homework computer

File Submission: Computer Deals

Objective of the activity

After learning the characteristics of the components of the Data Processing Cycle, students will apply the knowledge acquired through the exercise of selecting a computer offering that meets their needs.

Instructions

What are we going to do?

The student will reflect on the requirements that the computer that he needs for his studies and to practice his profession must have.

How are you going to do?

Download the Computer Offers filePreview the document

Look for three (3) computer deals.

Capture the screens of the three offers, including their description.

Detail in a table the components of the computer (main memory (RAM), CPU, Hard disk, components such as: printer, webcam, speakers, monitor, included programs …

Write in a paragraph in which you explain which of the three computers has the greatest capacity. Argument, based on what you researched and learned in the module.

Based on your needs as a student and professional, determine which of the three offers is right for you, regardless of price.

Deliverable

The activity is individual. The work must be delivered on time, without spelling or grammatical errors. The works will be submitted to the tool to detect similarity of content (now Urkund). Submit the answers in a Word document, Times New Roman, size 12. You must include the references in APA format, three years old or less.

Word file with the completed Computer Offers table. Must include:

The screenshots of the offers (including their description).

The paragraph determining which of the three has the greatest capacity and which of the three offers meet your needs as a student and professional.

References (where you got the bids from)

Answer the following question

 

Consider the reputation service and the needs of both individual consumers and large organizations that are security conscious.

What will be the expectations and requirements of the customers?

Will small-scale consumers’ needs be different from those of enterprises?

Who owns the data that is being served from the reputation service?

What kinds of protections might a customer expect from other customers when accessing reputations?

Research Paper – Info Tech Strat Plan

This week’s written activity is a three- part activity. You will respond to three separate prompts but prepare your paper as one research paper. Be sure to include at least one UC library source per prompt, in addition to your textbook (which means you’ll have at least 4 sources cited). 

Start your paper with an introductory paragraph.

Prompt 1 “Data Warehouse Architecture” (2-3 pages): Explain the major components of a data warehouse architecture, including the various forms of data transformations needed to prepare data for a data warehouse. Also, describe in your own words current key trends in data warehousing. 

Prompt 2 “Big Data” (2-3 pages): Describe your understanding of big data and give an example of how you’ve seen big data used either personally or professionally. In your view, what demands is big data placing on organizations and data management technology? 

Prompt 3 “Green Computing” (2-3 pages):  One of our topics in Chapter 13 surrounds IT Green Computing. The need for green computing is becoming more obvious considering the amount of power needed to drive our computers, servers, routers, switches, and data centers. Discuss ways in which organizations can make their data centers “green”. In your discussion, find an example of an organization that has already implemented IT green computing strategies successfully. Discuss that organization and share your link. You can find examples in the UC Library.

Conclude your paper with a detailed conclusion section. 

The paper needs to be approximately 7-10 pages long, including both a title page and a references page (for a total of 9-12 pages). Be sure to use proper APA formatting and citations to avoid plagiarism.

Your paper should meet the following requirements:

• Be approximately seven to ten pages in length, not including the required cover page and reference page.

• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course, the course textbook, and at least three scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find supplemental resources.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

research writing

 1) Write and submit a paper on the topic “Cryptography and the Internet of Things” 2) The submission should be written in IEEE Proceedings Manuscripts style: two columns, single-spaced. You may find a template file at URL: http://www.ieee.org/web/publications/authors/transjnl/index.htm1. It should not be more than 2 pages long (including references and figures) and should contain an Abstract, Introduction, Main Body and Conclusion section at the minimum. 3) Anyone who reads the paper should be able to find answers to the following questions. a. What is the Internet of Things (IoT) and how does it change the dynamics of security in cyberspace? b. What are the classes of devices that run on the IoT and what are their security needs? c. What are lightweight cryptographic algorithms and why are they needed in the IoT space? d. What are the classes and approaches for creating lightweight cryptographic algorithms? e. How to evaluate lightweight cryptographic algorithm? Provide a brief evaluation of at least 3 lightweight cryptographic algorithms. 4) Your paper should also have a. At least 4 references b. At least 2 of the following, a graph, a table or a figure. If you choose to include a graph or a figure you must create them yourself. Do not copy images directly from another source 5) Copying the sentences directly from your references or other sources into your paper is plagiarism. Ensure that you write your paper using your own words. 6) Your submission will be judged based on the following criteria: Format/Organization Content Clarity Technical Depth Originality 

Course Mapping Document

The statement should provide a narrative or story about the student, including details about when he/she came to the U.S. to study, the degree program pursued, any previous OPT employment, why he/she decided to pursue a second Master’s degree program (if applicable), how he/she obtained CPT employment, job duties and experience gained during CPT employment, relevant and important courses taken that are helpful for CPT employment, etc.  

BSWA 7

 

Use the Web to search for methods to prevent XSS attacks.

Write a brief description of more than one method.

Use your own words and supply references.

200-300 words

Enterprise Risk Management

 

After reading the attached article, and any other relevant research you locate, please discuss the following in your main post: – atleast 250-300 words

  • Which case study in the paper was most interesting to you and why?
  • Do you think that ERM is necessary in the contemporary organization and why?

Guidelines for Evaluating Research Articles

The purpose of this assignment is to examine the components of a research article and help you identify guidelines for conducting critical analyses of published works.  The knowledge gained should be applied when completing your research assignments.  As you complete assignments it is a good idea to proof read your work or use the University writing center to help with APA formatting.  Both are great avenues for assistance in minimizing grammatical errors and conducting research.

Please use the attached “Guidelines for Evaluating a Research Article” to answer the below questions.  Write a 5 – 7 page paper on:

  • What is an Information Technology Project?  
  • Identify & explain the major parts of a research paper.
  • Explain the difference(s) between qualitative vs quantitative research methods.
  • Why use Peer Reviewed journals?
  • Why are keywords used during the Literature Review process?
  • Why are project deliverables, limitations & deadlines an important aspect of project development?
  • Why use/apply APA Basic Citation Stiles in YOUR writing assignments/research?
  • Why is Academic Integrity important (see syllabus)?
  • Explain the difference between plagiarism vs self-plagiarism? 

 

Your assignment must follow these formatting requirements:

Use at least five – ten (5 – 10) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format.  nclude a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page do not count toward the page count.

Fractional ownership

 

Write at least 500 words on fractional ownership and it’s relation to cloud computing. Use at least one example from another industry.    

Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs. Stand-alone quotes will not count toward the 3 required quotes.

Write in essay format not in bulleted, numbered or other list format.