H8

 Download and read the document and answer all questions in the document. Please see attached document H8 & APA Criteria doc.    

Research paper – 5 pages 5 references

Research paper topic: Data breaches in the cloud

 By 2018, the need to prevent data breaches from public clouds will drive 20% of organizations to develop data security governance programs.
Recommended Action: Develop an enterprise-wide data security governance (DSG) program. Identify data security policy gaps, develop a roadmap to address the issues and seek cyberinsurance when appropriate.

In your paper:

  • Identify and describe at least one emerging domain in the field of IT. Include details such as the underlying technologies of these domains and expected timelines for major worldwide adoption.
  • Analyze the impact on cybersecurity and supporting standards of these domains.
  • Make appropriate recommendations based on the standards and guidelines related to the identified domain.

Visualization – Discusiion + Research Paper

Task 1: 250 – 300 words. APA7 

 Composition deals with the overall readability and meaning of the project.  As noted by Kirk (2016), the topic of composition is divided into project-level and chart-level composition. Select one component of either project composition or chart composition and discuss. 

 Reference: Kirk, A. (2016). Data Visualisation: A Handbook for Data Driven Design (p. 50). SAGE Publications. 

Task 2:

 

Homework Assignment 6

Research: Annotation and ColorBackground: According to Kirk (2016), typography will have a significant role in your visualizations. You have to be careful with your text, but you must also be concerned with how the text looks. This then leads to color and functional harmony. You must provide the balance of colors in your visualizations (Kirk, 2016).  The harmony of colors you select during design will impact many aspects of the overall visualization.Assignment: Write a research paper that contains the following:

  • Discuss Typography and the importance of appearance of text
  • Discuss the following color harmonies: (Usage, Pros, and Cons)
  • Complementary colors
  • Analogous colors
  • Triadic colors

Your research paper should be at least 3 pages (800 words), double-spaced, have at least 4 APA references, and typed in an easy-to-read font in MS Word (other word processors are fine to use but save it in MS Word format). Your cover page should contain the following: Title, Student’s name, University’s name, Course name, Course number, Professor’s name, and Date. 

lab week 8

Write SQL statements that drop the tables you created in Question 2 if they already exist. This will

prepare the database for the CREATE TABLE commands in Question 2, so that the script will execute

without errors.

Operation security

  1. Think about how you would feel if there were no rules regarding how your credit card information was stored on merchants’ websites. Consider whether you would purchase items online. Would the Internet be as big as it is today if we had no laws or information security policies regarding data that makes up an e-commerce transaction? Provide rationale for your answer.
  2. Imagine that you work for an organization that has no Internet use policy. Employees use the Internet in whatever way they want using company-owned personal computers. Could this cause a problem for the organization? Why or why not?

Database – Discussions

Discussion 1 (Chapter 1):  Give examples of systems in which it may make sense to use traditional file processing instead of a database approach. 

Instructions: Your response to the initial question should be 250-300 words.  Next respond to two postings provided by your classmates. The first post should be made by Wednesday 11:59 p.m., EST. I am looking for active engagement in the discussion.  Please engage early and often. You are require to create your initial thread in order to view and respond to the threads posted by other students.  There must be at least one APA formatted reference (and APA in-text citation) to support the thoughts in the post as needed.  Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations.

ITSD424U3DB

 

Assignment Details

To improve the overall functionality and efficiency of your sub-ordering Java application, you are considering the use of some of the Java predefined methods. Some of the predefined Java classes and methods you are evaluating include vectors, wrapper classes, conversion methods, and collections data structures to process lists. Within the Discussion Board area, write 5 paragraphs that respond to the following questions with your thoughts, ideas, and comments. This will be the foundation for future discussions by your classmates. Be substantive and clear, and use examples to reinforce your ideas:

  • Thoroughly describe how you would utilize each of the following 4 topic areas to enhance the implementation of your Java sub-ordering application:
    • Vector class and methods (in terms of queue and stack creation and manipulation)
    • Wrapper classes (primitive)
    • Conversion methods (various string conversions)
    • Collections data structures (to build link list, queue, stack, search, and sort)

Week 5 D2

 This week we also discuss the concepts in chapter seven, which deals with the basic concepts and algorithms of cluster analysis.  After reading chapter seven answer the following questions:

  1. What is K-means from a basic standpoint?
  2. What are the various types of clusters and why is the distinction important?
  3. What are the strengths and weaknesses of K-means?
  4. What is a cluster evaluation?

 Read:

  1. ch. 6 & 7 in textbook: Association Analysis: Advanced Concepts and Cluster Analysis: Basic Concepts and Algorithms
  2. Križanić, S. (2020). Educational data mining using cluster analysis and decision tree technique: A case study. International Journal of Engineering Business Management, 12, 184797902090867–.

Mini Case Study

In this assignment, you will explore the business situation that the Global Green Books Publishing is facing and how it was resolved using effective project management.

The requirements for the assignments are:

Read the Mini Case Study attached to the assignment.

Answer the following questions based on the reading:

What are the types of direct costs identified in this case? Why are they viewed as direct costs?

What are two forms of costs identified?

What are some problems that might arise that could impact the budget?

Why would Global Green Books set aside contingencies? How would needed rework, if caught in the quality reviews, be accounted for in the budget?

What are the main cost drivers of this project?

What other information, if any, would you like to see included in the budget for this project? Why?

Create a budget for the European History eBook project then answer these questions:

What are the costs by major phases of work for making this European History eBook?

What are the total costs for direct labor?

What is the total estimated cost of this European History eBook?

The paper must be APA-formatted as a Word document.

SafAssign will be used to check this assignment for plagiarism. Remember to paraphrase in your own words and do not copy directly.

The length must be a minimum of two pages, excluding the title and reference pages.

Include at least one reference.

150/s4

  • What is the role of information security in the general hiring process? employee terminations?
  • What security practices are used to control employee behavior and prevent misuse of information?