Final Paper

 

  1. The final portfolio project is a three- part activity. You will respond to three separate prompts but prepare your paper as one research paper. Be sure to include at least one UC library source per prompt, in addition to your textbook (which means you’ll have at least 4 sources cited). 
    Start your paper with an introductory paragraph.
    Prompt 1 “Blockchain” (2-3 pages): Explain the major components of blockchain. Be sure to include how blockchain is affecting a global economy and how you see it growing in the future. 
    Prompt 2 “Big Data” (1-2 pages): Describe your understanding of big data and give an example of how you’ve seen big data used either personally or professionally. In your view, what demands is big data placing on organizations and data management technology?  How does big data affect a global economy.
    Prompt 3 “Government and Policies” (1-2 pages):  Discuss the role government plays in a global economy.  Also, look at what policies are currently in place and then discussion what policies should be put in place..
    Conclude your paper with a detailed conclusion section. 
    The paper needs to be approximately six to eight pages long, including both a title page and a references page (for a total of eight to ten pages). Be sure to use proper APA formatting and citations to avoid plagiarism.

    Your paper should meet these requirements: 

    • Be approximately six to eight pages in length, not including the required cover page and reference page.
    • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
    • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
    • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

PowerPoint_2G_Wedding_Services

 

#PowerPoint_2G_Wedding_Services

 

#PowerPoint 2G Wedding Services

 

Project Description:

In the following project, you will format a presentation describing  some of the wedding services offered by The Big Event Production and  Entertainment.

#On   Slide 1, format the subtitle-Floral and Lighting Design-as a WordArt using the first   style in the second column. Change the Text Fill to Black, Text 1.
 

#Select the picture and then Crop   the image from the bottom so that  the bottom-center crop handle aligns with   the lower half of the  vertical ruler at 2.5 inches.

Change the picture Height to 3 and then apply a  Glow: 5 point;   Dark Teal, Accent color 1 picture effect to the image.  Align the picture and   title using the Align Selected Objects command  to apply Align Top.

#On Slide 1, insert a Text Box   anywhere in the green content placeholder on the bottom of the slide. In the   text box, type The Big Event Production and Entertainment and then using the Align to   Slide option, apply the Align Center and Align Bottom alignment commands.

On Slide 2, remove the bullet symbol from the paragraph, and then    change the Shape Fill to the second color in the fifth column, and the  Shape   Outline to Black, Text 1.

#On Slide 3, convert the bulleted list to the List type SmartArt    graphic-Vertical Curved List. Change the color to Colorful Range –  Accent   Colors 4 to 5, and then apply the Simple Fill style.
 

  Note—Mac users, convert to any SmartArt style, and then change to Vertical   Curved List.

On Slide 4, change the bulleted   list to Numbering.

On Slide 5, in the placeholder on the right, insert an Online Picture   by searching for full bloom rose  then insert the picture of the large single rose. Select and delete    any additional text boxes that may display when the image is inserted.  To   avoid file size limitations, compress the online picture once it  is inserted.
 

  Note—alternatively, search for an image in a web browser, and then download   and insert a relevant image from the results.

Remove the background from the   picture using the default selected  area, and then apply the Glow: 18 point;   Brown, Accent color 6 picture  effect.
 

On Slide 5, change the bullet   symbols to Star Bullets, change the  Color to the first color in the last column,   and then change the Size  to 80.

On Slide 6, from the Shapes gallery, under Basic Shapes, insert a    Diamond of any size anywhere on the slide. Resize the diamond so that  its   Shape Height is 6 and its Shape Width is 8.  Using the Align to Slide option, apply the Align Center, and Align    Middle alignment commands to the diamond shape. Apply the Intense  Effect –   Dark Teal, Accent 1 shape style.

In the diamond, type The Big Event   Productions and Entertainment (no  period). Change the Font Size to 36, and then, to the diamond   shape,  apply the Round Convex Bevel effect to the diamond shape. Note—this    effect may be called Art Deco on some systems.

Insert a Header & Footer on   the Notes and Handouts. Include the  Date and time updated automatically, the   Page number, a Footer with  the text 2G_Wedding_Services

Save and close the file, and   then submit for grading.

mod 3

 

MedicalWise is implementing a text message of your medical record. Another cryptography option for security is asymmetric ciphers, also known as PKI (Public Key Infrastructure).

Assignment Details

For this week’s course project assignment, address the following elements:

  • An assessment of whether Asymmetric Ciphers are the BEST solution. Include at least one paragraph for each heading below.
  • Description of PKI.
  • Description of the practical aspects of PKI.
  • Necessary requirements for a public key.
  • Cryptographers recommendation on asymmetric ciphers with supporting reasoning on why, or why not, they are the best choice for this security scenario.

