practical connection assignment

 Assignment:
Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment.  

 

Requirements:

Provide a 500 word (or 2 pages double spaced) minimum reflection.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

Share a personal connection that identifies specific knowledge and theories from this course.

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 

You should NOT, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace. 

Presentation Computer Science

Summarize the following subjects  of Chapter 3 

  • Different types of network circuits and media
  • Digital transmission of digital data
  • Analog transmission of digital data
  • Digital transmission of analog data
  • Analog and digital modems
  • Multiplexing

Discuss & Present TWO of the following subjects:

5- space-based global Internet service
https://www.youtube.com/watch?v=hXa3bTcIGPU
https://www.blueorigin.com/news/blue-origin-to-launch-telesats-advanced-global-leo-satellite-constellation
https://www.starlink.com/
https://www.oneweb.world/
 

6- Select and present a Network topic from IEEE Spectrum
https://spectrum.ieee.org/computing/networks

Week 1 Assignment BUsiness AIII

 

Week 1 Assignment

Complete the following assignment in one MS word document:

Chapter 1 –discussion question #1 & exercise 15 (limit to one page of analysis for question 15)

Chapter 2 – discussion question #1 & exercises 4, 5, and 15(limit to one page of analysis for question 15)

When submitting work, be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) to support the work this week.

All work must be original (not copied from any source).

Text BOOK Author,

Analytics, Data Science, & Artificial Intelligence

Ramesh Sharda

Dursun Delen

Efraim  Turban

9 Assignment

Please run a Google search of the term, “United States Supreme Court Carpenter v. United States 2018.” 

Please write an essay of not less than 500 words, summarizing the court’s decision. 

computer science

For the final phase of the project, please do the following. 

  • Complete the final written report as an accumulation of work done in Phases 1-3. It should be submitted as a final document including recommended revisions all compiled as one document. The paper should be six to eight pages long, in APA style. Include a cover page, table of contents, and list of references.
  • You will also create a narrated PowerPoint presentation and submit it separately. It should be addressed to the CEO or CIO of the company. Your final presentation file should include slides for each of the main topics of your research, as well as including title and references. Your PowerPoint presentation should be approximately 6-8 minutes long. The presentation should be done in a professional manner with the notes section containing the “speaker’s notes” on the content.

Both parts of this assignment are due by Sunday at 11:59 PM CT. Submit the Final Written Report as well as the PowerPoint  You will submit these two items separately.

Software engineering

  

Paper topic proposal should not exceed 2 pages and should include the following:

1- Paper topic

2- Brief description

Describe in 1-2 paragraphs the topic of the paper and the approach you will take to address the topic. If you have developed an outline, you can include that in this section.

3- Preliminary list of references.

Include 3-4 references, in the APA format, that you plan to use for the paper.  

Case Project 8.3

You work for a mid-size corporation known for its inventions that does a lot of copyright and patent work. You’re investigating an employee suspected of selling and distributing animations created for your corporation. During your investigation of the suspect’s drive, you find some fileswith the unfamiliarextension .xde. The network administrator mentions that other xde files have been sent through an FTP server to another site. Describe your findings after conducting an Internet search for this file extension.

Identifying Threats and Vulnerabilities in an IT Infrastructure

 

Risk Management Fundamentals Lab #1: Identifying Threats and Vulnerabilities in an IT Infrastructure

Critical infrastructure vulnerability assessments are the foundation of the National Infrastructure Protection Plan’s risk-based implementation of protective programs designed to prevent, deter, and mitigate the risk of a terrorist attack while enabling timely, efficient response and restoration in an all-hazards post-event situation.

Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA 7)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

latest video surveillance technology

  

Identify and research the latest video surveillance technology. For example, you can research “edge-based video surveillance,” or another new technology.

1. Find a resource–a scholarly article, security organization article/whitepaper, or web article. Give the article’s APA style reference information.

2. Summarize the article. Include all major points.

3. Explain how this surveillance technology could be used. What kind of location, organization, level of needed security, etc., would need kind of surveillance technology? Justify your choice.

4. Explain the advantages of using this new technology over the older technology options.

 Expected length is 2 pages.