computer information

  

Module 2: Portfolio Project Job Title Submission 

You will start the portfolio project process by documenting the job title or career that you will explore in your brochure and an explanation of at least 40 words discussing why the selection appeals to you. Submit this assignment in Blackboard. choose, Nursing or manager job

Module 3: Annotated Bibliography 

You will be required to submit an annotated bibliography for four (4) separate articles or resources. The annotated bibliography is comprised of an APA citation, a summary of the resource, and your evaluation of the credibility of the source. Please refer to the specific instructions and example provided below for more information on writing Annotated Bibliographies. Double-click the icons below to see the examples.

Module 5: Brochure Content Outline 

You will create an outline that applies the research from your annotated bibliographies. In the outline you will illustrate your main topic sentence and bullet points for each of your 3 content paragraph topics, outline which source or sources you’ll cite to give information about that topic, and include a reference page. See the content outline by double-clicking below for an example.

Module 6: Rough Draft Submission

You will submit the rough draft of your three (3) career development brochure panels. Once submitted, you will receive feedback from your instructor so you can revise your work for your final submission in Module 7.

Module 7: Final Submission to ePortfolio

You will submit the final draft of your three (3) career development content paragraphs, including any edits or feedback supplied by the instructor on the Module 6 draft submission.  

Module 2: Portfolio Project Job Title Submission 

You will start the portfolio project process by documenting the job title or career that you will explore in your brochure and an explanation of at least 40 words discussing why the selection appeals to you. Submit this assignment in Blackboard.

Module 3: Annotated Bibliography 

You will be required to submit an annotated bibliography for four (4) separate articles or resources. The annotated bibliography is comprised of an APA citation, a summary of the resource, and your evaluation of the credibility of the source. Please refer to the specific instructions and example provided below for more information on writing Annotated Bibliographies. Double-click the icons below to see the examples.

Module 5: Brochure Content Outline 

You will create an outline that applies the research from your annotated bibliographies. In the outline you will illustrate your main topic sentence and bullet points for each of your 3 content paragraph topics, outline which source or sources you’ll cite to give information about that topic, and include a reference page. See the content outline by double-clicking below for an example.

Module 6: Rough Draft Submission

You will submit the rough draft of your three (3) career development brochure panels. Once submitted, you will receive feedback from your instructor so you can revise your work for your final submission in Module 7.

Module 7: Final Submission to ePortfolio

You will submit the final draft of your three (3) career development content paragraphs, including any edits or feedback supplied by the instructor on the Module 6 draft submission.

Coso Framework

The COSO framework of internal controls is practiced within companies around the world. The objectives of the COSO framework are closely related to its five components. For this week’s activity, please discuss these five components of the COSO framework. Be sure to include each components’ impact on each of the COSO framework objectives. What do you feel an auditor would most be concerned with during an IT audit? Lastly, discuss suggestions for integrating COSO framework compliance into a company in which you are familiar. 

Your paper should meet the following requirements:

• Be approximately four to six pages in length, not including the required cover page and reference page.

• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

Practical Connection Emerging Threats

 

Assignment: 
Provide a reflection of at least 550 words (or 2 pages) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Requirements:

  • Provide a 550 word (or 2 pages double spaced) minimum reflection.
  • Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.
  • Share a personal connection that identifies specific knowledge and theories from this course.
  • Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 
  • You should not, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace. 
  • Any use of outside sources, including your own prior work, will result in a zero on the activity and a report being filed with Academic Affairs regarding plagiarism (even if self-plagiarism). 

discussion

 A digital forensics professional must know basic IT skills, understand computer architecture and networking, and have analytical and investigative skills, as well as strong attention to detail. Why do think all of these skills are necessary? Please explain. 

2 Questions each on in separate document

 Question 1

My Research Project Tokenization for that I need, 5 sources annotated bibliography. here attaching my PPT and Abstract.

Question 2 

Write an essay of at least 500 words comparing or contrasting ISO v. NIST database security frameworks.

