Assignemnt

 

Why is it important for business strategy to drive organizational strategy and IS strategy? What might happen if the business strategy was not the driver?

Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

Hardware & Software Security

Topic: Hardware & Software Security 

Abstract – Brief summary that identifies the   purpose, goal, problem, methods, results, and conclusion of your work. (Format- Introduction, Body and Conclusion). Include separate page.

Paper Format- Write 3 full-pages word, double spaced paper, written in APA format, showing sources and a bibliography.

Include this information for your research:

Purpose-

· Why did you decide to do this study or project?

· How did you conduct your research?

· What did you find?

· Why is this research and your findings important?

· Why should someone read your entire essay?

Problem-

· What problem is your research trying to better understand or solve?

· What is the scope of your study – a general problem, or something specific?

· What is your main claim or argument?

Method- 

· Discuss your own research including the variables and your approach.

· Describe the evidence you have to support your claim

· Give an overview of your most important sources.

Results-

· What answer did you reach from your research or study?

· Was your hypothesis or argument supported?

· What are the general findings?

Conclusion-

· What are the implications of your work?

· Are your results general or very specific?

References-

· Scholarly articles (ex. Harvard etc), peer-reviewed journals, publications, textbooks

Access controls

Subject: Access controls

Describe what you learned from Public Key Infrastructure and Encryption.

APA Format. 300 words

Preview the document

IT project needs

 

Instructions:

  1. Search the internet for tips on how to distinguish software needs versus software wants.
  2. From your research, summarize 3 of the most common tips.
  3. Describe in your own words what happens with a technology project that fails to define the needs of the project.
  4. Research what makes a technology solution focused and easy to use (focused on the NEEDS).

From this week’s supporting links, review Five tips for any technology project’s needsPreview the document 

  • Which one of the tips is the most important in your eyes?
  • Why?
  • Which tip is the least important?
  • Why?

DQ

Hi

cybersecurity implementation 

the techniques have to be applicable to the field of AI/Cloud

Industry-wise — related to banking/manufacturing, anything would be fine

Contents will be Abstract, Introduction, Technical Discussion, Implementation, Conclusion,

IT Infrastructure Security Policies

 

Information Technology (IT) infrastructure security policies are represented in many types of policy documents, depending on the organizations network and infrastructure needs.  As you review Chapter 10, it discusses common IT infrastructure policies, in an effort to establish policy baselines as they relate to different infrastructure domains.

What are some best practices organizations can observe when creating and maintaining domain policies?

700 words: You have read about server virtualization and cloud computing , complete a case study of the organization you work for (use a hypothetical or “other” organization if more applicable) that will address the following things

700 words: You have read about server virtualization and cloud computing , complete a case study of the organization you work for (use a hypothetical or “other” organization if more applicable) that will address the following prompts:

• Describe the organization’s environment, and evaluate its preparedness for virtualization.

• Explain Microsoft (or another product) licensing for virtualized environments.

• Recommend a configuration for shared storage; make sure to discuss the need for high availability and redundancy for virtualization for the organization.

• Explain Windows Azure capabilities for virtual machines and managing a hybrid cloud, including Windows Azure’s Internet as a Service (IaaS) and storage capabilities

Make a recommendation for cloud computer use in the organization, including a justification for your recommendations.

Discussion 7 erm

Please answer the following two questions.

  • What are some of the potential risks involved with cloud computing?
  • Does the research and model in this article propose a viable solution to cloud-based risk management?

Please make your initial post should have 500 words and the post will do at least TWO of the following:

  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

Informative Essay Final Draft

 Informative Essay Final Draft on OBAMA

Due: Sunday, October 3 2020

RENG 92

OBAMA

1.  https://www.whitehouse.gov/about-the-white-house/presidents/barack-obama/ 

2. https://www.cnn.com/2020/09/17/media/barack-obama-promised-land-memoir-trnd/index.html

3.https://www.cnn.com/2017/01/18/politics/obama-final-news-conference/index.html

4.https://www.nbcnews.com/news/us-news/president-obama-faces-white-house-press-corps-one-last-time-n708391

To begin, review the feedback provided for your submitted introduction paragraph. Next, make the suggested changes and develop a 3-page  informative essay typed in MLA Format that proves your thesis statement (last sentence in the introduction paragraph). Please note: the works cited page is page three!!

Please make sure your essay includes the following:

  • MLA Format Throughout (Size 12 Font, Times New Roman, Double Spacing, Title, Heading, and Page Numbers)
  • Strong Thesis Statement (Start with a transitional word or phrase–last sentence in the introduction paragraph)
  • Start each body paragraph with a transitional word or phrase and include text support in at least 3 body paragraphs, per MLA Format
  • Topic sentences that support the thesis statement and supporting details in each body paragraph
  • Start the conclusion paragraph with a transitional word or phrase and summarize the main points within the essay
  • No use of, ” I”  “You”, or “We”
  • No contractions

Finally, please remember to proofread your submission!

No late submissions !!!!

fund 12

if you are Network engineer in information technology Carrer? And how do you see the database evolving in that career in the next decade?