practical connection

it is a priority that students are provided with strong educational programs and courses that allow them to be servant-leaders in their disciplines and communities, linking research with practice and knowledge with ethical decision-making.

This Practical assignment is a written assignment where students will demonstrate how this course research has connected and put into practice within their own career. Assignment: (you have 2 weeks to complete this assignment)

Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment.

If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Requirements:Provide a 500 word (or 2 pages double spaced) minimum reflection.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

Share a personal connection that identifies specific knowledge and theories from this course.

Demonstrate a connection to your current work environment.

If you are not employed, demonstrate a connection to your desired work environment. 

You should NOT, provide an overview of the assignments assigned in the course.

The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.

For example, you have already reviewed many valuable concepts.  I have listed the chapters that we have already covered in the last 5 weeks.  How will these concepts help you in the future with your career?  

Also, review the objectives of this course in our syllabus. For example, explain the basic concepts of data mining?  How can you apply this knowledge?  

Database security

Write an essay of at least 500 words discussing the Safe Harbor provisions under HIPAA.  

Do not copy without providing proper attribution. This paper will be evaluated through SafeAssign. 

Write in essay format not in outline, bulleted, numbered or other list format.  

Use the five paragraph format. Each paragraph must have at least five sentences. Include 3 quotes with quotation marks and cited in-line and in a list of references. Include an interesting meaninful title.

Include at least one quote from each of 3 different articles. Use the Research Databases available from the Danforth Library, not Google.  Place the words you copied (do not alter or paraphrase the words) in quotation marks and cite in-line (as all work copied from another should be handled). The quotes should be full sentences (no more, less) and should be incorporated in your discussion (they do not replace your discussion) to illustrate or emphasize your ideas.

Cite your sources in a clickable reference list at the end. Do not copy without providing proper attribution (quotation marks and in-line citations).

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your submission Do not use spinbot or other word replacement software. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about.  

Questions Need to be Completed in 10 hours

1. (250 words)

 

Before an organization considers scaling, it should understand the organizational system performance and potential system bottlenecks. Web Page Test (https://webpagetest.org/) is a site evaluator that creates a detailed report. The report helps identify images that can be further compressed and the impact of the systems cache, as well as potential benefits of compressing text. 

Use WebPagetest to evaluate two or more websites. In one page, discuss how the report’s findings align with your user experience.

The paper must adhere to APA guidelines including Title and Reference pages.  The Title and Reference pages do not count towards the page count requirement. There should be at least one scholarly source listed on the reference page.  Each reference cited in the text must appear in the reference list, and each entry in the reference list must be cited in text. APA requirements for this class include:

  • A title page
  • 12-point Time New Roman font
  • Your paper should be typed and double-spaced with 1″ margins on all sides
  • The first sentence of each paragraph should be indented one tab space
  • All papers should contain the page number, flush right, in the header of every page. Use the automatic page-numbering function of your word-processing program to insert page numbers in the top right corner; do not type page numbers manually.
  • APA 7th edition in-text citations
  • Reference page

2. (250 words)

 

This week’s assigmnet is based on Chapter 6 & 7. Please complete the following assignment. You should have acquired the require text book for course.

Week 5 Assignment .pdf (Please Find attached Document)

3. (250 words)

 

Some partitional clustering algorithms that automatically determine the number of clusters claim that this is an advantage.  Using your required textbook, Chapters 6 & 7 as a guide, discuss two (2) situations in which this is not the case.

PLEASE PROVIDE PAGE NUMBER from your textbook in your citation.

Duscussion

 

Conduct independent research to find a targeted recruiting strategy. Then answer the following:

  • Describe the strategy.
  • Who does it target?
  • Does it work?

Also share other recruiting strategies you personally think are worth using.

  • Please describe them
  • Share why you think they work

Cite sources.

BS 5

In 200- 250 words

Learn About creating good password security.

An IT Security consultant has made three primary recommendations regarding passwords:

  1. Prohibit guessable passwords
    • such as common names, real words, numbers only
    • require special characters and a mix of caps, lower case and numbers in passwords
  2. Reauthenticate before changing passwords
    • user must enter old pw before creating new one
  3. Make authenticators unforgeable 
    • do not allow email or user ID as password

BSWFP

Final Project Topic Name:  Data Center Security

In 100 words (1)

1.  Include a short paragraph describing your project (Data Center Security ) and how you intend to research it. 

In 200 words (2)

2. Brief abstract describing final project (Data Center Security ).

3. 500-600 words, double spaced, written in APA format, showing sources and a bibliography
Please include the following:  

 What is (Data Center Security ).

Advantages/Disadvantages

Challenges one might face

Conclusion:

References:

Research Project #1 Project 1: VEEM and Blockchain Technologies Transforming Global Marketing (Due within 5hours)

 

Project 1: VEEM and Blockchain Technologies Transforming Global Marketing 

Due 11PM EST Friday Evening Session

2 Parts: 4-5 page paper & accompanied 8-12 slide power point.

  • Paper: Must be APA format, 12 pt font, Times New Roman, with title page and references page. Minimum 2-3 references. Title page and References page do NOT count towards minimum.
  • Power Point: Is a summary presentation overview of paper, with additional charts/graphs to help demonstrate your insights on the topic.  Any template is fine to use.

Directions:

Submit a 4-5 page paper (APA style) and accompanying power point presentation that addresses how VEEM and Blockchain will transform global marketing. You may use a company of choice to use as an example to help guide your discussion in how that company leverages VEEM and Blockchain to expand and transform their global marketing efforts.  Answer the following questions in your paper and power point.

1) Define how VEEM and Blockchain is expanding the global marketing efforts of companies

2) In your company of choice, who are they, are how do you think they use Blockchain and VEEM technologies to operate their digital marketing efforts?

3) How does this company use those technologies to expand globally their marketing efforts?

4) What challenges do companies in general face when it comes to implementing these technologies for their marketing efforts?

5) What forward thinking 1-2 key strategies do you think this company and their industry can implement to be competitive in the global marketing landscape?

You can use magazines, company websites, journals, news articles, interviews etc, to research and uncover your information.  There is no exact right or wrong answer to the questions on the strategies and challenges you think face that company and their industry, as long as your supportive research supports your thoughts. Looking for more what you think based on the research conducted.