Pls use 7th edition APA format.
Contingency planning
Contingency planning is a risk mitigation process for developing back-up plans in anticipation of events (scenarios) that might disrupt ‘business as usual’. Business continuity planning is an expanded version of contingency planning that typically encompasses a more comprehensive and extended response plan for getting back to ‘business as usual’. In a well-formatted, highly-detailed research paper, address the need to contingency planning, ensuring to address the following items:
(1) Benefits of scenario events/planning.
(2) Questions to consider when implementing scenario planning.
(3) The common types of scenario planning.
paper should meet these requirements:
- Be approximately four to six pages in length, not including the required cover page and reference page.
- Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
- Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook.
- Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.
Paper
1. Identify the three main types of computer software that werediscussed in your unit lesson. Within the three main categories, give examples of each and a brief explanation of each. Each explanation/description category must be answered with at least 100 words. You must cite your sources within your answers.
MAIN TYPES OF COMPUTER SOFTWARE
EXAMPLES
EXPLANATION/DESCRIPTION
2. Write a 150-word essay on the importance of operating systems (OSs). Locate at least one article in the CSU Online Library and one article from an Internet search. You may also use the required readings to support your essay. You must cite your sources within your essay.
3. Identify three mobile OSs and three personal computer OSs. Explain advantages and disadvantages of each one. Describe each OS. The total wording for each OSdescription/advantages/disadvantages should be no less than 100 words. You must cite your sources.
OPERATING SYSTEMS
DESCRIPTION
ADVANTAGES
DISADVANTAGES
1.
2.
3.
4.
5.
6.
References
dba must be aware of when moving to the cloud.
Describe in 500 words the shared security responsibility model that a dba must be aware of when moving to the cloud.
Use at least three sources. Use the Research Databases available from the Danforth Library not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list. Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs. Stand alone quotes will not count toward the 3 required quotes.
Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0.
Write in essay format not in bulleted, numbered or other list format.
Do not use attachments as a submission.
Reply to two classmates’ posting in a paragraph of at least five sentences by asking questions, reflecting on your own experience, challenging assumptions, pointing out something new you learned, offering suggestions. These peer responses are not ‘attaboys’. You should make your initial post by Thursday evening so your classmates have an opportunity to respond before Sunday.at midnight when all three posts are due.
It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your post and that you reply to two classmates in a substantive way (not ‘nice post’ or the like). Your goal is to help your colleagues write better. Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. . I will not spend a lot of my time trying to decipher nonsense. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about. Please do not submit attachments unless requested.
Paper
1. Identify the three main types of computer software that werediscussed in your unit lesson. Within the three main categories, give examples of each and a brief explanation of each. Each explanation/description category must be answered with at least 100 words. You must cite your sources within your answers.
MAIN TYPES OF COMPUTER SOFTWARE
EXAMPLES
EXPLANATION/DESCRIPTION
2. Write a 150-word essay on the importance of operating systems (OSs). Locate at least one article in the CSU Online Library and one article from an Internet search. You may also use the required readings to support your essay. You must cite your sources within your essay.
3. Identify three mobile OSs and three personal computer OSs. Explain advantages and disadvantages of each one. Describe each OS. The total wording for each OSdescription/advantages/disadvantages should be no less than 100 words. You must cite your sources.
OPERATING SYSTEMS
DESCRIPTION
ADVANTAGES
DISADVANTAGES
1.
2.
3.
4.
5.
6.
References
Machine language
Can anybody help me to get A in my test?
project
Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references.
Your work over the next 8 weeks will lead-up to your ability to represent an enterprise security architecture solution as a diagram or diagrams with annotations. The project involves depicting a Security Architecture for one of the following businesses:
· Financial (Bank, brokerage, Insurer, etc.)
· Hospital/Medical Services
· Pharmaceutical/Chemical
· Social Media Company
· Energy Company (Electrical Utility, Oil Company, Solar, Wind, etc.)
· Manufacturer (Automobile, Computer, Consumer Electronics, etc.)
Respond to the following:
· Identify the business type you have selected for your paper.
· Provide a brief overview of the business
· Provide the goals and approach to the project
· Architectural diagrams and annotations
Submission
Compose your work in a .doc or .docx file type using a word processor (such as Microsoft Word, etc.) and save it frequently to your computer.
Check your work and correct any spelling or grammatical errors.
Include at least two APA most recent references.
M1
Please go through the word document carefully for full assignment details.
You only need to finish Milestone 1 from the document.
The whole research paper is about 10-pages and this is part 1 of that. Part 2 and 3 will be due in the next 3 weeks.
For this assignment, You need to write an Abstract, Introduction, and describing the industry has chosen and potential resources to be used.
This assignment is 2-3 pages in length with a minimum of 3 peer-reviewed scholarly journal references.
Research Paper on 2019 Georgia Cyberattacks
2019 Georgia Cyberattacks
You are assigned with the task of writing a 1500-2000 word critical analysis academic paper on the incident response and disaster recovery of a specific cybersecurity incident. You will find your assigned cyberattack/breach in the list below. Your paper must analyze how the targeted/victim organization detected, responded to, and recovered from the attack. Your paper must include the following:
1. It must be 1500-2000 words not including the references (you will lose marks if you exceed or fail to meet the wordcount by).
2. It must be an original work of your own research and writing skills, free of plagiarism.
3. It must be in the ieee format with correct citations and references.
4. It must be written in professional academic language free of colloquialisms but also written so that a reader with an unknown level of knowledge (such as a C level executive, a board member, or manager) can understand your meaning, argument, and purpose.
5. You must use reliable sources. i.e. Trusted verifiable web resources (i.e. legitimate websites, news resources, white papers, peer reviewed works such as books, conference papers, reports journal articles, etc) NOT Wikipedia or personal blogs.
6. Your paper must have an introduction with a clearly stated thesis (an argument statement that tells the reader the point you will make. For example, XYZ company’s response to the ABC cyberattack was poorly managed due to a lack of communication or 123 Corp prevented severe financial losses due to their incident response handling). The introduction is the roadmap/outline to your paper. Following the introduction there must be a body containing the history of the attack/breach and an analysis of the incident that supports and proves your thesis. Lastly, you must write a conclusion that states how you have proven your argument and why it matters to Contingency Planning (IRP, BCP, DRP). The written part of the paper must be followed by a properly formatted list of references.
MICROSOFT PROJECT 2016
Skim through Appendix A(LINK BELOW) on Microsoft Project 2016 (available on the Companion website for this text). Review information about Project 2016 from the Microsoft website (www.microsoft.com). Research three other project management software tools, including at least one smartphone app. Write a paper answering the following questions:
a)What functions does project management software provide that you cannot do easily using other tools such as a spreadsheet or database?
b)How do the different tools you reviewed compared with Project 2016, based on cost of the tool, key features and other relevant criteria?
c)How can organizations justify investing in enterprise or portfolio project management software?
https://intropm.files.wordpress.com/2018/08/project2016guide.pdf
APA STYLE, 2 PAGES, COVER SHEET
