Assignment READ CAREFULLLY !!!

 
        Complete the questions 1, 2, 3, below, working with personality types.  

Learn more about these personality types at ( YOU MUST OPEN AND READ THIS LINK IN ORDER TO ANSWER QUESTIONS) LINK:http://www.personalitypage.com/high-level.html (Links to an external site.)  (Links to an external site.) and complete the following: 

Question 1. WHICH TYPE ARE YOU? Briefly explain (total 5 paragraphs; 1 paragraph is = to 8 sentences)

Question 2. Briefly describe the ISTJ and ENFP personality types in the Myers-Briggs categories (1 paragraph of 8 full sentences (phrases are not sentences (a couple of you wrote phrases instead of sentences in last assignment) .

Question 3. Critical Thinking Question: There are 2 peer employees that you simply cannot get along with or you are in arguments often at meetings. Let’s call them Albert and Jennifer. Albert is a ISTJ and nothing ever bothers him. Unfortunately, he agrees to everything, even if it’s apparent that doing his method will lose your company thousands of dollars ($240,000).
List 2 sentences stating HOW YOU can get Albert to give his true feelings – communicate with the group if he believes the group plans will succeed or fail and why. (How can you make him talk?)

Jennifer is YOUR OPPOSITE personality type. What personality type is opposite you? (answer this)

Other peers have noticed that neither you or Jennifer stand down/compromise.  List 2 sentences stating HOW YOU can improve this communicate. (I know, I said “YOU” and not her. Work conflicts are difficult.)

research on Internet Of Things

I want you to describe Internet Of Things and  current technologies in use. Review how the technology works. Research the future of these technologies. How will they change businesses and our lives? Paper Requirements: 

  • Your paper will comprise 2500 to 3000 words (not including title and reference pages).
  • Your paper must be formatted according to APA guidelines as a Word document, double spaced,
  • You must support your materials by using at least five appropriate, properly cited sources in addition to your course textbook.
  • Formatting: Times New Roman, 12-font, with one-inch margins. 
  • No Plagiarism 

Discussion

 What do you think is the most important factor affecting the collection of digital data and what impact do you think that this factor has on the ultimate quest for obtaining evidence in a criminal case?

Why is it important to look for Big Data and how could it be used in enhancing or finding evidence in a criminal or civil violation investigation?

Discussion and Research paper

Research Paper

 This week, you have read about entrepreneurship in a global economy. For your written assignment this week, complete a case study of the organization you work for (use a hypothetical or “other” organization if more applicable) that will address the following prompts:

  • Describe the organization’s environment, and evaluate its preparedness to go global, if not already, and it’s strategy for staying global if it is.
  • Research other company’s strategy for going global and explain if this will or will not work for your company. 
  • Make a recommendation for a global strategy in the organization, including a justification for your recommendations.

Submit your midterm research paper as a single document. Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Discussion:

 

Networks have changed drastically over the last 30 years.  With the first introduction of the 56k modem, which was about 3 typewriter pages per second, to speeds well over 1Gbps these days, the ability to use networks globally, has changed the way we do business.  Using research, determine where networks will go in the next 5-10 years and how that might impact the global economy.

Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

Practical connection assignment – INFERENTIAL STATISTICS IN DECISION-MAKING

At our university, it is a priority that students are provided with strong educational programs and courses that allow them to be servant-leaders in their disciplines and communities, linking research with practice and knowledge with ethical decision-making. This assignment is a written assignment where you will demonstrate how this course research has connected and put into practice within your own career.

 

Assignment:  

Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

 

Requirements:  

Provide a 500 word (or 2 pages double spaced) minimum reflection.  

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.  

Share a personal connection that identifies specific knowledge and theories from this course.  

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment.   

You should NOT, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.

Discussion with 500 words

 

Explain in 500 words or more what NIST Is and how it should be used by a dba.  

Use at least three sources.   Use the Research Databases available from the Danforth Library, not Google.  Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.

Write in essay format not in bulleted, numbered or other list format.  

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your post and that you reply to two classmates in a substantive way (not ‘nice post’ or the like). Do not use spinbot or other word replacement software. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about. Please do not submit attachments unless requested.

Internet Security Threat Report

Read this report :

https://www.mcafee.com/enterprise/en-us/security-awareness/cybersecurity/what-is-internet-security.html#definition

According to the report, write a one page answering the following questions:

  + What threats are currently the most dangerous?

  + Which of these top threats represent problems for you and your use of the Internet?

  + Which of these top threats represent problems for your school or business?

Exp19_Word_Ch06_Cap_IT_Professionals

Exp19_Word_Ch06_Cap_IT_Professionals

Exp19 Word Ch06 Cap IT Professionals

Word Chapter 6 Capstone – IT Professionals

  

Project Description:

You have recently been elected secretary of the local professional chapter of Information Technologist Professionals (ITPs). You download a meeting agenda template, personalize it with the organization’s information, and then email it to the president and vice president. After they have given their inputs, you combine the two versions of agendas into one document, assemble the monthly minutes, and then format the agenda and minutes into professional-looking documents.

     

Start Word. Download and open   the file named Exp19_Word_Ch06_Cap_JohnAgenda.docx.   Grader has automatically added your last name to the beginning of the   filename. 

