[SOLVED] Journal Citations

Write a discussion post on following three topics. Each one should be in a separate file, each post should have 2 (scholarly) journal citations, min 300 words each, additional requirements also specified below:Discussion 1:Malicious individuals have discovered several methods to attack and defeat cryptosystems. It’s important that understand the threats posed by cryptographic attacks to minimize the risks to your network systems.Identify one cryptographic attack and how you can protect against it.?Discussion 2):Excel is probably the most popular spreadsheet software for PCs. Why? What can we do with this package that makes it so attractive for modeling efforts?Discussion 3):What are the common business problems addressed by Big Data analytics? In the era of Big Data, are we about to witness the end of data warehousing? Why?Please make your posts substantive. A substantive post will do at least two of the following:· Ask an interesting, thoughtful question pertaining to the topic· Answer a question (in detail) posted by another student or the instructor· Provide extensive additional information on the topic· Explain, define, or analyze the topic in detail· Share an applicable personal experience· Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)· Make an argument concerning the topic.Run you submission through grammar check before submitting.At least 2 (scholarly) journal source should be used for each post.Make your references in correct APA 7 format and cite each reference at least once, but as many times as you rely on it. Citations support each sentence relying on a reference, not an entire paragraph. Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations. Initial posts need to be 300 words minimum .

Read more

Branding Project

In this project, you will create a professional presence on LinkedIn (a professional social media network that is widely used by professionals and employers in most industries). If your profession or personal beliefs prevent you from establishing a LinkedIn site, ask about an alternative to building a live LinkedIn profile. As part of this project, you will conduct research into your present or desired industry, you will create a branding statement, and finally, create or revise an existing LinkedIn profile, using what you have learned about the industry and yourself.My desired Industry is Information TechnologyNow that you’ve analyzed the situation, you can start on your branding statement.Step 1: Engage in Analysis and ReflectionYou now know your assignment, but before you get started, take a few minutes to think about a strategy for success. Watch the See Yourself in a New Career Video for some inspiration and ideas.For background information, read Professional Use of Social Media and LinkedIn on the Using LinkedIn resource page.Are you seeking to advance in your current field? Are you changing fields? Where are you right now in your career? Where do you want to be? Will you be seeking a new position in your field or will you need to seek opportunities for getting experience in a new field? What are your goals and objectives? What particular positions do you want, and what is your time frame for obtaining them? For example, you might ask yourself “Why am I pursuing a graduate degree?”Next, answer the question: What’s the market like in the industry or field in which you’d like to apply your degree? Is the demand for employees increasing, decreasing, or remaining steady? Does the geographic region play a role? Does specialization within the field matter? Use the UMUC library to locate journal articles, books, and other sources that will enable you to identify information about your industry or field. You can refer to the Project 2 information on Business Research.Finally, you need to think about what’s competition like? Who are the other competitors seeking positions in this profession? Who are the primary competitors for employment and upward mobility in this field? Can you identify particular individuals who are your main competition (which will be the case if you are competing internally). How do you compare to these competitors? What do you need to do to become more competitive? Look at Competitor Analysis for some guidance on these issues.STEP 2See Branding Statements for some resources and tips to create your statement. Draft a personal branding statement of 200 words or less. Edit for clarity and conciseness. It should be error-free as the representation of you!STEP 3Next, you will create or revise a LinkedIn page.Now that you’ve analyzed the situation, you can start on your branding statement.

Read more

Desired Work Environment.

Practical Connection :Subject Name: Emerging Threats & Countermeasit is a priority that students are provided with strong educational programs and courses that allow them to be servant-leaders in their disciplines and communities, linking research with practice and knowledge with ethical decision-making. This assignment is a written assignment where students will demonstrate how this course research has connected and put into practice within their own IT career.Assignment:Provide a reflection of (or 3 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.Requirements:Provide a (or 3 pages double spaced) minimum reflection.Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.Share a personal connection that identifies specific knowledge and theories from this course.Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment.You should not, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.Any use of outside sources, including your own prior work, will result in a zero on the activity and a report being filed with Academic Affairs regarding plagiarism (even if self-plagiarism).

