Need solution to this MCQ questions in brief details.
Glb ethics
Topic:
“Ethical issues involved in the human Genome Project”
REQUIREMENTS:
Required topic headings for your paper should include the background surrounding the issue, a historical perspective, current issues that are applicable, legislation dealing with this topic, examples, global dynamics/impact (such as issues, processes, trends, and systems), personal impact from a global perspective, and a summary. These are the topics to be discussed in the term paper
Each paper should contain a reference list of at least five (5) different substantial and quality references. The references and reference citations for the term paper must be to a current event less than 3 years old (a reference with no date (n.d.) is not acceptable). This requires a reference citation in the text of the paper and a reference at the end of the paper to which the reference citation applies. You must include some information obtained from the reference in your answer. The references must be found on the internet and you must include a URL in your reference so that the reference can be verified.
You cannot use information from the text book or any book/article by the author of the text book as a current event. Make sure that your reference has a date of publication.
The body of the paper should be a minimum of six typed double spaced pages. Your cover page and reference page cannot be counted in this number. You should use the APA format for your reference citations and the reference page.
This course has been designated as a global course which includes the requirement that you must place this term paper in your ManeSync Experiences. A screen shot must be attached to your term paper that you submit for grading to prove that the paper was placed in your ManeSync Experiences. Directions for using ManeSync Experiences are provided in the following document under the Term Paper tab: ManeSync Experiences Instructions.docx
Feel free to use the Communications Skill Center (http://www.tamu-commerce.edu/litlang/CSC/located.htm), Hall of Languages, Room 103, Phone No. 903.886.5280 to assist you with this writing assignment.
meer – final project
Final Project on the surveillance state consists of two parts:
1 a Powerpoint presentation consisting of at least 12 slides not including title and references.
2. 1000 word research paper with at least 3 sources.
You must include at least 3 quotes from your sources enclosed in quotation marks and cited in-line.
There should be no lists – bulleted, numbered or otherwise.
Write in essay format with coherent paragraphs not in outline format.
read the articles and answer in 200 word.
Read two articles Legal Status of SE.pdf (published in 1995) and Push to Make SE respectable.pdf
(published in 2000). Post a message of at least 200 words to meet the following requirements:
1. Tell us your understandings on software engineer’s working condition and social status in the last three decades. You can also include link(s) to article that is related to this discussion.
2. Provide constructive comment on at least one other student’s posting. “Agree with you”, “good thoughts” etc. are not counted as constructive commenting and do not count.
Security Policy
A well-written security policy will clearly define the limits of computing infrastructure to the end users. Security policies should be simple and to the point.
- Research any computer security threat or a recent attack. Select one element of the threat or attack (e.g., “Complex Passwords”).
- Write a security policy for your selected element. The scope of this policy should be issue specific.
- Your policy at a minimum should include a title, purpose of the policy, scope, details of the policy, compliance, author, and review date.
- Your policy should be no longer than 500 words and written using an industry standard policy format.
Discussion
The author proposed one methodology as an example of how risk can be understood and rated fairly easily.
However, there are other methodologies, would you use the proposed methodology at your organization and explain why in comparison to other methodologies
Hash Techniques
MD5 and SHA Functions have been used for years to verify files and messages. Discuss how they have used it. What is the difference between a one-way hash value and other cryptographic functions? Why is “salt” important?
Please write 750 words with proper APA format with at least three references cited. STRICTLY NO PLAGIARISM
Information Security Fundamentals, Security Policies, and Operations Life Cycle
- This week we learned about Information Security Fundamentals, Security Policies, and Operations Life Cycle. Based on the week’s objectives of defining network security and business priorities that must be taken into account provide your own experiences and perceptions of Network Security and Business Priorities. Research these topic areas on the internet to support your information and provide links to the resources cited in APA format.
Discussion on Blockchain best practices
Required text book:
Gaur, N., Desrosiers, L., Novotny, L., Ramakrishna, V., O’Dowd, A. & Baset, S. (2018). Hands-On Blockchain with Hyperledger: Building decentralized application with Hyperledger Fabric and Composer. Packt Publishing.
This week’s reading(see attachment) discussed some of the challenges to implementing enterprise blockchain applications, along with a discussion of best practices.
Discussion Topic:
- Choose one of the best practices presented in the paper assigned as this week’s reading that you find most interesting (and clearly state which best practice you have chosen).
- Explain why you chose this best practice as the most interesting.
- Describe how implementing your chosen best practice (from the assigned research paper) will increase the probability of implementation success.
Other requirements:
Think of three questions you’d like to ask other students and add these to the end of your document.
- The questions must be taken from material you read in Chapter 12( The Future of Blockchain and the Challenges Ahead), and each question should start a discussion topic.
Networking
I need this draft until tomorrow..