InfoTech Import in Strat Plan (ITS-831)

Research Paper: Final Portfolio Project

Word count: 5-8 pages in length, not including the required cover page and reference page

The final portfolio project is a three-part activity. You will respond to three separate prompts but prepare your paper as one research paper. Be sure to include at least one scholarly source per prompt, in addition to your textbook (which means you’ll have at least 4 scholarly sources cited). 

Start your paper with an introductory paragraph.

Prompt 1 “Data Warehouse Architecture” (2-3 pages): Explain the major components of a data warehouse architecture, including the various forms of data transformations needed to prepare data for a data warehouse. Also, describe in your own words current key trends in data warehousing. 

Prompt 2 “Big Data” (1-2 pages): Describe your understanding of big data and give an example of how you’ve seen big data used either personally or professionally. In your view, what demands is big data placing on organizations and data management technology? 

Prompt 3 “Green Computing” (1-2 pages):  One of our topics in Chapter 13 surrounds IT Green Computing. The need for green computing is becoming more obvious considering the amount of power needed to drive our computers, servers, routers, switches, and data centers. Discuss ways in which organizations can make their data centers “green”. In your discussion, find an example of an organization that has already implemented IT green computing strategies successfully. Discuss that organization and share your link.

Conclude your paper with a detailed conclusion section. 

The paper needs to be approximately 5-8 pages long, including both a title page and a references page (for a total of 7-10 pages). Be sure to use proper APA formatting and citations to avoid plagiarism.

Your paper should meet the following requirements:

Be approximately 5-8 pages in length, not including the required cover page and reference page.

Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

Support your answers with the readings from the course, the course textbook, and at least three scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Reading resources:

1. Managing and Using Information Systems, Keri E. Pearlson, Carol S. Saunders, Dennis F. Galletta, John Wiley & Sons

plagiarism check required, APA7 format, include References, within 8hrs

Discuss the following: 1. What is blockchain's potential for application in the HR functions of recruitment and selection?

 

Use the following headings to organize your paper: Introduction, Question 1, Conclusion, References.

Submit your paper as a Word attachment in the discussion forum. I provide feedback within the paper and will not grade your post unless you submit it as an attachment. Your response to the discussion prompt should contain a minimum of 500 words.

 

Follow the following writing requirements for all of your discussion prompt responses (note that these writing requirements DO NOT apply to your responses to other students):

Writing Requirements for all Assignments:

  • References MUST be cited within your paper in APA format. Your reference page and in-text citations must match 100%. Papers without in-text citations will earn failing grades.
  • Always include a cover page and reference page with all submissions
  • Your paper must have headings in it. For discussion posts Introduction, Prompt/Question, and Conclusion will suffice as headings.  
  • Provide the EXACT web link for all online sources – do not provide just the home page, but the EXACT LINK – I check all sources
  • No abbreviations, no contractions – write formally
  • Write in the third person formal voice (no first or second person pronouns)
  • Write MORE than the minimum requirement of the word count assigned
  • As always, the word count is ONLY for the BODY of the paper – the cover page, reference page, and / or Appendix (if included) do not count towards the word count for the paper
  • Indent the first line of each new paragraph five spaces
  • Refer to the example APA paper in the getting started folder under the content tab if you need an example. Also, a power is provided under the information tab that addresses APA format.
  • Use double-spacing / zero point line spacing, a running header, page numbers, and left justify the margins.

Essay

Discuss the extent to which the government should control its citizens’ access to the Internet. In your discussions, consider issues related to national security, any other type of security issues that might occur, as well as the concept of freedom, and liberty of access and expression. Feel free to support your ideas with references from various sources, add pictures and videos to make your posting more exciting.

This needs to be a page only

project 8

  

Project 8 

1. You are approached by a hospital to maintain the data records of its patients. Which file organization technique would you suggest? Why?

2. What are the advantages and disadvantages of each access control method? Which of these methods would you recommend for a highly secure system with several files and several users?  Provide reasons for your answers.

Prepare the slide with a diagram and link to the reference 

2 slide each question 

4 pages

 Provide a written example of a cloud computing topic in a brief topical description of information  ?

 

write briefly on Cloud Computing Recommendations suggested by NIST .

Hint:  SP 800-146 May 2012  Cloud Computing Synopsis and Recommendations

 

Compare between different formal Cloud definition? Based on stale and standards? (include the NIST definitions)

Hint: SP 800-145 September 2011  The NIST Definition of Cloud Computing

Company Overview of United Health group

 Company Overview of United Health group

The page should include  the industry they are in and a general overview of the organization and also the history.

 

The paper must adhere to APA guidelines including Title and Reference pages.

Use the Academic Writer Tutorial: Basics of Seventh Edition APA Style website to learn more about APA style.

  • References should be 2016 or later.
  • Each source should be cited in the body of the paper to give credit where due. Per APA, the paper should use a 12-point Time New Roman font, should be double spaced throughout, and the first sentence of each paragraph should be indented .5 inches.

One Page is required

Discussion

While there are many benefits to the use of cryptocurrency, there is also much skepticism from the general public.  Much of this concern centers around legal protection associated with transactions. From your research, discuss what legal protections exist for Bitcoin users in the US and other countries.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

Policy, Legal, Ethics

  

1) Do a bit of research on JSON and AJAX. How do they relate to the the Same-Origin policy?

Using WORD, write several short paragraphs on each. A total of 250-300 words. Use your own words.

2) Answer below questions, each of these questions in a paragraph with at least five sentences.Include the question and number your responses accordingly. Min 1 citation for EVERY question and it needs to be referenced. References & citations should be less than 6 years old. They also need to be an academic source something from the library or scholar Google not just any random website. It must be a peer reviewed academic source or an industry recognized type reference. Make sure your citations and your references use proper APA formatting if you are unsure consult the OWL website. 

1. With all the stories about millions and millions of bytes of personal data having been exposed, why is their still any faith at all in the Internet?

2. How has the term hacking changed meaning over the years?

3. What is the most dangerous hacker tool?

4. From the news: How were NSA’s hacker tools  compromised? 

5. What was the vulnerability in the Target Breach?

6. What do you think of hactivism?

7. How did Stuxnet work? 

8. What was the Arpanet?

9. Deep brain stimulation is a treatment for Parkinson’s disease. Medical devices such as these are now becoming accessible through the web. Consider the dangers (threat surface)?

10. What is the Red Team?

11. Make an argument for legalizing the copying of music or software. 

12. Do I or don’t I own the books on my Kindle? If I own them, why can’t I transfer them? If I  don’t own them, what is my legal right to them?

3) Watch this video about Joseph Shumpeter’s concept of Creative Destruction. For example, many think that the introduction of self-driving cars will disrupt the job market for drivers. 

Use at least three sources. Use the Research Databases available from the Danforth Library, not Google.   Include at least 3 quotes from your sources enclosing the copied words in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs. Do Not Doublespace.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0.  Write in essay format not in bulleted, numbered or other list format. It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your post. Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. 

OP Dis -6

Here is a questionnaire for you to take on your “Change Readiness”. Provide feedback on how it relates to you and your style. 

400 Words – 5 Dollars