HTML programming

  

The purpose of this assignment is to get some experience using HTML web editors. There are many commercial and free options to choose from. If you have access to programs such as Adobe Dreamweaver or Microsoft Expression Web feel free to utilize them. There are several free open source web editors such as Kompozer, Amaya, and Bluefish.

Here is a page link from Wikipedia showing a comparison of Web HTML Editors. This might be a good place to start when making your choice of software. Copy the URL below to your browser.

http://en.wikipedia.org/wiki/Comparison_of_HTML_editors

Assignment

Your assignment is to download (if necesary) and experiment with two different Web HTML Editors. Search YouTube for any available tutorials on how to use the software. For each editor, create a page with a table, image, lists, and cascading style sheet. Include the name of the editor in the comments in the HTML file. Feel free to also include any other features you find interesting. Create a short write up containing information about your reaction to using each program. Did you like it? What features did you like? What features did you not like or felt could have been better? If you prefer, you can include this information inside the pages (display it when the file is opened with a browser) that you create using the programs. Do this process for two different HTML Web Editor programs. Do not submit the exact same code for each editor. The HTML file for each editor must be different. Submit the pages you created along with the write ups (If separate documents) to the correct submission box. 

Discussion question, 300 words and 2 references.

Search “scholar.google.com” for a company or school that has defined the role of end-users in the creation of a contingency plan. Discuss why it is (or is not) important to include end users in the process of creating the contingency plan? What are the possible pitfalls of end user inclusion? 

Paper

 

Chapter 2 Paper: Discuss why the IT organizational structure is an important concept to understand.  Also, discuss the role of IT in the overall business strategy. (Information Technology and Organizational Learning Textbook)

The above submission should be one page in length and adhere to APA formatting standards.

3 pages—Assignment 01–will be submitted to Turnitin

This assignment will be submitted to Turnitin®. Please see  Rubrics attached. 

Instructions

It is a responsibility of the global firm to ascertain the level of importance of various aspects of culture. Companies’ operations need to recognize and adjust to the cultural environment. In this week’s Lesson, you will find eight elements of culture. For this assignment, there are four elements of culture that are most important when marketing products and services internationally: language, religion, manners and customs, and aesthetics. Indicate why each is important and provide examples in your response.

Write a paper of 3 pages, typewritten in double-spaced APA format (Times New Roman, 12 pt. styles), page margins Top, Bottom, Left Side and Right Side = 1 inch, with reasonable accommodation being made for special situations and online submission variances.

In your response, make certain that you include at least two outside references from search engines or scholarly sources from the APUS Online Library.

Your paper will be automatically submitted to Turnitin in the assignment dropbox. Originality reports will be returned to the faculty and student. Multiple submissions are allowed. For full credit, make sure that your Similarity Index does not exceed 20%.

In the Assignment dropbox, please attach your paper as a file, do not copy & paste. I will grade and return your file.

Please see  Rubrics attached. 

RP

You have recently been hired as a Chief Information Governance Officer (CIGO) at a large company (You may choose your industry). This is a newly created position and department within the organization that was founded on the need to coordinate all areas of the business and to provide governance of the information. You will need to hire for all positions within your new department.

The company has been in business for more than 50 years and in this time has collected vast amounts of data. Much of this data has been stored in hard copy format in filing cabinets at an offsite location but in recent times, collected business data is in electronic format stored in file shares. Customer data is being stored in a relational database, but the lack of administration has caused data integrity issues such as duplication. There are currently no policies in place to address the handling of data, business or customer. The company also desires to leverage the marketing power of social media, but has no knowledge of the types of policies or legal issues they would need to consider. You will also need to propose relevant metrics that should be collected to ensure that the information governance program is effective.

The CEO and Board of Directors have tasked you to develop a proposal (paper) that will give them the knowledge needed to make informed decisions on an enterprise-wide Information Governance program, addressing (at a minimum) all of these issues, for the company. 

Answer should contain 3 pages of following

Abstract and Introduction, which includes industry discussion

Introduction Section – describing the industry chosen and potential resources to be used

Please write 350 words essay on the following with references?

 Web servers are compromised for a number of reasons which may include any of the following: Improper file or directory permissions, installing the server with default settings, unnecessary services enabled, security conflicts, a lack of proper security policies, improper authorization with external systems, default accounts with default or no passwords, unnecessary default, backup, or sample files, misconfigurations, bugs in server software, OS, or web applications, misconfigured SSL certificates and encryption settings, administrative or debugging functions that are enabled or accessible on web servers or the use of self-signed certificates and/or default certificates.

Select one of these compromises and explain how it could be avoided.