Paper

Please review attached document and paper needs to be written according to that. 

Research paper

Writea Research paper on threeof the following topic it relates to or complements Systems Analysis and Design(SAD):

Cloud Computing (PaaS, IaaS, SaaS, DaaS, AaaS)(how SADis different for cloud solutions)

Your research papermust be at least 4pages in length, double-spaced, 12 font, and includeat least 5references, at least 2 of which must be peer-reviewed.  Your paper must be formatted using APA guidelines.  Do not include a cover page.  Do not include an abstract.  The reference page is NOTincluded in the 4-page length requirement.

The paper shouldinclude an Introduction(to include a Hypothesis based on the research), Literature Review (Evidence) and Analysis of the Literature.  All references must be cited within the text.  Since the paper includes multiple topics, each topic must be separated and start with a HEADING.  Include a conclusion at the end of the paper to summarize the entire paper and analyze how each topic relates together as related to the use of Systems Analysis and Design.

Write a paper on following topic

 

select an organization that has leveraged Cloud Computing technologies in an attempt to improve profitability or to give them a competitive advantage. Research the organization to understand the challenges that they faced and how they intended to use Cloud Computing to overcome their challenges. The paper should include the following sections each called out with a header.

  • Company Overview: The section should include the company name, the industry they are in, and a general overview of the organization.
    • Challenges: Discuss the challenges the organization had that limited their profitability and/or competitiveness and how they planned to leverage Cloud Computing to overcome their challenges.
    • Solution: Describe the organization’s Cloud Computing implementation and the benefits they realized from the implementation. What was the result of implementing Cloud Computing? Did they meet their objectives for fall short?
    • Conclusion: Summarize the most important ideas from the paper and also make recommendations or how they might have achieved even greater success.

Requirements:

The paper must adhere to APA guidelines including Title and Reference pages. There should be at least three scholarly sources listed on the reference page. Each source should be cited in the body of the paper to give credit where due. Per APA, the paper should use a 12-point Time New Roman font, should be double spaced throughout, and the first sentence of each paragraph should be indented .5 inches.

The body of the paper should be 3 – 5 pages in length. The Title and Reference pages do not count towards the page count requirements.

PYTHON PROGRAM RELATED TO INFORMATION RETRIEVAL AND WEB SEARCH

 

 

Problem 1  Automatically collect from memphis.edu 10,000 
unique documents. The documents should be proper after converting them to txt
(>50 valid tokens after saved as text); only collect .html, .txt, and and .pdf
web files and then convert them to text - make sure you do not keep any of
the presentation tags such as html tags. You may use third party tools to
convert the original files to text. Your output should be a set of 10,000 text
files (not html, txt, or pdf docs) of at least 50 textual tokens each. You must
write your own code to collect the documents - DO NOT use an existing or third party crawlercrawler.

Store for each proper file the original URL as you will need it later
when displaying the results to the user.

Problem 2  Preprocess all the files using assignment #4( "python program that preprocesses a 
collection of documents using the recommendations given in the
Text Operations lecture. The input to the program will be a directory
containing a list of (10000 unique documents)text files collected in above program.  documents must be converted to text before using them.

Remove the following during the preprocessing:
- digits
- punctuation
- stop words (use the generic list available at ...ir-websearch/papers/english.stopwords.txt)
- urls and other html-like strings
- uppercases
- morphological variations).)" This directory should have index terms( inverted
index of a set of already preprocessed files.Use raw term frequency (tf) in the document without normalizing it. Think about saving the generated index, including the document frequency (df), in a file so that you can retrieve it later) .Save all preprocessed documents in a single directory . 

Intro + Literature review on assessing cybersecurity awareness programs (articles provided)

 Intro + Literature review on assessing cybersecurity awareness programs (articles provided) 

 

have a task that I need help completing which is an intro + LR on assessing cybersecurity awareness programs. I will be providing 5 articles and I need 5 more references from the respective tutor.

1- https://ieeexplore.ieee.org/abstract/document/8883535

2- https://www.sciencedirect.com/science/article/abs/pii/S0166361522000094

3- http://www.digitalcommons.www.na-businesspress.com/JHETP/JHETP19-4/7_RaineriEM_19_4_.pdf

4- https://link.springer.com/chapter/10.1007/978-3-030-20488-4_6

5- https://core.ac.uk/reader/215364253

Kindly contact me if there is anything I need to clarify. Thanks

Requirements: Detailed

Project part 2

Finance and Insurance (Choice of industry)

This is the second milestone of the portfolio project (which is due in week 15).For milestone 2 (due in week 6), you will develop an annotated bibliography with a minimum of 5 peer reviewed scholarly articles.
   This is FIVE PEER REVIEWED SCHOLARLY ARTICLES and not five websites, books, magazine articles, whitepapers, etc.For your reference, the portfolio project guidelines are attached here. 

2 Pages

Please see the UC library for help in formatting your bibliography.Here are some examples: 

Delimiter check C language

Write a program in C language that will take an input string from the user and use the finite state machine developed in the lecture to process the string to determine if all delimiters match correctly or not. The string delimiters are curly braces, parentheses, and square brackets. You must follow the preliminary analysis directly.

i have attached a code, might come helpful.

Research paper week 5 develop a computer and internet security policy

You have been hired as the CSO (Chief Security Officer) for an organization. Your job is to develop a computer and internet security policy for the organization that covers the following areas:

  • Computer and email acceptable use policy
  • Internet acceptable use policy
  • Password protection policy

Make sure you are sufficiently specific in addressing each area. There are plenty of security policy and guideline templates available online for you to use as a reference or for guidance. Your plan should reflect the business model and corporate culture of a specific organization that you select. 

 **** Include at least 3 scholarly references in addition to the course textbook.  

Your paper should meet the following requirements:

• Be approximately four to six pages in length, Use Calibri, 11 pt not including the required cover page and reference page. Try dividing your paper into section with section headers.

• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion. 

• Support your answers with the readings from the course and at least three scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.