Should Social Media Activity Cost You a Job?

 

When you apply for a new job, there’s a good chance that the company will take a look at your social media activity, such as your Facebook page, blog activity, and even Craigslist listings. In fact, many companies now require job applicants to pass a social media background check before offering them a job. Companies are trying to protect themselves by looking for such things as racist remarks and illegal activities, as well as get a feel for whether or not an individual would be a good fit for the company.

But should individuals have to risk losing a job if they post a photo of themselves in a racy Halloween costume or make an offhand comment that an employer may misinterpret? What if a company denies you a job based on inaccurate information or information they wouldn’t be allowed to ask in a job interview, such as information relating to your age, race, gender, religion, and so forth? And what if someone else posts and tags a questionable photo of you—should a potential employer be able to use that or other third-party information to make a decision about your future? To be safe, should job applicants have to abstain from social media activity in order to protect themselves, even though such sites are typically viewed as places to casually interact with others on personal free time? Or is everything a potential employer finds online fair game?

Pick a side on this issue, form an opinion and gather supporting evidence, and write up a short discussion about your opinion and post it to this discussion board.

BSWA Week 10

 You are the web master for the Republican Party National Committee. Prepare a risk assessment analysis for your website. Some questions to consider:

  • Who is likely to attack your site?
  • When are attacks likely to occur?
  • What sort of attacks might take place?
  • How can you best minimize attacks and protect the integrity of your site?

Write between 200-300 words. 

word document edit

 

  1. Open the EmergencyProcedures-02.docx start file. If the document opens in Protected View, click the Enable Editing button so you can modify it.
  2. The file will be renamed automatically to include your name. Change the project file name if directed to do so by your instructor, and save it.
  3. Change the theme to Integral and the theme color to Red.
  4. Change the top, bottom, left, and right margins to 0.75″.
  5. Select the entire document and change the font size to 12 pt.
  6. Format the title of the document.
    1. Select the title of the document and apply Heading 1 style.
    2. Open the Font dialog box, apply All caps effect, and change the font size to 16 pt.
    3. Change the Before paragraph spacing to 0 pt.
    4. Add a bottom border to the title using the Borders drop-down list.
  7. Apply and modify the Heading 2 style and delete blank lines.
    1. Apply the Heading 2 style to each of the bold section headings.
    2. Select the first section heading (“Emergency Telephones [Blue Phones]”).
    3. Change Before paragraph spacing to 12 pt. and After paragraph spacing to 3 pt.
    4. Apply small caps effect.
    5. Update Heading 2 style to match selection. All the section headings are updated.
    6. Turn on Show/Hide and delete all the blank lines in the document.
  8. Select the bulleted list in the first section and change it to a numbered list.
  9. Apply numbering format and formatting changes, and use the Format Painter.
    1. Apply numbering to the text below the section headings in the following sections: “Assaults, Fights, or Emotional Disturbances”; “Power Failure”; “Fire”; “Earthquake”; and “Bomb Threat.”
    2. Select the numbered list in the “Bomb Threat” section.
    3. Open the Paragraph dialog box, set Before and After paragraph spacing to 2 pt., deselect the Don’t add space between paragraphs of the same style check box, and click OK to close the dialog box.
    4. Use the Format Painter to copy this numbering format to each of the other numbered lists.
    5. Reset each numbered list so it begins with 1 (right-click the first item in each numbered list and select Restart at 1 from the context menu).
  10. Customize a bulleted list and use the Format Painter.
    1. Select the text in the “Accident or Medical Emergency” section.
    2. Create a custom bulleted list and use a double right-pointing triangle symbol (Webdings, Character code 56).
    3. Open the Paragraph dialog box and confirm the left indent is 0.25″ and hanging indent is 0.25″. If not, change the settings.
    4. Set Before and After paragraph spacing to 2 pt. and deselect the Don’t add space between paragraphs of the same style check box.
    5. Use the Format Painter to apply this bulleted list format to the following text in the following sections: “Tips to Professors and Staff” and “Response to Students.”
  11. Change indent and paragraph spacing and apply a style.
    1. Select the text below the “Emergency Telephone Locations” heading.
    2. Set a 0.25″ left indent.
    3. Set Before and After paragraph spacing to 2 pt.
    4. Confirm the Don’t add space between paragraphs of the same style box is unchecked (Paragraph dialog box).
    5. Apply Book Title style to each of the telephone locations in the “Emergency Telephone Locations” section. Select only the location, not the text in parentheses or following text.
  12. Change left indent and paragraph spacing and set a tab stop with a dot leader.
    1. Select the text below the “Emergency Phone Numbers” heading.
    2. Open the Paragraph dialog box and set a 0.25″ left indent for this text.
    3. Set Before and After paragraph spacing to 2 pt. and confirm the Don’t add space between paragraphs of the same style box is unchecked.
    4. Open the Tabs dialog box, set a right tab stop at 7″, and use a dot leader (2).
    5. Press Tab before the phone number (after the space) on each of these lines. The phone numbers align at the right margin with a dot leader between the text and phone number.
  13. Apply the Intense Reference style to the paragraph headings in the “Accident or Medical Emergency” section (“Life-Threating Emergencies” and “Minor Emergencies”). Include the colon when selecting the paragraph headings.
  14. Use the Replace feature to replace all instances of “Phone 911” with “CALL 911” with bold font style. Note: If previous Find or Replace criteria displays in the Replace dialog box, remove this content before performing this instruction.
  15. Insert a footer with document property fields and the current date that appears on every page.
    1. Edit the footer on the first page and use the ruler to move the center tab stop to 3.5″ and the right tab stop to 7″.
    2. Insert the Title document property field on the left. Use the right arrow key to deselect the document property field.
    3. Tab to the center tab stop and insert the Company document property field at center. Use the right arrow key to deselect the document property field.
    4. Tab to the right tab stop, insert (not type) the date (use January 1, 2020 format), and set it to update automatically.
    5. Change the font size of all the text in the footer to 10 pt.
    6. Add a top border to the text in the footer using the Borders drop-down list and close the footer.
  16. Use the Borders and Shading dialog box to insert a page border on the entire document.
    1. Use Shadow setting and solid line style.
    2. Select the fifth color in the first row of the Theme Colors (Dark Red, Accent 1) and 1 pt. line width.
  17. Center the entire document vertically (Hint: use the Page Setup dialog box).
  18. View the document in Side to Side page movement view [View tab, Page Movement group] and then return to Vertical page movement view.
  19. Save and close the document (Figure 2-119).
  20. Upload and save your project file.
  21. Submit project for grading.

