Cookies

 
Explain how cookies can show that a user has visited a site if that user’s history has been deleted. Need in a word document with no less than 250words with references.

Web Designing and Programming

 

This task should be done with writing a website database. Then using PHP to link the database to the link and finally adding some more instruction to the website.

The website detail will be provided after the task is accepted.

IaaS cloud migration

Research IaaS then address the following scenario in essay format. Your essay should be 2-3 pages in length (not including cover and reference page) and should include at least two scholarly references and no less than four references total. Your paper must be in APA format.

XYZ corporation is a large hospital considering moving services to the cloud to reduce some data center expenses. The hospital must comply with HIPAA regulations while moving resources to the cloud. You are considering an IaaS solution for the hospital, but leadership is skeptical about the move.

Your job is to provide assurances through research as to why there is no need for concern. In this essay, you need to provide assurances that should address risks, legal compliance, downtime, and other key areas of IaaS migrations.

Business Intellegence

Discussion: 

Research Apple Home Pod. How does it interact with smart home devices?  Alexa is now connected to smart home devices such as thermostats and microwaves. Find examples of other appliances that are connected to Alexa and write a report. 

Discussion Questions: 

1.Compare the IoT with regular Internet. 

2. Discuss the potential impact of autonomous vehicles on our lives. 

3. Why must a truly smart home have a bot? 

4. Why is the IoT considered a disruptive technology? 

Exercises: 

1. AT&T is active in smart city projects. Investigate their activities (solutions). Write a summary. 

2. It is said that the IoT will enable new customer service and B2B interactions. Explain how. 

3.Find information about Sophia, a robot from Hanson Robotics. Summarize her capabilities. 

LOOKING FOR NATIVE WRITERS

Looking For Native Writers

I am Looking for  *EXPERIENCED* Writers that can be able to handle 10-20 pages a day with, Top notch Grammar. Well constructed Paragraphs with Topic Sentences. They should be familiar with Spss and Data analysis tools will be an advantage

If you know you can’t meet High grammatical standards don’t engage me. 

Email your samples to firstlanedollarshumanresource at g.m.a.i.l c.o.m indicating your name in the subject of your email and phone number

Call 0700152748

Cloud Discussion 15

 Review in 500 words or more the video above called Cloud Security Myths. 

 Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources.   Stand alone quotes will not count toward the 3 required quotes. 

CIS 210 Assignment 4: Term Paper

 

Assignment 4: Term Paper
Due Week 10 and worth 200 points

You were talking to members of your favorite local band after a recent show. The topic of software came up, and the leader said she has a love-hate relationship with it. She loves the recording software they use and is okay with QuickBooks for the band’s financial records. But, she does not like the available options to track bookings and create set lists that draw from their entire repertoire.

In addition to their regular weekly gigs, the band performs for many school assemblies and community events. They have to pick music that’s appropriate for the audience and the theme without being repetitive. They are constantly adding new songs to their catalog, and putting others on hiatus. The band likes to take requests, so they frequently update the set list after a gig. The band does not want to bother entering chords or lyrics because they don’t use computers or phones on stage.

You offer to put together a system design to address the band’s needs. It’s okay to collect ideas by looking at off-the-shelf solutions, but the design must be your own for this assignment. Include the following in your design:

1. A list and short explanation of each function to manage:

  1. the band’s song catalog,
  2. bookings,
  3. set lists, and
  4. any other category you believe is important for this application.

2. A logical data design that supports all of these functions. Use either an entity-relationship or a UML class diagram, which should be in third normal form. Indicate all primary keys, relationships, and cardinalities.

3. Recommend a system architecture that identifies the hardware and software components and how they interact. Include a short (not more than 500 words) description and rationale. Illustrate using your choice of a static functional decomposition or object-oriented diagram.

4. Identify security concerns and other nonfunctional requirements for this system.

5. Propose at least three distinct and measurable criteria to evaluate the quality of the finished software.

Important Note: The required attached template must be used for this assignment and is not optional. It has been designed so that papers are logically organized and includes prompts for all required information for the assignment. Assignments submitted not using this template will be returned ungraded and must be resubmitted using the template. Late penalties on improperly submitted papers will apply in accordance with the published late policy.

security architecture and design 7.1

 

Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references.

As you finalizing your enterprise security assessments, what would be your deliverable for the following team members: – Explain Why and What by examples –

  • Executives and boards
  • Data security and IT professionals
  • Risk managers

Emerging Threats & Countermeas – Research Paper

Develop a disaster recovery plan for an organization. There are many different templates available online for you to use as reference and guidance. Your plan should cover the following sections (these sections detail the elements in a DR plan in the sequence defined by industry compliance standards ISO 27031 and ISO 24762): 

  1. Important: This section should summarize key action steps (such as where to assemble employees if forced to evacuate the building) and list key contacts with contact information for ease of authorizing and launching the plan.
  2. Introduction
  3. Roles and Responsibilities
  4. Incident Response
  5. Plan Activation
  6. Document History
  7. Procedures

Your paper should meet the following requirements:

  • Be approximately six to eight pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least four scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.