Mini Paper

 My Topic is a:- a comparison of authentication mechanisms

 Research topic.  You must  include at least four primary, peer-reviewed sources in your  bibliography.  Additional sources of varying standards can also be used.   However, these four must be specifically cited.  An un-cited source  should not appear in your bibliography.

A primary source is the original material. If you are directly  quoting the words of an author, that is usually a primary source.  However, if you are quoting a paraphrase from an author (known because  the author is making a citation), then you should find the original  document they are paraphrasing and then quote or paraphrase the  original.

  • Peer-reviewed means that experts in the field have vetted the ideas,  methods, and conclusions to determine its suitability for publication.

  • Use the library databases, Google Scholar, and Wikipedia to locate  these primary sources (i.e. see what Wikipedia cites, or what papers are  listed as often cited in Google Scholar). Ensure that they are from  peer reviewed sources (such as ACM, IEEE, etc.) and not from trade  publications (such as eWeek, PC Magazine, etc.) Wikipedia is not a  primary source — you can use it, but it will not count as one of the  four peer reviewed primary sources.

  • Write a 4 to 6 page research paper on your topic.  The page count  excludes any figures, tables, pictures, title page, front-matter,  back-matter, appendices, or bibliographic references. In other words,  there should be 4 to 6 pages of double-spaced prose.

  • Proofread your assignment carefully.  Improper English grammar,  sentence structure, punctuation, or spelling will result in significant  point deductions.

CC W 9 D

 Select from the following list four (4) topics and discuss. Use only 50-words max per topic to discuss and present your answer.  The discussion questions this week are from Chapter 10  (Jamsa, 2013).Chapter 10 topics:

  • Define and describe business continuity.
  • Define and describe disaster recovery.
  • Discuss pros and cons of cloud-based backup operations.
  • Discuss threats to an IT data center infrastructure and provide cloud-based solutions to mitigate the risks.
  • Create a DRP for a company with which you are familiar.

NOTE: You are required to use at least two-peer reviewed sources (besides your textbook) to answer the above questions. 

Prepare a 3-5 page paper on the implications for voting, lotteries, certificate issuance, security auditing and enterprise. Discuss the impact on blockchain finance and how these functions will accelerate basic functions.

Prepare a 3-5 page paper on the implications for voting, lotteries, certificate issuance, security auditing and enterprise. Discuss the impact on blockchain finance and how these functions will accelerate basic functions.

Your paper should be 3-5 pages long (excluding the title and reference pages) and formatted according to APA.

Compose your essay in APA format, including the introduction and conclusion, and in-text citations for all sources used. In addition to your 3-5 page essay, you must include an APA-style title page and reference page

Logical Database Design

 If your boss asked you to create a  database that integrated logical design best practices, what are the  three most important features you would integrate in your end solution?  Remember to not only just state them, but explain why and show examples.  Don’t repeat the same examples of others. That constitutes cheating. 

Instructions

  • This is a required assignment, worth 15 points. The assignment  must be submitted by the due date. Late assignment are not allowed. 
  • You are required to submit a minimum of two postings. Points will be deducted for not fulfilling this minimum requirement.
  • Apply and use the basic citation styles of APA is required. Points are deducted per the rubric for this behavior.
  • Do not claim credit for the words, ideas, and concepts of  others. Use in-text citation and list the reference of your supporting  source following APA’s style and formatting. Points are deducted per the  rubric for this behavior.
  • Do not copy and paste information or concepts from the Internet  and claim that is your work. It will be considered Plagiarism and you  will receive zero for your work. A second offense results in a zero for  the course. A third is termination from the university.

CC W 5 A

Write a 3-5 page double space paper about how this course is relevant  to your current or future job.

Course – Cloud Computing

Job – Salesforce Developer / Software Developer / Software Programmer

3 – 5 pages are mandatory

Assignment

 

Discuss in 500 words or more best practices for incident response in the cloud. Refer to at least one incidence response framework.

Use at least three sources. Use the Research Databases available from the Danforth Library not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Write in essay format not in bulleted, numbered or other list format. 

WEBAssignment1003

 This weeks assignment you will be reading different journal articles, one on Firefox, one on Chrome, one on Private Web Forensics, and one on Private and Portable Modes. Select two from four attached articles and write a 2-3 page summary on what have you learned including the techniques used, how each is different and the end results. You should have a title page and your 2-3 page summary should include your opinions on all the information as this is not a research pap