SIEMENS SIMATIC

I need to write a term paper on the topic Siemens Simatic- PCS7/WINCC (SCADA) 

There are all the requirements for the term paper alongside the template for the term paper.
Please help and thank you 

aptm

InfoTech Import in Strat Plan—– write 200 words on this subject what you learnt the course  

InfoTech in a Global Economy —- write 200 words on this subject what you learnt the course  

SE 491 week7

FOR QUESTION 1 YOU HAVE TO USE VISUAL LOGIC SOFTWARE AND FOLLOW THE INSTRUSTION TO CREATE THE PROGRAM

 1. Using Visual Logic, print 5 columns of 5 stars by outputting only one star in your output command and using while nested loops to print the rest. When using print in your output command, only one star should be output at one time. In other words to print 5 stars next to each other for example, you need a loop that repeats itself 5 times. 

FOR QUESTION 2 APA FORMAT AND CITATION AND 150 WORDS 

2.   What did you learn about the use of constructors in chapter 8? 

Problem 2- Proj Risk

 #1.  What are the benefits an organization can receive from the adoption of a risk management system?

  • Describe the risk management system application.
  • What roles do security and capacity play within the risk management process?
  • What is the purpose of a risk management system?
  • Describe the various risk management methodologies used for risk assessment and how they relate to a systematic approach.

#2.  Tessile, S. A., a company based in Turin, Italy, is a medium-size company that manufactures, sells, and exports textiles. An increased demand for the company’s high-quality textiles has led to the approval by its CEO, Giuseppe Franco, to implement a major expansion to other markets. Mr. Franco is seen as a visionary leader in the textile industry as he transformed a cotton plantation company into one of the major textiles companies in northern Italy.Mr. Franco recently led an aggressive and successful series of acquisitions of wineries in southern and central Italy. Mr. Franco wants to follow these acquisitions by purchasing and introducing Tessile S.A. to the tourist and cheese industries. However, these last winery acquisitions left the company in serious debt and with its shares losing value due to the perceived negative view of Mr. Franco’s strategy by its shareholders moving away from their core textile business.You have been assigned to advise Tessile, S.A. board of directors on identifying potential hazards, threats, and risks of Tessile’s business strategies.Create a document presentation that consists of at least 7 sections as to considerations and process. Be sure to include the following information in your packet:

  • Explain the process you will use to identify potential hazards, threats, and risks of the company’s current business strategies.
  • Identify the potential hazards, threats, and risks that you discovered when using your process.

Be sure to include notes in your presentation where necessary. All sources used, including the textbook, must be referenced; paraphrased and quoted material must have accompanying citations. 

 

Title: Managing Project Risks; 464 Pages

ISBN: 978-1-119-48975-7

Authors: Peter J. Edwards, Paulo Vaz Serra, Michael Edwards

Publisher: Wiley-Blackwell

Publication Date: 2019

Discussion 300 words

 Explain your thoughts on the future of IoT and the security implications. Why do you believe it is important to secure these devices as they become more common in our lives and our businesses? 

Business Intelligence Discussion

 

Discussion  (Chapter 9): What are the common business problems addressed by Big Data analytics?  In the era of Big Data, are we about to witness the end of data warehousing? Why?

Your response should be 250-300 words.  Respond to two postings provided by your classmates.
There must be at least one APA formatted reference (and APA in-text citation) to support the thoughts in the post.  Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations.

Cover letter and interview march 8

Prepare a professional cover letter

Articulate effective interview strategies

Explain the difference between a “good” interview and a “bad” interview

Lecture Notes: There are 3 sections of a cover letter that are required when writing a professional cover letter to include with your resume: Introductory paragraph (to attract the potential employer’s attention) Main Body (to highlight and draw attention to your skills) Closing paragraph (to ask for an interview

Week 2 assignment #1—related to cover letter  

Using the lecture notes above, the video in this week’s discussion forum, and sources from the internet, write and submit a cover letter for a job you are interested in applying for. You can use indeed.com, careerbuilder.com, LinkedIn, or look for job opening on a company’s website to find a job opportunity that interest you. Be sure to include a copy of the job posting with your cover letter.

Week 2 Assignment #2—interview prep—good interview vs. bad interview (interviewing techniques

https://www.youtube.com/watch?v=HG68Ymazo18 [Title: Top Interview Tips: Common Questions, Nonverbal Communication & More] 

https://www.youtube.com/watch?v=rAIXkf8WOlk [Title: Good interview, bad interview]

After watching both video, write a one to two paragraph reflection of what you will do differently in an interview as a result of what your learned. Explain what you did wrong prior to watching this video. If you have never interviewed for a job, then write about your interview for admission into the  Graduate School.

Application security – hardening techniques

  Scenario

As a security administrator for Always Fresh, you have been instructed to ensure that Windows authentication, networking, and data access are hardened. This will help to provide a high level of security.

The following are issues to be addressed through hardening techniques:

§ Previous attempts to protect user accounts have resulted in users writing long passwords down and placing them near their workstations. Users should not write down passwords or create passwords that attackers could easily guess, such as words founds in the dictionary.

§ Every user, regardless of role, must have at least one unique user account. A user who operates in multiple roles may have multiple unique user accounts. Users should use the account for its intended role only.

§ Anonymous users of the web server applications should only be able to access servers located in the demilitarized zone (DMZ). No anonymous web application users should be able to access any protected resources in the Always Fresh IT infrastructure.

§ To protect servers from attack, each server should authenticate connections based on the source computer and user.

Tasks

Create a summary report to management that describes a hardening technique that addresses each issue listed above. Provide rationale for each selection.

1000 words APA format needed with References

HR Management & Blockchain

 1. How can blockchain increase human resource management efficiencies? 2. How and why is blockchain a disruptive technology in human resource management?

500 words

word document APA format