cs-2

In 500 words or more, consider this statement: For cloud computing to become multi-jurisdictional, it must be separated from politics.

Use at least three sources. Use the Research Databases available from the Danforth Library not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.   Stand alone quotes will not count toward the 3 required quotes.

Annotated Bibliography – Inferential Statistics

  

Using APA format, find at least 3 peer-reviewed sources (from industry articles, journals, academic and professional textbooks, and case studies) which will support your selected and pre-approved Research Paper Topic. Include them as references in APA format, write a summary of each article considered. At the end of your summary indicate the usefulness of the article in support of your Project Paper.

An annotated bibliography is a list of citations to books, articles, and documents. Each citation is followed by a brief (usually about 150 words) descriptive and evaluative paragraph, the annotation. The purpose of the annotation is to inform the reader of the relevance, accuracy, and quality of the sources cited 

Steps to Creating an Annotated Bibliography 

1. Find sources related to your topic  

2. Critically read and evaluate sources. 

3. Create the proper APA citation. 

4. Below the citation write your annotation. 

References for the format of the Annotated Bibliography. 

https://owl.purdue.edu/owl/general_writing/common_writing_assignments/annotated_bibliographies/annotated_bibliography_samples.html

Ethical Decision Making

 

Assignment Content

  1. Resource: Decision Tree Example
    Your team of international developers will be developing a publicly accessible cloud-based application which may potentially house user PII data along with information about users’ behaviors and activities (e.g., physical locations, online sites they visit, searches, purchases, etc.), and user’s intellectual property (e.g., photos, artwork, videos, etc.).

    Based on your work in Weeks 3 and 4, develop an ethical decision-making illustration or decision tree that shows ways to address each risk if an actual incident occurs. Develop an ethical policy statement of the actions your team would take, keeping a global perspective in mind.

    Using the Decision Tree Example provided as a guide, create a PowerPoint presentation containing 4 to 6 slides. Provide 1 file for the team. This example will help you develop your individual assignment in Week 5.

    Note: You may use other applications like Adobe Spark, Microsoft Sway, or Mix instead of PowerPoint.

    Submit your assignment.

WEB ANALYTICS

Instructions: You are to select a topic that is related directly to Web Analytics, the topic must be related to Web Analytics or Digital Analytics. DO NOT USE Wikipedia as a source.

· Your paper will be a minimum of 4-6 pages (the title cover and reference do not count in this total).

· In addition to the 4-6 pages of the paper itself, you must include a title page and a reference page.

· Your title page must include the title of your paper, the date, the name of this course, your name, and your instructor’s name.

· Your citations and references page must be written in APA style.

· Paper must be submitted in Word Document.

Physical security 7

 

Search the Internet for an article where physical security failed:

  • Propose a possible change in that organization’s physical security that could have prevented the breach/failure for that scenario
  • Submit at least 5 full pages double spaced (not including your required cover page, reference pages, abstract, or table of contents)
  • No photos or graphs
  • Reference all sources used
  • Your paper must be APA formatted (including a separate cover page and reference page) 
  • Your paper must include at least 2 references that are properly cited inside the body of your paper and listed in your reference section

disaster recovery plan in cybersecurity

Business continuity and business impact analysis are essential models for all businesses but can be costly.  Pick an organization and create a disaster recovery plan for that business. 

Discuss the “must have” items and the “nice to have” items you placed in your disaster recovery plan (remember companies have competing costs).

Explore why it is essential to test your disaster recovery plan as it relates to cybersecurity and Privacy.

offer advice and suggestions on thing we should do or should not do in disaster recovery plan 

3 pages 

help3

if you are not an expert on the topic don’t bid.

further guidelines will be provided on chat.

see file attached.

Discussion week

As the modern database grows bigger and bigger, many organizations are moving away from a relational store and looking towards NoSQL design. There is a desperate need to consider storage and file structure as part of physical design principles. If you were implementing a new database system for an ERP or CRM that required a minimum of 100 TB of storage per year, what would you consider as you plan your physical design?

Instructions

This is a required assignment, worth 15 points. The assignment must be submitted by the due date. Late assignment are not allowed. 

You are required to submit a minimum of two postings. Points will be deducted for not fulfilling this minimum requirement.

Apply and use the basic citation styles of APA is required. Points are deducted per the rubric for this behavior.

Do not claim credit for the words, ideas, and concepts of others. Use in-text citation and list the reference of your supporting source following APA’s style and formatting. Points are deducted per the rubric for this behavior.

Do not copy and paste information or concepts from the Internet and claim that is your work. It will be considered Plagiarism and you will receive zero for your work. A second offense results in a zero for the course. A third is termination from the university.

Cellular network

  Base on the reading assignment, your experience, and personal research, please  answer the following questions: 

  • Thoroughly explain the Base Station Controller (BSC) as it relates to a cellular network?
  • What is a Mobile Equipment Identifier (MEID) and what is it used for?
  • As an examiner, why is it important for you to understand how a call is routed through the cellular network?
  • What is the significance of Code Division Multiple Access (CDMA)?
  • List and explain three components of a SIM file system

Post your main response to the question (400 words minimum).