9-1 Discussion: The Role of Social Media in Technical Communications

A relatively new conduit for technical and business communications is social media. Research the various forms and types of social media. Then discuss the types that are useful for technical communications in the enterprise. Why are these types useful? How would you use them if you were in charge of communications for a company? Offer a solid an example.

Discussion post – Govt

Today’s Global Economy is very top-down driven with the government making all the decisions and regulations as it relates to doing business globally.  

Question1) What are some advantages and disadvantages to this approach?  

Question 2) Is there another approach that might work better? 

Note: 250 word minimum. At least one scholarly source should be used. In text citation need to be included.

Discussion on Emerging threats

Internet-related crime occurs every minute. Cybercriminals steal millions of dollars with near impunity. For everyone that is captured nearly 10,000 or not captured. For every one successful prosecuted in a court of law, 100 get off without punishment or with a warning. Why is it so difficult to prosecute cybercriminals?Please provide a post and substantive post will do at least TWO of the following:

  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source  that applies to the topic, along with additional information about the topic or the source (please cite properly in APA 7)
  • Make an argument concerning the topic.

At least two scholarly sources should be used. Be sure to use information from your readings. Use proper citations and references in your post.

Research paper – industry

Pick an industry/company to focus on for this assignment.  Based upon the given information you can find on the company and any past issues/breaches the company has gone through, create Crisis Management Plan  Introduction – brief background of company and any issues the company has had in the past such as data breaches Strategies and Management – business activities, risk factor activities, reactive risk mitigation strategy, risk management, financial performance (more or less depending upon company) Risk Analysis – political analysis, environmental analysis (more or less depending upon company) Crisis Management Plan: Purpose Committee for crisis management planning Crisis types Structure of the Crisis Management Team Responsibility and control Implementation Plan Crisis Management Protocols Crisis Management Plan Priorities Conclusion References – APA format   Page Count Range should be 20 pages not including:  Title page, Table of Contents and References page  All References are to be in APA format.

Cloud computing

Cloud computing deployment models in 3 pages  , with power point slides , the content should not Have words which has more than one meaning like ”lot” etc.., 

Discussion Questions

 Research software that will allow you to review a file’s metadata or generate Hash values for files.  Write a review of one software and annotate the pros and cons of that particular software. 

this is the generic discussion about week 9's material, which is group communication, summaries and other general questions/comments.

Write a small 1 page write up on week 9 material which is group communication in distributed system

Group Communication and Multicast

What you got out of the week’s material

Any questions on the material or the homework

Any suggestions on how to explain the material better

Any additional examples or the like that may help illustrate the material

Any research ideas that came to mind

Ethical hacking Assignments

Wk 6 Writing Assignment(250 Words)

Select one network scanning software tool (there is a list in your required reading slides) and explain in detail how it works and how detects network vulnerabilities. Provide the site where you obtained your information and include that in your assignment write-up.

Wk 8 Research Assignment (250 Words)

Locate an article on a system breach (Target stores, Sony Pictures, US Government, and many more).In 2-3 paragraphs, briefly explain the situation and what kind of information was compromised. How large was the breach and how long did it take to find the problem. Include a link to any of your Internet resources.

Wk 9 Written Assignment(250 words)

Using the following link as your reference, select TWO and explain the differences

(viruses, worms, trojans, and bots).

What Is the Difference: Viruses, Worms, Trojans, and Bots?

Music research paper proposal and 3-5 page research paper.

  

RESEARCH PAPER SUBJECT and PROPOSAL in APA format.

On George Gershwin (American, 1898 – 1937)

Select four references – two printed (books) and two electronic.

PROPOSAL

1. Title Page 

2. Proposed Outline 

3. Proposed References

PROPOSED OUTLINE

The proposed outline should clearly show your chosen subject of research. 

▪ Create a title for your paper that reflects your research subject; be creative. 

• Make sure this title is consistent with the ones shown on the title page and header.

Your outline should show your plan to organize the paper. 

▪ It should include important topics relevant to the subject of research that you have chosen. 

▪ Note that ‘Running head’ is no longer present in the header from page 2 onward.

PROPOSED REFERENCES 

▪ In the Proposed Reference page, list the sources that you plan to use for this project. 

▪ “Proposed References” in the center of the page. 

▪ Double-space, without extra spacing between entries. 

▪ If an entry takes up two or more lines, indent the second and subsequent lines. 

▪ Arrange the entries in alphabetical order.

A minimum of four references are required for this project: 

• Two printed (book references) 

• Two electronic (on-line references)