Ghostware

It is essential to determine how unintended software is installed on user systems with only marginal adherence to policies. By understanding the process, a security professional can better ensure that only software built to acceptable standards is installed and maintained on systems under their purview.

Using an Internet search engine, identify three sources of unintended software that could be installed on a user’s machine.

In a 500- to 750-word essay, describe the type and risks of the executable programs and adware to the user. Explain why this is legal. Then, share your personal experience related to what happens when software has negative, unintended side effects from unanticipated installation. Who is to blame, the software developer or user? It might be perfectly okay legally when there is no malice aforethought, but how would you explain this when humans are considered as God’s image bearer? How would you relate it to human value and dignity?

Prepare this assignment according to the guidelines found in the APA Style Guide, located in the Student Success Center. An abstract is not required.

This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.

Organ Leader and Decision Making

 

After completing the reading this week, please review table 1.2 in the text and review the distinction between leadership and management.  Then think about this in regard to how senior leaders versus senior managers lead change in an organization (especially when it comes to technical change in an organization).

This week please reflect on these concepts and answer the following questions:

  1. When implementing change in an organization, there are always cultural issues that are faced, such as not accepting change, determine how differently this would be handled thinking about the management versus leadership constructs?
  2. When dealing with performing work, how is this implemented differently within the management versus leadership constructs?

Decision Support and Expert Systems

Overview:

In a meeting with your executives, your CIO expressed interest in exploring Decision

Support Systems and Expert Systems. To address this need, your IT director asked you

to write a 2-3-page white paper that he will review and submit to the executive team.

Instructions:

In this paper, you will need to develop the following points:

• List and explain the phases in decision making, and how a decision support

the system will add a competitive advantage to your hospital.

• Describe the typical software components that decision support systems

comprise and their fields of application in your hospital.

• Describe the adoption of a medical expert system, and if it could be beneficial to

the doctors at your Hospital.

Requirements:

• This assignment is a paper consisting of 2-3 pages, using APA formatting and

citations.

• Include two references.

Exp19_Excel_Ch05_ML1_RealEstate

  

Project Description:

You are a real estate analyst who works for Mountain View Realty in the North Utah County area. You have consolidated a list of houses sold during the past few months and want to analyze the data. For a simple analysis, you will outline the data and use the Subtotal feature. You will then create two PivotTables and a PivotChart to perform more in-depth analysis.

Big Data Analytics Dissertation

 In 250-300 words outline your dissertation topic related to Big Data Analytics and goals for this semester as they relate to your dissertation course. If you do not have a dissertation topic please revert those you are considering. Also, include ways that you could improve your dissertation, as well as areas you may be struggling with 

FAVORITE SCRIPTING LANGUAGE

Comment your favorite scripting language (VBScript, Node.Js, Python or SQL script). What do you think is most useful for administration and security? How can you use it? Minimum 150 words. APA format. 1 reference. No plagiarism. 100% original work. NEED THE WORK ASAP!!

HW

 CMST 100B WORD PROCESSING

 

PART 2: WEEK 1 DISCUSSION
WELCOME to the discussion for WEEK 1. Please respond in complete sentences for each question, unless directed to do otherwise, demonstrating in your reply that you have read the material in order to earn full credit. Please note that participating in this discussion counts toward your class participation grade.

DISCUSSION
Microsoft Word is a word processing program designed for everyday tasks. MS Word is the most popular word processing software used today.  Microsoft Word is used to create and edit professional-looking documents such as applications, forms, templates, business cards, letters, paper, reports, and booklets by using Microsoft Word.

This week, we will discuss Week 1’s reading assignments. Our discussion will focus on Managing Documents in MS. Word.  The topics we will be discussing are:

1. Navigating within documents.
2. Formatting documents.
3. Saving and sharing documents.
4. Inspecting document for issues.
5. Locating and correcting accessibility issues.

TOPICS
This week’s Read and Watch covers the following topics:

Create a New Blank Document

Create a Document based on a Template

Open Existing Documents

Open Documents in Protected View

Open and Edit PDF Files in Word

Display Different Views of Documents

Display and Edit File Properties

Manually Save Documents

Automatically Save Documents

Save Documents in Other Formats

Maintain Compatibility with Other Versions of Word 

Using Existing Styles

Create a New Style Based on Document Formatting

Add or Change the Background Color

Save Files to OneDrive

Types of Hidden Data and Personal Information

 Insert a Header of Footer

Find and remove hidden data and personal information with the Document Inspector

Change the Area of a Document Displayed in the Content Pane

Open Document in Protected View

YOUR RESPONSE

1. Item A: From the list of topics above, choose one topic or term discussed in the reading that stood out to you. 
2. Item B: Define or describe the topic, including citations from the Read & Watch material and ANY other additional source/sources.
3. Item C: Discuss the importance of the topic. Cite specific examples from the reading. Include personal experience with the topic if appropriate.
4. There are THREE items to each response: Item A (topic), Item B (definition and citation), Item C (discussion) unless specified otherwise. When you respond, they should be labeled accordingly.

Minimum Topic Response: Word Count = 70 (per topic question). Your response to each question is required to be AT LEAST 70 WORDS long.  If your reply to each question is less than 70 words, you will lose points. You can use Microsoft Word to count the words in your response to make sure you have met the requirement.
NOTE 2: Please make sure you answer EACH item and LABEL each item (#1, #2, #3, etc) so that I can easily check that each item has been answered.
NOTE 3: Please do not attach a file to the conference–enter your reply into the text area provided.
NOTE 4: After you post your response, please review it to make sure it is formatted correctly and is easy to read.

5s week 5 assignment BS

In 300 words

Learn About creating good password security.

An IT Security consultant has made three primary recommendations regarding passwords:

  1. Prohibit guessable passwords
    • such as common names, real words, numbers only
    • require special characters and a mix of caps, lower case, and numbers in passwords
  2. Reauthenticate before changing passwords
    • user must enter old PASSWORD before creating a new one
  3. Make authenticators unforgeable 
    • do not allow email or user ID as password

Using WORD, write a brief paper of 300 words explaining each of these security recommendations. Do you agree or disagree with these recommendations. Would you change, add or delete any of these?  Add additional criteria as you see necessary.

Note your Safe Assign score. Continue submitting until your Safe Assign score is less than 25. You have three attempts to complete your assignment.

Include references.

Research paper

 In this assignment you are going to read the following research paper: “A Turing Test for Computer Game Bots”. Then, please answer the following questions: 1. Summarize the following paper. Your summary should be 1 to 2 pages long and should cover the following parts: a. The problem and its importance. b. General description of the proposed solution. c. The experiments conducted. d. The results achieved. e. Did you find this article interesting? Please justify your answer. f. What is your critique on this paper? 2. Using the web, read then write about: a. The Turing Test: what is its purpose, and its importance. Then, give a detailed description of this test. b. The ELIZA chatbot, then briefly explain how ELIZA is related to the Turing Test. c. The Chinese Room argument, then briefly explain how it is related to the Turing Test. Please be careful about plagiarism, and that you do not copy somebody else’s text. There are no constraints on the format of the paper, just make sure that each question can be uniquely identified. The maximum page limit is 4. What to hand in Submit your assignment electronically through D2L. Please make sure that the file that you submit is a word document.

Discussion question, 300 words and 2 references.

Search “scholar.google.com” for a company, school, or person that has been the target of a network
or system intrusion? What information was targeted? Was the attack successful? If so, what changes
were made to ensure that this vulnerability was controlled? If not, what mechanisms were in-place to protect against the intrusion.