Computation

 

Conteste en una presentación de PowerPoint las siguientes preguntas:

  • ¿Qué es una base de datos?
  • ¿Para qué sirve una base de datos?
  • Provea ejemplos de bases de datos que usted conoce (1-3 ejemplos solamente)
  • Las bases de datos en Access se componen de cuales cuatro elementos fundamentales.Mencione y explique cada elemento.

Su trabajo debe de contar con portada y referencias.

Utilice animaciones, transiciones, imágenes y otras utilidades para preparar una presentación de aspecto profesional e informativa. Utilice el área de las notas para ampliar los detalles del tema.

Su presentación debe de contar con 9 a 10 diapositivas.

Physical Security: Laptop theft – a case study on effectiveness of security mechanisms in open organizations

http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.154.8259&rep=rep1&type=pdf

https://www.cisa.gov/sites/default/files/publications/ISC-Facility-Security-Plan-Guide-2015-508.pdf

Submit a research paper and a presentation 

Papers are typically 10 pages (content) length  

Use the following case study of two Universities and their attempts to protect against Laptop theft.

Reference all sources used.

No Plagiarism 

Discuss and identify leader traits and attributes that are most beneficial in implementing the best decisions in an organization.

 

After completing the reading this week, we reflect on a few key concepts this week:

  1. Discuss and identify leader traits and attributes that are most beneficial in implementing the best decisions in an organization. 
  2. Explain the differences in charismatic and transformational leadership and how both leadership styles impact organizational effectiveness. Please note how these leadership styles affect implementing new innovative technologies.
  3. Review table 8.1 in the reading this week, note the work characteristics and the traditional versus high-performance focus, note which focus is best for strategic decisions and which is best for operational decisions. Please explain.

Please be sure to answer all the questions above in the initial post.

Please ensure the initial post and two response posts are substantive. Substantive posts will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Expand on the topic, by adding additional thoughtful information
  • Answer a question posted by another student in detail
  • Share an applicable personal experience
  • Provide an outside source
  • Make an argument

At least one scholarly (peer-reviewed) resource should be used in the initial discussion thread. Please ensure to use information from your readings and other sources from the UC Library. Use APA references and in-text citations.

Business Intellegence

 Discussion: There have been many books and opinion pieces written about the impact of AI on jobs and ideas for societal responses to address the issues. Two ideas were mentioned in the chapter – UBI and SIS. What are the pros and cons of these ideas? How would these be implemented?

Exercise: 

1. Identify applications other than those discussed in this chapter where Pepper is being used for commercial and personal purposes. 

2. Go through specifications of MAARS at https://www. qinetiq-na.com/wp-content/uploads/brochure_ maars.pdf. What are the functions of MAARS? 

3. Conduct online research to find at least one new robotics application in agriculture. Prepare a brief summary of your research: the problem addressed, technology summary results achieved if any, and lessons learned. 

4. Conduct online research to find at least one new robotics application in healthcare. Prepare a brief summary of your research: the problem addressed, technology summary, results achieved if any, and lessons learned. 

5. Conduct online research to find at least one new robotics application in customer service. Prepare a brief summary of your research: the problem addressed, technology summary, results achieved if any, and lessons learned. 

6. Conduct online research to find at least one new robotics application in an industry of your choice. Prepare a brief summary of your research: the problem addressed, technology summary, results achieved if any, and lessons learned. 

7. Conduct research to identify the most recent developments in self-driving cars. 

Questions:
1. Based upon the current state of the art of robotics applications, which industries are most likely to embrace robotics? Why? 

2. Watch the following two videos: https://www. youtube.com/watch?v=GHc63Xgc0-8 and https:// www.youtube.com/watch?v=ggN8wCWSIx4 for a different view on the impact of AI on future jobs. What are your takeaways from these videos? What is the more likely scenario in your view? How can you prepare for the day when humans indeed may not need to apply for many jobs? 

Discussion

Discussion: Encryption

Learning Objectives and Outcomes
  • Determine the best form of encryption for a given scenario.
Assignment Requirements

A human resources manager stores a spreadsheet with sensitive personal information on her local workstation. The spreadsheet is the only file with sensitive data, and the name of the spreadsheet does not change.

As a security specialist, you must choose the best form of encryption to protect the spreadsheet. Your choices are:

  • BitLocker
  • BitLocker To Go
  • File encryption via Encrypting File System (EFS)
  • Folder encryption via EFS

Answer the following question(s):

  1. Which form of encryption would ensure the spreadsheet is always stored on the disk in encrypted format? More than one form may be correct.

