discussion-3

How is the regulation of security and trustworthiness on the Internet likely to develop? Will the private sector improve trust online? Will governments have to step in more? Will public confidence in the Internet decline to such a great extent that other infrastructures will become more popular?

WEEK 7 FINAL PROJECT CIT

Prepare a written work in a word file of 4 pages, including all the elements you have written before as well as the alternatives for vendors and software for each kind of it and the corresponding advantages and disadvantages of each of them.

Include an introduction, development, and conclusions, as well as at least 6 references using APA style.

Discussion week 6

Propose arguments and recommendations for using the software types and social media selection for making possible cross impacts and principal strategic objectives of your project company. Select a specific software for each type, and share the vendor and website. Write the information in at least 200 words.

Discussion

 

Wk 12 Discussion

Wireshark is one of the most widely-used network protocol analyzer. It lets you see what’s happening on your network at a microscopic level and is the preferred standard across many commercial and non-profit enterprises, government agencies, and educational institutions. GlassWire is a free network monitor & security tool with a built-in firewall. Review the features of these two products and explain how you could benefit from using either of these network management tools.
https://www.glasswire.com/
https://www.wireshark.org/

 

Week 12 Discussion

Pick one of the many information security standards organizations and describe what they do and what type of standards they are responsible for.

An initial post must be between 250-300 words 

assignment

 

  1. What is the definition of data mining that the author mentions?  How is this different from our current understanding of data mining?
  2. What is the premise of the use case and findings?
  3. What type of tools are used in the data mining aspect of the use case and how are they used?
  4. Were the tools used appropriate for the use case?  Why or why not?

Exp19_PowerPoint_Ch02_ML2 – Education 1.1

Exp19_PowerPoint_Ch02_ML2 – Education 1.1

Exp19 PowerPoint  Ch02 ML2 Education 1.1

PowerPoint Chapter 2 Mid-Level 2 – Education

  

Project Description:

The local senior citizens’ center asked you to speak on your recent trip to Peru. You will create a presentation on the obstacles the children face preventing them from obtaining any formal education beyond sixth grade. The goal of the presentation is to gather monetary support for the children.

     

Start PowerPoint. Download and   open the file named Exp19_PPT_Ch02_ML2_Education.pptx. Grader has automatically added your   last name to the beginning of the filename.

 

Click the Title Layout slide and   type Children   of Peru as the   title on Slide 1. Replace the subtitle with Tom Davis.

 

Click Slide 2. Type Major   obstacles as   the title text. Modify the three bullets in the content placeholder as: Food   availability, Water   sanitation, Basic hygiene   Then add a   fourth bullet: Health care 

 

Click Slide 3 and type Obstacles   Prevent Education as   the title. Insert the shape Rectangle: Rounded Corners. Size the width and   height to 2.5″. Position it horizontally at 1.92″ from the Top Left   Corner. Position it vertically at 3.00″ from the Top Left Corner. Type Lack of basic   needs in the   shape.
Note, Mac users, insert the Rounded   Rectangle shape.  

 

Insert a second shape Rectangle:   Rounded Corners. Size the width and height to 2.5″. Position it horizontally at 9.33″ from   the Top Left Corner. Position it vertically at 3″ from the Top Left   Corner. Type Educated children in the shape.
Note, Mac users, insert the Rounded   Rectangle shape.

 

Add an Arrow: Right (from Block   Arrows). Set the height to 0.75″ and the width to 2.83″. Position it horizontally at 4.75″ from   the Top Left Corner. Position it vertically at 4.08″ from the Top Left   Corner.

 

Add a Line shape. Set the height   to 3.33″ and the width to 5 pt. Position it horizontally at 7.83″   from the Top Left Corner. Position it vertically at 2.56″ from the Top   Left Corner.

 

Click Slide 4. Type Daily   Activity as the   title text. 

 

Insert the downloaded video, Education.mp4. Apply the Beveled   Rounded Rectangle style (under Moderate) to the video. Add a Light Blue   (Standard colors) border. Set the video option to start automatically. 

 

Click the last slide and type Please help as the title. Type Your   contribution would mean so much to the children in the text box on the right   and increase the font size to 24. Insert the downloaded image, Peru.jpg in the picture placeholder.

 

Insert the downloaded audio   file, Contribution.m4a. Drag the   speaker icon to the top right of the slide. Set the audio option to start   automatically and to hide during the show.

 

Save and close the file Exp19_PPT_Ch02_ML2_Education.pptx.   Exit PowerPoint. Submit the file as directed.

1/2 reading

  1. Read Chapters 1–4 in your textbook.
  2. Using the discussion link below, respond to the following questions (minimum 300 words):
    1. What was the most useful takeaway for you from this workshop’s reading?
    2. What concept from the reading is the most applicable to you now in your profession, and how might you implement it?

homework

1.- Please describe the Central Processing Unit and the hard drive. What is a software?

2.- Please name the the computer peripherals, and explain 3 of them.

3.- What means working offline ? What is Electronic Health Records ?

4.- Please name and explain four (4) benefits that clinical software programs can bring into the physician’s office.

5.- How can you avoid the invasion of patients’ privacy, when you are using a computer? Please explain

Discussion

 

  • Chapter 9 – Review the section on Establishing a Security Culture.  Review the methods to reduce the chances of a cyber threat noted in the textbook.  Research other peer-reviewed source and note additional methods to reduce cyber-attacks within an organization.

The above submission should be one-page in length and adhere to APA formatting standards.**Remember the APA cover page and the references (if required) do not count towards the page length** 

Interaction Overview Diagrams

Interaction Overview Diagrams (IOD) provide a high-level overview of the interactions happening within a system. Therefore, these diagrams show dependencies and flows between use cases. For this week’s Critical Thinking activity, create an IOD for a system of your choosing. Add notes to your activity and IOD. Provide an overview of your diagram, including a detailed discussion of the activity within your diagram.