Apply: Signature Assignment: Internet Systems Technologies Comparison

 

Assignment Content

  1. Imagine this scenario: Pine Valley Furniture wants to use Internet systems to provide value to its customers and staff. There are many software technologies available to Internet systems development teams, including SOAP, HTML, JSON, XML, CSS, ASP.NET, Objective-C, PHP, Java™, Python, Ruby, AJAX, Swift™, AngularJS, Bootstrap, jQuery, and R.

    Choose 1 of the following formats for this assignment:

    • Comparison table (3–4 pages)
    • Tabbed spreadsheet with a supporting narrative
    • Address the following items in your assignment:
    • Compare at least 3 Internet systems developments software technologies for use at Pine Valley Furniture.
    • Analyze how the selected Internet systems developments software technologies support Pine Valley Furniture’s core business processes.
    • Justify why an Internet systems developer might choose a specific type of technology instead of another type of technology for Pine Valley Furniture.
    • Explain how these technologies can bring value to Pine Valley Furniture.
    • Incorporate additional research to support your comparison.
    • Cite references to support your assignment.

      Format your citations according to APA guidelines.

      Submit your assignment.

Case3

 

Read the mini-case, Innovation at international Foods (pp. 234-238).

Submit a Word document with answers to questions one and two on page 238. Your answer to question one should include strategies for overcoming each of the IT related problems and be about two pages long. Your answer to question two should be about two pages long.

Your submission must meet the following criteria: 

  • Use APA level one headings to separate your answers to each question.
  • Comply with the APA and writing standards for this course. Use    Dr. Straw’s APA and writing checklist  for guidance.
  • Have two scholarly sources, not including our textbook.

SafeAssign is designed to detect plagiarism, which is stealing the sentences of others and claiming them to be your sentences. You must not plagiarize. You must write your own sentences and paragraphs. Therefore, you must follow these SafeAssign instructions. Failure to follow these SafeAssign instructions will result in a grade of zero with no opportunity for resubmission and no opportunity for regarding. If your SafeAssign score is above 25% after the paper submission deadline and you do not include the comment in item v below, your paper will receive a zero.

 

  1. Submit your paper to Blackboard.
  2. Look at your SafeAssign score. Your SafeAssign score will be available between 10 minutes and 24 hours after submitting your assignment. You are responsible for managing your time to ensure you have enough time to evaluate your SafeAssign score, make changes to your paper, and resubmit your work by the due date. Plan accordingly.
    1. If your SafeAssign score is 25% or below then you are done. You do not need to do anything else.
    2. Do the following if your SafeAssign score is over 25%. You must do step v below even if the primary reason for your high SafeAssign score is not plagiarism.
      1. Review your SafeAssign Originality Report to understand your score.
      2. You can ignore headings, textbook questions, legitimate quotations with APA citations, and references that are flagged by SafeAssign.
      3. Any other sentences that are flagged by SafeAssign must be rewritten by you in your own words. Do not steal the sentences of others.
      4. Rewrite content, other than the items listed in ii above, and resubmit your paper to Blackboard. You are not required to get your SafeAssign score down to or below 25%. You are required to correct all content, not including items listed in ii above, flagged by SafeAssign. 
      5. In the assignment comments section for your last submission write these words: “I have corrected all content (excluding headings, textbook questions, legitimate quotations with APA citations, and reference) that were flagged by SafeAssign in my previous submission.” 

COmputer, Email and Internet acceptable policy

You have been hired as the CSO (Chief Security Officer) for an organization. Your job is to develop a very brief computer and internet security policy for the organization that covers the following areas:

  1. Computer and email acceptable use policy
  2. Internet acceptable use policy

Make sure you are sufficiently specific in addressing each area. There are plenty of security policy and guideline templates available online for you to use as a reference or for guidance. Your plan should reflect the business model and corporate culture of a specific organization that you select. 

 Include at least 3 scholarly references.  

Your paper should meet the following requirements:

• Follow APA6 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

Block Chain Development discussion

In chapter 2, the author describes Hyperledger Fabric and its components. choose one of the Hyperledger design principles described in chapter 2, and explain why your chosen design principle is important to a successfully enterprise blockchain implementation. 