DF-12

Explain how cookies can show that a user has visited a site if that user’s history has been deleted.

Rstudio data visualization

Take the assignment from the previous week, and add at least twice as much data to the data sets.  Note how this impacted the results from the previous week.  Be sure to have a visualization to show the initial results and the new results.  Be sure to explain why the results are different or similar to last week.

The objective of the lab is to take the UML

this zip states the question 

programmin C++

The objective of the lab is to take the UML Class diagram and enhance last week’s Employee class by making the following changes:

Create a class called Salaried that is derived from Employee.

Create a class called Hourly that is also derived from Employee.

Override the base class calculatePay() method.

Override the displayEmployee() method.

Create a new project and name it CIS247C_WK5_Lab_LASTNAME. Copy all the source files from the Week 4 project into the Week 5 project.

Using the updated Employee class diagram, modify the attributes to be protected.

Using the UML Diagrams from Step 1, create the Salaried classes, ensuring to specify that the Salary class inherits from the Employee class. Using the UML Diagrams from Step 1, create the Hourly classes, ensuring to specify that the Hourly class inherits from the Employee class.

operating system jan 20

Homework Content ( your operating system)

  1. Even though this class is new to you, none of you should be new to Operating Systems…in fact, everyone who has a phone or laptop probably used the operating system as a main factor for making your purchase (i.e., Mac vs. Windows vs. Linux, Android vs. iPhone)…

    So what phone or laptop do you own?…what is the operating system on your device?…be VERY specific…what was it about the operating system that made you choose it?…now that you have purchased your device, what is your evaluation of the operating system?…does it perform and do all the things you thought it would when you made your decision to buy?…are you satisfied with the security aspects of the operating system?…for each question, explain WHY…

    Be VERY specific when you answer this…

    REMEMBER…this is a PERSONAL evaluation of the decision that you made regarding your purchase…it is NOT a list of functions and features…you may reference functions and features but you need to be specific on how those functions or features apply to YOU…if all you do is provide me a list of functions and features, you will NOT do well on this assignment…

    You should submit at least TWO FULL PAGES OF CONTENT…meaning sources, title, etc. do NOT count…be sure to include any reference material you used…

    Please refer to the “Written Assignment” rubric in the folder “Rubrics”…the items in that rubric will factor into your grade…

Research paper and discussions

Discussion1:

  Assume  that you have been tasked by your employer to develop an incident  response plan. Create a list of stakeholders for the IR planning  committee. For each type of stakeholder, provide the reasons for  inclusion and the unique aspects or vision that you believe each of  these stakeholders will bring to the committee.   ***Standard for all discussion posts:   Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:    

  • Ask an interesting, thoughtful question pertaining to the topic 
  • Answer a question (in detail) posted by another student or the instructor 
  • Provide extensive additional information on the topic 
  • Explain, define, or analyze the topic in detail 
  • Share an applicable personal experience 
  • Provide  an outside source (for example, an article from the UC Library) that  applies to the topic, along with additional information about the topic  or the source (please cite properly in APA 7) 
  • Make an argument concerning the topic 

At  least one scholarly source should be used in the initial discussion  thread. Be sure to use information from your readings and other sources  from the UC Library. Use proper citations and references in your post.  

Discussion 2:

 The seven domains of a typical IT  infrastructure include the User Domain, Workstation Domain, LAN Domain,  LAN-to-WAN Domain, WAN Domain, Remote Access Domain, and  System/Application Domain. As you’ve learned, each domain has business,  technical, and security policy challenges that affect organizations. Answer the following question(s): 

  1. What is an advantage of organizing IT security policies by domain?
  2. What is a disadvantage of organizing IT security policies by domain?
  3. Do you think one domain is more challenging than the others as far as applying security policies? Explain your answer.

Fully address the questions in this  discussion; provide valid rationale for your choices, where applicable;  and respond to at least two other students’ views. 

Research paper:

  Submit  a report that discusses the techniques used by malware developers to  disguise their code and prevent it from being analyzed.  Give  suggestions on how these techniques should be classified and ranked in  the disaster recovery documentation and recovery plan.    ***Standard for all Research Assignments   Your paper should meet the following requirements:   

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support  your answers with the readings from the course and at least two  scholarly journal articles to support your positions, claims, and  observations, in addition to your textbook. The UC Library is a great  place to find resources.
  • Be  clearly and well-written, concise, and logical, using excellent grammar  and style techniques. You are being graded in part on the quality of  your writing.

Discussion

Why are privacy and confidentiality important for your study participants? What are some ways to maintain and ensure privacy and confidentiality? 

Cite the research guides to support your discussion.