Summary about Cloud Computing main concepts, history, features, implementations, advantages, limitations…
Notes on W(5) H(1) for Three New Research Articles, and Compare & Contrast Research (p. 16a)
Assignment Content
In class, we had Research Day II where you were required to find THREE more research articles related to your topic in exploration of your research question.
For this assignment, you are asked to download the Word document below and simply fill out W(5) H(1) notes for EACH new research article found in class:
KG 604 – Research Day II, Objective Summary Worksheet.docx
GRADING
- GRADING
- Title Page = 5 pts: Adjust the template for your own work
- Worksheet Pages = 80 pts (breakdown below):
- New Article #1
- Who = 5 pts
- Why = 5 pts
- When = 5 pts
- Where = 5 pts
- How PLUS cut and pasted paragraph with HIGHLIGHTED indicator words = 5 pts
- What PLUS cute and pasted sentences that summarize findings with HIGHLIGHTED overall findings = 5 pts
- New Article #2
- Who = 5 pts
- Why = 5 pts
- When = 5 pts
- Where = 5 pts
- How PLUS cut and pasted paragraph with HIGHLIGHTED indicator words = 5 pts
- What PLUS cute and pasted sentences that summarize findings with HIGHLIGHTED overall findings = 5 pts
- New Article #3
- Who = 5 pts
- Why = 5 pts
- When = 5 pts
- Where = 5 pts
- How PLUS cut and pasted paragraph with HIGHLIGHTED indicator words = 5 pts
- What PLUS cute and pasted sentences that summarize findings with HIGHLIGHTED overall findings = 5 pts
- References Page = 10 pts: Create a proper APA 7 References Page with your THREE research articles (refer to the video and see pp. 33-34 for the FORMAT you must use to create your reference and p. 32 for a perfect sample of what a References Page looks like.)At this point, you have found your research articles exploring your approved research question and you have learned how to find your 6 ‘ingredients’ during class (contact the Graduate You learned about the W(5) H(1) and completed Phase 2 on p. 13a of your Final ‘Mission’ Packet (Found in W. 4’s HW).
- You will open your Final ‘Mission’ Packet that is saved to your computer, and turn to p. 16a, “Activity: Analyze Your Research Articles: Compare and Contrast.”
- Complete p. 16a using all 4 research articles in your workbook and them COPY and PASTE into a NEW Word document to be submitted here.
Grading:
Comparison = 50%
- To earn full credit, you will have mentioned all four research articles, used correct in-text citations, used appropriate comparison, transition words, have written in full sentences, and have written FULLY in your own words.
Contrast = 50%
- To earn full credit, you will have mentioned all four research articles, used correct in-text citations, used appropriate contrasting, transition words, have written in full sentences, and have written FULLY in your own words.
paper 2 **
3days please
DB Sys WK 1 Peer Res
Download The Attachment and Message Me Please for Detailed Instructions
Discussion on topic: Hacking on Social Media Platforms
write your complete draft of your discussion section:
- Activity: Discussion, Para. 1
- Activity: Discussion, Para. 2
- Activity: Discussion, Para. 3
References
Malik, A., Dhir, A., Kaur, P., &Johri, A. (2020). Correlates of social media fatigue and academicperformance decrement: a large cross-sectional study. Information Technology & People.https://doi.org/10.1108/JCOM-01-2019-0002
Ecklebe, S. and Löffler, N. (2021), “A question of quality: perceptions of internal communication during the Covid-19 pandemic in Germany”, Journal of Communication Management, 25(3), 214-232. https://doi.org/10.1108/JCOM-09-2020-0101
Du, H.S., Chu, S.K.W., Chan, R.C.H. and He, W. (2016), “Collaborative writing with wikis: an empirical investigation”, Online Information Review,40(3), 380-399. https://doi.org/10.1108/OIR-06-2015-0173
Strenghts Finder 2
This paper will allow you to examine your strengths and develop a plan for moving forward.
