Need annotated bibliography for a research topic selected. I have selected “Cyber Crime” as my research topic. I am attaching the two files. One for Selected research topic content. Second is for format in which Annotated Bibliography need to be written. Need 10 peer reviewed articles for Annotations.
Include at least one quote from each of 3 different articles
Write an essay of at least five hundred words discussing the use of encryption to protect data at rest, in motion, and in use.
Do not copy without providing proper attribution. This paper will be evaluated through SafeAssign.
Write in essay format not in outline, bulleted, numbered or other list format.
Use the five paragraph format. Each paragraph must have at least five sentences. Include 3 quotes with quotation marks and cited in-line and in a list of references. Include an interesting meaninful title.
Include at least one quote from each of 3 different articles. Use the Research Databases available from the Danforth Library, not Google. Place the words you copied (do not alter or paraphrase the words) in quotation marks and cite in-line (as all work copied from another should be handled). The quotes should be full sentences (no more, less) and should be incorporated in your discussion (they do not replace your discussion) to illustrate or emphasize your ideas.
Cite your sources in a clickable reference list at the end. Do not copy without providing proper attribution (quotation marks and in-line citations).
It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your submission Do not use spinbot or other word replacement software. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about.
Week 2 IT
Find a recent article that relates to this week’s topic and post a summary of that article and how it relates to this week’s lesson.
Post your reply by Wednesday at midnight. Your response should be at least 200 words and appropriately cite your resources.
Respond to two of your classmates by Sunday at midnight. Your responses should be at least 100 words and should be substantive. You should offer additional resources, insight, or other helpful feedback. A simple “I like your post” will result in a 0.
You will not be able to see other posts until you make your first post.
Not more than 350 words total. Respond to at least two other students (150 words each peer)!!
2. Two (2) paragraphs (350 Words total) discussion response to main DQ questions. In addition, respond with two (2) students/Peers to Peer (identify peers) or two classmates. The responses should 150 words each and must focus on the discussion topic above. Examine related issues, ask questions, provide hypothesis and/or situation(s). A peer response may not be to a peer already responded to more than twice.
topic- Should we allow facial recognition at sporting events? What about shopping malls?
Journal Analysis
DEFINITION: a brief definition of the key term followed by the APA reference for the term; this does not count in the word requirement.
SUMMARY: Summarize the article in your own words- this should be in the 150-200 word range. Be sure to note the article’s author, note their credentials and why we should put any weight behind his/her opinions, research or findings regarding the key term.
ANALYSIS: Using 300-350 words, write a brief analysis, in your own words of how the article relates to the selected chapter Key Term. An analysis is not rehashing what was already stated in the article, but the opportunity for you to add value by sharing your experiences, thoughts and opinions. This is the most important part of the assignment.
REFERENCES: All references must be listed at the bottom of the submission–in APA format and only use journal articles
Portfolio Assignment
Portfolio AssignmentAttached Files:
disaster-recovery-plan template.docx disaster-recovery-plan template.docx – Alternative Formats (35.447 KB)
Create a Disaster Recovery Plan for either the organization they work for or one they wish to work for in the future. The plan will follow the template/example provided.
Should request prior authorization of company to be addressed to ensure that all students are working on unique companies.
**Even though this is a technical document, for academic purposes, all sources should be cited and referenced.
Portfolio assignment will be due the end of Week 15.
***Yout may modify some of the sections per the company they have selected but all students will need to complete a DR Plan for the Portfolio Requirement.
****SafeAssign should be turned on and reviewed since it will flag a lot of the common elements but we want to make sure the students are writing the content from scratch.
Apache Hadoop Pic assignment3
Do online research and find out one case study where Apache Pig was used to solve a particular problem.
Expecting 4 page write-up including diagrams. Please provide as much technical details as possible about solution through Apache Pig.
Must:
1)Atleast 2 Technical diagrams to explain the solution. own diagrams please, not from internet.
2) Maximum one page for business problem and 3 pages of technical solution.
3) No plagiarism.
Practical Connection Assignment
Assignment:
Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.
Requirements:
- Provide a 500 word (or 2 pages double spaced) minimum reflection.
- Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.
- Share a personal connection that identifies specific knowledge and theories from this course.
- Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment.
- You should not, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.
- Any use of outside sources, including your own prior work, will result in a zero on the activity and a report being filed with Academic Affairs regarding plagiarism (even if self-plagiarism).
Physical Security Control
Some organizations prohibit workers from bringing certain kinds of devices into the workplace, such as cameras, cell phones, and USB drives. Some businesses require employees to use clear or see-through backpacks when carrying personal items. What other devices might not be allowed in certain facilities, and why would they be restricted? Assignment should consist of 2-3 paragraphs.
week2
2 different assignments
dq
DQ question