Need this in APA format without plagiarism.
4s week 4 assignment EH 2
Select one type of cryptography or encryption and explain it in detail. Include the benefits as well as the limitations of this type of encryption. Your summary should be 2-3 paragraphs in length and uploaded as a TEXT DOCUMENT. There is an EXAMPLE attached to show you the format requirements.
Video: https://www.youtube.com/watch?v=-yFZGF8FHSg&feature=emb_title
Include references, no copy-paste strictly. use your own words.
Power Point
BUSI 300 PowerPoint Instructions
For this assignment, you will create a professional looking PowerPoint presentation on a topic of professional communication. To help put this in perspective, the scenario is that your supervisor has assigned you the task of presenting a 45 to 60-minute training session on some aspect of professional communication. You need to research your topic and prepare an engaging PowerPoint that would be used as a visual aid in for your presentation.
Topic Ideas
The course textbook will be a great resource when looking for a topic that relates to some aspect of professional communication. Some examples of topics include (but are not limited to):
- How to be an Effective Verbal and Nonverbal Communicator
- How to Give an Effective Presentation
- Effective Communication Within Teams
- Overcoming Communication Barriers
It is recommended that you pick a topic of interest and then do some research to make sure you can find five credible sources – more about credible sources below. Once you are certain you can locate five credible sources, begin creating your PowerPoint presentation.
PowerPoint Requirements:
I. Title Slide
- This will be the first slide of your PowerPoint (and is NOT considered a content slide).
- This slide will include the following: title of your presentation, your full name, class name & section number, and your institution (Liberty University).
II. Content Slides
- A minimum of 15 content slides must be included.
- All content slides must contain speaker notes.
o Speaker notes are a presenter’s “cheat sheet”, if you will. In other words, speaker notes are hidden from your audience, but you are able to view them while presenting.
o Speaker notes are NOT a copy of the information on your slide. Instead, speaker notes expand upon and/or offer further clarification regarding points on each slide.
o To add speaker notes, go to the Notes pane under the slide where you will see, “Click to add notes”. For more help, view the information at: https://support.office.com/en-us/article/add-speaker-notes-to-your-slides-26985155-35f5-45ba-812b-e1bd3c48928e
- A minimum of four relevant, professional images/graphics must be included in your PPT.
o All images/graphics used must be relevant, professional looking, and used with the main purpose of helping an audience better grasp a complex concept and/or remember information presented.
o Do not include blurry images.
o Re-read section 12-3 in your course textbook, as there are some important guidelines regarding the use of images/graphics in a presentation.
III. Reference Slide
- This slide will be the last slide(s) of your PowerPoint (and is NOT considered a content slide).
- This slide (or slides) will contain all sources used in your PowerPoint presentation.
- Sources must be formatted according to current APA formatting guidelines.
- In addition to current APA formatting guidelines, the inclusion of the complete URL (sometimes called a permalink) is required for all full-text, peer-reviewed/scholarly articles retrieved from Liberty’s online library journal database. Note that this is not the same as the doi #. The URL must take your reader directly to the full text article within Liberty’s online library journal database. If you’re unsure about the specific URL/link, you can copy the entire web address from the top of the browser’s address bar once you are viewing the full text article within Liberty’s online library journal database.
IV. Sources
- A minimum of five credible sources must be used within your presentation. Required, credible sources include:
o four full-text, peer-reviewed/scholarly articles retrieved from Liberty’s online library journal database.
o two of the above four full-text, peer-reviewed/scholarly articles must be within the last 7 years.
o the course textbook (as listed on the course syllabus).
- You are able to include additional sources, other than the five credible sources listed above; however, they must be full-text articles retrieved from Liberty’s online library journal database.
- Sources NOT acceptable for this assignment:
o No textbooks (including e-books), other than the course textbook/ebook (as listed on the course syllabus)
o No general Internet searching is acceptable. Therefore, no blogs, education sites, commercial sites, Wikipedia, About.com, editorials, abstracts, online books, book reviews, etc.
V. Avoiding Plagiarism
- Create an original PowerPoint presentation; previously submitted work from this or another course is considered self-plagiarism and is prohibited.
- Provide citations for the following:
- All statements, ideas, & thoughts (whether paraphrased or directly quoted) used from an outside source;
- tables, data, images, etc. used from an outside source.
- All citations should be formatted according to the most current APA formatting guidelines and should directly follow the information used from an outside source.
- All sources used must be formatted on your reference slide(s), according to current APA formatting guidelines.
VI. Other Requirements and Reminders:
- Must be created in Microsoft PowerPoint and uploaded through the assignment link as a .ppt or .pptx file.
- Individual slides and the overall design of your presentation must be professional and engaging.
- A running header or page #s are not required.
- An abstract is not required.
Write And Call Three Functions
Instructions
You will write a flowchart, and C code for a program that does the following:
Call three functions from main(). The functions are named first(), second(), and third(). Each function prints out its name (“first,” “second,” “third.”). After all three functions are called, the main() function should print “End of program.”
Here is what the program looks like.
Submission Instructions
Upload your Flowgorithm file, your .c file, and a screenshot of your code output saved in a Word document
Assignment OE
Please go through the assignment question document before providing the answer.
Answer the following question in 600 to 700 words
What does a peer review process look like?
When does an assessment require a peer review?
Who should perform the peer review?
residency-practical connection assignment
Provide a 500 word (or 2 pages double spaced) minimum reflection.
Application security course
PLEC9
Watch this video about Joseph Shumpeter’s concept of Creative Destruction. For example, many think that the introduction of self-driving cars will disrupt the job market for drivers.
Use at least three sources. Use the Research Databases available from the Danforth Library, not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list. Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.
Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0.
Write in essay format not in bulleted, numbered or other list format.
bi-4
1. Define data mining. Why are there many names and definitions for data mining?
2. What are the main reasons for the recent popularity of data mining?
3. Discuss what an organization should consider before making a decision to purchase data mining software.
4. Distinguish data mining from other analytical tools and techniques.
5. Discuss the main data mining methods. What are the fundamental differences among them?
6. Visit teradatauniversitynetwork.com. Identify case studies and white papers about data mining. Describe recent developments in the field of data mining and predictive modeling
written assignment
You are asked to locate any company privacy policy. Some of the more popular ones might include GOOGLE, APPLE, or MICROSOFT, but you may elect to review another agency.Explain what you find to be the most interesting information contained in that privacy policy. At the end of your report, please include a LINK to the policy you have reviewed.