IT project management

 

PART 1: PROJECT MANAGEMENT SCENARIO (20%) 

This part of the in-course assessment is intended to address Learning Outcomes 1, 2. For this part of the assessment, you are required to critically scope and author a project management case scenario which should contain sufficient appropriate detail for analysis and determination of an IT-related project management strategy, plan and toolset. This scenario could be fictitious or based on a real business need.Start with describing the business case and value(s) of the project, then add both qualitative and quantitative details to explain the scenario in more depth. The data might be used in the formulation of your plan or toolset. You can use appendices for finer details.

Word count for Part1: approx. 1,000 words (guideline only).

PART 2: PROJECT MANAGEMENT STRATEGY & PLAN (50%) 

This part of the in-course assessment is intended to address Learning Outcomes 1, 2, 5, 6, 7.  In this part of the assessment you will review, develop and defend a case for adopting a specific project management life cycle (PMLC) and develop a suitable project management plan. The aim is to demonstrate knowledge of alternative philosophies and project planning artefacts, critically evaluating which broad methodological approach (and toolset) would fit your described project scenario. It is therefore expected that you will analyse your scenario, compare and contrast project management approaches, then select the most appropriate ones for your scenario and justify your choices. 

Word count for Part 2: approx. 2,000 words (guideline only).

PART 3: TOOLSET (30%) 

This part of the in-course assessment is intended to address Learning Outcomes 3, 4.  In this part of the submission you are required to employ a suitable toolset portfolio, demonstrating how the tools advocated would / could be applied to the given project management scenario. You may use live case data, plausible invented data, or an exemplar, illustrative presentation of critical tools in your toolset. 

Word count for Part 3: approx. 300 words (guideline only),plus associated illustrations

biometric and random numbers

1. Select one of these biometric techniques and explain the benefits and the  vulnerabilities associated with that method in 3-4 paragraphs (100-200 words).

1.Fingerprint recognition 2. Signature dynamics 3. Voice prints 4. Face recognition

2. In this module, you learned that random numbers (or, at least, pseudorandom numbers) are essential in cryptography, but it is extremely difficult even for powerful hardware and software to generate them. Go online and conduct research on random number generators. What are the different uses of these tools besides cryptography? How do they work? Explain your answer using your own words in 2-3 paragraphs (100-200 words).

want an essay to complete within 3 hours ?

Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Requirements:

Provide a 500 word (or 2 pages double spaced) minimum reflection.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

Share a personal connection that identifies specific knowledge and theories from this course.

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 

You should NOT, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace. 

Network Forensics-1

In this module, we will discuss network forensics. We move away from cellular/smartphone discovery and look at the wired and wireless investigation. We will use the European Union Agency for Cybersecurity’s Introduction to Network Forensics guide. 

The document is available at:

https://www.enisa.europa.eu/topics/trainings-for-cybersecurity-specialists/online-training-material/documents/introduction-to-network-forensics-handbook.pdf

1) What types of network investigations are typical of those that fall under the topic of network forensics?

2) How is information acquired from the various types of networks?

3) Describe several tools for network forensics and how the tools function? 

· No Plagiarism 

· Each Answer Should be 400 words without References.

!!! NEED 2  ANSWERS FOR THIS QUESTION WITH 0% PLAGIARISM !!!!

chryptography and BI

Q1.  Check out this website called  The 25 Best Data Visualizations of 2019. Select one data visualization            example that appeals to you the most. Using your own words, answer the following questions:

  • Why do you think it was identified as one of the 25 best?
  • How many dimensions of information were captured?
  • Do you find the data useful?
  • What do you like most about it?
  • What do you like least?

response should be 250-300 words.

There must be at least one APA formatted reference (and APA in-text citation) to support the thoughts in the post.  Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations

Q2. What are the privacy issues with data mining? Do you think they are substantiated?

response should be 250-300 words

There must be at least one APA formatted reference (and APA in-text citation) to support the thoughts in the post.  Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations.

Q3.Complete the following assignment in one MS word document.

When submitting work, be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) to support the work this week.

All work must be original (not copied from any source).

 1.How do you describe the importance of data in analyt- ics? Can we think of analytics without data? Explain.(150 to 200words)

2.Considering the new and broad definition of business
analytics, what are the main inputs and outputs to the
analytics continuum?(150 to 200words)

3.Where do the data for business analytics come from?
What are the sources and the nature of those incoming
data?(150 to 200words)

4.What are the most common metrics that make for
analytics-ready data?(150 to 200words)

5.Go to data.gov—a U.S. government–sponsored data portal that has a very large number of data sets on a wide variety of topics ranging from healthcare to edu- cation, climate to public safety. Pick a topic that you are most passionate about. Go through the topic-specific information and explanation provided on the site. Explore the possibilities of downloading the data, and use your favorite data visualization tool to create your own meaningful information and visualizations.( 200-250 words)

6.Define data mining. Why are there many names and definitions for data mining?(150 to 200words)

7.What are the main reasons for the recent popularity of data mining?(150 to 200words)

8.Discuss what an organization should consider before making a decision to purchase data mining software.(150 to 200words)

9.Distinguish data mining from other analytical tools and
techniques.(150 to 200words)

10.Discuss the main data mining methods. What are the
fundamental differences among them?(150 to 200words)

11. Visit teradatauniversitynetwork.com. Identify case studies and white papers about data mining. Describe recent developments in the field of data mining and predictive modeling.(250to 300words)

Q4. analyze the history of the Caesar Cypher and its impact on cryptography.  Feel free to also include the impact of items such as the Scytale and the Polybius square.  All of these were used long before computers.You must use at least one scholarly resource.  Every discussion posting must be properly APA formatted.(250 -300WORDS)

Operational excellence assignment week 7

 

Chapter 11 – Review the employment challenge in the digital era (as well as the entire chapter).  Reflect on the various challenges are present in the digital era.  Will things get better or more complicated as times goes on?  Explain.  What are some methods to assimilate new generations into the workforce to think about competitive advantage?

The above submission should be one -page in length and adhere to APA formatting standards.

**Remember the APA cover page and the references (if required) do not count towards the page length**

week 6

 

This week’s journal article focuses on attribution theory and how it  influences the implementation of innovation technologies. Two types of  employee attributions are noted in the article (intentionality and  deceptive intentionality), please review these concepts and answer the  following questions:

Provide a high-level overview/ summary of the case study

Note how constructive intentionality impacts innovation implementations

Find another article that adds to the overall findings of the case  and note how attribution-based perspective enhances successful  innovation implementations. Please be explicit and detailed in answering  this question.

Be sure to use the UC Library for scholarly research. Google Scholar  is also a great source for research. Please be sure that journal  articles are peer-reviewed and are published within the last five years.

The paper should meet the following requirements:

3-5 pages in length (not including title page or references)

APA guidelines must be followed. The paper must include a cover  page, an introduction, a body with fully developed content, and a  conclusion.

A minimum of five peer-reviewed journal articles.

The writing should be clear and concise. Headings should be used to  transition thoughts. Don’t forget that the grade also includes the  quality of writing.