I. What Do You Do Best?
· Of all the things you do well, which two do you do best and why?
· Which activities do you seem to pick up quickly and why?
· Which activities bring you the greatest satisfaction and why?
II. STRENGTHSFINDER Results
· What are your top five Signature Themes as identified by the Clifton STRENGTHSFINDER? Which theme resonates with you the most and why?
· Based on your Signature Themes, what should a manager/supervisor know about working with you and why?
· Based on your Signature Themes, what should a co-worker know about working with you and why?
· How can a manager/supervisor help you with your strengths more within your current role and why?
III. Celebrating Successes
· What was your most significant accomplishment in the past 12 months?
· When do you feel the most pride about your work?
· How do you like to be supported in your work?
IV. Applying Talents to the Role
· What things distract you from being positive, productive, or accurate?
· Which talents do you have that could benefit the team if you had better opportunities to use them?
· What steps could be taken to ensure you have an opportunity to apply your natural talents to your role?
· Submit a 5-page paper double spaced
· Include a cover page and a reference page (not to be included in the 5 pages of paper content)
· Use the questions and bullets above as the framework and outline of your paper.
· Please provide at least four (4) scholarly references to support your paper in addition to the STRENGTHSFINDER text.
· All references should be used as in-text citations.
Discussion Assignments
1.Write at least 500 words discussing how you would test your hypothesis for the likelihood of mask-wearing in the US in the next year.
Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list. Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs.
2.Write at least 500 words discussing how to use text mining to analyze how politicians use language to influence voters.
Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list. Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs.
ADVANCED EXCEL
Using the PERT method sample file uploaded, follow the method outlined in the .pdf file and PPT to complete the schedule with 95% confidence level.
Find the Z value for 95% confidence level in pdf file containing the z table.
Country Analysis:
Country Analysis: Write a briefing paper on the cyber threats facing a particular nation. The analysis will need to take into account historical and current enemies, the nation’s dependence on cyber, the level of sophistication of its cyber defense, and the level of sophistication of its adversaries. The discussion must be fact based, logical, and analytical
GLBA Safeguarding Requirements
Scenario
You have been in your role as the CIO for Premier University for almost six months. In that time, you have managed to create a small information security team, and incident response is one of the team’s strengths. Unfortunately, the repercussions for the data breach that occurred almost a year ago continue to plague you.Premier University recently received a letter from the Department of Education, asking the university to explain the circumstances of the data breach and how the institution handled the breach. The letter also referenced the Gramm-Leach-Bliley Act (GLBA). You know that the institution must follow GLBA provisions to ensure the security and confidentiality of student financial aid information. That requirement is part of the contract for administering federal student financial aid that Premier University has signed. You also know that the Department of Education Office of Federal Student Aid issued an informational memo about these requirements in February 2020.
Tasks
The Premier University president has asked you to outline GLBA data safeguarding requirements and why they are important to implement to protect student financial aid data. The president has also asked for your opinion on the ease with which Premier University can implement the safeguarding requirements.For this part of the project:
- Review the “Enforcement of Cybersecurity Requirements under the Gramm-Leach-Bliley Act” memo and the links within the memo: https://ifap.ed.gov/electronic-announcements/022820EnforcCyberReqGrammLeachBlileyAct
- Create a professional report that addresses the following:
- The university’s GLBA data safeguarding requirements
- Why the data safeguards are important to implement to protect student financial aid data
- Your opinion on the ease with which Premier University can implement the safeguarding requirements to reduce risk; rate the ease of implementing each safeguard on a scale of easy, medium, or hard
- In the report, include any sources you consulted.
Required Resources
- Internet access
- Course textbook
Submission Requirements
- Format: Microsoft Word (or compatible)
- Font: Arial, size 12, double-space
- Citation Style: Follow your school’s preferred style guide
- Length: Minimum 6 to 8 pages