country Presentation to the Board of Directors

 

Assignment Content

  1. Based on readings in Rising Powers, Global Governance, and Global Ethics and related discussions, choose 1 of the countries or regions from the book into which your company might wish to expand. 

    Develop a 1-to 2-page table using either Microsoft Word, PowerPoint, or Excel that accurately compares your U.S.-based company’s ethics, based on classical ethical theory as well as its ethical stance on privacy, protection of intellectual property, and protection of PII to those within your country of choice. The column headings are “U.S.-based Company” and “Country of Choice.” The row headings are “Classical Ethical Theory,” “Privacy,” “Protection of Intellectual Property,” and “Protection of PII.”

    Create a PowerPoint presentation containing 8 to 10 slides for your corporate Board of Directors logically depicting at least 3 ethical challenges you might anticipate along with a policy statement for each. Include research concerning the country’s stance on issues, such as privacy, protection of intellectual property, corruption index, major religions, or indigenous tribal groups in the speaker notes.

    Include supportive graphics and appropriate backgrounds and styles. All references need to adhere to APA guidelines, and images should not be copied unless you obtain author permission or use copyright-free images.

    Note: You may use other applications like Adobe® Spark®,, Microsoft® Sway®, or Mix instead of PowerPoint.

    Submit your assignment.

Emerging Threats – Research paper

Penetration testing is a simulated cyberattack against a computer or network that checks for exploitable vulnerabilities. Pen tests can involve attempting to breach application systems, APIs, servers, inputs, and code injection attacks to reveal vulnerabilities. In a well-written, highly-detailed research paper, discuss the following:

  • What is penetration testing
  • Testing Stages
  • Testing Methods
  • Testing, web applications and firewalls

Your paper should meet the following requirements:

  • Be approximately 4-6 pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clear and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

federated architecture in cloud systems

 

Discuss in 500 words or more federated architecture in cloud systems. Remember that this is a cloud class, not a database class.

Cite your sources. Do not copy. Write in essay format, not in bulleted, numbered, or another list format. 

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding the length of your post, and that you reply to two classmates in a substantive way (not ‘nice post’ or the like).  Your goal is to help your colleagues write better. Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. Please do not use attachments unless requested.

Vehicle Insurance management system project(OOAD)

  

The project documentation should include the following sections: 

• Title of the project (with the list of project team members); 

• Executive Summary; 

• Table of Contents; 

• Introduction; 

• Project Plan; 

• Functional Specifications (including descriptions of Actors/Roles; Business Rules; Use-Case 

Diagrams with Use-Case descriptions; Examples of Class Diagrams (related to particular Use 

Cases); Examples of Object Diagrams [related to the selected Class Diagrams]; Examples of 

Sequence Diagrams; Examples of Collaboration or Communication Diagrams; Examples of StateChart Diagrams); 

• Functional Tests Plan; 

• System Design Specifications (including System Architectural [Layered, “Physical”] Design Scheme selected; Package Diagram [populated with interrelated classes]; Database Tables; Entity-

Relational diagrams; Window Navigation Diagrams; Drafts of User Interfaces; and Examples of System-Response Report Forms); 

• Integration Tests Plan; 

• Issues to Future Studies; 

• Conclusion; 

• References; 

short answer

 

Course Conclusion”  Please respond to the following:

  • You have just completed ten (10) weeks of a human-computer interaction course. Imagine you have been asked to create a one-day training course that highlights the important elements of what you have just learned within the past ten (10) weeks.
  • Create a hierarchy of no more or no less than five (5) of the most important topics that you believe that a one-day course entitled “Human-Computer Interaction: The Essentials Presented in One Day” should address. Provide a detailed rationale for each of the five (5) topics.

Internet Privacy

In order to complete assignment #1 you will need to answer the below questions. Please complete the questions in a Word document and then upload the assignment for grading. When assigning a name to your document please use the following format (last name_Assignment #1). Use examples from the readings, lecture notes and outside research to support your answers. The assignment must be a minimum of 1-full page in length with a minimum of 2 – outside sources. Please be sure to follow APA guidelines for citing and referencing source. Assignments are due by 11:59 pm Eastern time on Sunday.

Privacy is a concept that is rapidly evolving in relation to the most public of mediums, the Internet, which became even more super-charged with social networking websites. In a recent California election, one ballot measure, Proposition 8, asked voters a question on marriage. Donors to the Prop 8 campaign found that their names, addresses, and amount of contribution were masked up with Google Maps and thus rendered into a format showing the world a map image of donors’ names, street addresses, and dollar contributions. All this data is public record information already, but still quite inconvenient to access. What are the side effects of this action?

Choosing a Methodology

 

Read the Manage Your Health Inc. Case Study and complete the assignment below.

Consider the differences between Agile and waterfall.

Select 1 methodology to use for a project plan for this initiative.

Create a simplified project plan such as the examples listed in the “Tips” section below. Include, at least, the following criteria:

  • Name of task
  • Duration
  • Predecessors
  • Notes

After completing your simplified project plan, write a 175-word paragraph and complete the following:

  • Define which methodology, Agile or waterfall, is most appropriate for this project. Why? Cite at least 2 sources to support your rationale.
  • Describe the following roles for this project: project manager, project sponsor, business analyst, and scrum master or program manager.

You may create your simplified project plan using Microsoft® Excel® or another software application of your choice. 

Portfolio project

  • The Final Portfolio Project is a comprehensive assessment of what you have learned during this course.  
    The Final Project has two parts: Limitations of Blockchain and Emerging Concepts.
    Blockchain continues to be deployed into various businesses and industries. However, Blockchain is not without its problems.  Several challenges have already been associated with the use of this technology.  Identify at least 5 key challenges to Blockchain. Additionally, discuss potential solutions to these challenges. Lastly, please discuss if we will see the limitations to blockchain be reduced or mitigated in the future.  
    There are several emerging concepts that are using Big Data and Blockchain Technology. Please search the internet and highlight 5 emerging concepts that are exploring the use of Blockchain and Big Data and how they are being used.
    Conclude your paper with a detailed conclusion section which discusses both limitations and emerging concepts. 
    The paper needs to be approximately 6-8 pages long, including both a title page and a references page (for a total of 8-10 pages). Be sure to use proper APA formatting and citations to avoid plagiarism.
    Your paper should meet the following requirements:

    • Be approximately seven to ten pages in length, not including the required cover page and reference page.
    • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
    • Support your answers with the readings from the course, the course textbook, and at least ten scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find supplemental resources.
    • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing