Portfolio Project

 You will respond to three separate prompts but prepare your paper as one research paper

1.Start your paper with an introductory paragraph.

2.Prompt 1 “Data Warehouse Architecture” (2-pages): Explain the major components of a data warehouse architecture, including the various forms of data transformations needed to prepare data for a data warehouse. Also, describe in your own words current key trends in data warehousing. 

3.Prompt 2 “Big Data” (2- pages): Describe your understanding of big data and give an example of how you’ve seen big data used either personally or professionally. In your view, what demands is big data placing on organizations and data management technology? 

4.Prompt 3 “Green Computing” (2 pages): IT Green Computing. The need for green computing is becoming more obvious considering the amount of power needed to drive our computers, servers, routers, switches, and data centers. Discuss ways in which organizations can make their data centers “green”. In your discussion, find an example of an organization that has already implemented IT green computing strategies successfully. Discuss that organization and share your link. 

5.Conclude your paper with a detailed conclusion section. 

The paper needs to be 8 pages long and 6 references. Be sure to use proper APA formatting and citations to avoid plagiarism.

Discussion 4

How would you describe that factors that determine the tone at the top?

APA format with 250 to 300 words minimum and references less than 5 years old.

Research Paper: Electronic innovation and the government

 

Each student will write a short research paper for a peer-reviewed research paper that pertains to the week’s assigned reading.  This will be a detailed summary of the research paper and what you gained from the research.  Each week, you will find an article/peer-reviewed research paper that pertains to the week’s assignment.  If you have a difficult time, Google Scholar is a wonderful location to find these types of articles:

https://scholar.google.com/

Once you find the article, you will simply read it and then write a review of it.  Think of it as an article review where you submit a short overview of the article.

Your paper should meet the following requirements:

• Be approximately 2-3 pages in length, not including the required cover page and reference page.

• Follow APA6 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

*All outside sources must be referenced and cited in your paper.  All papers will be reviewed with a plagiarism software. Any references not properly referenced and cited will result in a 0 on your paper. Multiple violations will result in a failure for the course!

Journal Article Analysis

DEFINITION: a brief definition of the key term followed by the APA reference for the term; this does not count in the word requirement.

SUMMARY: Summarize the article in your own words- this should be in the 150-200 word range. Be sure to note the article’s author, note their credentials and why we should put any weight behind his/her opinions, research or findings regarding the key term.

ANALYSIS: Using 300-350 words, write a brief analysis, in your own words of how the article relates to the selected chapter Key Term. An analysis is not rehashing what was already stated in the article, but the opportunity for you to add value by sharing your experiences, thoughts and opinions. This is the most important part of the assignment.

REFERENCES: All references must be listed at the bottom of the submission–in APA format. 

Assignment on privacy policy

For this assignment, you are asked to locate any company privacy policy. Some of the more popular ones might include GOOGLE, APPLE, or MICROSOFT, but you may elect to review another agency. In 3- 4 paragraphs, explain what you find to be the most interesting information contained in that privacy policy. At the end of your report, please include a LINK to the policy you have reviewed.

Troubleshooting & Usability

IT support is a key partner when a new system or application “goes live.” Users will call in with questions and problems and the support team needs to be ready. 

Describe at least five key troubleshooting steps an IT support professional must take to successfully resolve a caller’s system or application performance problem.

Usability is one of the critical factors in designing an EHR system. Since clinical staff interact with patient electronic health records every day, a poorly designed EHR system can inhibit work flow and performance. Therefore, staff will often report “usability” type performance problems during and after implementation. For example, you may receive a complaint that doctors are refusing to enter lab orders via the EHR because it has too many fields to complete and slows down the doctor’s workflow and patient interactions. 

Consider the types of usability complaints an IT department is likely to hear throughout new system implementation and beyond. 

Explain the following:

  • How usability related complaints could be used to provide information that would be an important part of an organization’s long-term system improvement plans
  • What type of user complaint information should be tracked so trends and improvement opportunities can be identified 

Discussion Week 6 -2 – Cloud Computing

 

According to your readings, cloud computing represents one of the most significant paradigms shifts in information technology (IT) history, due to an extension of sharing an application-hosting provider that has been around for many years, and was common in highly regulated vertical industries like banks and health care institutions.  The author’s knowledge from their research continue to assert that, the impetus behind cloud computing lies on the idea that it provides economies of scale by spreading costs across many client organizations and pooling computing resources while matching client computing needs to consumption in a flexible, real-time version. 

Identify the issues and risks that pose concern to organizations storing data in the cloud –  briefly support your discussion.

— 500 Words

case study

 

1.You have just been hired to perform digital investigations and  forensics analysis for a company. You find that no policies, processes,  or procedures are currently in place. Conduct research to find  information, and then create a policy and process document (3 to 4 pages  in length) to provide the structure necessary for your lab environment.  Be sure to cite your online sources and follow APA formatting.(3,4)

2.Establish a procedure for your organization on how to validate a  new forensics software package. Write 3 to 4 pages outlining the  procedure you plan to use in your lab. Be sure to cite references, such  as the ISO standard or NIST, to support your procedure. Make sure you  use APA formatting.(chapter 5,6)

3.As part of the duties of a digital forensics examiner, creating an  investigation plan is a standard practice. Write a 3 to 4 (not including  title or reference page) page paper that describes how you would  organize an investigation for a potential fraud case. In addition, list  methods you plan to use to validate the data collected from drives and  files such as Word and Excel, with hashes. Specify the hash algorithm  you plan to use, such as MD5 or SHA1. Make sure you follow the grading  rubric and write your paper in APA format.(chapter 9,10)

4. A mother calls you to report that her 15-year-old daughter has run  away from home. She has access to her daughter’s e-mail account and  says her daughter has a number of emails in her inbox suggesting she has  run away to be with a 35-year-old woman. Write a 2 to 3 page  paper/report (not including title or reference page) explaining how you  should proceed. Make sure you adhere to the grading rubric and write the  report in APA format.(chapter 11,12)

· 3-4 pages in length  (excluding cover page, abstract, and reference list)

· APA format, Use the APA template located in the Student Resource Center to complete the assignment.

· Please use the Case Study Guide as a reference point for writing your case study.

IA week12 DB

 

Hello,

i need this paper by 11/11 afternoon.

Strictly No plagiarism please use your own words.

Pick one of the many information security standards organizations and describe what they do and what type of standards they are responsible for.

An initial post must be between 350 words.

Make sure Strictly No plagiarism content should not match and even the reference should not match in plagiarism 

risk management strategies

Compare s and explain a risk management strategies situation in school life or in life where you applied risk management strategies.

Provide enough details so your classmates understand the situation and risk strategy employed.

Choose two of situation and risk strategies and offer a suggestion on how using controls could mitigate certain risks.