Questions

 1. Cloud Computing usage for Ecommerce developer (500 words)

In a Word document, write a paper describing how the knowledge, skills, or theories of Cloud Computing have been applied or could be applied, in a practical manner to your current work environment. If you are not currently working, share how you could leverage the knowledge gained working as an IT consultant working for an organization of your choice.

Requirements

  • The reflection paper should be 2pages in length 
  • Page count does not include title and reference pages
  • The paper should include a title page and reference page
  • Correct use of APA 7th edition guidelines is required
  • Save as a Word document (not Pdf)

2.  4 pages (Please Find Attached For this Question)

This week’s journal article focus on the how positive team culture can correct the impact of lagging leadership creativity. Additionally, we discussed how digital transformation leaders in regard to artificial intelligence (AI).  After reviewing the reading, please answer the following questions:

  1. What is your definition of AI?  Please explain.
  2. What is your opinion of AI, is the technology currently available? Why or why not?
  3. Please note at least four AI technologies, explain if they are truly AI or something else.  Thoroughly explain your answer.
  4. How is AI perceived as different in various industries and locations? Please explain

Find a process within an business that you feel can help that business gain a competitive advantage

 

Create a word document that contains at least the following:

Start by introducing the project:
* Explain the process you will be reviewing and want to modify.
* Explain the business and industry where this process exists.
* Give an overview of the current process and how it works.

Based on the materials within this course, explain a new technology that should be deployed.
* Be very specific.  Note the exact technology as well as the specific application of that technology (i.e. technology might be Smart Automation – while the specific application might be light dimming technology).
* Identify the pros and cons of the new technology. 
* Identify how the new technology would impact the business/industry and the process that was selected to be modified.

What are the various factors the business should consider before deploying the new technology.
* Are their cost considerations. 
* What other project are impacted or might impact the deployment. 
* What are 5 to 10 things the business should consider before implementing and explain how important it would be to use the new technology (i.e. use some type of scale like ‘Critical’ vs ‘High Priority’ vs … vs ‘Good to have’).

The project must be at least 3 pages in length, double-spaced, 12-font.  This total length does not include the APA approved cover page and the reference page(s).  There must be at least 3 APA approved references, with citations, to support your work.

CA

 

There are a variety of ways that a cyber-attack can cause economic damage. In many cases, attackers try to “penetrate” systems in order to steal technology or other sensitive information. When do you think an attack can be classified as cyber terrorism?

  • Ask an interesting, thoughtful question pertaining to the topic
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Make an argument concerning the topic.

Portfolio Project

 

Please submit a draft of your final project for review. Final submissions are due during week 15 (from the week 15 content folder)

Final Project Prompt: 

The final portfolio project is a three- part activity. You will respond to three separate prompts but prepare your paper as one research paper. Be sure to include at least one UC library source per prompt, in addition to your textbook (which means you’ll have at least 4 sources cited). 

Start your paper with an introductory paragraph.

Prompt 1 “Data Warehouse Architecture” (2-3 pages): Explain the major components of a data warehouse architecture, including the various forms of data transformations needed to prepare data for a data warehouse. Also, describe in your own words current key trends in data warehousing. 

Prompt 2 “Big Data” (1-2 pages): Describe your understanding of big data and give an example of how you’ve seen big data used either personally or professionally. In your view, what demands is big data placing on organizations and data management technology? 

Prompt 3 “Green Computing” (1-2 pages):  One of our topics in Chapter 13 surrounds IT Green Computing. The need for green computing is becoming more obvious considering the amount of power needed to drive our computers, servers, routers, switches, and data centers. Discuss ways in which organizations can make their data centers “green”. In your discussion, find an example of an organization that has already implemented IT green computing strategies successfully. Discuss that organization and share your link. You can find examples in the UC Library.

Conclude your paper with a detailed conclusion section. 

The paper needs to be approximately 5-8 pages long, including both a title page and a references page (for a total of 7-10 pages). Be sure to use proper APA formatting and citations to avoid plagiarism.

