Blockchain Technology could be proposed as a solution

 After working on Blockchain literature review, pick one area where you think Blockchain Technology could be proposed as a solution. Briefly explain your proposed solution. Your final document should include an Abstract and a Conclusion. This assignment should be in APA format and have to include at least six references. Also a required template is included, make sure to use it. 

 Length: Minimum of 1000 words.  

ethics

 

Discuss in five hundred words or more a situation at work where you felt you had to consider the ethics of something you were being asked to do. 

Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Write in essay format not in bulleted, numbered or other list format. 

Do not use attachments as a submission. 

Reply to two classmates’ posting in a paragraph of at least five sentences by asking questions, reflecting on your own experience, challenging assumptions, pointing out something new you learned, offering suggestions. These peer responses are not ‘attaboys’.   You should make your initial post by Thursday evening so your classmates have an opportunity to respond before Sunday.at midnight when all three posts are due. 

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your post and that you reply to two classmates in a substantive way (not ‘nice post’ or the like).  Your goal is to help your colleagues write better. Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. . I will not spend a lot of my time trying to decipher nonsense. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about.  Please do not submit attachments unless requested.

WK-2

  

Assignment 1

Why are the original/raw data not readily usable by analytics tasks? What are the main data preprocessing steps? List and explain their importance in analytics.

Refer to Chapter 3 in the attached textbook:

Sharda, R., Delen, D., Turban, E. (2020). Analytics, Data Science, & Artificial Intelligence: Systems for Decision Support 11E. ISBN: 978-0-13-519201-6. 

Discuss the process that generates the power of AI and discuss the differences between machine learning and deep learning.

Requirement: 

****Separate document for each assignment.****

Minimum 300-350 words. Cover sheet, abstract, graphs, and references does not count.

Add references separately for each assignment question.

Double Spaced and APA 7th Edition Format

No plagiarized content please! Attach a plagiarized report.

Check for spelling and grammar mistakes!

$5 max. Please bid if you agree.

Assignment 2:

What are the privacy issues with data mining? Do you think they are substantiated?

Refer to Chapter 4  in the attached textbook:

Sharda, R., Delen, D., Turban, E. (2020). Analytics, Data Science, & Artificial Intelligence: Systems for Decision Support 11E. ISBN: 978-0-13-519201-6. 

Requirement: 

****Separate document for each assignment.****

Minimum 300-350 words. Cover sheet, abstract, graphs, and references does not count.

Add references separately for each assignment question.

Double Spaced and APA 7th Edition Format

No plagiarized content please! Attach a plagiarized report.

Check for spelling and grammar mistakes!

$5 max. Please bid if you agree.

1-2 page in APA 6th standard- Using virtualization to protect subscriber data

Using virtualization to protect subscriber data-In your initial discussion post, recommend two options or approaches that cloud service providers can implement to protect subscriber data. Keep in mind, there is a balance to be struck between relying on trusted processes and security policies, and achieving operational agility –especially when subscriber data is at stake

Discussion-2

After this weeks readings and your own research, describe and discuss ways, if any, we can safely share security data.Are there precautions we can take, technical solutions we can use, e.g., like using the CIA triad, or should we just not share these kinds of data? Feel free to argue for and against, just make sure to back up your statements with scholarly support.

Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA 7)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

Main Post is due by the end of Thursday (250 words minimum).

2 Responses (100 words minimum) using at least one of the following:

  • Ask a probing question.
  • Offer a suggestion.
  • Elaborate on a particular point.
  • Provide an alternative opinion.

essay

 

Your client has a few questions about the differences between mobile and the standard one you’re building.

In a short document, explain what changes are necessary to your current site to make it usable as a mobile Website.

For your Final Deliverable you will need to be prepared for both versions.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow SWS. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

COM303 Week 1 Discussion 3

  

Choose one of the caveats for studying IC (individual uniqueness, generalizing, and objectivity) and explain how you’ve encountered it in a work-related experience. Were the parties involved aware of the lack of effective communication when it occurred? How might the incident have been improved with a better sense of IC?

Request for Proposal

 

Due Thursday 

Respond to the following in a minimum of 250 words: 

The vendor selection process ensures you choose a vendor to meet the organization’s needs. A Request for Proposal process provides a structure that leads to better decisions for purchasing through vendors. 

Discuss the need for a Request for Proposal (RFP). When would you need to create a Request for Proposal? 

Note: As part of this week’s individual assignment, you will create a Request for Proposal. 

Lab 4

Lab #4 Social Engineering Steps

 In Lab 4 find an article on social Engineering and the steps used to employ social engineering. Post the article in this moodle thread and put a copy in your Lab Notebook. 

Writing Requirements

assignment Acceptable Use Policy (AUP)

 Acceptable Use Policy (AUP) (Information Technology)

For this assignment, you need to find three examples of an AUP from the Internet or other sources. Download these, or copy them and convert them into a PDF to attach to your submission. After reading/skimming these AUPs, attempt to write your own abbreviated AUP. Keep your AUP to a maximum of 5 pages and a minimum of 3 pages. You can cut and paste from your examples; however, be advised that this needs to fit the needs of the small marketing company weeks 5. Change text accordingly if you copy from other sources and make sure it is relevant. 

Submit your paper and the 3 PDF examples for this assignment.  

I attached the week 5 assignment just in case if you needed.