Discussion

 

1) Please summarize, in your own words, a description of enterprise risk management. Why do you feel ERM is different from traditional risk management?

Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA 7)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

Information Technology Project in APA format

Requirement attached in word file. 

Sample APA format also attached. 

Make sure you will follow the APA format strictly with Table Content and point wise. 

 

1. – What is an Information Technology Project? (Max 50 words) ”Cite the source – Use APA”

2. – What is research? (Max 100 words)  “Cite the source – Use APA”

3. – Why we need to research? (Max 50 Words)  “Cite the source – Use APA”

       3.1. – Explain what we mean by Qualitative research

       3.2. – Explain what we mean by Quantitative Research

       3.3. – What is a survey?

       3.4. – List the major parts of a research paper

       3.5. – What is a Peer Review Journal?

4. – What we need to research? (Max 50 Words)  “Cite the source – Use APA”

        4.1. – Why we need to use keywords during our Lit Review?

5. – What is a research methodology? (Max 100 Words)  “Cite the source – Use APA”

6. – What is a research design? (Max 100 Words)  “Cite the source – Use APA”

7. – What we mean by project deliverable? (Max 50 Words)  “Cite the source – Use APA”

8. – Is deadline an important aspect of a project? (Max 50 Words)  “Cite the source – Use APA”

9. – What is project limitations? (Max 50 Words)  “Cite the source – Use APA”

10. – What do we mean when we say resources? (Max 100 Words)  “Cite the source – Use APA”

11. – Why we need to apply APA Basic Citation Stiles in a research proposal? (Max 100 Words).  “Cite the source – Use APA”

12. – From our Syllabus, please explain what we mean by Academics Integrity? (Max 250 Words)  “Cite the source – Use APA”

13. – What is Plagiarism? (Max 100 Words) ”Reference the Academic Integrity from the Syllabus”

14. – What is Self-Plagiarism? (Max 50 Words)   ”Reference the Academic Integrity from the Syllabus”

To complete this assignment, the following must be observed

1. – Use only Peer-reviewed Journal to research the above questions.

2. – Adhere and apply properly the Basic Citation Styles of the APA (Use as a reference the APA Manual. Sixth Editions).

3. – If you use the ideas, concepts, and words of another author, then, you need to cite the source and give credit to the author. Not citing in-text the source will be considered Plagiarism, and you will receive zero (0) for your assignment.

4. – Do not copy and paste information. (You will receive zero (0) for your Assignment).

5. – No late submission is accepted.

6. – This is an individual assignment, not a group assignment.

7. – You need to use the Sample-APA-Paper provided to submit your assignment.

8. – Use the Sample – APA – Paper provided as a guide to submit your assignment.

      8.1.- Observe the Paper Structure and Formating.

      8.2.- Make sure you observe The Title Page and Structure.

      8.3.- Your list of reference must be per APA.

CC1 – Assignment questions

Assignment 1:

Identify and define at least three Cloud Deployment Models. What are their characteristics? What are the pros and cons?

Mandatory – Refer to the attached textbook content and use it for completing assignment. The textbook content should be visible in the assignment.

Requirement:

  1. Two page minimum (cover sheet does not count). Minimum 550 words.
  2. Double Spaced and APA Format
  3. No plagiarized content please! Attach a plagiarized report.
  4. Check for spelling mistakes!
  5. $8 max. Please bid if you agree.

  

Assignment 2:

There are three common Cloud Service Models. Define one and identify at least three cons and three pros for that particular Cloud Service Model.

Mandatory – Refer to the attached textbook content and use it for completing assignment. The textbook content should be visible in the assignment.

Requirement:

  1. Minimum 350-400 words. Cover sheet does not count.
  2. Double Spaced and APA Format
  3. No plagiarized content please! Attach a plagiarized report.
  4. Check for spelling mistakes!
  5. $5 max. Please bid if you agree.

Reading material in the textbook:

 

  • Jamsa – Chapter 1
  • Erl – Section 3.1
  • Jamsa – Chapter 2
  • Erl – Sections 4.1 and 4.2
  • Jamsa, K. A. (2013). Cloud computing: SaaS, PaaS, IaaS, virtualization, business models, mobile, security and more. Burlington, MA: Jones & Bartlett Learning.
  • Erl, T., Mahmood, Z., & Puttini, R. (2014). Cloud computing: concepts, technology, & architecture. Upper Saddle River, NJ: Prentice Hall.

