CC Week10 DB

Hello,

i need this paper by 07/15 afternoon.

Strictly No plagiarism please use your own words.

Describe in 500 words discuss the scope of a cloud computing audit for your business.

Use at least three sources. Use the Research Databases available from the Danforth Library (https://libguides.nec.edu/az.php)not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs.  Stand alone quotes will not count toward the 3 required quotes.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Write in essay format not in bulleted, numbered or other list format. 

Strictly No plagiarism

Presentation

 In Milestone 4 you are going to create a PowerPoint presentation that evaluates your previous 3 milestones.  The PowerPoint presentation is a minimum of 8 slides that analyze all the major findings from your research.  The title and reference slide does not count toward the presentation. You must properly APA format the slide. Utilize all the guidance from the residency to develop your PowerPoint presentation.  

2 Separate Questions – Use separate document for each Question

Question 1:  Firewall

Using the Web or other resources, do a bit of research on the methodologies that Microsoft Windows firewall uses. Define a firewall. Define firewall security techniques. Write the strengths and weaknesses of the Microsoft Windows firewall   Write between 200 and 300 words. Use your own words

Question 2:  

Write an essay of at least 500 words discussing the Safe Harbor provisions under HIPAA.  

Do not copy without providing proper attribution. This paper will be evaluated through SafeAssign. 

Use the five paragraph format. Each paragraph must have at least five sentences. Include 3 quotes with quotation marks and cited in-line and in a list of references. Include an interesting meaninful title.

Include at least one quote from each of 3 different articles. Use the https://libguides.nec.edu/az.php , not Google.  Place the words you copied (do not alter or paraphrase the words) in quotation marks and cite in-line (as all work copied from another should be handled). The quotes should be full sentences (no more, less) and should be incorporated in your discussion (they do not replace your discussion) to illustrate or emphasize your ideas.

Readings:

 https://www.youtube.com/watch?v=GEOM9bxzkI8 

youtube.com/watch?v=4crxtIwdV7E

Running game

Run 3 online

Start running and jumping like there’s no tomorrow!!! The goal here is to get as far as you can in the weird corridor and avoid falling below in the deep space. Once you reach a certain distance inside the corridor, the level will automatically rise up. There are lots of missing platforms inside, and you should jump over them or walk on the sides to rotate the whole corridor. Collect power cells when you see them and use these items to buy costumes or power-ups.

 

Controls

  • Use left and right arrow keys to move.
  • Use Space to jump.

Web/Link  Run 3 online. 

implementation of innovation technologies.

 

This week’s journal article focuses on attribution theory and how it influences the implementation of innovation technologies.  Two types of employee attributions are noted in the article (intentionality and deceptive intentionality), please review these concepts and answer the following questions:

  1. Provide a high-level overview/ summary of the case study
  2. Note how constructive intentionality impacts innovation implementations
  3. Find another article that adds to the overall findings of the case and note how attribution-based perspective enhances successful innovation implementations.  Please be explicit and detailed in answering this question.

Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research.  Please be sure that journal articles are peer-reviewed and are published within the last five years.

The paper should meet the following requirements:

  • 3-5 pages in length (not including title page or references)
  • APA guidelines must be followed.  The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.
  • A minimum of five peer-reviewed journal articles.

The writing should be clear and concise.  Headings should be used to transition thoughts.  Don’t forget that the grade also includes the quality of writing.

Develop a Computer/Internet Security Policy

You have been hired as the CSO (Chief Security Officer) for an organization. Your job is to develop a computer and internet security policy for the organization that covers the following areas:

  • Computer and email acceptable use policy
  • Internet acceptable use policy
  • Password protection policy

Make sure you are sufficiently specific in addressing each area. There are plenty of security policy and guideline templates available online for you to use as a reference or for guidance. Your plan should reflect the business model and corporate culture of a specific organization that you select. 

 Include at least 3 scholarly references in addition to the course textbook.  The UC Library is a good place to find these references. At least two of the references cited need to be peer-reviewed scholarly journal articles from the library.

Your paper should meet the following requirements:

• Be approximately four to six pages in length, not including the required cover page and reference page.

• Follow APA6 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course and at least three scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Research Paper

 

The final portfolio project is a three- part activity. You will respond to three separate prompts but prepare your paper as one research paper. Be sure to include at least one UC library source per prompt, in addition to your textbook (which means you’ll have at least 4 sources cited). 

Start your paper with an introductory paragraph.

Prompt 1 “Blockchain” (2-3 pages): Explain the major components of blockchain. Be sure to include how blockchain is affecting a global economy and how you see it growing in the future. 

Prompt 2 “Big Data” (1-2 pages): Describe your understanding of big data and give an example of how you’ve seen big data used either personally or professionally. In your view, what demands is big data placing on organizations and data management technology?  How does big data affect a global economy.

Prompt 3 “Government and Policies” (1-2 pages):  Discuss the role government plays in a global economy.  Also, look at what policies are currently in place and then discussion what policies should be put in place..

Conclude your paper with a detailed conclusion section. 

The paper needs to be approximately 5-8 pages long, including both a title page and a references page (for a total of 7-10 pages). Be sure to use proper APA formatting and citations to avoid plagiarism.

Your paper should meet the following requirements:

5 pages with content,

 Follow APA6 guidelines 

 Support your answers with the readings from the course, the course textbook, and at least three scholarly journal articles from the UC library to support your positions, claims, and observations, in addition to your textbook. 

 

Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Smart City environment.

Describe how the tool can be used to develop a policy for optimizing bus and local train schedules to minimize energy use and passenger wait times in a Smart City environment.

200-250 words

 

Kirk (2016) tells us that all requirements and restrictions of a project must be identified.  Select 1 key factor below and discuss why Kirk (2016) states it will impact your critical thinking and shape your ambitions:

People: stakeholders, audience.

Constraints: pressures, rules.

Consumption: frequency, setting.

Deliverables: quantity, format.

Resources: skills, technology

Textbook:http://dl.booktolearn.com/ebooks2/computer/graphics/9781526468925_Data_Visualisation_050a.pdf