Case Study

–   Read the below article and complete the questions at the end of the case study. 

https://www.scu.edu/leadership-ethics/resources/the-ceo-of-starbucks-and-the-practice-of-ethical-leadership/

– The answers should be a minimum of two pages with two references attached for each. There should be no plagiarism- attach a plagiarism report with 0% similarity index.   

Research Paper

 Topic: Computer Networking and Machine Learning

Format: APA, 15 pages (excluding tables of content, charts, pictures)

Rules: please find below titles, format  and explanation on how a research paper is expected to be done. For extra reference I will add my college, research paper guide, which has detailed explanation of how the work is expected with examples.

 

The research paper must be supported by evidence (citations from peer-reviewed sources). 

A minimum of five (5) peer-reviewed journal citations are required. 

Formatting should be double-spaced, one-inch boarders, no extra space for headings, no extra white space, no more than two levels of heading, page numbers, front and back matter).

A minimum of 15 full pages is required (no extra whitespace, does not include appendices)

Required Table of Contents. Images and charts are not considered in 15 page-paper.

Required titles:

1. Abstract

2. Literature review- 5 peer-reviewed literature sources 

Description of the research including who the target population was (if available)

Research Method used to conduct the research (describe what the researcher(s) did to gather data for the research)

a.      Was survey distributed? How many questions? How many participants

b.      Was it a focus group? Was it a case study

c.      Be explicit

  • 3. Problem statement
  • 4. Relevance and significance  
  • 5. Research questions- Add no more than 2 research questions as they relate to your research focus
  • 6. Barriers and Issues

7. Approach/Methodology

8. Findings, Analysis, and Summary of Results

The following topics are intended to serve as a guide: 

  Data analysis

  Findings & discussion 

 Analysis 

 Summary of results & discussion

9. Conclusions

10. References

GO16_PP_CH01_GRADER_1G_HW – Northern Lights 1.5

  

GO16_PP_CH01_GRADER_1G_HW – Northern Lights 1.5

     

Start   PowerPoint. Download and open the file named go_p01_grader_h3.pptx.

 

Replace all occurrences of the   text North with Northern and then change layout of Slide   1 to Title Slide.

 

Apply the Ion Boardroom theme   with the default purple variant to the presentation.

 

Change the Slide Size to   Widescreen (16:9).

 

With Slide 1 displayed, open the Reuse Slides pane, and then from   your downloaded grader files browse for and display the presentation p01G_Slides.pptx. If necessary, clear   the Keep source formatting check box, and then insert the last two slides.   Note, Mac users, after importing the slides, delete Slides 2-4. There should   be four slides total in the presentation.

 

Display Slide 4. Click at the end of the first bullet point after the   word time. Press SPACEBAR. Add the   words for viewing and then in the same slide, increase the list level of the second   and third bullet points.

 

 

With Slide 4 still displayed,   select the title and change the Font Size to 32. In the Notes pane, type the   following notes: The lights reach their peak in September and March. Be sure to type the period at   the end of the sentence.

 

 

Display Slide 2. Select the   paragraph of text, and then change the Font Color to Purple, Accent 6,   Lighter 60%-in the last column, the third color. Change the Font Size to 16,   and then apply Bold.

 

In the same paragraph, change the Line Spacing to 1.5, and then   center the paragraph and the slide title.

 

With Slide 2 still displayed, format the picture with the Soft Edge   Rectangle picture style and the Marker artistic effect.

 

Display Slide 3. In the content placeholder on the right, from your   downloaded grader files, insert the picture p01G_Lights.jpg. Apply the Reflected Rounded Rectangle picture   style.

 

Move Slide 4 between Slides 2   and 3.

 

 

Display Slide 4. Insert a New   Slide with the Section Header layout. In the title placeholder type Visit   Fairbanks and View the Northern Lights! In the text placeholder type With Kodiak   West Travel.

 

Apply the Uncover transition and   change the Effect Options to From Top. Change the Timing by increasing the   Duration to 01.25. Apply the transition effect to all of the slides.

 

Insert a Header & Footer on   the Notes and Handouts. Include the Date and time updated automatically, the   Page number, a Footer with the text Northern Lights Presentation and then apply to all the   slides.

 

Display the Document Properties.   Type northern   lights, Fairbanks   as the Tags.
  Note, Mac users will enter these as Keywords

 

Save and close the document.   Exit PowerPoint. Submit the file as directed.

 

Discussion 300 words

 

Use the Web to search for methods to prevent XSS attacks.

Write a brief description of more than one method.

Use your own words and supply references.

Creating a web service

New WCF service application and Discoverable service URLS. I need the code and screenshots of code in word document. Do not need a research paper to be written on the topic. I need the files provided to be used in a code and provide code & screenshots

SOCIAL MEDIA POLICY AND EXECUTIVE SUMMARY You have been hired as an HR Specialist the company has asked you to draft a Social Media policy for the employees hi you need to draft a social media policy for the employees. write an executive summary and

 SOCIAL MEDIA POLICY AND EXECUTIVE SUMMARY 
You have been hired as an HR Specialist the company has asked you to draft a Social Media policy for the employees

hi

you need to draft a social media policy for the employees. write an executive summary

and you need to consider these key questions(do not answer) before you draft the policy

A perfect social networking policy to cover these new media could be drafted using only a few words: “Be mature, be ethical, and think before you type.” Ultimately, you may decide that such brevity is what you want for your business. For the sake of completeness, though, here are the seven most important questions to ask yourself when drafting a social networking policy.

  1. How far do you want to reach? Social networking presents two concerns for employers—how employees are spending their time at work, and how employees are portraying your company online when they are not at work. Any social networking policy must address both types of online use.
  2. Do you want to permit social networking at work, at all? It is not realistic to ban all social networking at work. For one thing, you will lose the benefit of business-related networking. Further, a blanket ban is also hard to monitor and enforce.
  3. If you prohibit social networking, how will you monitor it? Turning off Internet access, installing software to block certain sites or monitoring employees’ use and disciplining of offenders are all possibilities, depending on how aggressive you want to be and how much time you want to spend watching what your employees do online.
  4. If you permit employees to social network at work, do you want to limit it to work-related conduct, or permit limited personal use? How you answer this question depends on how you balance productivity versus marketing return.
  5. Do you want employees to identify with your business when networking online? Employees should be made aware that if they post as an employee of your company, the company will hold them responsible for any negative portrayals. Or, you could simply require that employees not affiliate with your business and lose the networking and marketing potential Web 2.0 offers
  6. How do you define “appropriate business behavior?” Employees need to understand that what they post online is public, and they have no privacy rights in what they put out for the world to see. Anything in cyberspace can be used as grounds to discipline an employee, no matter whether the employee wrote it from work or outside of work.
  7. How will social networking intersect with your broader harassment, technology and confidentiality policies? Employment policies do not work in a vacuum. Employees’ online presence—depending on what they are posting—can violate any number of other corporate policies. Drafting a social networking policy is an excellent opportunity to revisit, update and fine-tune other policies

Below are some ideas about he policy in the video https://youtu.be/et9nWEfEZcA
do not use any reference… just make a policy and write an executive summary 

Milestone

 subject ISOL-535-   CRYPTOGRAPHY

In the second milestone writing assignment, you will analyze asymmetric and symmetric encryption.  Evaluate the differences between the two of them and which one that you would determine is the most secure.  The writing assignment requires a minimum of two written pages to evaluate the history.  You must use a minimum of three scholarly articles to complete the assignment.  The assignment must be properly APA formatted with a separate title and reference page.