HW: Is Your Article a Research Article? (with APA 7 Cover/Title Page & References Page) jan 30

Assignment Content

  1. STOP!  Have you watched the two, past assigned, short videos on APA 7 Title Page and References Page? If not, you must do that first, because this submission requires both. 

    In class today, you were asked to find your first research article that explores your approved research question. (DO NOT ATTEMPT THIS ASSIGNMENT UNLESS YOU HAVE COMPLETED THE PREVIOUS ASSIGNMENT and gained approval: Brainstorming and Research Question.)

    For this assignment, I want you to create a single, APA 7-compliant, Word document. To earn full credit, you must do the following:

    • Page 1 = 20 pts: Proper APA 7 Title Page (watch the video and see p. 31 in the Foundations text to help you create a perfect title page)
    • Page 2 = 60 pts (breakdown below): Simply answer the following questions
    • (1) What is your approved research question from the Brainstorming Research Question HW assignment? (5 pts) 
    • (2) What is the title of the research article you found? (5 pts)
    • (3) Does the article contain the methodology the researchers used to conduct the study/research? To get full credit, you must (a) name the methodology, (b) cut and paste the paragraph from the article that details the methodology, AND (c) highlight indicator words(30 pts)
    • (4) Does the article contain findings or results of the research? To get full credit, you must (a) cut and paste excerpts from the article that detail the findings (go to Discussion section or at times Conclusion), AND (b) highlight specific words that detail the findings(20 pts)
    • Page 3 = 20 pts: Create a proper APA 7 References Page with your ONE research article (refer to the video and see pp. 33-34 for the FORMAT you must use to create your reference and p. 32 for a perfect sample of what a References Page looks like.)

Austin Martin Electronic Project

There are seven questions in the below attached pdf. All graphs/charts/tables are to be produced in the native format (excel, project, etc.) and then copied into the response area of the Management Word document. Please don’t copy paste from Chegg. 

1. Provide a project objective associated with the Astin Martin Electronics project.  Include a list of assumptions about the project. 

2. What is a work breakdown structure? What is a responsibility matrix? Using the Astin  Martin Astin Martin Electronics project activity list and activity duration schedule,  create a WBS and RAM. 

Work Breakdown Structure (Should provide hierarchical graph) 

??? 

Responsibility Assignment Matrix 

??? (Example RAM Template: From different requirements.  Be sure and remove any examples in your management response  document.)

Field of Cyber Crime

The assignment should result in an APA paper with a minimum of four pages given to its Main Body, and no more than eight. The page requirement does not relate to Title Page, Abstract, and References pages. The paper should address the following: 

1. From the course Section II: Field of Cybercrimes, select one area of cybercrime that frames your work. 

2. Discuss it by describing any comparative traditional crime—e.g., trespass as compared to DDoS. 

3. Next, create a digital forensics investigation plan that may be applied to solve your selected cybercrime. Ensure that it is detailed enough to prove your knowledge of the discipline as a tool to help solve a crime, while being general enough that, perhaps, it could serve as a template for a law enforcement division. 

4. Lastly, discuss a legal case, criminal law (state or federal), and/or an article from a legal journal that relates to your chosen area of cybercrime.

CIS 222 Unit 6 Assignment

 Cryptography was identified in one of the key security controls planned for improving PCS security. The cost of the hardware and software for these controls raised some additional concerns.Based on your research for Unit 6, write a point paper:

  • Explain the benefits of encryption.
  • Explain the different ways encryption will play a role on the PCS corporate network and satellite offices.
  • Give some examples of security problems that will be addressed by your encryption solutions.
  • The CEO asked why we haven’t been using encryption all along if it is so easy. Other than hardware and software costs, provide a response to this question.

The requirements for your assignment are:

  • 1-2 page APA paper excluding title and reference pages
  • Provide at least two references and in-text citations in APA format
  • College level writing

Refer to the attached document for the grading rubric. 

Applied IT Assignment Phase 2

Phase 2 – Research and Recommendation

Using the sources provided in your annotated bibliography, as well as any additional research you have performed, write the second phase of your project summarizing your research and providing your recommendation. Describe the decision criteria used in deciding upon your recommended solution. Write your full paper in a formal tone and in a manner that presents it to the business leadership for their approval. Provide enough details that both a technical and a business leader would be able to understand what your solution is and how it will function. Do not go overboard on technical specifications for equipment to be acquired or in the programming language or coding. 

Note: 3 pages with intext citations and references must (2)

The project we were working till now, I have attached the document, 

Assignment

 

Our e-book has mentioned blogs, LinkedIn, Twitter and search engine to assist us in finding the answers to broken down equipment and software (installation and removal if infected with viruses/trojan horses/worms/ransomware. Advice from lots of nice people around the world discuss keyboards, monitors, laptops, desktops – memory, fan, clocks, and much more. However, we must be careful to not open files with .exe (executable files just like the ones that run our operating systems, etc.) and unsolicited files.

One such place is TED TALKS. Google tells us “TED is a nonprofit devoted to spreading ideas, usually in the form of short, powerful talks (18 minutes or less). TED began in 1984 as a conference where Technology, Entertainment and Design converged, and today covers almost all topics — from science to business to global issues — in more than 100 languages.”

In working with technology/machines, we need to watch KEVTECH videos also.

Our assignment is to write a 5-sentence paragraph explaining to users (that’s our audience) on each of the following topics:

Using WORD software to write about all 5 topics and submit as 1 document:

1. Watch 1 TED TALK (watch one video that could help you) – then write what you think about this short talk. ADD a Captured Screen and/or Photo.

2. Watch 1 KEVTECH video – then write what you think about this short talk. ADD a Captured Screen and/or Photo.

3. Research and find a job in LinkedIn – then write what you think about this.  ADD a Captured Screen and/or Photo.

4. Research Twitter – then write what you think about this. ADD a Captured Screen and/or Photo.

5. Research and find out about Facebook – then write what you think about this. ADD a Captured Screen and/or Photo.

due 05/05/23 (SSO): Advantages and Disadvantages

 

Pick an industry that you work for, and you work for the  chief information officer ( CIO) of a company within this industry. Your CIO is considering implementing Single Sign-On (SSO) and wants you to prepare some background information for her review.

Please provide the following Single Sign-On (SSO) background information for your CIO in a post of

  • Detail the advantages and disadvantages of SSO architecture.
  • Recommend whether SSO or another form of sign on architecture would be best for a company within your selected industry.
    • Be sure to provide the rationale behind your recommendation.