Company Overview of United Health group

 Company Overview of United Health group

The page should include  the industry they are in and a general overview of the organization and also the history.

 

The paper must adhere to APA guidelines including Title and Reference pages.

Use the Academic Writer Tutorial: Basics of Seventh Edition APA Style website to learn more about APA style.

  • References should be 2016 or later.
  • Each source should be cited in the body of the paper to give credit where due. Per APA, the paper should use a 12-point Time New Roman font, should be double spaced throughout, and the first sentence of each paragraph should be indented .5 inches.

One Page is required

Discussion

While there are many benefits to the use of cryptocurrency, there is also much skepticism from the general public.  Much of this concern centers around legal protection associated with transactions. From your research, discuss what legal protections exist for Bitcoin users in the US and other countries.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

Policy, Legal, Ethics

  

1) Do a bit of research on JSON and AJAX. How do they relate to the the Same-Origin policy?

Using WORD, write several short paragraphs on each. A total of 250-300 words. Use your own words.

2) Answer below questions, each of these questions in a paragraph with at least five sentences.Include the question and number your responses accordingly. Min 1 citation for EVERY question and it needs to be referenced. References & citations should be less than 6 years old. They also need to be an academic source something from the library or scholar Google not just any random website. It must be a peer reviewed academic source or an industry recognized type reference. Make sure your citations and your references use proper APA formatting if you are unsure consult the OWL website. 

1. With all the stories about millions and millions of bytes of personal data having been exposed, why is their still any faith at all in the Internet?

2. How has the term hacking changed meaning over the years?

3. What is the most dangerous hacker tool?

4. From the news: How were NSA’s hacker tools  compromised? 

5. What was the vulnerability in the Target Breach?

6. What do you think of hactivism?

7. How did Stuxnet work? 

8. What was the Arpanet?

9. Deep brain stimulation is a treatment for Parkinson’s disease. Medical devices such as these are now becoming accessible through the web. Consider the dangers (threat surface)?

10. What is the Red Team?

11. Make an argument for legalizing the copying of music or software. 

12. Do I or don’t I own the books on my Kindle? If I own them, why can’t I transfer them? If I  don’t own them, what is my legal right to them?

3) Watch this video about Joseph Shumpeter’s concept of Creative Destruction. For example, many think that the introduction of self-driving cars will disrupt the job market for drivers. 

Use at least three sources. Use the Research Databases available from the Danforth Library, not Google.   Include at least 3 quotes from your sources enclosing the copied words in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs. Do Not Doublespace.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0.  Write in essay format not in bulleted, numbered or other list format. It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your post. Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. 

OP Dis -6

Here is a questionnaire for you to take on your “Change Readiness”. Provide feedback on how it relates to you and your style. 

400 Words – 5 Dollars 

Research Paper on organization and their global strategy

Research a company or organization and their global strategy to address specific issues (business challenges, breaches, etc). Describe the company, their strategy plan, and the issues in your group paper while including recommendations to alleviate issues.

 * At least 20 pages, no more than 25

 * with PPT to summarize your research paper 

 * Double spaced APA format

 * At least 15 references

 * At least 5 of your references have to be scholarly peer-reviewed articles

security

Securing IoT Devices: What are the Challenges?

Security practitioners suggest that key IoT security steps include:

1) Make people aware that there is a threat to security;

2) Design a technical solution to reduce security vulnerabilities;

3) Align the legal and regulatory frameworks; and

4) Develop a workforce with the skills to handle IoT security.

Final Assignment – Project Plan (Deliverables):

Address each of the FOUR IoT security steps listed above in terms of IoT devices.

Explain in detail, in a step-by-step guide, how to make people more aware of the problems associated with the use of IoT devices.

databases for organizational security

 Considering the importance of data in organization, it is absolutely  essential to secure the data present in the database. What are the  strategic and technical security measures for good database security? Be  sure to discuss at least one security model to properly develop  databases for organizational security. Create a diagram of a security  model for your research paper.

Your paper should meet the following requirements:

  • Be approximately 4-6 pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at  least two scholarly journal articles to support your positions, claims,  and observations, in addition to your textbook. The UC Library is a  great place to find resources.
  • Be clear and well-written, concise, and logical, using excellent  grammar and style techniques. You are being graded in part on the  quality of your writing.

Computer programing

 Assignment 2 tests your knowledge of Selection (Chapter 4) and Repetition (Chapter 5). Write a program YourName-Assignment2 (replace YourName with your actual name, no spaces) that reads/inputs from a file1 students’ records (one student per line) with the following format: LastName Tests Grade Assignments Grade and computes and outputs (to the console) the STUDENT STATISTICS in a table format one line per student: Student Name Total Points2 Numeric Grade3 Letter Grade4 The table should have the exact table header5 . The program should also compute and output (to the console) in the 2 rows 2 columns table format, the CLASS STATISTICS for the entire class: the number of students6 (row Number) and the average numeric grade7 (row Average) among all students. All text/character columns should have the same width, be aligned to the left and all floating-point values align to the right and formatted with 2 decimals. You can test your program on the attached Grades.txt (do not edit the file) and you can check your output by comparing it to the sample output shown here, but your program should work on any other files that have the correct format, thus, do not hardcode the output or the number of students. The program needs to use loops/repetition statements to read the data from the files and selection statements (Chapter 4) to compute the letter grades. You should write the program in Visual Studio 2019 using only concepts learned in classso far (Chapters 1 to 5, so, without arrays, functions, pointers, references, and any other concepts not studied in class so far). Create a Microsoft Word document called YourName-Assignment2-Screenshots.docx (replace YourName with your name, no spaces) that contains screenshots of your entire C++ code in editor (take multiple screenshots if the code is larger than one screen and is not readable in one screenshot), and the entire program console output in the Console Output Window for the attached Grades.txt (take multiple screenshots if the output is larger than one window). SUBMIT your YourName-Assignment2.cpp Visual Studio 2019 C++ source code and YourName-Assignment2- Screeshots.docx screenshots document files under Assignment2 on eCampus. Do not archive the files (no ZIP, RAR or other archived files) or submit other file formats. 

1 The program should work on any file with that format with different numbers of line. Do not hardcode the number of lines, compute it instead when you read from the file.

 2 You compute the Total Points as the sum between Tests and Assignments.

 3 You compute the Numeric Grade as the total points (from all the evaluations) divided by 2. The value will be between 0 and 100 

4 The Letter Grade is: A if the numeric grade is between 89.5 and 100, B if the numeric grade is between 79.5 and 89.49, C if the numeric grade is between 69.5 and 79.49, D if the numeric grade is between 59.5 and 69.49, and F if the numeric grade is between 0 and 59.49.

 5 The table header should have the exact text, but it does not have to be on 2 separate lines/rows, you can put them on one row (.e.g. “Total Points” on one row)

 6 The number of lines from the file

 7 The sum of all the numeric grades divided by the number of students