Research Paper

 I have attached the concept of my paper. I need help on writing a complete paper and a PPT with about 14 pages with below mentioned points.

  • Business Plan
    • How will you obtain funds for the project?  (are you asking for funds or obtaining from another source)
    • How many funds are required to start?
    • What is the timeframe to launch?
    • Resource requirements
      • Hardware
      • Software
      • Other support IT to get the systems up and running (networking, database, etc…)
      • People
      • Equipment
      • Office Space
      • Etc…
  • Key concepts to address to ensure the organization is running efficiently
    • Organizational Learning Concepts and Theories
    • Integration of IT Resources
    • Virtual Teams? Local Teams?  Why?
    • Ethical and Legal Implications
    • Cyber Security and Privacy of Information
      • What do you have to account for?  (managing data or credit card information?)
    • Best Practices that you are going to implement in your organization and why
  • Summary and Next Steps

Computer Science Homework

 Remember to review the syllabus expectations for initial discussion posts and peer replies! 

Discuss the following questions: 

1. What is Blockchain’s potential for application in the HR functions of recruitment and selection. 

2. How might Blockchain technology impact job repositories. You are required to cite this week’s assigned readings in your paper. You may also cite prior week’s reading assignments and external sources if you wish.

Use the following headings to organize your paper: Introduction, Question 1, Question 2, Conclusion, References.

Writing Requirements for All Assignments:

  • References MUST be cited within your paper in APA format. Your reference page and in-text citations must match 100%. Papers without in-text citations will earn failing grades.
  • Always include a cover page and reference page with all submissions
  • Your paper must have headings in it. For discussion posts Introduction, Prompt/Question, and Conclusion will suffice as headings.  
  • Provide the EXACT web link for all online sources – do not provide just the home page, but the EXACT LINK – I check all sources
  • No abbreviations, no contractions – write formally
  • Write in the third person formal voice (no first or second person pronouns)
  • Write MORE than the minimum requirement of the word count assigned
  • As always, the word count is ONLY for the BODY of the paper – the cover page, reference page, and / or Appendix (if included) do not count towards the word count for the paper
  • Indent the first line of each new paragraph five spaces
  • Refer to the example APA paper in the getting started folder under the content tab if you need an example. Also, a power is provided under the information tab that addresses APA format.
  • Use double-spacing / zero point line spacing, a running header, page numbers, and left justify the margins.

Week 4 Assignment – Defense in Depth

 

Week 4 Assignment – Defense in Depth

Introduction

The process of implementing security frequently opens one’s eyes to other forms of security not previously considered. In this two-part assignment, you should experience just that. This assignment focuses on a model of implementing security in  layers, which, in many cases, requires a network that is designed  accordingly. The specific course learning outcome associated with this assignment is: 

  • Recommend best security practices to achieve business objectives based on risk assumptions.

Instructions

Design a network that incorporates the following: 

  • One corporate site (Chicago).     
    • All servers exist here (web server, file server, print server, mail server, FTP server).
    • Connection to the Internet (50 MBps).
    • 300 employees who only need access to local corporate resources and the Internet.
  • One remote site (8 miles away).     
    • 20 employees who need access to all resources at corporate, plus the Internet.
    • Connection to the Internet (3 MBps).
Part 1

Use Microsoft Visio or an open-source alternative, such as Dia Diagram Editor, to: 

  • Create a network diagram with defense in depth in mind, citing  specific, credible sources that support the design and depicting at  least four-fifths of the following:     
    • All necessary network devices (routers, switches and/or hubs, firewalls, VPNs, proxies, and others).
    • The interconnections between network devices.
    • Connections to end-user (client) devices (desktops, laptops).
    • Connections from the Internet cloud to the network input.
Part 2

Write a 6–10 page paper in which you: 

  • Describe the flow of data through the network, citing specific, credible sources.     
    • Assume data begins at the remote site.
    • Data flow may be monitored by an IDS.
  • Explain all three elements of the CIA triad and how isolating by  network functions helps deliver a layered approach, citing specific,  credible sources that support your assertions and conclusions.
  • Support your main points, assertions, arguments, or conclusions  with at least four specific and credible academic sources synthesized  into a coherent analysis of the evidence.     
    • Cite each source listed on your source page at least one time within your assignment.

Cloud Computing

 

  • List the security advantages of cloud-based solutions.
  • List the security disadvantages of cloud-based solutions.
  • Define and discuss the data wiping process.
  • Discuss how a cloud-based solution provider may reduce the risk of a DDoS attack.

 Use only 70-words max per topic to discuss and present your answer.   

 References: (Chapter 9)
Erl, T., Mahmood, Z., & Puttini, R. (2014). Cloud computing: concepts, technology, & architecture. Upper Saddle River, NJ: Prentice Hall.
Jamsa, K. A. (2013). Cloud computing: SaaS, PaaS, IaaS, virtualization, business models, mobile, security and more. Burlington, MA: Jones & Bartlett Learning 

3rd Excel Exam SU1 2021

 

3rd Excel Exam SU1 2021

 

#3rdExcelExamSU12021

After graduating from college, you and  three of your peers founded the software company TechStore Unlimited  (TSU). TSU provides an online market place that fosters business to  business (B2B), business to consumer (B2C), and consumer to consumer  sales (C2C). As one of the company’s principal owners, you have decided  to compile a report that details all aspects of the business, including:  employee payroll, facility management, sales data, and product  inventory. To complete the task you will duplicate existing formatting,  import data from an Access database, utilize various conditional logic  functions, complete an amortization table, visualize data with  PivotTables and Power Maps, connect and transform several external data  sources, and lastly you will inspect the workbook for issues.

