blockchain

Industry experts believe blockchain is a technology that has the potential to affect the business of most IT professionals in the next five years. Pick an industry you feel will be most affected by blockchain and how blockchain may be used in that industry. As an IT manager, how would you embrace blockchain? For instance, how would training occur for your team, what strategies might you use, what security methods may you recommend be used?

Your paper should meet the following requirements:

  • Be approximately 2-3 pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Homework 1

Please find the attachment of home 1

Total words 600 excluding references and No plagarism

System analysis

Assume you are hired by the XYZ company as Systems Analyst to prepare a cost-benefit analysis report for building an R&D laboratory for its staff with the following specifications:

  • The company already have a large hall reserved for the purpose, meaning the owner will not have to rent the space.
  • The lab will have ten computer spaces with a computer table and chair.
  • Each computer space is to be equipped with a high-performance laptop, a headphone and a scanner.
  • Each laptop will have an operating system (i.e. Microsoft Windows), word processing package (i.e. Microsoft Office 2016) and an antivirus (i.e. Kaspersky Antivirus) installed
  • All the computers need to be connected with the internet (requiring the purchase of a router and internet connection from an Internet Service Provider)
  • The laptops in the lab will share a heavy-duty printer available on the network

This lab will be established in Year 0 and you have to calculate the cost of establishing it. You can use the e-commerce websites (e.g. Amazon Saudi Arabia, Jarir Book Store, Extra Store etc.) to gather the costs of each of the above-mentioned items to be purchased and thus estimate the total cost of establishing the lab (in SAR).

Once the lab is operational, benefits and ongoing costs are projected over a period of three years according to the table shown below:

Year 0

Year 1

Year 2

Year 3

Total

Total Benefits

25,000

40,000

62,000

Total Costs

To be estimated

10,000

11,000

17,000

(Note: The cost of establishing the lab that you have already estimated (in SAR) for year zero is to be entered in the cell “To be estimated” in the table)

Based on the information in the table above, calculate:

  1. The total benefits and total costs over the duration of three years.
  2. The return on investment (ROI)
  3. The break-even point (BEP)

Policy Legal and ethics

 

This quiz is based on chapter 6 in the text. Answer each question in a paragraph that contains at least five sentences: Include the question and number your answers accordingly.

1. Should society help workers dislocated when technology, like the Internet, elimlnates their jobs in a process called ‘Creative Destruction‘?

2. are we working more and earning less?

3. Would you want a telecommuting job? Why or why not? 

4. Does the gig economy appeal to you? Why or why not?

5. How is an employee differentiated from a contracter under US law? 

6. Why have some municipalities put restrictions on innovations in the sharing economy and in on-demand services?

7. What has been the effect on the US economy of outsourcing (or offshoring) technical and professional jobs? 

8. How much monitoring of employee activities at work is appropriate? 

9. Should an employer be able to discipline or terminate an employee for on-line behavior in his/her own time? 

10. What is the relationship betwee BYOD (bring your own device) and shadow IT

11. What is cyberloafing?

Business Intellegence

Discussion: What are the common business problems addressed by Big Data analytics?  In the era of Big Data, are we about to witness the end of data warehousing? Why? 

 Questions: 1. What is Big Data? Why is it important? Where does Big Data come from? 

2. What do you think the future of Big Data will be? Will it lose its popularity to something else? If so, what will it be? 

3. What is Big Data analytics? How does it differ from regular analytics? 

4. What are the critical success factors for Big Data analytics? 

5. What are the big challenges that one should be mindful of when considering the implementation of Big Data analytics? 

Exercise:  At teradatauniversitynetwork.com, go to the Sports Analytics page. Find applications of Big Data in sports. Summarize your findings 

paper work (Application Security Course)

  

Assume that you are the security administrator at ABC corporation in charge of security policies. Your Job is to assure confidentiality, integrity, and availability of the information within ABC corporation. Although, there have been several data breaches to the organization because of lousy security policies, as determined through forensic investigation. Therefore, to assure IT security to ABC organization, your security team has been tasked to create a proposal on the steps that could be taken to mitigate the risk of data breach into ABC corporation’s IT infrastructure. Based on what you have learned from Week 1-7.   

Your Task

Create a proposal that will be present to the ABC corporation’s functional manager, detailing the steps that could be taken to mitigate the risk of the future data breach. 

Proposal Guidelines:

  1. Create the proposal using the Request for Proposal form      as attached.
  2. The proposal should not be more than 3-4 pages,      excluding the titled page.
  3. The proposal must conform to APA 6th edition writing      style. 
  4. The final paper is due on the 21st of June 2020.

Database Assignment

 

Write an essay discussing sqlmap, an automated tool for sql injection and database takeover in 500 words or more. Why do we need an automated tool for sql injection? 

Do not copy without providing proper attribution. This paper will be evaluated through SafeAssign. 

Write in essay format not in outline, bulleted, numbered or other list format.  

Use the five paragraph format. Each paragraph must have at least five sentences. 

Include an interesting meaningful title.

Include at least one quote from each of 3 different articles. Use the Research Databases available from the Danforth Library, not Google.  Place the words you copied (do not alter or paraphrase the words) in quotation marks and cite in-line (as all work copied from another should be handled). The quotes should be one  full sentence (no more, no less) and should be incorporated in your discussion (they do not replace your discussion) to illustrate or emphasize your ideas. Each quote must be cited in-line and at the end. 

 

https://www.youtube.com/watch?v=h-9rHTLHJTY

https://www.youtube.com/watch?v=_jKylhJtPmI

https://www.youtube.com/watch?v=ciNHn38EyRc

Watch this video on the SQL Slammer worm

https://www.youtube.com/watch?v=Zbd4Vk9LO3g

Watch these videos on inference attacks

https://www.youtube.com/watch?v=Z9ZjtvcgOcs

https://www.youtube.com/watch?v=rrwUCOEJFJM

https://www.youtube.com/watch?v=dx-R_AFQsc0

paper

 

This week, you have read about server virtualization and cloud computing in chapter 6 of your textbook. For your written assignment this week, complete a case study of the organization you work for (use a hypothetical or “other” organization if more applicable) that will address the following prompts:

 • Describe the organization’s environment, and evaluate its preparedness for virtualization.

• Explain Microsoft (or another product) licensing for virtualized environments.

• Recommend a configuration for shared storage; make sure to discuss the need for high availability and redundancy for virtualization for the organization.

• Explain Windows Azure capabilities for virtual machines and managing a hybrid cloud, including Windows Azure’s Internet as a Service (IaaS) and storage capabilities

Make a recommendation for cloud computer use in the organization, including a justification for your recommendations.

Submit your midterm research paper as a single document. Your paper should meet the following requirements:

• Be approximately four to six pages in length (1200-1800 words), not including the required cover page and reference page.

• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.