Read more

Commercial Databases

1. What is privacy?2. What risks, if any, does facial recognition software raise?3. How much information about you can be found on-line with a simple google search?4. How much information about you can be found by searching government and commercial databases?5. Describe informed consent.6. Should secondary use of consumer provided data be available without notice to the consumer?7. How do data mining and predictive analytics work?8. Watch this Science Friday video by Ira Flatow. And, offer your opinion – Are advancing algorithms taking our free will?9. Should Facebook be regulated, at least as far as it’s privacy and data policies?10. How many public cameras is too many?

Read more

Marketing Technology

Read the attached PDF article entitled, “How Blockchain Technology Can Benefit Marketing: Six Pending Areas Research Areas”After reading the article in full, select one of the mentioned six areas of research and write an article reflection minimum 8-9 maximum page paper identifying the following;1) Describe and provide the overall research area mentioned in the article in a synopsis2) What did the article state in how Blockchain can benefit that marketing area overall?3) What further research did the article recommend?4) What do you think can be the approach to further research the topic? What approach would you recommend to take and what type of research method would make sense?5) What is an example of a company that you believe would benefit from this type of research and why?6) Outside of Blockchain, what other pieces of marketing technology can help this area?7) What do you recommend is the best way to approach for a company to implement this area of research into their company?NOTE: for all the questions above, just pick one research area, and first part- give summary and stick to the same topic while answering all the 7 questions. Choose a company and relate that area to the company.

Read more

Mobile Application Development

To help you understand the design challenges and issues in mobile apps development.Topic of DiscussionOver the last ten years, mobile devices technology has changed significantly and becoming a necessity to human being. These developments have led to a huge variety of mobile applications to improve the quality of life. These mobile applications are typically harder to design and build because of several issues. Discuss TWO (2) issues in designing a mobile app with examples.Submission InstructionsPost your responses, examples, ideas, and discussions on this topic on the blackboard.You must write at least ONE original post and at least four respond commenting on the posts uploaded by your classmates.

Read more

Strategy and Technology

In Chapter 2 of ISMG (Module 1) you read about strategy and technology. In this module, in Chapters 9, 10 of ISMG, you learned that there are several enterprise systems / software. You also read about the concepts of cloud computing and open source software.For the “Discussion 2 Forum”, read the scenario below and answer the question:”Imagine that you are an IT / IS manager in an organization. Your organization is planning to implement a new ERP system. You have two options – a cloud based solution offered by a reputed vendor and an open source product used by many competitors. You are responsible for making the decision. Which one will you choose and why? Provide at least three specific reasons to justify your choice.”Support your answer with appropriate sources as needed.(Note: References will not be counted in the word count, you can use any format MLA / APA. See the supporting guide on how to add citations in Word document in Module 2 if needed).

Read more

Network Security Analysis

You are in networking at a large international company. Your company recently decided to implement a cross-training initiative and you have been selected to give a presentation to an audience of non-networking professionals working at various departments in your company.Your presentation must be clear and concise enough to convey technical information to professionals who have a limited understanding of how networking actually works. However, it must also be accurate enough that your audience can understand how their company roles (such as scheduling resource-hogging reports, allowing contractors access to the system, and setting the hours international customers can place orders on your company’s system) can impact the company’s network, particularly in terms of security.You decide to use the OSI model to explain the fundamental characteristics and components of networks because it is visual and presents the complexity of network communication in 7 layers.Draft your speaker notes to hand off to an assistant who will turn your notes into a graphic-rich presentation. Each of your answers should be about 150-250 words long.Note: Your assignment is to draft speaker notes. Do not create a presentation and do not write a paper.1. Overview of Networking and SecurityYou decide to begin your presentation by providing your audience an overview of networking, with an emphasis on security and why it is important for all company roles to assist in securing the company’s network.Discuss the potential security risks for each layer of the OSI model and the risks in each of the following:· Distributed vs. centralized computer systems and why your department chose to be distributed/centralized· Different network topologies and why your department chose the topology it did· Why standards bodies are essential in networking and how your department complies with standards· The importance of communication protocols and which one(s) your department chose· The differences between LAN, WAN, and wireless technologies, and how your department incorporated each· The responsibilities associated with providing telecommunications services such as security, privacy, reliability, and performanceClick or tap here to enter your speaker notes.2. Routing and SwitchingDescribe basic routing and switching in the context of the OSI model (i.e., in which layer routing, switching, and cabling occur). To underscore your department’s commitment to achieving 24/7 availability, describe 3 strategies your department uses to ensure the availability of network access in switched and routed networks.Click or tap here to enter your speaker notes.3. Effective Security PolicyDescribe at least 3 characteristics of an effective security policy, emphasizing the ways in which all departments in the company are responsible for helping secure the company network.Click or tap here to enter your speaker notes.4. Security StrategiesExplain strategies your department used to build security directly into the design of your company network.Click or tap here to enter your speaker notes5. MalwareDefine malware in layperson-friendly language and identify at least 2 strategies your department has put into place to protect your company’s network against malware.Click or tap here to enter your speaker notes.6. ClosingSummarize your presentation.Click or tap here to enter your speaker notes.

