Web Development, PHP and ASP Data Collection and Retrieval one page paragraph

 

  1. Identify the topic for this week.
  2. Find three high-quality sources of related information on the Internet. 
  3. Read your chosen high-quality sources of related information.
  4. state your three sources of information.
  5. DESCRIBE each of the three sources of information within a few sentences providing EXAMPLES.
  6. SUMMARIZE with three things about the topic that you want to remember forever.

Research project on why organizations should implement Enterprise Risk Management (ERM), how it is effective, challenges, solutions and one real organization where ERM is applied?

 

Risk management is one of the most important components in  empowering an organization to achieve its ultimate vision. With proper  risk management culture and knowledge, team members will be “speaking”  the same language, and they will leverage common analytical abilities to  identify and mitigate potential risks as well as exploit opportunities  in a timely fashion. In order to consolidate efforts, the existence of  an integrated framework is crucial. This is why an ERM is necessary to  the fulfillment of any organization’s goals and objectives.

In your final research project for the course, your task is to write a 7-10 page paper discussing the following concepts:

  • Introduction
  • Why should an organization Implement an ERM application?
  • What are some key challenges and solutions to Implementing an ERM?
  • What is Important for an effective ERM?
  • Discuss at least one real organization that has been effective with implementing an ERM framework or /application.
  • Conclusion, final thoughts for future research
  • Recommendation

Your paper should meet the following requirements:

  • Be approximately seven to ten pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course, the course  textbook, and at least ten scholarly journal articles to support your  positions, claims, and observations, in addition to your textbook. The  UC Library is a great place to find supplemental resources.
  • Be clearly and well-written, concise, and logical, using excellent  grammar and style techniques. You are being graded in part on the  quality of your writing.

5s week 6 assignment PL

 

Answer each these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.

1. what do each of these terms refer to: copyright, patent, trademark, trade secret?

2. Why is intellectual property entitled to legal protection? 

3. Why did copyright laws become stricter and more punishing in the late 20th century?

4. What is the Fair Use doctrine?

5. Make an argument for legalizing the copying of music or software. 

6. Do I or don’t I own the books on my Kindle? If I own them, why can’t I transfer them? If I don’t own them, what is my legal right to them?

7. What was the 1984 Sony Supreme Court case about?

8. Was Napster responsible for the actions of its users?

9. Why did the court find in favor of Diamond in the Rio case? 

10. What is Digital Rights Management?

Include references. No copy paste strictly.

Data Elements

Criteria of security decision-makers use to evaluate the trustworthiness of a data center for critical data?

Assignment

Instructions

  • Add two separate HTML pages that contain: One Page includes details about your Contact Information (home vs work) and best way to contact
    Second Page includes your favorite Links with a brief information about each link
     
  • Using  headings , paragraphs, lists and images in your pages.
  • Using ONE External CSS file to format your pages
  • Your Style file should include at least TEN different rules  that applied on your HTML files.

Make sure that all your site has a valid HTML code

Disuccsion

The control of processes and threads are of deep concern by developers of all operating systems capable of handling “real or emulated” simultaneous computer activity. Threads are typically created by processes (initially invoked by the user or another process). Discuss how an operating system manages these processes and threads, how they are instantiated and discarded, how the activity is controlled, along with the respective advantages and disadvantages of both process and thread. Do not discuss MS Windows OS. Instead you may choose from Linux, UNIX, ROS, z/OS, or VM.

week 3 discussion cloud computing

In 500 words or more, consider this statement: For cloud computing to become multi-jurisdictional, it must be separated from politics.

Use at least three sources. Use the Research Databases available from the Danforth Library not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.   Stand alone quotes will not count toward the 3 required quotes.Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Write in essay format not in bulleted, numbered or other list format. 

20210112

  

Data Base Security:

1) Write an essay discussing sqlmap, an automated tool for sql injection and database takeover in 500 words or more. Why do we need an automated tool for sql injection? 

2) Write an essay of at least 500 words discussing discussing IAM in a federated cloud application. 

3) Write an essay of at least five hundred words discussing the use of encryption to protect data at rest, in motion, and in use. 

4) Write an essay of at least 500 words discussing the reasons for the two new auditing roles in Oracle 12c. Why did Oracle consider them necessary? What problems do they solve? How do they benefit companies? 

5) Write an essay of at least 500 words discussing the Safe Harbor provisions under HIPAA.  

6) Write an essay of at least 500 words discussing how database auditing and monitoring fit within a SOX compliance framework. 

7) Write an essay of at least 500 words discussing discussing how a blockchain implementation would improve data security in a military, education, or other context. 

8)   Learning About Cookies as Spyware. Research what kind of information cookies store. You might find the following  websites helpful:

www.allaboutcookies.org/

www.howstuffworks.com/cookie1.htm

Using WORD, write an ORIGINAL brief essay of 300 words or more describing cookies and the way they can invade privacy.