Contracting & Service Level Agreements

 

Discuss in 500 words or more the top 5 details that should be included in your cloud SLA.

Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes.

Write in essay format not in bulleted, numbered or other list format. 

BSWA10

 

You are the web master for the Republican Party National Committee. Prepare a risk assessment analysis for your website. Some questions to consider:

  • Who is likely to attack your site?
  • When are attacks likely to occur?
  • What sort of attacks might take place?
  • How can you best minimize attacks and protect the integrity of your site?

Write between 200-300 words.

Use your own words.

cis210 essay

 

You were talking to members of your favorite local band after a recent show. The topic of software came up, and the leader said she has a love-hate relationship with it. She loves the recording software they use and is okay with QuickBooks for the band’s financial records. But, she does not like the available options to track bookings and create set lists that draw from their entire repertoire.

In addition to their regular weekly gigs, the band performs for many school assemblies and community events. They have to pick music that’s appropriate for the audience and the theme without being repetitive. They are constantly adding new songs to their catalog, and putting others on hiatus. The band likes to take requests, so they frequently update the set list after a gig. The band does not want to bother entering chords or lyrics because they don’t use computers or phones on stage.

You offer to put together a system design to address the band’s needs. It’s okay to collect ideas by looking at off-the-shelf solutions, but the design must be your own for this assignment. Include the following in your design:

1. A list and short explanation of each function to manage:

  1. the band’s song catalog,
  2. bookings,
  3. set lists, and
  4. any other category you believe is important for this application.

2. A logical data design that supports all of these functions. Use either an entity-relationship or a UML class diagram, which should be in third normal form. Indicate all primary keys, relationships, and cardinalities.

3. Recommend a system architecture that identifies the hardware and software components and how they interact. Include a short (not more than 500 words) description and rationale. Illustrate using your choice of a static functional decomposition or object-oriented diagram.

4. Identify security concerns and other nonfunctional requirements for this system.

5. Propose at least three distinct and measurable criteria to evaluate the quality of the finished software.

Important Note: The required attached template must be used for this assignment and is not optional. It has been designed so that papers are logically organized and includes prompts for all required information for the assignment. Assignments submitted not using this template will be returned ungraded and must be resubmitted using the template. Late penalties on improperly submitted papers will apply in accordance with the published late policy.

COM303 Week 3 Discussion 8

  

Put the word family into an internet browser search engine and then select “images” to look at the photos, cartoons, etc. that pop up when we look up the word family. What do you notice about those ‘families’ that the internet determines are families? Are there any disturbing trends? Any reassuring trends? Choose one photo that came up in your search and analyze it based on the elements and qualities your book uses to explain the family unit. (Be sure to include a link to the photo or upload it directly in your post.)

IT 345 week 4 discussion

 

Week 4 Discussion

Welcome to Week 4

This week we will explore intellectual property. Most people do not know what intellectual property is, yet it is extremely important. Intellectual property is not specific to large corporations. Rather, individuals can also generate intellectual property. We also explore challenges of new technologies and how they affect copyright laws.

Pick a topic below and post your reply by Wednesday at midnight. Your response should be at least 400 words and appropriately cites your resources.

You will not be able to see your classmates’ posts until you make your first post.

topic

  • What do you think the impact would be on creative industries, such as music, movies and fiction novels, if copyright laws did not protect intellectual property?

Study question and assignment

Information Systems for Business and Beyond Questions

  • Chapter 11 – study questions 1-10, Exercise 1, 3 & 4

Information Technology and Organizational Learning Assignment:

  • Chapter 9 – Review the section on Establishing a Security Culture.  Review the methods to reduce the chances of a cyber threat noted in the textbook.  Research other peer-reviewed source and note additional methods to reduce cyber-attacks within an organization.

ET WK1 – S

400 words

After reading below two articles and any other relevant research you locate, please discuss the following: 

Please summarize, in your own words, a description of enterprise risk management. Why do you feel ERM is different from traditional risk management?

 Readings:

 Requirements:

  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA 7)