Research paper

, you have read about entrepreneurship in a global economy. For your written assignment this week, complete a case study of the organization you work for (use a hypothetical or “other” organization if more applicable) that will address the following prompts:

  • Describe the organization’s environment, and evaluate its preparedness to go global, if not already, and it’s strategy for staying global if it is.
  • Research other company’s strategy for going global and explain if this will or will not work for your company. 
  • Make a recommendation for a global strategy in the organization, including a justification for your recommendations.

Submit your midterm research paper as a single document. Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Cloud computing

 In this project, you will make narrated presentation to convince the BallotOnline management of the value of migrating the organization’s existing IT infrastructure and services to a public cloud. You will learn about cloud computing technology and services and how organizations can take advantage of this trend.Your supervisor, Sophia, BallotOnline’s director of information technology, has tasked you with creating a presentation that will convince the executives that using cloud-based computing to accommodate BallotOnline’s future growth rather than trying to expand the current infrastructure will help the company do business faster and at lower cost while conserving IT resources.Your presentation will include an executive summary along with the following from previous steps:

  • Overview of cloud computing
  • summary of service and deployment models
  • summary of cloud compute and storage infrastructure components
  • advantages and disadvantages
  • economic analysis
  • IT business requirements (provide a concise description of what each bullet should ensure)
  • SWOT analysis

 Please use power point to answer the question and add references 

WebApllications

 

You are the  web master  of a college website. You share a server with other school departments such as accounting and HR. 

  Based on this chapter, create at least five security-related rules for  staff members who are adding web pages being added to your site.  Include a justification and explanation for each rule. Rules should  relate to college, staff and student, and system information security.  

  Write your answer using a WORD document.

Question 8 part (c)

  

Question 8 part (c)

Layer1, that is, physical layer and layer 2, that is, data link layer are common to USB2 and USB 3.

Layer 1 is the Physical Layer. This Layer includes Fiber, Twisted Pair (copper), Serial, USB, coaxial and others. In other words, interface connections and cabling. Some of those physical connections will be defined by the color of the cable: for fiber, Single Mode cable will be typically yellow and Multi Mode cable typically Orange. The fiber transceivers themselves are available in different kinds of connectors: SC, ST, LC. Serial interfaces are defined by cable types—two wire, four wire; USB interfaces fall into 3 categories of support and thus, identified as 1.1, 2.0 or 3.0; each having a different capability. Twisted pair cabling is available in CAT3 all the way up to CAT7, available in cross over or straight through, as well as whether it is shielded or unshielded.

Layer 2 is the Data Link Layer. The Data Link Layer covers how the data is transmitted over the Physical Layer 1. It packages raw bits from the physical layer into frames (logical, structured packets for data). It is protocol layer responsible for transferring frames from one node to another in a LAN or between network nodes in a WAN. Simply put, Layer 2 provides data transfer across the physical link. But the data link layer is also divided into two sub-layers: the MAC (Media Access Control) layer and the LLC (Logical Link Control) layer. The former controls how computers on the network gain access to the data and obtain permission to transmit it; the latter controls packet synchronization, flow control and error checking.

Penetration teting

Penetration testing is a simulated cyberattack against a computer or network that checks for exploitable vulnerabilities. Pen tests can involve attempting to breach application systems, APIs, servers, inputs, and code injection attacks to reveal vulnerabilities. In a well-written, assignment, discuss the following: 

1. What is penetration testing?

2. Testing Stages? 

3. Testing Methods? 

4. Testing, web applications and firewalls. 

Assignment should meet the following requirements: Be approximately 4 pages in length, not including the required cover page and reference page. 

PowerPoint Presentation (12-14 SLIDES)

Essentials of MIS (14th Edition) Kenneth C. Laudon and Jane P. Laudon

POWERPOINT PRESENTATION OF CHAPTER 12 OF ABOVE MENTIONED BOOK.

SHOULD BE 12 TO 15 SLIDES TOTAL.

CHAPTER 12- MAKING THE BUSINESS CASE FOR INFORMATION SYSTEMS AND MANAGING PROJECTS

 12-1 How should managers build a business case for the acquisition and development of a new information system?  The business case for an IT investment describes the problem facing the organization that can be solved by investing in a proposed system solution. It provides an analysis of whether an information system project is a good investment by calculating its costs and benefits. Tangible benefits are quantifiable, and intangible benefits cannot be immediately quantified but may provide quantifiable benefits in the future. Benefits that exceed costs should then be analyzed using capital budgeting methods to make sure they represent a good return on the firm’s invested capital. Organizations should develop an information systems plan that describes how information technology supports the company’s overall business plan and strategy. Portfolio analysis and scoring models can be used to evaluate alternative information systems projects.  

12-2 What are the core problem-solving steps for developing a new information system?  The core problem-solving steps for developing new information systems are: (1) define and understand the problem, (2) develop alternative solutions, (3) evaluate and choose the solution, and (4) implement the solution. The third step includes an assessment of the technical, financial, and organizational feasibility of each alternative. The fourth step entails finalizing design specifications, acquiring hardware and software, testing, providing training and documentation, conversion, and evaluating the system solution once it is in production. 

 12-3 What are the alternative methods for building information systems?  The systems life cycle requires information systems to be developed in formal stages. The stages must proceed sequentially and have defined outputs; each requires formal approval before the next stage can commence. The system life cycle is rigid and costly but useful for large projects.  Prototyping consists of building an experimental system rapidly and inexpensively for end-users to interact with and evaluate. The prototype is refined and enhanced until users are satisfied that it includes all their requirements and can be used as a template to create the final system. End-user-developed systems can be created rapidly and informally using user-friendly software tools. End-user development can improve requirements determination and reduce application backlog.  Application software packages and SaaS eliminate the need for writing software programs when developing an information system. Application software packages and SaaS are helpful if a firm does not have the internal information systems staff or financial resources to custom-develop a system.  Outsourcing consists of using an external vendor to build (or operate) a firm’s information systems. If it is properly managed, outsourcing can save application development costs or enable firms to develop applications without an internal information systems staff.  Rapid application design, agile development, joint application design (JAD), cloud-based platforms, and reusable software components (including web services) can be used to speed up the system’s development process. Mobile application development must address multiple platforms, small screen sizes, and the need to conserve resources. 

 12-4 How should information systems projects be managed?  Information systems projects and the entire implementation process should be managed as a planned organizational change using organizational impact analysis. Management support and control of the implementation process are essential, as are mechanisms for dealing with the level of risk in each new systems project. Project risks are influenced by project size, project structure, and the level of technical expertise of the information systems staff and project team. Formal planning and control tools (including Gantt and PERT charts) track resource allocations and specific project activities. Users can be encouraged to take active roles in systems development and become involved in installation and training. 

Journal

 Pick one of the following terms for your research: Strategic philanthropy, locus of control, ethical culture, ethical awareness, or normative approach.  

–  The paper should have a ‘Definition, Summary and Discussion’ headings ( Summary should have 150-200 words and discussion should have 300-350 words. )

– Attach minimum 2 references

– Absolutely no plagiarism, attach a plagiarism report with a 0% similarity index

Write a Java application to calculate the circumference

Write a Java application to calculate the circumference and the area of a circle. Your application must have two classes. The Circle class will have two methods: the circumference method and the area method. Each method will take a double input parameter as the value of the radius, perform its calculation, and return a double result.

The CircleTest class will have a main method that uses a JOptionPane to get the value of the radius from the user. The main method will create an object of the Circle class and test its methods. The main method will also use a JOptionPane for output. Use Math.PI and the Math.pow method in your calculations.

Limit your output to three digits after the decimal point by using the String.format method. Add exception handling to your program so that, if the user inputs something other than a string of digits, your program catches the exception and gives the user another chance to input the value of the radius.

Mobile Application Forensic

 Mobile ForensicsLearning Objectives and Outcomes

  • Describe the steps involved in seizing evidence from a mobile device.
  • Describe the information a mobile device reveals about the owner.

Assignment Requirements
You are an experienced employee of the DigiFirm Investigation Company. DigiFirm is conducting an employee training activity in which employees describe the process of how they would look for evidence on their own mobile devices.For this assignment, write a report that:

  • Details the properties of one of your own mobile devices
  • Outlines the steps you would take to seize evidence from your device, including device storage system data, and so on
  • A few legal issues related to mobile device forensic activities in general
  • Lists the general information that your device reveals about your life

Required Resources

  • Course textbook
  • Internet

Submission RequirementsFormat:Microsoft WordFont:Arial, size 12, double-spaceCitation Style:Follow your school’s preferred style guideLength:1-2 pages
Self-Assessment Checklist

  • I wrote a report that details the properties of one of my mobile devices, outlines the steps I would take to seize evidence from my device, describes a few legal issues related to mobile device forensic activities in general, and lists the general information that my device reveals about my life.
  • I created a professional, well-developed report with proper documentation, grammar, spelling, and punctuation.
The Importance of Literature

LIT101 week 1

Hello Class,

One of the most important questions students ask me is “Why do I need to study literature?” Well, that is easy for me to understand since I have been reading and teaching literature for so long. However, I understand that it is not always easy for others to see. Therefore, for our second discussion this week, we will be discussing the importance of literature. 

To prepare for this discussion, review the following three YouTube videos

The Importance of Literature:The Importance of Literature (Links to an external site.)The Importance of Literature

An introduction to the discipline of Literature:An introduction to the discipline of Literature (Links to an external site.)An introduction to the discipline of Literature

What is literature for?What is Literature for? (Links to an external site.)What is Literature for?

After, reviewing the above videos, identify your major and/or career goals. Then, discuss the following:

  • What skills are important to reading and understanding literature?
  • How will these skills help you in your career path?
  • Use specific examples to help further describe your thoughts. 

Respond to two others: Once you complete your initial post, you should respond to at least two other people. Think about the person’s career goals and their specific example. What other examples can you provide them as to how the skills learned in reading literature can apply to them professionally?