Research paper for Advanced operating system and PPT

Need 10-12 pages research paper and 12 -15 slides of PPT

Instructions:

Research paper:

• The research paper must be between 10-12 pages supported by evidence (citations from peer-reviewed sources). There is a reason for page limits. The page limits under and over will result in grade point deduction.

• A minimum of four (4) peer-reviewed journal citations are required.

• No references should be more than 5 years old.

PPT:

·       Your PPT should reflect a summary of your Individual Research Report.

·       You should have 12-15 slides.

·       The design elements and content will be judged equally.

Conflict Managment Dis 1

 As a junior congress person you have been asked to help promote a bill to allow casino gambling in your state. There is much opposition to this bill. Using distributive bargaining, discuss the pros and cons which might arise toward the passing or defeating of this bill. 

Need Minimim 400 words Excluding references.

Research Paper

 There are fewer better ways to help understand these complex guidelines, from a practical perspective, than to learn about how “real world” stakeholders have dealt with them. Research and discuss an actual scenario in which a PCI stakeholder has dealt with, or failed to comply with, PCI DSS. Tell us some stories. Your subjects is: (2) a small, local business (such as a barbershop, bookstore, or restaurant). 

Cloud computing

THREE-TIER WEB APPLICATION ARCHITECTURE

Write a paper discussing a standard three-tier web application architecture (web, application, and storage/database).

Apply APA Edition 6 formatting.

Use at least three properly documented references (do NOT use wikis).

Correctly cite your references using APA Edition 6 formatting.

Your paper should be at least 500 words in length using good grammar.

Use complete sentences and paragraphs. Do not use bullets.

Be sure and use a spelling and grammar checker.

There is a APA Word template with default font and spacing.

Your paper will checked by SafeAssign for originality. With the exception of quoted material, all writing should be your own.

Enterprise Risk Management

 

Annotated Bibliography – ERM

This assignment will be one of several throughout your PhD program that we use to help you prepare for the dissertation process. One of the core competencies necessary to succeed in a doctoral program is the ability to identify other research that pertains to your own. This means you’ll have to identify similar research, read the papers, and assimilate prior work into your own research. An annotated bibliography helps you develop and hone these research skills.

This assignment is listed on the syllabus as “Mid-term research paper” and is worth 20% of your grade. Your paper will be an annotated bibliography, specifically focusing on implementing Enterprise Risk Management (ERM). Choose a “theme” (i.e. ERM in higher education, manufacturing., etc.), and make sure that all your resources relate to your theme. 

You paper must be in correct APA format, use correct grammar, and will need to include at least seven (7) resources, ALL of which must:

1) Be current. Published within the last few years.

2) Be peer-reviewed.

3) Relate directly to Defense in depth in the context of protecting National Infrastructure.

Remember that an annotation is not the same as an abstract. Abstracts are descriptive. Your annotations are to be evaluative and critical. Give me enough information for me to decide if I’m interested enough to read the paper, and also how you perceive the paper. Don’t go skimpy on these annotations, but DO NOT write too much here. Quality is far more important that quantity. This exercise is for each of you to demonstrate that you can identify, categorize, and digest multiple research papers. 

Every resource you choose must be peer reviewed. That means the paper must have undergone a formal peer review before being published in a journal or presented at a conference. You must ensure that your resources have undergone rigorous reviews. In most cases, you can find out the review process for a conference or journal by visiting the appropriate web site. Do not simply assume that a resource is peer reviewed – check it out. 

Here are a few URLs with additional information: (I strongly suggest that you look at these. Really.)

https://sites.umuc.edu/library/libhow/bibliography_apa.cfm

https://www.bethel.edu/library/research/apa-annobib-sixth.pdf

http://libguides.enc.edu/writing_basics/annotatedbib/apa    <<<< Check out the "Rules! rules! rules!" section

http://guides.library.cornell.edu/annotatedbibliography

https://owl.english.purdue.edu/owl/resource/614/03/

Security Assessment

In a 200- to 250-word essay, explain the difference between vulnerability scanning and penetration testing. Recommend to your organization methods to eliminate the vulnerabilities.

Critical Analysis Paper-2 on Journal

 Textbook: Tapscott, D., &Tapscott, A. (2016). Blockchain revolution: how the technology behind bitcoin is changing money, business, and the world. Penguin.  

Follow the attachment  given below for the journal and complete the following questions 

Assignment:

 Most critical analysis papers begin with a short summary of the work and then dive into the argument. Since most of these paper assignments are short, it is important to be concise in all parts of your analysis. Please respond to the questions below with at least one paragraph for each question. Please use your own words. 

  1. What is the overall aim of the research being presented?
  2. Are the aims of the research and the results of the data clearly and concisely stated in the abstract? Provide a summary of the abstract.
  3. Does the introduction provide sufficient background information to enable readers to better understand the problem being identified by the Authors? Provide one example.
  4. Have the Authors provided sufficient evidence for the claims they are making? Provide some examples.
  5. Provide at least 3 examples from the literature review section.
  6. What was the methodology used in this journal? Be specific.
  7. The conclusions should match the data being presented. Provide some examples presented in the paper that support the conclusion.
  8. Discuss the implications of this research.
  9. What was the main contribution of this research to the body of knowledge?
  10. What additions or research questions would you add to this journal?

Write three pages document. No need APA format and citations

information system

Your assignment is to download (if necesary) and experiment with two different Web HTML Editors.  Search YouTube for any available 

tutorials on how to use the software.  For each editor, create a page with a table, image, lists, and cascading style sheet.   

Include the name of the editor in the comments in the HTML file.  Feel free to also include any other features you find interesting.  

Create a short write up containing information about your reaction to using each program.  Did  you like it?  What features did you like?  

What features did you not like or felt could have been better?  If you prefer, you can include this information inside the pages 

(display it when the file is opened with a browser) that you create using the programs.  Do this process for two different HTML Web Editor programs.   

Do not submit the exact same code for each editor.  The HTML file for each editor must be different.  Submit the pages you created along with the write ups 

(If separate documents) to the correct submission box.  Be sure to submit this assignment in a zip file.

mad discussion

 The readings this week expand on investigation and of digital forensic analysis and investigations. Organizations, especially those in the public, health and educational areas are bound by legal and statutory requirements to protect data and private information, therefore digital forensics analysis will be very beneficial when security breaches do occur. Using this weeks readings and your own research, discuss digital forensics and how it could be used in a risk management program 

Project management

Find any example of a real project with a real project manager. Feel free to use projects in the media (such as the Olympics, television shows, or movies) or a project from your work, if applicable.

Write a two page paper describing the project in terms of its scope, time, and cost goals.

Also describe other impacts on a project, such as quality, resources, and risks.

Discuss what went right and wrong on the project and the role of the project manager and sponsor.

Be sure to describe whether the project was a success, and why.

Include at least one reference and cite it on the last page. 500 words