 

Replace the words Company/Department Name in the first   paragraph with Information Technologist Professionals. To the left of this text,   insert the graphic Logo.png. Position   the image so that it is aligned with the upper left corner of the document   and change the wrapping to tight. Resize the logo so that the height is   1″. Insert the word Chapter in front of the words Meeting   Agenda in the second paragraph. 

 

Replace the following text in   the document:
  Replace This Text With This Text
Date Every first   Tuesday of the month
Time 7:00 p.m.
Invitees:   Location:
Names of Invitees Student Union   Building, Room 111
  IV. a) Description of open issue 1 Membership Update
  IV. b) Description of open issue 2 Community Services
IV. c) Description of open issue 3 Fundraising   Projects
  V. a) Description of open issue 1 Upcoming Social Events

 

Create a building block   consisting of the logo, the first two paragraphs, meeting date, and time.   Name it Meeting_Info   and save it as AutoText and put it in the Building Blocks template. Remove   the bullets and the two unused Description of open issue 2 and 3 placeholders   under V. New Business. Save the   document.
 

  Note, Mac users, select the logo, the first two paragraphs, meeting date, and   time, and then from the Insert menu, click AutoText, and then click New.

 

Use the Combine feature to view EileenAgenda.docx (as the original   document) and Exp19_Word_Ch06_Cap_JohnAgenda.docx (as the revised   document). Save the combined file as a Word document named StudentLastname_Exp19_Word_Ch06_Cap_CombinedAgenda.
 

  Select the logo, the first two paragraphs, meeting date, and time and reject   the changes.
 

  Reject the following deletions: Chairperson’s   Report, Rosemary Nursing Home (along   with Christmas Angel Tree), and Christmas Party (along with Calendar).
  Accept the following additions: Thanksgiving   Turkeys and Canned Goods Collection.   Change the date from Tuesday to Wednesday, and the time from 7:00 p.m. to 6:30 p.m. Change the top and bottom   margins to 0.8″ so that the agenda is on one page.
 

  Note, Mac users, ignore the deletions. 

 

Insert a blank page after the   agenda and remove the numbered list format. Use the Create from File Object   feature to add the minutes of the meeting, stored in the Minutes.docx file, to the end of the agenda. Type Susan Wood as Note taker/Secretary   for the First Wednesday of September   Minutes. Scroll to the end of the Minutes page, insert a blank paragraph,   and insert the Meeting_Info building block.
 

  Note, Mac users, select the logo, the first two paragraphs, meeting date, and   time, and then from the Insert menu, click AutoText, and then click AutoText.   Insert the Meeting_Info AutoText entry. Select and cut the AutoText in the   text box. Paste the text on the last line of the Minutes page.

 

Scroll to the end of the Minutes page, insert a page break, and   use the Create from File Object feature to add other minutes, stored in the YearlyMinutes.docx file to the end of   the September minutes. Type Susan Wood as Note taker/Secretary for the August Minutes. 

 

Change the document theme to   Retrospect.
 

  Note, Mac users, use Retrospect.thmx   file downloaded with the project files. Click Themes arrow, click Browse for   Themes, navigate to the Retrospect.thmx   file, and select it. 

 

Modify the theme colors by   changing the Text/Background – Light 1 color to Black, Background 1 (first   row, first column) and the Accent 1 color to Orange, Accent 2, Lighter 60%   (third row, sixth column). Save the font colors as Agenda Colors.
 

  Note, Mac users, skip this step.

 

Create new theme fonts by   replacing the heading font with Arial Black and the body font with Arial   Narrow. Save the fonts as Agenda Fonts. If needed, delete the blank page below the agenda   page.
 

  Note, Mac users, skip this step as written, but change the two headings (Information Technologist Professionals   and Chapter Meeting Agenda) to   Arial Black and the text font to Arial Narrow. 

 

Double-click the Minutes object, and insert a bookmark   named September at the left edge of the date First Wednesday of September, which   displays in the second paragraph of the table holding the minutes.   Double-click the YearlyMinutes   object, and insert a bookmark named August at the left edge of the date First Wednesday of August, which displays on the next page.   Continue to insert bookmarks for July and June in the YearlyMinutes object. 

 

Save and close Exp19_Word_Ch06_Cap_CombinedAgenda.docx.   Exit Word. Submit the file as directed.

Lab

  • The SOHO Wireless Network: Describe the setting for the SOHO wireless network. An example could be a five-person law office, size and layout, and other details. Discuss relevant physical conditions. It should be generally about 3–5 sentences or bullet points.
  • Key Network Requirements: Describe the key user, application, and systems requirements. For example, what must the network provide, and how will it be used? Identify special industry or regulatory requirements. Discuss bandwidth requirements, fault tolerance, recovery goals, privacy needs, openness needs, and so forth. It should be generally about 5–10 sentences, or bullet points. 
  • Wireless Network Security Policy Statement: Outline a wireless network security policy statement. This should address the key policies that must be respected. It should be 2–3 paragraphs, 5–10 sentences, or 5–10 bullet points. Each statement is mapped to (highly related to) the requirements.
  • Wireless Network Security Processes and Procedures Statement: Outline a wireless network security processes and procedures statement. This should address the key operational tasks that must be respected. It should be 5–10 must do statements and mapped to the requirements or the security policy.
  • Citations and Resources Used in This Report: Tell us where you received external guidance and ideas. If you have presented original ideas, then give yourself credit and tell us why you believe it will work.