Prof Writing & Proposal Devel

 

Do a little bit of research on grant writing versus academic (scholarly) writing. 

Then…

1) Write a one sentence statement that describes the difference in grant writing vs. scholarly writing.

2) Research a need in your community and write a 100-300 word needs section in an academic writing style, citing your references in APA format. Copy and paste into the discussion forum. 

3) Write a quick one paragraph describing the mock dissertation topic (see list of topics below) that you will write about in this class and include your research question. Use academic writing style and standard. There is no word limit. 

 

  • Students must choose from the listed topics of their school/program:

 IT Students:

  • Enhancing Cyber Security In Healthcare -With The Help Of Machine Learning
  • Using Data Science Techniques To Enhance Data Security

A2

Attached is the document contains the question. Include at least two APA formatted references (and APA in-text citations). The assignment is one page in length. 

Python Assignment

Write a Python program to read the item name and quantity of each item included in a shopping list using a loop. 

Assume a shopping list will include only following three items: 
Item name
Item unit price
Pencil
$1
Eraser
$2
Box
$3
The program should ask the user to enter the item name and quantity of each item. Assume user enters valid input. You are NOT required to do validation checks of the data input.
Your program must find and display the itemised cost and the total cost of the items in the shopping list using a loop.
Sample program run (user input is given in italics):
Enter item name: pencil
Enter item quantity: 2
Enter item name: box
Enter item quantity: 1
Enter item name: eraser
Enter item quantity: 2
Sample output:
*************************************************************************************
Item No Item Name Unit Price Quantity Item Price
*************************************************************************************
1 pencil 1 2 2
2 box 3 1 3
3 eraser 2 2 4

Discussion

Please search the internet for an answer to the following question.

  • Why did Cisco Systems transition from standalone access control systems to IP networked systems?
  • What challenges did Cisco face in order to solve the physical security problems?

Discussion 6

The readings this week expand on investigation and of digital forensic analysis and investigations. Organizations, especially those in the public, health and educational areas are bound by legal and statutory requirements to protect data and private information, therefore digital forensics analysis will be very beneficial when security breaches do occur. Using this weeks readings and your own research, discuss digital forensics and how it could be used in a risk management program.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

IT 345 Assignment 1

 Required Assignment 1: Submit one to two-page summary of a journal article on a relevant topic of your choice. You are required to use IGU’s learning resources such as university’s digital library and online resources and confirm your use of these resources with your instructor. See “LRS” section above.

Assignment Week 4
1. Use Library Database in Syllabus to find an article related to Organizational Behavior:
2. Capture five major points of from the article and use APA to acknowledge this is captured or copied by (authors last name, date)
3. Write a short paragraph explaining why you think this article interest you as Introduction
4. Summary: Write your conclusion of what you have learned from the article
5. List the title and author of the article
6. Reference put the article reference in APA format 

Divya-OWASP Tools, Vulnerability Management

 For this assignment, download the GSA virtual appliance vulnerability assessment tool by clicking the link.   Install the GSA virtual appliance in your VirtualBox environment. Next review the video below about conducting a vulnerability scan using GSA/openvas.  Conduct a scan against the Linux Lamp Server virtual machine you created doing week 3.  Download the report in a PDF and submit.  Provide a summary about how this assignment represents securing the cloud.