Also give three questions you’d like to ask other students and add these to the end of your discussion. The questions should be taken from material you read in Chapter 1 or 2. 

You must do the following:

1) As indicated above, choose one of the Hyperledger design principles described in chapter 2, and explain why your chosen design principle is important to a successfully enterprise blockchain implementation. Then think of three questions you’d like to ask other students and add these to the end of your discussion. The questions should be taken from material you read in Chapter 1 or 2. You’re not trying to test each other, but you are trying to start a discussion.

Discussion

 

This discussion topic is to be reflective and will be using your own words and not a compilation of direct citations from other papers or sources. You can use citations in your posts, but this discussion exercise should be about what you have learned through your viewpoint and not a re-hash of the course  Data Science & Big Data Analysis and any particular article, topic, or the book.

Items to include in the initial thread: 

  • “Interesting Readings” – What reading or readings did you find the most interesting and why? “Interesting Readings”
  • “Perspective” – How has this course changed your perspective? 
  • “Course Feedback” – What topics or activities would you add to the course, or should we focus on some areas more than others? 

research paper

 

Project Based Midterm

You have been asked by management (manufacturing, healthcare, retail, financial, and etc. ) to create a demo using a data analytic or BI tool. It is your responsibility to download and produce outputs using one of the tools. You will need to focus your results on the data set you select.  

Ensure to address at least one topic covered in Chapters 1-5 with the outputs. The paper should include the following as Header sections.

Introduction
History of Tool [Discuss the benefits and limitations] Review of the Data [What are you reviewing?] Exploring the Data with the tool
Classifications Basic Concepts and Decision Trees
Classifications Alternative Techniques
Summary of Results
References

Ensure to use the Author, YYYY APA citations with any outside content.

Types of Data Analytic Tools

https://www.octoparse.com/blog/top-30-big-data-tools-for-data-analysis/
Excel with Solver, but has limitations
R Studio
Tableau Public has a free trial
Microsoft Power BI
Search for others with trial options

Examples of Dataset

https://www.forbes.com/sites/bernardmarr/2016/02/12/big-data-35-brilliant-and-free-data-sources-for-2016/#4b3e96f1b54d

  textbook – Introduction to mining – Tan, Steinbach, Karpatne, Kumar. 

RM DISCUSSION-5

 Discussion: Should be between 250-to-300 words. 

DUE DATE: Saturday End of Day USA time (3 days from now)

Reply: I need 2 replies. Reply is nothing but just additional 100-150 words on same topic but as a different paragraph. (I won’t send any replies to you and then you send info on that. NO) 

DUE DATE: Saturday End of Day USA time (6 days from now)

Topic: 

From your research, discuss whether or not your organization has ISO 27001 certification. Outside of overall protection from cyber-attacks, describe, in detail, some other benefits your organization will achieve in obtaining this certification. If your company does not have this certification, how can they go about obtaining it?

Present your discussion post as if you were presenting to senior leaders of your company.

Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:

Health Care Standards

The health cares sector derives its policies from two standards. The HIPAA Security Rule and HIPAA Privacy Rule. In 80 words or more discuss the two and how they are interrelated.

Research Paper

 

The COSO framework of internal controls is practiced within companies around the world. The objectives of the COSO framework are closely related to its five components. For this week’s activity, please discuss these five components of the COSO framework. Be sure to include each components’ impact on each of the COSO framework objectives. What do you feel an auditor would most be concerned with during an IT audit? Lastly, discuss suggestions for integrating COSO framework compliance into a company in which you are familiar. 

Your paper should meet the following requirements:

• Be approximately four to six pages in length, not including the required cover page and reference page.

• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

DISCUSSION 9

“The Importance of Reports” 

  • Explain in your own words the importance of documentation in forensic analysis. Determine what you consider to be the most difficult task in writing a system forensics report. Justify your point.
  • Decide whether software-generated reports assist with this specific portion of the report writing process and provide a rationale for your response. Provide a website or online resource that could assist with the documentation.