IT204 office 365 Application assignment 2

Note: Unicheck is not used for this assignment since you are re-formatting  instructor supplied text.

Use the text below and format as described. Copy and paste it into your document. The font for the header is Arial Black or another sanserif font. Use Times New Roman for the body. Your press release should fit on one page. You may need to adjust the photo’s size to make this happen. Run spell check to correct misspelled words as there are intentional misspelling and grammar errors in the original.

We will discuss the tools for this assignment in class, you can use online sources as a refresher.

Submit by Sunday 11:59 PM.

Email Richard Lanier with any questions. [email protected]

This is the beginning of the document you will submit.

(1 blank line from the top of the page)

Press Release (Center, 20 point Arial Black font, red color with a light gray fill)

For Immediate Release 1/12/2021 (center, underline, 12 point Arial Black font not bold)

(2 blank lines)

Celebrate the end of Covid! (Times New Roman font, bold 12 point, centered. Indent the following paragraph one tab)

You are invited to atend an a walkathon (Times New Roman font, 12 not bold 1.5 line spacing) to raise money for the capital area food bank. (capitalize and bold and underline the words capital area food bank) All money that is raised will be donated to feed hungry people in the Washington area. Please wear a mask ans social distance.

Date: Saturday, June 19, 2021

Time: 10:00 AM 

Place: The Mall in Washington, D.C. (Use bullets and indent two tabs for the date, time, place)

Contributions accepted. You decide what to give. (Indent two tabs, but no bullet)

Come join the fun! (Bold, 14 point, center, yellow highlight)

(1 blank space.  Make a bullet list for the following. Left align the list, one space, 14 point  not bold)

Exercise while helping people.

Wear comfortable walking shoes.

Free water and snacs will be provided.

Wear a mask and social distance. (add one line)

Insert a photo of someone jogging on the right of the type you just pasted. Rotate the photo and add a picture border.  Add as many lines as needed after the photo to fit the following information. Add a picture watermark titled Press Release.

Sponsored by students of I Global University, Fals Church, va (left align, 12 point type)

For more information, contact

Your name

Your email address

Check the document properties. Who created it? When was it created. Write this at the bottom of the page. Created by ______________ Date _______________.

Add a page border and a watermark. Add a light value background color to the page.

paper

 

You have read about server virtualization and cloud computing in chapter 6 of your textbook. For your written assignment this week, complete a case study of the organization you work for (use a hypothetical or “other” organization if more applicable) that will address the following prompts:

 • Describe the organization’s environment, and evaluate its preparedness for virtualization.

• Explain Microsoft (or another product) licensing for virtualized environments.

• Recommend a configuration for shared storage; make sure to discuss the need for high availability and redundancy for virtualization for the organization.

• Explain Windows Azure capabilities for virtual machines and managing a hybrid cloud, including Windows Azure’s Internet as a Service (IaaS) and storage capabilities

Make a recommendation for cloud computer use in the organization, including a justification for your recommendations.

Submit your research paper as a single document. Your paper should meet the following requirements:

• Be approximately 2-4 pages in length, not including the required cover page and reference page.

• Follow APA6 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

https://www.tandfonline.com/doi/abs/10.1080/02681102.2017.1335281?journalCode=titd20 

Research Paper

** RESEARCH PAPER** 

please address the following in a properly formatted research paper:

1. Do you think that ISO 27001 standard would work well in the organization that you currently or previously have worked for? If you are currently using ISO 27001 as an ISMS framework, analyze its effectiveness as you perceive in the organization.

2. Are there other frameworks mentioned has been discussed in the article that might be more effective?

3. Has any other research you uncover suggest there are better frameworks to use for addressing risks?

Your paper should meet the following requirements:

Be approximately five to six pages in length, not including the required cover page and reference page.

Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 

Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

**DISCUSSION POST**

From your research, discuss whether or not your organization has ISO 27001 certification. Outside of overall protection from cyber-attacks, describe, in detail, some other benefits your organization will achieve in obtaining this certification. If your company does not have this certification, how can they go about obtaining it?

Present your discussion post as if you were presenting to senior leaders of your company.

System Security Architecture

Briefly respond to all the following questions. Make sure to explain and back up your responses with facts and examples. This assignment should be in APA format and have to include at least two references. (600 Words)

 

Consider the data flow “octopus,” as shown in Figure. How can the analysis system gather data from all these sources that, presumably, are protected themselves?

Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references. (600 Words)

If an attacker can retrieve the API and libraries, then use these to write an agent, and then get the attacker’s agent installed, how should Digital Diskus protect itself from such an attack? Should the business analytics system provide a method of authentication of valid agents in order to protect against a malicious one? Is the agent a worthy attack surface?

Should Social Media Activity Cost You a Job?

 

When you apply for a new job, there’s a good chance that the company will take a look at your social media activity, such as your Facebook page, blog activity, and even Craigslist listings. In fact, many companies now require job applicants to pass a social media background check before offering them a job. Companies are trying to protect themselves by looking for such things as racist remarks and illegal activities, as well as get a feel for whether or not an individual would be a good fit for the company.

But should individuals have to risk losing a job if they post a photo of themselves in a racy Halloween costume or make an offhand comment that an employer may misinterpret? What if a company denies you a job based on inaccurate information or information they wouldn’t be allowed to ask in a job interview, such as information relating to your age, race, gender, religion, and so forth? And what if someone else posts and tags a questionable photo of you—should a potential employer be able to use that or other third-party information to make a decision about your future? To be safe, should job applicants have to abstain from social media activity in order to protect themselves, even though such sites are typically viewed as places to casually interact with others on personal free time? Or is everything a potential employer finds online fair game?

Pick a side on this issue, form an opinion and gather supporting evidence, and write up a short discussion about your opinion and post it to this discussion board.

BSWA Week 10

 You are the web master for the Republican Party National Committee. Prepare a risk assessment analysis for your website. Some questions to consider:

  • Who is likely to attack your site?
  • When are attacks likely to occur?
  • What sort of attacks might take place?
  • How can you best minimize attacks and protect the integrity of your site?

Write between 200-300 words. 

word document edit

 

  1. Open the EmergencyProcedures-02.docx start file. If the document opens in Protected View, click the Enable Editing button so you can modify it.
  2. The file will be renamed automatically to include your name. Change the project file name if directed to do so by your instructor, and save it.
  3. Change the theme to Integral and the theme color to Red.
  4. Change the top, bottom, left, and right margins to 0.75″.
  5. Select the entire document and change the font size to 12 pt.
  6. Format the title of the document.
    1. Select the title of the document and apply Heading 1 style.
    2. Open the Font dialog box, apply All caps effect, and change the font size to 16 pt.
    3. Change the Before paragraph spacing to 0 pt.
    4. Add a bottom border to the title using the Borders drop-down list.
  7. Apply and modify the Heading 2 style and delete blank lines.
    1. Apply the Heading 2 style to each of the bold section headings.
    2. Select the first section heading (“Emergency Telephones [Blue Phones]”).
    3. Change Before paragraph spacing to 12 pt. and After paragraph spacing to 3 pt.
    4. Apply small caps effect.
    5. Update Heading 2 style to match selection. All the section headings are updated.
    6. Turn on Show/Hide and delete all the blank lines in the document.
  8. Select the bulleted list in the first section and change it to a numbered list.
  9. Apply numbering format and formatting changes, and use the Format Painter.
    1. Apply numbering to the text below the section headings in the following sections: “Assaults, Fights, or Emotional Disturbances”; “Power Failure”; “Fire”; “Earthquake”; and “Bomb Threat.”
    2. Select the numbered list in the “Bomb Threat” section.
    3. Open the Paragraph dialog box, set Before and After paragraph spacing to 2 pt., deselect the Don’t add space between paragraphs of the same style check box, and click OK to close the dialog box.
    4. Use the Format Painter to copy this numbering format to each of the other numbered lists.
    5. Reset each numbered list so it begins with 1 (right-click the first item in each numbered list and select Restart at 1 from the context menu).
  10. Customize a bulleted list and use the Format Painter.
    1. Select the text in the “Accident or Medical Emergency” section.
    2. Create a custom bulleted list and use a double right-pointing triangle symbol (Webdings, Character code 56).
    3. Open the Paragraph dialog box and confirm the left indent is 0.25″ and hanging indent is 0.25″. If not, change the settings.
    4. Set Before and After paragraph spacing to 2 pt. and deselect the Don’t add space between paragraphs of the same style check box.
    5. Use the Format Painter to apply this bulleted list format to the following text in the following sections: “Tips to Professors and Staff” and “Response to Students.”
  11. Change indent and paragraph spacing and apply a style.
    1. Select the text below the “Emergency Telephone Locations” heading.
    2. Set a 0.25″ left indent.
    3. Set Before and After paragraph spacing to 2 pt.
    4. Confirm the Don’t add space between paragraphs of the same style box is unchecked (Paragraph dialog box).
    5. Apply Book Title style to each of the telephone locations in the “Emergency Telephone Locations” section. Select only the location, not the text in parentheses or following text.
  12. Change left indent and paragraph spacing and set a tab stop with a dot leader.
    1. Select the text below the “Emergency Phone Numbers” heading.
    2. Open the Paragraph dialog box and set a 0.25″ left indent for this text.
    3. Set Before and After paragraph spacing to 2 pt. and confirm the Don’t add space between paragraphs of the same style box is unchecked.
    4. Open the Tabs dialog box, set a right tab stop at 7″, and use a dot leader (2).
    5. Press Tab before the phone number (after the space) on each of these lines. The phone numbers align at the right margin with a dot leader between the text and phone number.
  13. Apply the Intense Reference style to the paragraph headings in the “Accident or Medical Emergency” section (“Life-Threating Emergencies” and “Minor Emergencies”). Include the colon when selecting the paragraph headings.
  14. Use the Replace feature to replace all instances of “Phone 911” with “CALL 911” with bold font style. Note: If previous Find or Replace criteria displays in the Replace dialog box, remove this content before performing this instruction.
  15. Insert a footer with document property fields and the current date that appears on every page.
    1. Edit the footer on the first page and use the ruler to move the center tab stop to 3.5″ and the right tab stop to 7″.
    2. Insert the Title document property field on the left. Use the right arrow key to deselect the document property field.
    3. Tab to the center tab stop and insert the Company document property field at center. Use the right arrow key to deselect the document property field.
    4. Tab to the right tab stop, insert (not type) the date (use January 1, 2020 format), and set it to update automatically.
    5. Change the font size of all the text in the footer to 10 pt.
    6. Add a top border to the text in the footer using the Borders drop-down list and close the footer.
  16. Use the Borders and Shading dialog box to insert a page border on the entire document.
    1. Use Shadow setting and solid line style.
    2. Select the fifth color in the first row of the Theme Colors (Dark Red, Accent 1) and 1 pt. line width.
  17. Center the entire document vertically (Hint: use the Page Setup dialog box).
  18. View the document in Side to Side page movement view [View tab, Page Movement group] and then return to Vertical page movement view.
  19. Save and close the document (Figure 2-119).
  20. Upload and save your project file.
  21. Submit project for grading.

IT project management

 

PART 1: PROJECT MANAGEMENT SCENARIO (20%) 

This part of the in-course assessment is intended to address Learning Outcomes 1, 2. For this part of the assessment, you are required to critically scope and author a project management case scenario which should contain sufficient appropriate detail for analysis and determination of an IT-related project management strategy, plan and toolset. This scenario could be fictitious or based on a real business need.Start with describing the business case and value(s) of the project, then add both qualitative and quantitative details to explain the scenario in more depth. The data might be used in the formulation of your plan or toolset. You can use appendices for finer details.

Word count for Part1: approx. 1,000 words (guideline only).

PART 2: PROJECT MANAGEMENT STRATEGY & PLAN (50%) 

This part of the in-course assessment is intended to address Learning Outcomes 1, 2, 5, 6, 7.  In this part of the assessment you will review, develop and defend a case for adopting a specific project management life cycle (PMLC) and develop a suitable project management plan. The aim is to demonstrate knowledge of alternative philosophies and project planning artefacts, critically evaluating which broad methodological approach (and toolset) would fit your described project scenario. It is therefore expected that you will analyse your scenario, compare and contrast project management approaches, then select the most appropriate ones for your scenario and justify your choices. 

Word count for Part 2: approx. 2,000 words (guideline only).

PART 3: TOOLSET (30%) 

This part of the in-course assessment is intended to address Learning Outcomes 3, 4.  In this part of the submission you are required to employ a suitable toolset portfolio, demonstrating how the tools advocated would / could be applied to the given project management scenario. You may use live case data, plausible invented data, or an exemplar, illustrative presentation of critical tools in your toolset. 

Word count for Part 3: approx. 300 words (guideline only),plus associated illustrations

biometric and random numbers

1. Select one of these biometric techniques and explain the benefits and the  vulnerabilities associated with that method in 3-4 paragraphs (100-200 words).

1.Fingerprint recognition 2. Signature dynamics 3. Voice prints 4. Face recognition

2. In this module, you learned that random numbers (or, at least, pseudorandom numbers) are essential in cryptography, but it is extremely difficult even for powerful hardware and software to generate them. Go online and conduct research on random number generators. What are the different uses of these tools besides cryptography? How do they work? Explain your answer using your own words in 2-3 paragraphs (100-200 words).