Discussion 4

Select from the following list four (4) topics and discuss. Use only 70-words max per topic to discuss and present your answer. The discussion questions this week are from Chapter 5  (Jamsa, 2013).

Chapter 5 topics:

  • Define and describe SSO.
  • Define and describe IDaaS.
  • Define SAML and describe its purpose.
  • Define and describe provisioning.
  • Define and describe FIDM.
  • List factors that make mobile ID management difficult.

NOTE: You are required to use at least two-peer reviewed sources (besides your textbook) to answer the above questions.  

Computer Science

What is a project, and what are its main attributes? How is a project different from what most people do in their day-to-day jobs? Discuss the importance of top management commitment and the development of standards for successful project management. Provide examples to illustrate the importance of these items based on your experience on any type of project. Discuss the unique challenges that an IT project presents.

Business Intelligence

  

Complete the following assignment in one MS word document:

Chapter 1 –discussion question #1 & exercise 15 (limit to one page of analysis for question 15)

Chapter 2 – discussion question #1 & exercises 4, 5, and 15(limit to one page of analysis for question 15)

When submitting work, be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) to support the work this week.

All work must be original (not copied from any source).

Chapter 1

Discussion 1) Survey the literature from the past six months to find one application each for DSS, BI, and analytics. Summarize the applications on one page, and submit it with the exact sources

Exercise Q) Find information about IBM Watson’s activities in the healthcare field. Write a report.

Chapter 2

Discussion 1) Discuss the difficulties in measuring the intelligence of machines.

Exercise Q4. In 2017, McKinsey & Company created a five-part video titled “Ask the AI Experts: What Advice Would You Give to Executives About AI?” View the video and summarize the advice given to the major issues discussed. (Note: This is a class project.) 

5. Watch the McKinsey & Company video (3:06 min.) on today’s drivers of AI at youtube.com/ watch?v=yv0IG1D-OdU and identify the major AI drivers. Write a report.

15. Explore the AI-related products and services of Nuance Inc. (nuance.com). Explore the Dragon voice recognition product.

Web Technologies, Use of Social Media in Business

Overview:

Congratulations! You have been hired as the IT manager at the local hospital; the job

you applied for in the previous unit. Part of your 60-90-day plan is preparing a presentation for the executive board.

Instructions:

Your IT director asked you to prepare a 5-6-page PowerPoint presentation where you

explain the following concepts:

1) The functionality of various web technologies: HTML, XML, XHTML, CSS, etc.

And how they could be used to improve the Hospital’s website?

2) Your hospital is currently ranked as second in your region, how can better use of

social media as part of the hospital’s web strategies improve its position?

3) Part of the low-ranking came from a breach on the hospital’s website.

a. How can we remediate this from happening again?

b. Why are we not safe and immune from online annoyances such as spam and adware?

c. How can we further secure our system from malware?

Requirements:

• This assignment is a PowerPoint presentation consisting of 5-6 slides, using APA

formatting and citations.

• Include two references.

Be sure to read the criteria by which your work will be evaluated before you write

and again after you write.

Security breach

Review a Security Breach which occurred over the past year and present a research paper providing the below point!! 

Describe the incident

Provide Specifics about the incident.

What data or information was impacted?

Describe threat modeling techniques which could have assisted in the mitigation of breach.

How can the organization be better postured for future attacks?

This assignment should be in APA format and have to include references and 650 words

Access control Assignment 11

Discuss the best practices for implementing an access control system.

Length, 2 – 3 pages.

All papers are written in APA formatting, include title and reference pages (not counted). Must use at least two references and citations.

Please reference the rubric for grading.

Discussion (Chapter 6):

 List and briefly describe the nine-step process in con-ducting a neural network project.

Note: The first post should be made by Wednesday 11:59 p.m., EST. I am looking for active engagement in the discussion. Please engage early and often.

Your response should be 100-300 words. Respond to two postings provided by your classmates.