Week 4 Research Paper – Info Tech Import Strat Plan

This week, you have read about server virtualization and cloud computing in chapter 6 of your textbook. For your written assignment this week, complete a case study of the organization you work for (use a hypothetical or “other” organization if more applicable) that will address the following prompts:

 • Describe the organization’s environment, and evaluate its preparedness for virtualization.

• Explain Microsoft (or another product) licensing for virtualized environments.

• Recommend a configuration for shared storage; make sure to discuss the need for high availability and redundancy for virtualization for the organization.

• Explain Windows Azure capabilities for virtual machines and managing a hybrid cloud, including Windows Azure’s Internet as a Service (IaaS) and storage capabilities

Make a recommendation for cloud computer use in the organization, including a justification for your recommendations.

Submit your midterm research paper as a single document. Your paper should meet the following requirements:

• Be approximately four to six pages in length (1200-1800 words), not including the required cover page and reference page.

• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Python homework

Modify the Pi Simulation program to improve its appearance, behavior, and/or code in order to meet the quality objectives. You should implement at least 5 modifications.  Be sure to use comments to identify each of your modifications.

4s week 13 assignment IA

In 350 words,

Explain your thoughts on the future of IoT and the security implications. Why do you believe it is important to secure these devices as they become more common in our lives and our businesses? 

Include references.

No copy-paste, use your own words.

Discussion

Maintaining compliance with laws and regulations in a complex IT environment is difficult. The vast array of regulations a company must comply with is constantly increasing and changing.  Each state has its own set of laws and regulations that indicate who is covered by the law & what event triggers consumer notifications.  Laws which require notifying consumers of data breaches are a good example of conflicting rules.  

1. Discuss the importance of collaboration and policy compliance across business areas

2. How can penetration testing be used to help ensure compliance?

VBA Coding Challenge

  • Create a script that will loop through all the stocks for one year and output the following information.

CHALLENGES

  1. Your solution will also be able to return the stock with the “Greatest % increase”, “Greatest % decrease” and “Greatest total volume”. The solution will look as follows (attachment).  
  2. Make the appropriate adjustments to your VBA script that will allow it to run on every worksheet, i.e., every year, just by running the VBA script once.

Other Considerations

  • Use the sheet alphabetical_testing.xlsx (attachment 4) while developing your code. This data set is smaller and will allow you to test faster. Your code should run on this file in less than 3-5 minutes.
  • Make sure that the script acts the same on each sheet. The joy of VBA is to take the tediousness out of repetitive task and run over and over again with a click of the button.

Submission

  • To submit please upload the following to Github:
    • A screen shot for each year of your results on the Multi Year Stock Data.
    • VBA Scripts as separate files.

Practical Connection Assignement

Assignment:
Reflect on at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Requirements:

Provide a 500 word (or 2 pages double spaced) minimum reflection.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

Share a personal connection that identifies specific knowledge and theories from this course.

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 

You should NOT provide an overview of the assignments assigned in the course. The assignment asks that you reflect on how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace

My role :SAP Analyst

discussion help minimum 300 words

Discuss a particular type of Malware and how has it been used in “todays news” and the respective impact on cyber security. Add to your discussion ways the Malware could have been detected and potentially avoided.

Read Chapter 1 of the assigned textbook.

Book reference:

Computer Security: Principles and Practice

Fourth Edition By:  William Stallings and Lawrie Brown

HRM DIS L: 8, D 1

A coworker just brought you a union leaflet urging employees to sign an authorization card. What questions would you ask of the union supporter? Name a minimum of 5 questions that you can ask. What may happen from this point on?

a) Your discussion should be in APA format with 250 words You must have a minimum of two sources to support your answer.  You must have two intext citations of sources in which you cite the author and the date of the article.  

b) Response to another student 150 words minimum 

EH 5 paper

In 250 words
 

Develop your own crime scenario. Explain the incident that occurred, and then list the steps you would follow to solve this case (examples might include: a lost child, an unauthorized charge on your credit card, an unidentified charge made with your EZ PASS, etc.).