Include at least one quote from each of 3 different articles, place the words you copied (do not alter or paraphrase the words) in quotation marks and cite in-line (as all work copied from another should be handled). The quotes should be full sentences (no more, less) and should be incorporated in your discussion (they do not replace your discussion) to illustrate or emphasize your ideas.

Cite your sources in a clickable reference list at the end. Do not copy without providing proper attribution (quotation marks and in-line citations). Write in essay format, not in bulleted, numbered, or another list format

Wk2 – Apply CRM Success

  

Assignment Content

  1.     The Week 1 assignment placed you in the role of an IS or IT manager to investigate the 3 types of CRM and how they relate to customer acquisition, retention, and development. 

    In this week’s assignment, we look at how a company uses its CRM in relation to the practice of CPM. This assignment also investigates how a CRM is related to customer value, customer perceived value, and customer experience.  

    Important Note: While the Week 1 assignment required the use of the Case Report Resources, this assignment and future week assignments give you an option to select a company through the University Library or the Internet.

    Assignment Instructions

    1. Review the Assignment Deliverables section below. You will need this information to pick an appropriate company from the Case Report Resources (below), University Library, or the Internet.
    2. Choose a company from the Case Report Resources, University Library, or the Internet that is appropriate for the assignment deliverables. Not all cases may provide all the explicit details you are seeking. You may need to assume information. Please make a note in your assignment indicating the information that is assumed.
    3. Imagine that you are an IS or IT manager for the company you chose. Write a case report with 700 to 1050 words that includes the requirements listed under Assignment Deliverables. 
    4. Assignment Deliverables
      Include the following:
    • Describe what the case is about, give the important elements of the history of the situation, and specify the key problem or issue of the case, e.g. what decision has to be made by which manager. This is your introduction
    • Examine how the company used the practice of CPM.
    • Analyze how the CRM helped the company identify customer value and increase customer experience.
    • Suggest additional possible enhancements to customer-perceived value and/or customer experience that could be achieved by the CRM.
    • Include the most important information from the case in your conclusion.
    • Include a reference to the case and cite the reference in APA format.
    • Case Report Resources 
      Case Report Resources are success stories that customer companies have had with 3 popular CRM providers: 
    • Salesforce®
    • Blackbaud
    • Dynamics® 365 from Microsoft®
    • Submit your assignment.

CS-340 2-1 Assignment:CRUD in MongoDB

 Please see attached for better formatting.

Overview

To understand and make use of any database system, you must learn various techniques associated with the fundamental operations of create, read, update, and delete (CRUD). For this assignment, you will begin by creating databases of document collections and performing basic reading or querying operations to retrieve specific documents from the database system. You will also gain practice updating documents and subdocuments, and removing documents from a database. You will use the mongo shell and mongoimport commands to complete this assignment.

Note: Since this is the only assignment for Module Two, it is longer than a typical assignment. Be sure to begin working on this early in the week.

Prompt

After completing the textbook reading and reviewing the mongoimport tool documentation in the module resources, complete the following tasks using the mongo shell in Apporto.

  1. The data set for this assignment, city_inspections.json, has already been loaded into the Apporto environment for you. Using the mongoimport tool, load the database “city” with documents found in the city_inspections.json file into the “inspections” collection. Complete this by typing the following commands in the Linux terminal to perform the import in the right directory:
    cd /usr/local/datasets/ #change into the Apporto directory with the data sets mongoimport --db city --collection inspections ./city_inspections.json #mongo import utility
    TIP: In any Linux systems, commands must be exact and use proper syntax and case sensitivity.
  2. Verify your load by switching to the “city” database and issuing the following queries in the mongo shell:
    1. db.inspections.find({"id" : "10021-2015-ENFO"})
    2. db.inspections.find({"result":"Out of Business"},{"business_name":1}).limit(10)
    3. Provide screenshots of the results as evidence.
  3. Using the appropriate commands in the mongo shell, insert a document to the database named “city” within the collection named “inspections.” Use the following key-value pairs as data for your document.
    KeyValueid“20032-2020-ACME”certificate_number9998888business_name“ACME Explosives”dateToday’s dateresult“Business Padlocked”sector“Explosive Retail Dealer-999”addressnumber -> 1721
    street -> Boom Road
    city -> BRONX
    zip -> 10463
    Be sure the address is inserted as a sub-document, and use the JavaScript function Date() for “Today’s date.” Verify your database creation and insertion using the findOne() function in the mongo shell. Provide a screenshot as evidence.
  4. Answer the following questions using MongoDB queries.
    1. What is the distinct list of inspection “sector” in the current inspections collection? How many are in the list? Do not count by hand.
    2. What is the difference in the date data type for the business named “AUSTIN 2012” versus your business document insertion of “Acme Explosives”?
    3. How many businesses have a “Violation Issued”? (See Value column above.)
    4. Verify by providing screenshots of the queries and results as evidence.
  5. Using the appropriate command in the mongo shell, update the document with the ID “20032-2020-ACME” in the collection “inspections” in the database “city” with the information below.
    KeyValuebusiness_name”New ACME Flowers”result”Business Re-opened”comments”Flowers after the explosion”
    Verify your database update using the appropriate find() function in the mongo shell. Provide a screenshot as evidence.
  6. Using the database “city” with documents found in the “inspections” collection, perform the tasks listed below. Verify by providing screenshots of the results as evidence.
    1. Update all the documents that contain the key-value pair “city”:”ROSEDALE” in the address subdocument by changing the zip code in the address subdocument to “76114”.
    2. Remove the first document with the key-value pair “result”:”Violation Issued.”
    3. Guidelines for Submission
      Submit a Word document containing all of your screenshots. Use a screenshot tool, such as the Snipping Tool, for your screenshots and be sure to enlarge the images in the Word document before submitting. This will help make sure that your screenshots are an appropriate size for your instructor to be able to read them. Refer to this Use Snipping Tool to Capture Screenshots guide for help with taking screenshots.

Governance of Cloud-hosted Applications Through Policy Enforcement – Methodology

I want 3 pages if APA format on different governance methods used in Cloud hosted application which come under Methodology for my major research paper. I just need you to write this section. I do not want your to write intro or abstract just the methodlogy part which starts from page 21 but you need to refer other papers as well and reference them in this paper.

Note: NO Plagarism please everything should be in your own words.

Time : I need this in 3 hours ( by 1 pm cst)

I have already attached

Artificial Intelligence 2

1.Read chapter 5 from the PDF file and do Games Homework 1.

2. Read chapter 6 from the PDF file and do exercises 6-1 and 6-5. 

For reference watch the 2 video’s at:
Video 1: http://csis.pace.edu/~benjamin/teaching/cs627online/webfiles/ConstraintSat isfaction1.mp4
Video 2: http://csis.pace.edu/~benjamin/teaching/cs627online/webfiles/ConstraintSat isfaction2.mp4

3. Read chapters 7 and 8 from the PDF file and do Logic Homework 1. 

For reference watch only the first two videos at,

4. Read chapter 13 and sections 14.1 and 14.2 from the PDF file and do exercises 13-8 and 14-4. 

For reference watch the 3 video’s at:
Video 1: http://csis.pace.edu/~benjamin/teaching/cs627online/webfiles/Probability1. mp4
Video 2: http://csis.pace.edu/~benjamin/teaching/cs627online/webfiles/Probability2. mp4

Video 3:

http://csis.pace.edu/~benjamin/teaching/cs627online/webfiles/Probability3. mp4

5. Read sections 18.1 through 18.3 from the PDF file and do Learning Homework 1.

For reference watch these videos:
I. http://videolectures.net/bootcamp07_guyon_itml/

II. https://www.youtube.com/watch?v=pLzE2Oh9QDI

developing technology project requirements

 

  1. Search the internet for best practices for developing technology project requirements.
  2. Personally, what one part of the project requirements is critical to the success of the project? Please explain.
  3. As you work to complete your IT Project, you are soon to be  finalizing your project design (Unit 4). What have you learned about  your project over these weeks (ex. new requirements)?