Writing assignment

Week 2 Discussion

Consider, in 500 words or more, how business processes as services can improve efficiency. This discussion is about business process as a service and security. 

Use at least three sources. Use the Research Databases available from the Danforth Library not Google.   Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Write in essay format not in bulleted, numbered or other list format. 

Do not use attachments as a submission. 

Reply to two classmates’ posting in a paragraph of at least five sentences by asking questions, reflecting on your own experience, challenging assumptions, pointing out something new you learned, offering suggestions. These peer responses are not ‘attaboys’.   You should make your initial post by Thursday evening so your classmates have an opportunity to respond before Sunday.at midnight when all three posts are due. 

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your post and that you reply to two classmates in a substantive way (not ‘nice post’ or the like).  Your goal is to help your colleagues write better. Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. I will not spend a lot of my time trying to decipher nonsense. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about.  

Write a program to provide the following tasks for a Dictionary object

Write a program to provide the following tasks for a Dictionary object:

  • Create and print a dictionary
  • Accessing items in a dictionary
  • Looping items through a dictionary
  • Change a value in a dictionary
  • Check if key exists in a dictionary
  • Print a dictionary length
  • Adding Items to a dictionary
  • Removing Items in a dictionary

Requirements:

  • Maximum four to five pages in length is required.
  • You must include program code and results.
  • You must include an explanation about how the program works.
  • You must show your work for full credit.
  • You must include a minimum of three credible sources. Use the Saudi Electronic Digital Library to find your resources.
  • Your paper must follow Saudi Electronic University academic writing standards and APA style guidelines, as appropriate.

You are strongly encouraged to submit all assignments to the Turnitin Originality Check prior to submitting them to your instructor for grading. If you are unsure how to submit an assignment to the Originality Check tool, review the Turnitin Originality Check Student Guide.

diss (WS&F)

 

1) What type of device or system did you select to conduct your forensics investigation?

2) What tool did you use for the data capture? 

3) What did you learn from the experience?

Your response to the DQ must be a minimum of 400 words. You must provide references for your response (APA format). You will need to reply to two (2) other fellow student’s posts (See the syllabus). The responses must be made in the week due.

How To Handle Application Scalability (5 pages)

 

Competency

Summarize cloud applications scalability concepts

Scenario

You are a software developer for a retail company that sells mobile phones via the web. Your company has deployed the entire website onto the public cloud. The mobile manufacturing company launches a new mobile every year. Your company’s website gets ten times the traffic during the new mobile launch. Customers often complain about the timeout and slow website performance. Some of them are even moving to other competitor’s websites, directly impacting your annual profit.

The public cloud provides various options to handle website scalability. Your manager has asked you to investigate various alternatives and walk through the best possible cost-effective solution. The goal is to handle the scale-up of the application during the pick load and scale down during the less load.

The public cloud company also provides a cost calculator to estimate the approximate cost to host the solution.

Instructions

In a Microsoft Word document of 5-6 pages, provide a step by step walk through to your manager and discuss the following points.

  • The public cloud vendor you have selected.
  • A description of the public cloud architecture for your web application.
  • A description of the components that are required for your public cloud and their functionality.
  • An explanation of how scale up and scale down will work.
  • How security will be enhanced.
  • A description of the benefits of deploying to multiple cloud regions.
  • An overview of serverless architecture and the benefits provided.
  • The approximate cost to host your design on the cloud.

Be sure use a professional tone and check grammar and spelling.

References

Include a minimum of 5 scholarly resources.

Resources

Requirements to pass (Rubrics)

Word document is 5 or more pages in length.

Public cloud vendor is selected.

Full, robust, and detailed description of public cloud architecture.

Full, robust, and detailed description of the components and functionality 

that are required for your public cloud selection.

Full, robust, and detailed explanation of how scale up and scale down will work.

Full, robust, and detailed explanation of how security will be enhanced.

Full, robust, and detailed explanation of the benefits of deploying to multiple cloud regions.

Full, robust, and detailed overview of serverless architecture and the benefits provided.

Full, robust, and detailed explanation of the approximate cost to host your design on the cloud.

Spelling and grammar are correct; professional tone used.

5 scholarly references provided; documented correctly.

Please write 350 words essay on the following with references?

 Web servers are compromised for a number of reasons which may include any of the following: Improper file or directory permissions, installing the server with default settings, unnecessary services enabled, security conflicts, a lack of proper security policies, improper authorization with external systems, default accounts with default or no passwords, unnecessary default, backup, or sample files, misconfigurations, bugs in server software, OS, or web applications, misconfigured SSL certificates and encryption settings, administrative or debugging functions that are enabled or accessible on web servers or the use of self-signed certificates and/or default certificates.

Select one of these compromises and explain how it could be avoided.

Machine learning

 Exp#1: Develop a system based on two-class Support Vector Machine (SVM) that can predict if the subject will purchase iPhone. Dataset: 

https://github.com/omairaasim/machine_learning/blob/master/project_11_k_nearest_neighbor/ip hone_purchase_records.csv

Training/ Test Split: 75-25 

Exp#2: Develop a voting classifier based on Decision Tree, Logistic Regression and SVM. 

Business Plan

Finalize your business plan for the new HWE Accessories website by incorporating your instructor’s feedback into a well-integrated, cohesive document, including all previous sections submitted in Wks 1–5.

Additionally, create a 3- to 5-page post-implementation review plan. The plan must include the following:

  • How you will determine if project results are consistent with the business case
  • How to identify if project goals are attained
  • How to address stakeholder satisfaction
  • How to analyze project costs and benefits
  • How to identify future development needs
  • How you will document lessons learned

Format any citations according to APA guidelines. 

Week 9

Explain the three different types of factors for multi-factor authentication.

Remember to cite at least one scholarly peer-reviewed article.  
All citations should be in APA format.