dis_dmwk2

 What’s simple random sampling? Is it possible to sample data instances using a distribution different from the uniform distribution? If so, give an example of a probability distribution of the data instances that is different from uniform (i.e., equal probability). 

Prof writing & proposal Devel(DSRT 837)

 

Task: Write a condensed (2.5 – 3 pages or more is fine) chapter 1 for your mock dissertation topic.  You will use the section headers required from the university dissertation handbook.  See examples provided and the rubric. 

The following section headings are required:

  • Overview (1-2 well developed paragraphs)
  • Background and problem statement (1-2 well developed paragraphs)
  • Purpose of the study (1 well developed paragraph)
  • Significance of the study (1 well developed paragraph) 
  • Research Questions (numbered list)
  • Limitations of the Study (1 short paragraph)
  • Assumptions (1 short paragraph)
  • Definitions (list)
  • Summary (1 well developed paragraph)

Imoprtance of strategic IT planning 7

Discussion: Virtualization

Discuss the benefits of virtualization software, as described in the text. Do you agree/disagree with these benefits, or can you think of additional benefits not already presented?  Also discuss the security concerns highlighted by server sprawl and how you would propose to solve those in your (real or hypothetical) organization.

At least one scholarly source should be used in the initial discussion thread. Use proper citations and references in your post.

Note: Answer should be a minimum of 300 words and APA format

Assingment

  

Practical Connection Assignment

At UC, it is a priority that students are provided with strong educational programs and courses that allow them to be servant-leaders in their disciplines and communities, linking research with practice and knowledge with ethical decision-making. This assignment is a written assignment where students will demonstrate how this course research has connected and put into practice within their own career.

Assignment:
Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Requirements:

Provide a 500 word (or 2 pages double spaced) minimum reflection.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited. 

Share a personal connection that identifies specific knowledge and theories from this course. 

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 

You should NOT, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace. 

Week 4 Research Paper: ERM Strategy

 The reading this week discusses strategy and how ERM can be integrated with an organization’s overall strategy. Prepare a research paper on some of the various issues, protocols, methods, frameworks you found and discuss how – if possible – organizations can use ERM as strategy. It is perfectly acceptable if you deem ERM cannot be used as strategy, just back up your claim with scholarly research and justifications. Your paper should meet these requirements: 

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Final Project Paper

  

Topic: Home Automation Security and Vulnerabilities

Need to write 600-word paper (excluding References and Title page) written in APA format, showing sources/References and one page with bibliography

 Abstract:

We all recognize that the home technologies are designed such that it makes our lives easier, comfortable and also more convenient. But new conveniences should not mean to bring new problems but that indeed the case is in most of the cases in the current world. The issues of using automation in everything are most often discussed on social media or any blogs etc. For example, connecting home appliances/devices to the Internet makes you dependent on the connection quality and the servers they operate on. In parallel, cybercriminals are waiting on a poor link where they can use those points of entry gain control on the equipment that is open and vulnerable for attacks and use it to their own advantage in most cases. Many studies recently have revealed that number of ways are still there to take control of a smart home equipped and connected with smart devices. One such issue for example, could be a vulnerability in the cloud server with the help of which the home owner controls the house remotely using the controls that operates the devices, or even something seemingly innocuous like a smart light switch. In this paper, we will get in to more details of what devices are currently used as smart home safety/convenient devices and how vulnerable they are with some examples which happened in the real world. Safety measures that can be put in practice if equipped with this technology and other safety practices when decided to use this smart/convenient devices at home.

Discussion-2

  Jamsa (2013) noted that “several  companies provide cloud-based backup capabilities.” The author asserted  that the features most companies provide are similar.  One pf  the features he mentioned is file being backed up in an  encrypted format. List this along with the additional three features,  and in your own words explain how utilizing each contribute to  organizational success. 

Research paper- Smart cities

Deadline: 1/14

Pages: 4-6

This week’s reading centered around how Big Data analytics can be used with Smart Cities. This is exciting and can provide many benefits to individuals as well as organizations. For this week’s research assignment, you are to search the Internet for other uses of Big Data in RADICAL platforms. Please pick an organization or two and discuss the usage of big data in RADICAL platforms including how big data analytics is used in those situations as well as with Smart Cities. Be sure to use the UC Library for scholarly research. Google Scholar is the 2nd best option to use for research.Your paper should meet these requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Web Technologies, Use of Social Media in Business

Overview:

Congratulations! You have been hired as the IT manager at the local hospital; the job

you applied for in the previous unit. Part of your 60-90-day plan is preparing a presentation for the executive board.

Instructions:

Your IT director asked you to prepare a 5-6-page PowerPoint presentation where you

explain the following concepts:

1) The functionality of various web technologies: HTML, XML, XHTML, CSS, etc.

And how they could be used to improve the Hospital’s website?

2) Your hospital is currently ranked as second in your region, how can better use of

social media as part of the hospital’s web strategies improve its position?

3) Part of the low-ranking came from a breach on the hospital’s website.

a. How can we remediate this from happening again?

b. Why are we not safe and immune from online annoyances such as spam and adware?

c. How can we further secure our system from malware?

Requirements:

• This assignment is a PowerPoint presentation consisting of 5-6 slides, using APA

formatting and citations.

• Include two references.

Be sure to read the criteria by which your work will be evaluated before you write

and again after you write.