Fully address the question(s) in this discussion; provide valid rationale for your choices, where applicable; and respond to at least two other students’ views.

Required Resources
  • Course textbook
  • Internet access
Submission Requirements
  • Format: Microsoft Word (or compatible)
  • Font: Arial, size 12, double-space
  • APA Citation Style 
  • Length: 1/2 to 1 page
Self-Assessment Checklist
  • I fully addressed the question(s) in the discussion instructions.
  • I included justification or rationale for my choices, where applicable.
  • I responded to at least two other students’ views.
  • I followed the submission guidelines.

homework computer

 
File submission: Word processor document creation     Objective of the activity  By creating the Teaching Styles and Strategies document, students will develop the skills that will enable them to use the word processor efficiently.  Instructions  The academic goal of this assignment is to apply the skills learned in the previous module.  What are we going to do?  After having compiled, analyzed and paraphrased the information, you will deliver one (1) document created with a word processor, following the outline for the written work. Preview the document. The work must have:  Cover page Table of Contents Introduction – write l starting from the guiding question o Why is it important to know our learning preferences? Learning styles Active learning Reflective learning Sensing learners Intuitive learner Visual learner Verbal learner Sequential learner Global learner Results 

 
Conclusion – use the guiding questions to write your conclusion. What did you know about the subject? What did you know and was able to validate? How did you feel during the work process? Knowing your preferences for what or how will it be useful to you in the future? References: R.M. Felder and B.A. Soloman, Learning styles and strategies. A four-page handout that briefly explains the learning style preferences defined by the Felder-Silverman model.  Index Include keywords from the material. Appendix – You must create the appendix divider page. Images must be in the appendix area. Each image on one page. Appendices must be identified. Appendix A – __________ Appendix B – __________ Appendix C – __________ Appendix C – __________ 

 
How are we going to do the job?  Study the resources in the unit. Access the resource: R.M. Felder and B.A. Soloman, Learning styles and strategies. (Links to an external site.) A four-page handout that briefly explains the learning style preferences defined by the Felder-Silverman model. Take the survey (item # 4) available at: https://www.webtools.ncsu.edu/learningstyles/ (Links to an external site.)  Save the information so you can reference it when writing your paper. In a word processor document, prepare a summary of the exposed material in Spanish. It is important that when summarizing you use paraphrasing techniques when writing your work. Structure your work so that it complies with the parts to be developed. See the Outline documentPreview the document for written work. Perform the required functions and apply the required attributes. Save the document with the name Learning Styles_your name. For example, Learning Styles_Maria Olivero Upload your work to the platform. It will be scored only once. If you have any doubts about how to get the job done, go over the material in the textbook, the tutorials and the simulations given. If you cannot find how to do the process, post your question in the Questions and Questions forum. 

  
Deliverable  The activity is individual. The work must be delivered on time, without spelling or grammatical errors. The works will be submitted to the tool to detect similarity of content (now Urkund). You must include references in APA format, three years old or less. Each student must submit a document written in a word processor. The document must have the following characteristics:  The font must be Times New Roman, size 12, black. The margin must be 1 ”on all sides. Paragraphs must be indented. Titles must be centralized horizontally in “bold”. The content must be horizontally aligned in “justify”. The cover and divider page of the appendix must be aligned horizontally and vertically at “center”. 

 


research paper main

 our paper requires that you use at least 10 references – five of them from peer-reviewed scholarly journals(information governance). Develop a full annotated outline of the paper including sections in which each resource will be used. Note that you can find many examples of how to build an annotated bibliography.  Your Bibliography should be about 3 double-spaced pages in length as a guideline. 

Discussion

Operations Security

IT Policy Compliance and Compliance Technologies

Discuss tracking, monitoring, and reporting of various compliance systems and explain the relevance of such compliance systems. 

testing

 1 page

  1. Search the internet for best practices on testing new technologies (focus on ensuring that the technology works as it is needed). This needs to include current theories, models, and techniques in the analysis, design, implementation, and testing of secure network infrastructures across LANs and WANs (since all solutions depend on to some extent the network).
  2. From your research, select the 3 tips that you feel are the most likely to help and your reasons why.
  3. Include in your report the ways that you would keep the project on schedule.