Discussion 2- CET

Computerized Operating Systems (OS) are almost everywhere. We encounter them when we use out laptop or desktop computer. We use them when we use our phone or tablet. Find articles that describes the different types of operating systems (Linux, Unix, Android, ROS, z/OS, z/VM, z/VSE, etc). Do not select MS WINDOWS. Write a scholarly review of comparing any two or more OS. 

Discussion post should be about 300 words with 2-3 APA citations and matching references.  

BigData paper 4

This week we discussed Bitcoin Economics.  For this week’s research paper, you need to search the Internet and explain why some businesses are accepting and other businesses are rejecting the use of Bitcoins as a standard form of currency.  Your paper needs to identify two major companies that have adopted Bitcoin technology.

Resource: PAVLUS, J. (2018). The World Bitcoin Created. Scientific American, 318(1), 32–37. Retrieved from http://search.ebscohost.com/login.aspx?direct=true&AuthType=shib&db=buh&AN=126727561&site=eds-live

Paper requirements:

• Be approximately 4 pages in length, not including the required cover page and reference page.

• Follow APA 6E  guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your response with the readings from the course and at least 5 peer-reviewed articles or scholarly journals to support your positions, claims, and observations.  

• Be clear with well-written, concise, using excellent grammar and style techniques. 

Policy and legal_Week14

  1. Give an example from the book where insufficient testing was a factor in a program error or system failure.
  2. What was one cause in the delay in the completing of the Denver Airport.
  3. Why didn’t the healthcare.gov website work at first?
  4. What is one characteristic of high reliability organizations?
  5. Describe the potential risks of alert fatigue in EHR systems.
  6. What were 2 common factors in both the Therac-25 case and the space shuttle disaster.
  7. What does design for failure mean?

week 6

 In order to prevent common web-based attacks such as cross-site scripting (XSS), Cross-Site Request Forgery (CSRF), and SQL injections, organizations need the right tools to detect and prevent these issues before code goes to production. Both Dynamic Application Security Testing (DAST) and Static application security testing (SAST) tools are often integrated into an organization’s CI/CD pipeline to scan for vulnerabilities. For this week’s assignment, discuss the differences between DAST and SAST. Include any pros and cons for each type, how organizations can benefit, examples of what issues can be found, and any specific tools in your response. Your assignment should be 2-3 pages in length, with two or more references in APA Format cited in your response. 

Discussion 12

On the discussion forum, please describe the reasons for having a totally anonymous means of accessing the internet. Please also discuss the dangers of that same internet. Minimum 250 words APA format with citation and reference.

Physical security 2

 

When we think of ethics, we usually think of guidelines for differentiating between what is right and what is wrong. For example, consider the Golden Rule (“Do unto others as you would have them do unto you”) or the Hippocratic Oath (“First, do no harm”). We are exposed to ethical norms for behavior in many settings (home, school, church, etc.) and from an early age.

In this assignment, answer the following question 7-10 full pages, not including citations and title pages:

If ethical norms for behavior are so commonplace, and guidelines for ethical decision making are common sense, why must we consider the ethical implications of research in this course or any information technology class?

APA 6th Edition formate with in text citation

Ethical Tactics in negotiation

 

Each student will select one of the key terms listed below and conduct a search of Campbellsville University’s online Library resources to find 1 recent peer reviewed article (within the past 3 years) that closely relate to the concept. Your submission must include the following information in the following format:

Key Terms:

  • Ethical tactics in Negotiation 
  • Deceptive Tactics in Negotiation
  • Cultural influences to Negotiation
  • The Golden Rule

DEFINITION: a brief definition of the key term followed by the APA reference for the term; this does not count in the word requirement.

SUMMARY: Summarize the article in your own words- this should be in the 150-200 word range. Be sure to note the article’s author, note their credentials and why we should put any weight behind his/her opinions, research or findings regarding the key term.

ANALYSIS: Using 300-350 words, write a brief analysis, in your own words of how the article relates to the selected chapter Key Term. An analysis is not rehashing what was already stated in the article, but the opportunity for you to add value by sharing your experiences, thoughts and opinions. This is the most important part of the assignment.