Computers Pro 1

Make your dream computers 

 

Assume that cost is not a problem, create your dream computer. You should include the following:

  1. Think about the hardware and software you prefer to use.
    • Write a list of the parts for your dream computer system for each category specified below. You may include pictures.
  2. Input devices (include internal and external devices) – make sure to include a model name and number. For your reference, the model name and number can be found somewhere on the device.
  3. Output devices (include internal and external devices) – make sure to include a model name and number.
  4. Storage devices (include internal and external devices, and how much data each can hold) – For your reference, you may open Windows Explorer on your current computer and right click on a drive name to find relevant information.
  5. Amount of RAM – For your reference, you may open System Properties in the Windows Control Panel.
  6. Type and speed of CPU – For your reference, you may open System Properties in the Windows Control Panel to find relevant information.
  7. Ports (number and type) – Look for jacks into which a connector can be plugged on the front, back, and sides of the machine.
  8. Select an operating system as well as the application programs that you would like to install on this dream computer. Please include the brand and the version of the operating system and at least three application programs.
  9. Indicate how you would use the computer once it is ready.

You have to include the following:

 Hardware components:  1) Input devices 2) Output devices 3) Storage devices 4) Amount of RAM 5) Type and speed of CPU 6) Ports and additional hardware specifications 

Operating System and the application programs:

1) brand and version of operating system 2) at least three application programs 

Use of the computer: Explanation of how you would use the dream computer 

Practical Connection Assignment on physical security

 Prepare and submit a one page, double-spaced, APA style paper explaining how you do or could use the ideas we are learning in our physical security course in your current or upcoming career.  Be sure to cite any resources used for the paper in APA format.  

Business Process Redesign

Research Paper: Business Process Redesign

If you have you been involved with a company doing a redesign of business processes, discuss what went right during the redesign and what went wrong from your perspective. Additionally, provide a discussion on what could have been done better to minimize the risk of failure. If you have not yet been involved with a business process redesign, research a company that has recently completed one and discuss what went wrong, what went right, and how the company could have done a better job minimizing the risk of failure.

Your paper should meet the following requirements:

• Be approximately 4-6 pages in length, not including the required cover page and reference page.

• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Topic: SEARCH ENGINE AND OPTIMIZATION

Topic:  SEARCH ENGINE AND OPTIMIZATION (research paper) need to work at least 750words 

 Chapter 3 is considered to be the CORE of the research study

you will be required to elaborate on the substance of the research to answer the research questions posited in Chapter 1.

For this assignment, submit the following

  • Chapter 3 ONLY with the subheadings that you plan to elaborate on.
  • For each subheading, add a paragraph of content 
  • Be sure to include citations throughout
  • Include the Reference page with all sources in APA format

discussion form

discuss the current methodologies used to secure wired and wireless networks via current firewall technologies and the potential exposures that currently exist

Research paper

Develop a disaster recovery plan for an organization. There are many different templates available online for you to use as reference and guidance. Your plan should cover the following sections (these sections detail the elements in a DR plan in the sequence defined by industry compliance standards ISO 27031 and ISO 24762): 

  1. Important: This section should summarize key action steps (such as where to assemble employees if forced to evacuate the building) and list key contacts with contact information for ease of authorizing and launching the plan.
  2. Introduction
  3. Roles and Responsibilities
  4. Incident Response
  5. Plan Activation
  6. Document History
  7. Procedures

Your paper should meet the following requirements:

  • Be approximately six to eight pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least four scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

connection assignment

Provide a reflection of at least 500-800 words of how the knowledge, skills, or theories of “ Data Mining ” have been applied or could be applied, in a practical manner to your current work environment(software developer). If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Requirements:

Provide an 500-800 word minimum reflection.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

Share a personal connection that identifies specific knowledge and theories from this course.

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 

Discussion 4

After reading the articles this week, please answer the following two questions.

  • What are some of the potential risks involved with cloud computing?
  • Does the research and model in this article propose a viable solution to cloud-based risk management?

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.