Asg2

 

Hello,

i need this paper by  today 4pm cst.

Strictly No plagiarism please use your own words.

Requirements:

· Provide a 500 word (or 2 pages double spaced) minimum reflection.

· Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

· Share a personal connection that identifies specific knowledge and theories from this course.

· Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment.

How Network security and proxy related to cryptography.

this is my topic.

· You should not provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.

one page excluding citations

 

find an article that discusses cloud security and/ or data breaches 

Discuss how the company approached the problem or what they should have had in place based on the NIST standards.

Twitter discussion board

Twitter discussion board

1818 unread replies.1818 replies.

Twittering became virtually an overnight sensation, but some question its usefulness.

Do you want to know the routine activities your friends (or other individuals you choose to follow) are doing during the day?

Do you follow anyone on Twitter or do you tweet regularly?   Why or why not?

Because Twitter updates have to be very short, some may think that twittering on the job does not take up enough time to be a concern, but what about the distraction factor?

Should employers allow employees to use Twitter, Facebook, and other popular online activities during work hours? Why or why not?

OPERATING SYSTEM – 2

 

  • Briefly describe how the BIOS boots or starts the computer and the operating system.
  • Describe utilities that are on your Windows OS under System Information, Task Manager, and  Resource Monitor.
  • Provide a screenshot of the Performance and Overview tabs of your computer. (If you feel  that a screenshot shows too much personal information, you can choose another tab or decline this part of the assignment.)

Fortune 1000

This week’s article provided a case study approach which highlights how businesses have integrated Big Data Analytics with their Business Intelligence to gain dominance within their respective industry.  Search the  Google Scholar for a “Fortune 1000” company that has been successful in this integration. Discuss the company, its approach to big data analytics with business intelligence, what they are doing right, what they are doing wrong, and how they can improve to be more successful in the implementation and maintenance of big data analytics with business intelligence. 

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

InfoTech Import in Strat Plan (ITS-831)

Discussion: IT Governance

Word Count: 300+ words

What do you think were the critical factors that fueled the need for IT governance? In what ways did ISO affect the standards for network security?

Provide an outside source that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)

At least one scholarly source should be used in the discussion. Be sure to use information from your readings and other sources. Use proper citations and references in your post.

Reading resources:

Chapter 9, “Governance of the Information Systems Organization”. Managing and Using Information Systems, Keri E. Pearlson, Carol S. Saunders, Dennis F. Galletta, John Wiley & Sons 

Sari, R., Kosala, R., Ranti, B., & Supangkat, S. H. (2018). COSO Framework for Warehouse Management Internal Control Evaluation: Enabling Smart Warehouse Systems. 2018 International Conference on ICT for Smart Society (ICISS), 1. Retrieved from https://doi.org/10.1109/ICTSS.2018.8549983

Bailey, E., & Becker, J. D. (2014). A comparison of IT governance and control frameworks in cloud computing. Twentieth Americas Conference on Information Systems, Savannah. Retrieved from https://aisel.aisnet.org/cgi/viewcontent.cgi?article=1160&context=amcis2014

plagiarism check required, Good work, APA format, within 8hrs

CLoud Computing Questions

1.  250 words

Discuss the pros and cons of using a blog to present content on behalf of a company. Discuss the type of content for which a blog may be most appropriate.  Use at least one source to support your discussion.  Reference your source in APA.

2.  250 words

CASE 6-3 Dropbox Cloud-Based File Sharing and Synchronization (15 pts)

Most users today manage their content on a variety of devices. Dropbox is a cloud-based storage facility for photos, documents, and other digital content. Dropbox provides a convenient folder, as shown in Figure 6-7 of you Jamsa (2013) textbook. In one page, discuss the benefits of having web-based access to a cloud storage area.

The paper must adhere to APA guidelines including Title and Reference pages.  There should be at least one source listed on the reference page.  Each reference cited in the text must appear in the reference list, and each entry in the reference list must be cited in text. APA requirements for this class include:

  • A title page
  • 12-point Time New Roman font
  • Your paper should be typed and double-spaced with 1″ margins on all sides
  • The first sentence of each paragraph should be indented one tab space
  • All papers should contain the page number, flush right, in the header of every page. Use the automatic page-numbering function of your word-processing program to insert page numbers in the top right corner; do not type page numbers manually.
  • APA 7th edition in-text citations
  • Reference page

The Title and Reference pages do not count towards the page count requirement. This paper should be written in third-person. The third-person point of view belongs to the person (or people) being talked about. The third-person pronouns include he, him, his, himself, she, her, hers, herself, it, its, itself, they, them, their, theirs, and themselves (Not I, we, us, our).

Discussion post – Blockchain

The vast majority of the population associates Blockchain with cryptocurrency Bitcoin; however, there are many other uses of blockchain; such as Litecoin, Ether, and other currencies.

question1) In this discussion, please describe at least two cryptocurrencies with applicable examples. Discuss some similarities and differences. 

question2) Lastly, discuss if you have any experience using any cryptocurrencies. 

Note: Minimum 250 words. Use atleast one google scholarly article. Intext citation should be added.