5 pages

There   are fewer better ways to help understand these complex guidelines, from a   practical perspective, than to learn about how “real world” stakeholders have   dealt with them. Research and discuss an actual scenario in which a PCI   stakeholder has dealt with, or failed to comply with, PCI DSS. Tell us some   stories. Your subjects is: (1) an online retailer.

The paper has at least five references and at least two references are from peer-reviewed journals.

Each paragraph of the paper has at least one citation.

Scholarly abstract of Quantitative Analysis

Question: Scholarly abstract of Quantitative Analysis(5 pages with below requirements in the same order)

Requirements

Each paper should contain the below in the following order:

1. Bibliographic Citation – use the correctly formatted APA(APA7) style citation for the work as the title of your abstract, displaying the full citation in bold font.

2. Author Qualifications – name and qualification of each author conducting the research

3. Research Concern – one paragraph summary of the reason for the overall research topic

4. Research Purpose Statement AND Research Questions or Hypotheses – specific focus of the research

5.Precedent Literature – key literature used in proposing the needed research (not the full bibliography or reference list)

6. Research Methodology – description of the population, sample, and data gathering techniques used in the research

7. Instrumentation – description of the tools used to gather data(surveys, tests, interviews, etc.)

8. Findings – summation of what the research discovered and the types of analysis that were used to describe the findings (tables, figures, and statistical measures)

Support Queue Case Study

 Hide Assignment InformationInstructions

For this project, you will apply the CompTIA 6-Step Troubleshooting Process to explain how you would tackle Hudson Fisher Associates Help Desk Tickets. There are three groups of tickets, Level 1, Level 2, and Level 3. You will pick two tickets from each group.

As you prepare to analyze and hopefully solve these typical IT help desk tickets, keep in mind that for this course, it is more about the process and less about finding the “correct” answer. You may not always find an exact answer from the information given. The problems are structured to approximate what you will find in the workplace. Use a logical and repeatable process (e.g., the CompTIA 6-Step Troubleshooting Process) and eliminate the improbable as you work your way through each scenario.

CompTIA 6-Step Troubleshooting Process:

  1. Identify the problem.
  2. Establish a theory of probable cause.
  3. Evaluate the theory to determine the actual cause.
  4. Establish a plan of action to resolve the problem and implement the solution.
  5. Verify full system functionality and if applicable implement preventative measures.
  6. Document findings, actions, and outcomes.

How Will My Work Be Evaluated?

As you progress in your information technology and cybersecurity career, you may find yourself making presentations to customers, client audiences, and management. For this assignment, you should articulate your findings from the six support cases.

But the challenge you face is in expressing a technical solution to a nontechnical audience. Avoid jargon and acronyms. Find a way to relay your solution (and challenges) in language that your audience will find easily relatable.

Communicating in this manner will not always be easy. You may struggle to find the right analogy or metaphor. But if you can master the skill of summarizing your results and recommendations to management in an effective presentation, you will demonstrate how you use your technical knowledge to convey your ideas to others in a professional setting. You will also earn the respect and trust of your peers, your supervisor, and upper management as an effective communicator. You will be viewed as an employee ready for advancement.

The following evaluation criteria aligned to the competencies will be used to grade your assignment:

  • 1.1.1: Articulate the main idea and purpose of a communication.
  • 1.1.3: Present ideas in a clear, logical order appropriate to the task.
  • 1.3.3: Integrate appropriate credible sources to illustrate and validate ideas.
  • 2.1.1: Identify the issue or problem under consideration.
  • 2.3.1: State conclusions or solutions clearly and precisely.
  • 12.7.2: Explain the process of analyzing IT incidents.
  • 13.1.1: Create documentation appropriate to the stakeholder.

Your deliverable for the project is an annotated PowerPoint Presentation covering the following:

  • List of the six tickets you selected (two each from Level 1, Level 2, and Level 3)
  • One to two slides for each ticket, in which you:
    • State the problem.
    • Describe the steps taken to troubleshoot/analyze the problem.
    • Propose a brief resolution.
  • One summary slide: What did you find challenging or interesting about one or two of the support cases (opinion-based)?
  • One reference slide (two to six IEEE references). Include references for materials you consulted in TestOut or on the internet.

IT207 case study week 8

Case study: You have been asked to give a presentation (8 -9 slides)  n preparing reports using PowerShell scripting. You need to provide a one-page handout that indicates the purpose of each cmdlet please provide an example of each cmdlet and on accessing file shares from Windows 10 and CentOS 7.

Use citations and references as needed. Please do not copy & paste from the internet resources/solution manual as it will be considered plagiarism. 

Applied IT Assignment Phase 1

Phase 1 – Background, Business Justification, and Project Introduction

The opening phase to your project provides information about the organization you have selected, including details about the current status and existing issue(s) you plan to address in your project. This serves as the foundation for why the project is needed and business justification in seeking executive approval for the project. You will present your recommendation for work to be done to provide a technical solution addressing the problem(s) identified. Write your full paper in a formal tone in a manner that presents it to the business leadership for their approval. This phase should be at least 3 pages in length and will include at least 3 citations and references. 

Project we chose was – Restaurant business

Crypto – History

In the initial milestone writing assignment, you will evaluate the history of cryptography from its origins.  Analyze how cryptography was used and describe how it grew within history. 

1000 words 

You must use a minimum of three scholarly articles to complete the assignment. 

 The assignment must be properly APA formatted. 

Information security

 

Read the Closing Case on Page 60 in the Management of Information Security Book. Answer the two initial Discussion Questions. 

Discussion Questions:

1.Based on your reading of the chapter and what you know about the issues, List at least three other things Charlie could recommend to Iris

2.What do you think is the most important piece of advice Charlie gave Iris? why?

Second under Ethical Decision Making, answer the following questions:

  • If this comes to pass, is Charlie doing anything illegal? Is Iris?
  • What is ethically wrong with Charlie’s proposal?

Length: 250 words

Assignment Format: APA Format

Citations Required: 1 – 2 scholarly citations minimum 

Computer Science Algorithms Question – Written in English word

Erica is an undergraduate student at USC, and she is preparing for a very important exam. There are n days left for her to review all the lectures. To make sure she can finish all the materials, in every two consecutive days she must go through at least k lectures. For example, if k = 5 and she learned 2 lectures yesterday, then she must learn at least 3 today. Also, Erica’s attention and stamina for each day is limited, so for i’th day if Erica learns more than ai lectures, she will be exhausted that day.

You are asked to help her to make a plan. Design an Dynamic Programming algorithm that output the lectures she should learn each day (lets say bi), so that she can finish the lectures and being as less exhausted as possible(Specifically, minimize the sum of max(0,bi −ai)). Explain your algorithm and analyze it’s complexity.

Computer 11

Write 1 paragraphs per question.

1- Do some research, and write up an example of how IoT might provide a business with a competitive advantage  and why you think this.

2- Provide one example of how information technology has created an ethical dilemma that would not have existed before the advent of Information Technology (IT). Consider things such as: How has this created a dilemma? Is the negative impact worth the positive impact? For who?