Read more

The IP Address

Respond to the following in a minimum of 175 words:Research how to identify the IP address of your computer. After you have identified the IP address of your computer, share the URL of the resource that you found most useful in figuring out how to find your own IP address. What other details about your computer’s network connection, if any, did you learn while locating your device’s IP address? Note: If your computer is behind a firewall (which it may be if, for example, you’re using a computer at a public library or your place of work), your computer will be associated with two IP addresses: an internal IP address and an external, or public, IP address generated by the firewall.

Read more

[SOLVED] Measure Your Life

How Will You Measure Your Life?This is by necessity an individual project. Two of the key learning objectives for this course are to 1) learn about individual behavior and 2) learn about interpersonal behavior. One subcomponent of interpersonal behavior is leadership. And yet one of the most difficult people to learn to lead is oneself; what I refer to as “that guy or girl that we see in the mirror every morning.”As leaders of organizations, we frequently participate in strategic planning wherein, we document the organization’s values, purpose, mission, and strategy. In this project, you will reflect upon and document your personal values. You will think about your purpose and propose a mission. You will develop a life and career strategy based on your own strengths and weaknesses. We will effectively answer for each of ourselves, the question that Harvard Professor Clayton Christensen asked of the HBS class of 2010, “How will you measure your life (Links to an external site.)?”The good news is that there are no wrong answers because only you can answer these questions for yourself. However, the bad news is that nobody can give you the answers either. Your grade on this project will be based on the level of thought that you put into it. This type of reflection can positively affect the trajectory of your career and your life. You will get out of it, only what you put into it. Carpe Diem!Essay format with text of 4-5 Pages, Double Spaced, 12 point font.Rubric:MGMT 5113How Will You Measure Your LifeGrading RubricOverviewThe HWYMYL project is the first and often the most popular assignment in MGMT 5113. It is an assignment that students prepare individually. Students are assigned to apply strategic planning concepts to their careers and personal lives.The assignment is usually 4-5 pages in length. However, there is not a hard and fast rule on the length of the paper. Rather the focus of the grader should be on how well the student applies the specific concepts presented in the assigned reading and videos.Students are assigned to:Read the HBS article, “How will you measure your life?”Document 4-6 core values.Write a statement of purpose.Write a mission statement.Perform a SWOT analysis.Based upon the student’s vision (values, purpose & mission) and their SWOT analysis, they should develop a life strategy that includes Objectives, aka SMART Goals.Document how they will measure their progress going forward.The paper includes 4 – 6 core values that are such that the values are likely to never change; i.e. not dependent on technology, the economy etc.+ / -The paper includes a statement of purpose that is such that it could potentially last the person their entire life.+ / -The paper includes a mission statement such that it can be clearly evaluated whether or not it has been achieved by the date indicated; i.e. has a clear finish line.+ / -The paper includes an analysis of the student’s strengths, weaknesses, opportunities, and threats (SWOT). Note that the strengths should meet Marcus Buckingham’s definition in that they are not simply something the person is good at. Strengths are activities that make the person feel stronger.+ / -The paper includes specific Objectives that meet with definition of a SMART Goal; i.e. specific, measurable, attainable, results oriented, time-bound.+ / -The student has indicated what type of Measurement System that they will use to track their progress toward their Mission+ / -There is a particular consistent theme between the different components of the student’s submission; i.e. innovation, adventurousness, conservatism, frugality etc. The particular theme is not as important as the fact that there is a consistency between the different components that indicates a coherent strategy.+ / –

Read more
Enjoy affordable prices and lifetime discounts
Use a coupon FIRST15 and enjoy expert help with any task at the most affordable price.
Order Now Order in Chat

Ensure originality, uphold integrity, and achieve excellence. Get FREE Turnitin AI Reports with every order.