CAN YOU ANSWER ALL THIS QUESTIONS CORRECTLY IN HOUR HOUR AND HALF
4 questions for IT managers to be answered and analyzed
You have to answer 4 questions about IT technologies and their applications in management and business.
The important point is there must be no similarities and plagiarism, and 2 page for each question is necessary.
Questions and Instructions have been attached.
Cybersecurity Planning
1.) What do you think is the single greatest physical threat to information systems? Fire? Hurricanes? Sabotage? Terrorism? Discuss this question and provide support for your answer.
2.) Some organizations prohibit workers from bringing certain kinds of devices into the workplace, such as cameras, cell phones, and USB drives. Some businesses require employees to use clear or see-through backpacks when carrying personal items. What other devices might not be allowed in certain facilities, and why would they be restricted? The video on Google’s Data Center may give you some ideas to write about for this assignment.
excel homework
See attached pictures to answer all questions
Work has to be shown in a Word Doc
Emerging Threats – Research paper
Penetration testing is a simulated cyberattack against a computer or network that checks for exploitable vulnerabilities. Pen tests can involve attempting to breach application systems, APIs, servers, inputs, and code injection attacks to reveal vulnerabilities. In a well-written, highly-detailed research paper, discuss the following:
- What is penetration testing
- Testing Stages
- Testing Methods
- Testing, web applications and firewalls
Your paper should meet the following requirements:
- Be approximately 4-6 pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
- Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
- Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
- Be clear and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.
Emerging Threats and discussion
Internet-related crime occurs every minute. Cybercriminals steal millions of dollars with near impunity. For everyone that is captured nearly 10,000 or not captured. For every one successful prosecuted in a court of law, 100 get off without punishment or with a warning. Why is it so difficult to prosecute cybercriminals?
new tech bus leaders
What role do you feel that VR/AR will play in the future for managing products within an enterprise supply chain system?
augmented reality (AR) and virtual reality (VR)
Ethical Analysis
The google glass sits on ones face just like any other glasses but there are no actual lenses. It is asymmetrical as the prism is only on one side of the glass. Given the intrusive natures of these technologies it is easy for employees to take videos or photographs of other people at work and share it with others. What ethical issues arise from the use of wearable technologies in workplaces? Analyse it based on any four ethical philosophies taught to you in this unit .
A suggested report structure is as follows.
• title page • executive summary
• table of contents
• introduction
• ethical analysis
• conclusion
• references
• appendices
Discussion 7
- What are some of the potential risks involved with cloud computing?
- Does the research and model in this article propose a viable solution to cloud-based risk management?
A substantive post will do at least two of the following:
- Provide extensive additional information on the topic
- Explain, define, or analyze the topic in detail
- Share an applicable personal experience
- Provide an outside source that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
- Make an argument concerning the topic.
At least one scholarly source should be used in the initial discussion thread.
Reference article:
Mackita, M., Shin, S.-Y., & Choe, T.-Y. (2019). ERMOCTAVE: A Risk Management Framework for IT Systems Which Adopt Cloud Computing. Future Internet, 11(195), 1-21. Retrieved from https://doi.org/10.3390/fi11090195
INSTRUCTIONS.
1. No Plagiarism at any cost .
2. The submission date is Thursday (10/08/20).
3. Atleast 3 references in APA format
4. Min of 250 words (2-3 paragraphs)
chart discussion
The chart you select to represent your data will be influenced by many factors. Kirk (2016) has put each chart into the five main families below:
• Categorical: Comparing categories and distributions of quantities values
• Hierarchical: Charting part-to-whole relationships and hierarchies
• Relational: Graphing relationships to explore correlations and connections
• Temporal: Showing trends and activities over time
• Spatial: Mapping spatial patterns through overlays and distortions
Select a chart type from the text and discuss what the chart is used for and why you selected it. (The author has included a lot of different chart types in our course book)