in the textbook. Answer the Discussion Questions at the end of the Case Study. Your responses must be complete, detailed and in APA format. See the sample assignment.  Please view  APA Template File in the “Getting Stated” Folder. 

Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research. Please be sure that journal articles are peer-reviewed and are published within the last five years.

The paper should meet the following requirements:

3-5 pages in length (not including title page or references)

APA guidelines must be followed. The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.

A minimum of five peer-reviewed journal articles.

PhoneGap

Developing in the mobile space can be a daunting task for developers.  Developers must figure out which platforms they should support for their apps, purchase the hardware, and join the developer programs for each platform.   PhoneGap is an open source set of tools which enables developers to create mobile applications for multiple devices by utilizing the same code. It is a hybrid mobile application framework that allows the use of HTML, CSS, and JavaScript to write applications which are based on the open standards of the web.  MonoTouch and Mono for Android rely on the Mono Framework to function. Mono is a cross-platform open source implementation of the .NET Framework.  Mono is a cross-platform open source implementation of the .NET Framework. 

  • How is sharing code being one of the most appealing reasons to use MonoTouch and Mono for Android?  Explain
  • How is the use of debugging tools helpful in resolving mobile application issues quickly?

Research paper (2) + Discussion

Task 1: HIGH PRIORITY – Research paper.

The portfolio project is a three- part activity. 

You will respond to three separate prompts but prepare your paper as one research paper. Be sure to include at least one UC library source per prompt, in addition to your textbook (which means you’ll have at least 4 sources cited). 

Start your paper with an introductory paragraph.

Prompt 1 “Blockchain” (2-3 pages): Explain the major components of blockchain. Be sure to include how blockchain is affecting a global economy and how you see it growing in the future. 

Prompt 2 “Big Data” (1-2 pages): Describe your understanding of big data and give an example of how you’ve seen big data used either personally or professionally. In your view, what demands is big data placing on organizations and data management technology?  How does big data affect a global economy.

Prompt 3 “Government and Policies” (1-2 pages):  Discuss the role government plays in a global economy.  Also, look at what policies are currently in place and then discussion what policies should be put in place..Conclude your paper with a detailed conclusion section.

 The paper needs to be approximately six to eight pages long, including both a title page and a references page (for a total of eight to ten pages). Be sure to use proper APA formatting and citations to avoid plagiarism. Your paper should meet these requirements: 

  • Be approximately six to eight pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

TASK 2: 

 

Use the internet to research and find one example of a data visualization each for categorical data, time-series data, and spatial data. Discuss the data set and the following topics.

How effective is the visualization? Why?

What elements would you modify?

Does the example reveal the tool used ( PowerBI, R, Tableau, Qlikview….?What problem is the visualization addressing? 

Your research paper should be at least 3 pages (800 words), double-spaced, have at least 4 APA references, and typed in an easy-to-read font in MS Word (other word processors are fine to use but save it in MS Word format). Your cover page should contain the following: Title, Student’s name, University’s name, Course name, Course number, Professor’s name, and Date. Please see the grading rubrics for the assessment and the scores you received.

TASK 3: 

 There is a relationship between policy evaluation and production identification, policy evaluation and policy implement, and policy evaluation and policy formulation.  Can you explain this relationship and why they are important? 

case-study

  • Describe any laws or regulations that may have been violated. 
  • How would you feel as a consumer if your personal information was stolen in this case?
  • How should Target customers be reassured that this won’t happen again?
  • 2 pages

Purpose:

Identify the main information security and privacy protections of the Financial Services Modernization Act of 1999 (Gramm-Leach-Bliley).sites about the attackhttps://www.infoworld.com/article/2609942/target-contractor-says-it-was-victim-of-cyber-attack.htmlhttps://www.bloomberg.com/news/articles/2014-03-13/target-missed-warnings-in-epic-hack-of-credit-card-data