Prof Writing & Proposal Devel

 

Do a little bit of research on grant writing versus academic (scholarly) writing. 

Then…

1) Write a one sentence statement that describes the difference in grant writing vs. scholarly writing.

2) Research a need in your community and write a 100-300 word needs section in an academic writing style, citing your references in APA format. Copy and paste into the discussion forum. 

3) Write a quick one paragraph describing the mock dissertation topic (see list of topics below) that you will write about in this class and include your research question. Use academic writing style and standard. There is no word limit. 

 

  • Students must choose from the listed topics of their school/program:

 IT Students:

  • Enhancing Cyber Security In Healthcare -With The Help Of Machine Learning
  • Using Data Science Techniques To Enhance Data Security

Computer science course help

 

build a hardware device to do block encryption in the cipher block chaining (CBC) mode using an algorithm stronger than DES. 3DES is a good candidate. Figure 7.17 ( Attached in the file) shows two possibilities, both of which follow from the definition of CBC. Which of the two would you choose and why: 

  1. For security?
  2. For performance?

    Should be in APA format minimum 2 pages ( Excluding References & tittle page )

Paper on cloud migration

For this project, select an organization that has leveraged Cloud Computing technologies in an attempt to improve profitability or to give them a competitive advantage.  Research the organization to understand the challenges that they faced and how they intended to use Cloud Computing to overcome their challenges.  The paper should include the following sections each called out with a header. 

• Company Overview:  The section should include the company name, the industry they are in and a general overview of the organization.
• Challenges: Discuss the challenges the organization had that limited their profitability and/or competitiveness and how they planned to leverage Cloud Computing to overcome their challenges.
• Solution:  Describe the organization’s Cloud Computing implementation and the benefits they realized from the implementation.  What was the result of implementing Cloud Computing?  Did they meet their objectives for fall short?
• Conclusion:  Summarize the most important ideas from the paper and also make recommendations or how they might have achieved even greater success. 

This paper should not be a cursory overview. This is a technical class and should be a review of the technical solution. It should detail what was moved to the cloud, what cloud services were and are being consumed, and what the results were. 

Warning: If you choose Netflix, be certain to include precisely how cloud services are being used to facilitate their business. There are numerous resources that detail this, but it is vital that you understand exactly what cloud mechanisms are used to facilitate their business.  

Requirements: 

Evidence of copying from other papers or not properly citing sources could result in a score of zero. 

The paper must adhere to APA guidelines including Title and Reference pages.  There should be at least three scholarly sources listed on the reference page.  Each source should be cited in the body of the paper to give credit where due.  Per APA, the paper should use a 12-point Time New Roman font, should be double spaced throughout, and the first sentence of each paragraph should be indented .5 inches.  The body of the paper should be 3 – 5 pages in length.  The Title and Reference pages do not count towards the page count requirements.

Discussion 10

Select from the following list four (4) topics and discuss. Use only 70-words max per topic to discuss and present your answer. The discussion questions this week are from Chapter 10  (Jamsa, 2013).

Chapter 10 topics:

  • Define and describe business continuity.
  • Define and describe disaster recovery.
  • Discuss pros and cons of cloud-based backup operations.
  • Discuss threats to an IT data center infrastructure and provide cloud-based solutions to mitigate the risks.
  • Create a DRP for a company with which you are familiar.

NOTE: You are required to use at least two-peer reviewed sources (besides your textbook) to answer the above questions.  

Discussion Activity

  

 Review and summarize your ideas about the usefulness for the IT manager of a) a glossary that defines terms; b) the course readings; and c) working on a team including nominating potential teammates from the class roster.

13 Assignment

1. Using a Microsoft Word document, please review ONE of the following films  and tell how that film represents a contribution to the field of CyberLaw.

War Games (1983)Citizen Four (2014AlphaGo (2017)Google and the World Brain (2013)

2. The minimum word count shall be not less than 1000 words APA format and citations.

2 PPT slides

Compensation: Involves designing and implementing compensation, benefit, and incentive systems for employees and ensuring that compensation systems are fair and consistent.

Description of problems or challenges organizations face when performing this function

Review the attached pdf and answer the following questions

Answer to the following questions:

  1. Do you think the regression line sufficiently captures the relationship between the two variables? What might you do differently? 5 pts
  2. In the Iris slide example, how would you characterize the relationship between sepal width and sepal length? 5 pts
  3. Did you notice the use of color in the Iris slide? Was it effective? 5pts
  4. Why or why not? 5pts

Sort question

9.1 Give examples of applications of IPsec.

9.2 What services are provided by IPsec?

9.3 What parameters identify an SA and what parameters characterize the nature of a particular SA?

9.4 What is the difference between transport mode and tunnel mode?

9.5 What is a replay attack?

9.6 Why does ESP include a padding field?

9.7 What are the basic approaches to bundling SAs?

9.8 What are the roles of the Oakley key determination protocol and ISAKMP in IPsec?