Your paper should meet the following requirements:

• Be approximately 5-8 pages in length, not including the required cover page and reference page.

• Follow APA6 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course, the course textbook, and at least three scholarly journal articles from the UC library to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Discussion

Subject:  InfoTech Import in Strat Plan 

 

Why is it important for business strategy to drive organizational strategy and IS strategy? What might happen if the business strategy was not the driver?

 At least one scholarly source should be used in the initial discussion thread. Use proper APA citations and references in your post. 

Paper – Cloud computing

For this paper, select an organization that has leveraged Cloud Computing technologies to improve profitability or to give them a competitive advantage.  Research the organization to understand the challenges that they faced and how they intended to use Cloud Computing to overcome their challenges.  The paper should include the following sections each called out with a header.

  • Company Overview:  The section should include the company name, the industry they are in and a general overview of the organization.
  • Challenges: Discuss the challenges the organization had that limited their profitability and/or competitiveness and how they planned to leverage Cloud Computing to overcome their challenges.
  • Solution:  Describe the organization’s Cloud Computing implementation and the benefits they realized from the implementation.  What was the result of implementing Cloud Computing?  Did they meet their objectives for fall short?
  • Conclusion:  Summarize the most important ideas from the paper and make recommendations or how they might have achieved even greater success.

  • The paper must adhere to APA guidelines including Title, APA level 1, level 2 headings and Reference pages.
  • There should be at least three scholarly sources listed on the reference page. 
  • Each source should be cited in the body of the paper to give credit where due. 
  • Per APA, the paper should use a 12-point Time New Roman font, should be double spaced throughout, and the first sentence of each paragraph should be indented .5 inches.
  • The body of the paper should be 5 pages in length. 
  • The Title and Reference pages do not count towards the page count requirements.

Practical Connection Assignment (Global Market and Blockchain Technology)

 Course: Global Market and Blockchain Technology

Practical Connection Assignment

At UC, it is a priority that students are provided with strong educational programs and courses that allow them to be servant-leaders in their disciplines and communities, linking research with practice and knowledge with ethical decision-making. This assignment is a written assignment where students will demonstrate how this course research has connected and put into practice within their own career.

Assignment: 
Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Requirements:

  • Provide a 500 word (or 2 pages double spaced) minimum reflection.
  • Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.
  • Share a personal connection that identifies specific knowledge and theories from this course.
  • Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 
  • You should NOT, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace. 

C++ / Python

 

Check the slides “OS Security II,” pg. 4-8. You are to implement a Dictionary Attack with and without Password Salt program in either C/C++ or Python.

If you are not familiar with measuring execution time in C++, see the following website:

https://www.geeksforgeeks.org/measure-execution-time-function-cpp/

If you are not familiar with measuring execution time in Python, see the following website:

https://stackoverflow.com/questions/1557571/how-do-i-get-time-of-a-python-programs-execution

See the following steps.

1. Accept a user password of length N as keyboard input to your program. You can determine your own length N.

2. Compute the hash of the password from step 1.

Your hash function H() is simply the checksum. (See Assignment 2)

3. Now you become an attacker and try to find the password of length N.

Try every combination of length N password and for each combination, compute the hash and compare to the hash of the password from step 2.

Measure execution time.

4. Now let’s reinforce our password using the password salt. Accept an arbitrary non-negative integer number as keyboard input to your program.

5. Compute the hash of the concatenated password salt and password from step 4 and step 1. To compute the password salt portion of the checksum, you can treat the entire password salt as EITHER a single integer OR multiple one-byte integers.

6. Now you become an attacker and try to find the concatenated password salt and password.

Try every combination of an arbitrary non-negative integer number and length N password and for each combination, compute the hash and compare to the hash from step 5.

Measure execution time.

NOTE: your program should have separate functions for the checksum and the two dictionary attacks with and without the password salt by the attacker.