Networking
Discussion-5 MM
Select one element of the Marketing mix and discuss how marketing research could help that area. Be specific in your recommendations.
1. DISCUSSION: Using 300-350 words, write a brief discussion, in your own words of how the article relates to the selected chapter Key Term. A discussion is not rehashing what was already stated in the article, but the opportunity for you to add value by sharing your experiences, thoughts and opinions. This is the most important part of the assignment.
2. REFERENCES: All references must be listed at the bottom of the submission–in APA format. (continued) Be sure to use the headers in your submission to ensure that all aspects of the assignment are completed as required. Any form of plagiarism, including cutting and pasting, will result in zero points for the entire assignment.
PPT
PPT on this topic: Apple versus FBI: privacy versus security
Group PowerPoint Assignment: (50 points)
• Minimum 20 slides (does not include title and reference slides).
• 2 slides per student
• Minimum 6 references
• APA Format
• PowerPoint presentation should use graphics to convey key concepts and have in slide citations. Use the notes section of PowerPoint to elaborate on key points.
cloud computing
NO PLAGARISM
In 500 words or more, compare DNS failover and cloud failover.
Use at least three sources. Use the Research Databases available from the Danforth Library not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list. Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs. Stand alone quotes will not count toward the 3 required quotes.
Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0.
Write in essay format not in bulleted, numbered or other list format.
Do not use attachments as a submission.
Reply to two classmates’ posting in a paragraph of at least five sentences by asking questions, reflecting on your own experience, challenging assumptions, pointing out something new you learned, offering suggestions. These peer responses are not ‘attaboys’. You should make your initial post by Thursday evening so your classmates have an opportunity to respond before Sunday.at midnight when all three posts are due.
It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your post and that you reply to two classmates in a substantive way (not ‘nice post’ or the like). Your goal is to help your colleagues write better. Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. . I will not spend a lot of my time trying to decipher nonsense. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about. Please do not submit attachments unless requested.
Final research Paper
Start your paper with an introductory paragraph.
Prompt 1 “Blockchain” (600 words): Explain the major components of blockchain. Be sure to include how blockchain is affecting a global economy and how you see it growing in the future.
Prompt 2 “Big Data” (600 words): Describe your understanding of big data and give an example of how you’ve seen big data used either personally or professionally. In your view, what demands is big data placing on organizations and data management technology? How does big data affect a global economy?
Prompt 3 “Government and Policies” (600 words): Discuss the role government plays in a global economy. Also, look at what policies are currently in place and then discussion what policies should be put in place.
Conclude your paper with a detailed conclusion section.
The paper needs to be approximately six to eight pages long, including both a title page and a references page (for a total of eight to ten pages). Be sure to use proper APA formatting and citations to avoid plagiarism.
Your paper should meet these requirements:
Be approximately six to eight pages in length, not including the required cover page and reference page.
Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook.
Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.
1
1. There are three common Cloud Service Models. Define one and identify at least three cons and three pros for that particular Cloud Service Model. – 1 page
2. Identify and define at least three Cloud Deployment Models. What are their characteristics? What are the pros and cons? Two page minimum (cover sheet does not count) Double Spaced APA Format
3. Describe how a cloud-based database management system differs from an on-site database. – 1 page
4. Here is a questionnaire for you to take on your “Influencing Style”. Provide feedback on how it relates to you and your style. How might you use your style with organization management? How does your style prepare you for operations strategy? – 1 page (attached PDF)
cloud computing audit
Describe in 350 words discuss the scope of a cloud computing audit for your business.
Module 3 Discussion Questions
1. What is the difference between an IT security policy and IT procedures? Provide details to support your answer. HINT: Search the internet for Policy verse Procedure links. Include references to support your reasons in APA format.
2. What type of information should be included in IT procedures for IT equipment and tools? Provide details to support your answer. Include references to support your reasons in APA format.
3. Should the detailed information of the IT network structure and security tools be included in the general IT security procedures manual for unrestricted access? Give a reason for your comment. Include references to support your reasons in APA format.
Please check for grammatical errors. Please answer each question by number. Please don’t use books or journals as references.
M-7 Writing Assignment
Create a Gmail account to be used for encryption. Download and configure Thunderbird, GnuPG, and Enigmail to work with your new Gmail account. Document your findings and observations in 1200 words with references and following APA writing standards.
Use these websites: