Paper and Powerpoint Eric

The paper has to be four to five pages.  Please do not write more than four to five pages.  I will stop reading on the fifth page and you will get graded off what I read.  For each page over five pages I will take off 10 points for each page.  The font size of the paper must be 12 in Time New Roman.   Please do not try to use a bigger font size to make your paper four or five pages.  Please double space the whole document.  If the paper not four to five pages, I will not read the paper and you will receive a zero on the project part.  Please use MLA formatting for reference page.  Please make sure you have a reference page and cite all sources.   Please have the paper in APA formatting.  Please google an example of APA formatting.  No plagiarism. Make sure you cite all your sources.  Paper Outline

  • History (Who created it, What year, Who uses it?  General History)
  • Definition
  • Advantages and Disadvantages
  • Interesting Facts
  • Example of where it is used.
  • What audience uses this product?
  • And many more information you think is important.
  • Conclusion

Note:  Please make sure you have lead in sentences

  • The research papers are to be written in your words.  Copy and paste is unacceptable unless it is cited.
  • Must include the following:
    • Cover page with title and your name
    • Introduction/overview of topic and issues to be discussed
    • Background, description, and/or history 
    • Advantages, Disadvantages, etc.
    • Summary (your comments or evaluation)
    • List of at least three references.
  • Library, Internet sites, Topics from Class

Computer/Internet Security Policy

You have been hired as the CSO (Chief Security Officer) for an organization. Your job is to develop a computer and internet security policy for the organization that covers the following areas:

  • Computer and email acceptable use policy
  • Internet acceptable use policy
  • Password protection policy

Make sure you are sufficiently specific in addressing each area. There are plenty of security policy and guideline templates available online for you to use as a reference or for guidance. Your plan should reflect the business model and corporate culture of a specific organization that you select.  Include at least 3 scholarly references in addition to the course textbook. At least two of the references cited need to be peer-reviewed scholarly journal articles from the library.Your paper should meet the following requirements:• Be approximately four to six pages in length, not including the required cover page and reference page.• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.• Support your answers with the readings from the course and at least three scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

kyits531wk15dis

 Research Apple Home Pod. How does it interact with smart home devices?  Alexa is now connected to smart home devices such as thermostats and microwaves. Find examples of other appliances that are connected to Alexa and write a report. 

drawrof

  

In this challenge, you’ll create a function that reverses a string.
For example, given the string “forward”, your function should return “drawrof”.
Please do the following:
Name your function reverse.
Call your function with the input string This is my string. and assign the result to the variable my_string.
Print out my_string!
NOTE: Do NOT use input for your function as it cannot be used in this test environment. You should also assume that all inputs are strings, so you do not need to check for this.

week 1 B IT345: Impact of IT

 

Discussion 2 B

No unread replies.No replies.

Find a recent article that relates to this week’s topic and post a summary of that article and how it relates to this week’s lesson.

Post your reply by Wednesday at midnight. Your response should be at least 200 words and appropriately cite your resources.

Respond to two of your classmates by Sunday at midnight. Your responses should be at least 100 words and should be substantive. You should offer additional resources, insight, or other helpful feedback. A simple “I like your post” will result in a 0.

You will not be able to see other posts until you make your first post.

Not more than 350 words total. Respond to at least two other students (150 words each peer)!!

2. Two (2) paragraphs (350 Words total) discussion response to main DQ questions. In addition, respond with two (2) students/Peers to Peer (identify peers) or two classmates. The responses should 150 words each and must focus on the discussion topic above. Examine related issues, ask questions, provide hypothesis and/or situation(s). A peer response may not be to a peer already responded to more than twice.

Note: plagiarism is not tolerated in this course. Everything must be in your own words with sources! Failure to do so will result in failing grade. 

Project Management: A Systems Approach to Planning, Scheduling, and Controlling

 

You will have a two-part team project due in Weeks 9 and 10. The first part will be a research paper that outlines the components of a successful project. The second part will be application of these components to a project (real or fictitious) that you and your team mates are planning to start in a comprehensive Project Plan. Each paper should have a presentation to accompany it.

Guidelines:

  • For Part 2, remember to give me some context with regard to your project selection. Tell me what kind of business/organization it is, the goals of the project, and why it is important to complete the project.
  • Use your textbook as your primary source of information and current research (no more than 5 years old) to supplement it.
  • The papers must be written in APA style with references formatted in APA style, including a References page.
  • Presentations can take any form you like—be creative!

All written work must be submitted in the student’s own words with sources properly attributed in APA format. For your convenience, the correct in-text citation for your textbook is  (Kerzner, 2013). The correct in-text citation for your Case Studies book is (Kerzner, Project Management: Case Studies, 2013).

The correct full-text references for each book appear below:

Kerzner, H. (2013). Project Management: A Systems Approach to Planning, Scheduling, and Controlling, 11th ed. Retrieved from VitalSource Bookshelf: https://online.vitalsource.com/#/books/9781118418550/

Kerzner, H. (2013). Project Management: Case Studies. Retrieved from VitalSource Bookshelf: https://online.vitalsource.com/#/books/9781118415825/

Discussion#5 Week 8-1 – Privacy and Security Considerations for Information Governance

 Topic:

According to the authors, privacy and security go hand in hand; and hence, privacy cannot be protected without implementing proper security controls and technologies. Today, organizations must make not only reasonable efforts to offer protection of privacy of data, but also must go much further as privacy breaches are damaging to its customers, reputation, and potentially could put the company out of business. As we continue learning from our various professional areas of practice, its no doubt that breaches have become an increasing concern to many businesses and their future operations.   

Question:

For this discussion, find an example of a security breach which compromised data records at a company in the same industry as you will be using in your final paper. Summarize the breach, discuss the data that was lost and identify security controls that you would recommend be in place (be certain to remember to cite sources) that could have prevented this breach from occurring. 

Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

No Plagiarism**********

Write 200 words for each question. and 100 Words Summary for Each question.

Q1. Each of us works with other people in some manner, such as in teams, on projects, in meetings, virtually, using shared collaboration to edit documents, etc. How have you worked with others at your workplace this week? What challenges have you experienced in collaborating with others at work, and what did you do to resolve them?

Q2. Conflict at work is never easy. Sometimes you may not agree with a supervisor, peer, or client. What are some techniques you can use to address conflict? Share an experience where you had to overcome negative emotions because of a conflict at work.

Q3. What is the most valuable resource within a project? How do you avoid the overallocation of resources? Is communication within an IT project less than ideal, yes or no, and why or why not? Is it different from regular project management? Why or why not?

How would you explain the correlation between the amount of corruption in a country and economic development?

How would you explain the correlation between the amount of corruption in a country and economic development?

Primary/Initial post to Discussion Question: 

Your initial post/response to each module’s discussion forum question(s) should be at least 200 words. 

Secondary Responses/Posts to Peer Posts: 

Respond to at least 2 other postings with 100 words each, attached student question, Your primary posting can end with a “tagline” or a related question of your own. Your secondary postings can either answer another student’s question, or comment on their answering my question. In addition, please ensure that you answer all of my questions.