3 page review for blockchain

Find a peer reviewed article pertaining to blockchain and finance that is not one of the required readings for this course. Write a critical review of the article that is at least 3 pages long (content). Be sure to provide in-text citations when you paraphrase or directly quote from the article. Also include a reference page with an APA style citation of the article. Follow the writing requirements for this course when preparing the paper. Use the following format for the paper:

1.  Introduction, including the purpose of your paper and a preview of your paper. Be sure to also provide the article’s title and author(s)’ name(s) in the introduction of your paper.

2. Discuss the purpose and problem the article is addressing.

3. Elaborate on the content of the article.

4. Discuss the findings and conclusion(s) drawn by the article’s author.

5. Discuss the author’s point of view and assumptions. Indicate whether unsubstantiated assumptions were made and whether there is bias that exists in the article.

6. Discuss the significance of the article. Why it is important? On what do you base your assertions?

7. Conclude your paper. Summarize the important aspects of the review.

8. References

Your paper should include 8 centered and bolded headings that correspond to each of the required sections (Introduction, Article’s Purpose and Problem, Content, Article’s Findings and Conclusions, Point of View and Assumptions, Significance, Conclusion, References).

Creating Company E-mail/WIFI/Internet Use Policies

  

You have just been hired as the Security Manager of a medium-sized Financial Services company employing 250 people and have been asked to write two new security policies for this company. The first one is an e-mail policy for employees concentrating on personal use of company resources. The second policy is that of WIFI and Internet use within the company.

There are many resources available on the web so researching these topics and policies should be easy. The most difficult part of this exercise will be determining how strict or how lenient you want to make these policies for this particular company.

Project Plan

You are asked to create two separate policies on use of EMAIL and a WIFI/INTERNET USE within the company.

Be specific in your terms and conditions of use. Consider these items to be included in your policies (as applicable).

1. Overview 

2. Purpose 

3. Scope

4. Policy 

5. Policy Compliance

6. Related Standards, Policies and Processes

7. Definitions and Terms

  References:

https://resources.workable.com/email-usage-policy-template

https://www.sans.org/security-resources/policies/general/pdf/email-policy

OLTP vs OLAP

1. Compare and contrast at least three differences between OLTP and OLAP database designs.

2. Provide details, explanations, and examples.

3. 3-4 Paragraphs

4. provide website references

Week 4 Project

 Creating a BudgetIn this assignment you will create a spreadsheet and a chart to help a hypothetical couple work out their budget. You will submit a Microsoft Excel spreadsheet following the directions below to the appropriate submission folder by the due date. You will name this file W4P_LastName.xlsx.Click on the link below, Week 4 Project Tips, for some visual aids on how to tackle this week’s project.Week 4 Project TipsPlease Note:Information to help you with this project is available in the Week 4 online lectures, your textbook, as well as Microsoft Excel Help (F1). Your professor is also a great resource. If you work ahead, you can post questions about this assignment on the Questions for the Professor discussion board and still submit your assignment on time.ScenarioTom and Sally were trying to get a handle on their budget. They heard that MS Excel could help them with that.  Tom is going to school and has cut back on his hours. Sally has finished her associate’s degree and is working full time. They want to look at the last three months of their income and expenses to see where they can make changes.Part I – The SpreadsheetFirst, in an Excel Spreadsheet, create a budget to show Tom and Sally’s income, expenses, and money leftover each month (Net). Create formulas in your spreadsheet for your calculations using the following data:

  • Tom brought home $1,000 a month for January, February, and March.
  • Sally brought home $1,900, $2,000, and $1,975 respectively for those three months.
  • They paid $1,000 for rent and utilities each month.
  • They paid $88 for insurance each month.
  • They paid $60 for cell phones and $60 for Internet/TV each month.
  • They spent $600, $750 (due to a big birthday bash), and $500 on food respectively.
  • Their car payment and gas came to $225, $250, and $300 respectively.
  • Entertainment and gifts were $75, $100, and $45 respectively.
  • They paid a little extra on their credit card $150, $125, and $100 respectively.
  • They allocated $200 each month for personal grooming and health care.
  • They put $100 each month into savings.
  • Miscellaneous Expenses came to $200, $100, and $400 respectively.

A sample budget layout is included below as an example of one way to lay out a budget. Part II – The ChartOnce you have worked out the budget spreadsheet, use the tabs at the bottom of the page to open another sheet. Here you will create a chart similar to the example below using the tools you learned about in the lectures and the textbook. On the new sheet:

  1. Create a column chart to visually represent their monthly expenses. If you have a challenge getting the chart on this sheet, research how to move your chart using your reading or Help (F1). You might also try right clicking on the chart.
  2. Add a descriptive title to the chart.

Part III – Changing Values

  1. Copy everything from Sheet 1 (the budget calculations) and paste it into a new worksheet.
  2. Change values for Sally’s March income to $200 more. Let’s say that they didn’t use as much heat in March and their utilities were $75 less (you could use a formula to figure out $75 less but you don’t have to). See how the totals change automatically if you used formulas correctly. If the values did not change, check your formulas and try them again. Seek help if you can’t figure this out.
  3. Rename each of your three spreadsheets with descriptive names.

By the due date assigned, submit this budget to the Submissions Area. In the message box, share how the process of creating this went for you, including any challenges, successes, or insights. In the Comments box, briefly share your experiences with completing this project. 

Assignment

 Find a criminal case that involved Digital Forensics. 

Using WORD, write an ORIGINAL brief essay of 300 words or more describing the case and the how digital forensics were used  in the investigation. 

Safe Assign is software that verifies the originality of your work against on-line sources and other students.

Note your Safe Assign score. Continue submitting until your Safe Assign score is less than 25.

discussion api

 Name the three essential elements of a basic structured cabling network? How are they installed and what are the components that are involved with them? 

cloud computing

Compare and contrast physical, dedicated virtual, and shared virtual servers. Search the web for companies that provide each. What cost should a customer expect to pay for each?

Be sure to provide a minimal 2 pages, 3 scholarly resources and write using APA format. No plagiarism.

Room reservation site

Hello, this needs to be a very basic webpage. This is project for a school assignment and doesn’t need to be flashy or extra. Think the simpler the better. As long as it works and hits all the points listed below ill be fine. Requirements:

  • Allow users to login to the site
  • Create a database to hold login info for website, reservation info, & conference room info
  • Allow users to register to the site
  • Users should be able to reserve rooms for a specified date and time range
  • Validate user input
  • Display error messages when appropriate.
  • List conference room reservations sorted in date and start time order
  • Allow two display options: 
    • All-display all conference room reservation schedules; past and future
    • Future-display conference room reservations that are scheduled in the future only

This site is to be hand coded ONLY do not use and site builders, any plugins/widgets, I only need it to be very basic. This is not a professional site it is a school project. I have provided a link of what is considered too far and not what im asking for. 

http://mdimond.info/2550/conference/login.php

* Do not allow reservations outside of business hours or during the weekends

PT

Penetration testing is a simulated cyberattack against a computer or network that checks for exploitable vulnerabilities. Pen tests can involve attempting to breach application systems, APIs, servers, inputs, and code injection attacks to reveal vulnerabilities. In a well-written, highly-detailed research paper, discuss the following:

  • What is penetration testing
  • Testing Stages
  • Testing Methods
  • Testing, web applications and firewalls

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. 

Security Admin security Plan

1) Describe how security administration works to plan, design, implement and monitor an organization’s security plan. Submit by Friday of Week 4 11:59 PM EST in order to receive timely input.

2) Describe five effective change management processes organizations can execute as well as the advantages and disadvantages of change management when it comes to the IT department.