Start   Excel. Open 3rd Excel Exam SU1 2021.xlsx. Grader has automatically added   your last name to the beginning of the filename.

Create a Data Validation list in   cell J7 based on the employee IDs located in the range A6:A25. Add the Input   Message Select Employee ID and use the Stop Style Error Alert.
   Hint: Data Validation is located on the Data tab in the Data Tools group.
 

In cell K7, enter an INDEX   functions with two nested MATCH  functions. The first MATCH function will look up the row number of the  employee   number in cell J7 in the range A6:A25. The second MATCH  function will look up the column number of the value   in cell K6 in the  range B5:H5. Note   K6 contains a validation list that can be used to  select various lookup   categories.
 

  Hint: The arguments of the INDEX are array (B6:H25), Row  Number,Column   Number. The purpose of the two MATCH   functions is to  look up the ROW number and COLUMN number. I suggest you do the first  MATCH function   to ensure it works and then nest it inside of the INDEX  function. Then nest the second MATCH function in the   INDEX function.  To test the INDEX   function, use the Data Validation list in cell J7 to  select Employee_ID 31461 and select Salary in cell K6. Did it   look up the correct salary for the specified employee number?
 

Click cell K11 and type FT. Click cell A28 and type Full Time   Employees.

Use the Format Painter to apply   the formatting from the cell A3 to the range A28:B28.
 

  Hint: The Format Painter is located on the
   Home tab in the Clipboard group.
 

Use Advanced Filtering to   restrict the data to only display FT  employees based on the criteria in the   range K10:K11. Place the  results in cell A29.
 

  Hint: Advanced Filtering is located on the Data tab in the Sort & Filter   group.
 

Enter a database function (DCOUNTA)   in cell K18 to determine the  total number of FT employees. To complete the   function, use the range  A5:H25 as the database argument, cell E5 for the   field, and the range  K10:K11 for the criteria.
 

  Hint: To access DATABASE functions, click insert function, and select   Database from the function category menu.
 

Enter a database function in   cell K19 (DSUM) to determine the total  value of FT employee salaries. To   complete the function, use the  range A5:H25 as the database argument, cell H5   for the field, and the  range K10:K11 for the criteria.
 

  Hint: To access DATABASE functions, click insert function, and select   Database from the function category menu.
 

Enter a database function   (DAVERAGE) in cell K20 to determine the  average FT employee salary. To   complete the function, use the range  A5:H25 as the database argument, cell H5   for the field, and the range  K10:K11 for the criteria.
 

  Hint: To access DATABASE functions, click insert function, and select   Database from the function category menu.
 

Enter a database function in   cell K21(DMAX) to determine the  highest FT salary. To complete the function,   use the range A5:H25 as  the database argument, cell H5 for the field, and the   range K10:K11  for the criteria.
 

  Hint: To access DATABASE functions, click insert function, and select   Database from the function category menu.
 

Format the range K19:K21 with   Currency Number Format.
 

  Hint: Currency Number Format is located on the
   Home tab in the Number Group.
 

Use PowerQuery to connect and   open the Orders table in the eApp_Cap_Orders.accdb   database. Use the Query editor to format column A with Date number format and   load the table. Rename the worksheet Orders.
   Hint: Data can be imported using Get & Transform data tools  located on   the Data tab in the Get & Transform data group.
 

Adapt the previous step to   connect and load the Warehouse table.
 

  Hint: Data can be imported using Get & Transform data tools  located on   the Data tab in the Get & Transform data group.
 

Connect to, but don’t load the   Inventory table from the eApp_Cap_Orders.accdb   database. 

Create the following   relationships.
 

  Relationship 1
   Table Name
   Inventory
 

  Column (Foreign)
   Warehouse
 

  Table
   Warehouse
 

  Column (Primary)
   Warehouse
 

  Relationship 2
 

  Table
   Orders
 

  Column (Foreign)
 

  Item_Number
   Table
   Inventory
 

  Column (Primary)
 

  Item_Number
 

  Hint: Relationships are located on the Data tab in the Data Tools group.
 

Use PowerPivot to create a blank   PivotTable on a new worksheet. Add the following fields to the PivotTable.
   Rows
   Warehouse: Location
   Warehouse: Warehouse
   Inventory:
   Item_Number
   Values
   Inventory:
   Current_InventoryInventory:
   Total_Value

Insert a Slicer based on   Warehouse. Place the upper left corner of the Slicer inside the borders of   cell F3.
 

  Hint: Slicers are located on the Insert tab in the Filters group.
 

Create a 3D PowerMap that   displays the location of all warehouses based on the City geographic type.   Rename the worksheet Inventory.
   Hint: 3D Maps is located on the Insert tab in the Tours group.
 

Save and close the 3rd Excel   Exam SU1 2021. Go to the Test   Presentation Window. Upload the exam   and submit it for grading