Discussion 2 Info Tech in a global economy.

 

Question: How do you feel blockchain will change the global economy or will it?  

  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.
  • Your initial post must be at least 250 words.

At least one scholarly source should be used in the initial discussion thread. 

Use proper citations and references in your post.

No Plagiarism 

COMPUTER

 

You work as an administrative assistant for the President of Bass University which employs around 300 faculty and staff. Your immediate supervisor, the President, has just informed you that the university is going to hold an employee appreciation party where all employees and their families are invited. Consequently, the President knows that you have a creative talent in creating invitation flyers and has asked you to create such a document as an invitation for all employees and their families to attend and has asked that you include at a minimum the following requirements for this employee appreciation party invitation.

  1. For content, the message within the employee appreciation party invitation should be written to attract as many of the 300 faculty and staff as possible to the party including any family members.
  2. The invitation should include an overall theme appropriate for the occasion.
  3. The invitation should only be 1 page.
  4. The invitation should contain a full-page border.
  5. The invitation should include a text watermark displaying in the background “Employee Appreciation Party.”
  6. The invitation should include a formatted title displaying the name Bass University using Word Art.
  7. The invitation should include a two-column table including general food available during the party.
  8. The invitation should also include some type of graphic in the form of a clip art and or a picture and as a tip, using clip art to represent the general menu in the table would be very creative. 
  9. When you have the invitation flyer ready, proof the document to ensure that content does not exceed 1 page and apply any appropriate formatting to text and graphical objects to ensure all content fits to 1 page and be creative. 

Assignment Expectations

Structure and Format: Follow all 9 steps using ideally Microsoft Word.

File name: Name your saved file according to your first initial, last name, and the assignment number (for example, “RHall Assignment 1.docx”)

Organ Leader and Decision Making

 

After completing the reading this week, please review table 1.2 in the text and review the distinction between leadership and management.  Then think about this in regard to how senior leaders versus senior managers lead change in an organization (especially when it comes to technical change in an organization).

This week please reflect on these concepts and answer the following questions:

  1. When implementing change in an organization, there are always cultural issues that are faced, such as not accepting change, determine how differently this would be handled thinking about the management versus leadership constructs?
  2. When dealing with performing work, how is this implemented differently within the management versus leadership constructs?

EH Week14 DB

 

Hello,

i need this paper by 12/10 afternoon.

Strictly No plagiarism please use your own words.

There are many mobile platform vulnerabilities listed in the readings from this week (slides 8, 9, and 10). Which do you feel is the greatest threat to users? Do you agree that people generally are not aware of the threats to their mobile devices?

Make sure Strictly No plagiarism content should not match and even the reference should not match in plagiarism 

Software Testing

 

Write a 4–6 page paper addressing the following:

  • Define the following four levels of testing for software development: 1) unit testing, 2) integration testing, 3) systems testing, and acceptance testing.
  • Explain the purpose of each testing level, and provide your reasoning for why it is important that each level of testing is performed for any software development project.
  • Describe how the four testing levels are related to one another.
  • Additionally, conclude your paper by addressing the following ethical dilemma providing your perspective on how to approach this decision:

There is a “first to market at all costs” culture that exists at some well-known corporations today. They would rather send out a “buggy” product if it meant being first. There have been many inferior products to rise to the top simply because they took the biggest chunk of the market share before anyone else. If you worked for a major software corporation as a software developer and were assigned a role on a project, what would you do if your manager pushed to rush a product to market without sufficient debugging and testing. What are the ethical implications of delivering a quality product versus meeting a deadline? How would you approach this decision?

Be sure to cite your sources in this paper and use correct APA format.

Assignment Requirements

This paper should be a Microsoft Word (minimum 4-6 pages) document including the title and reference pages.

Respond to the questions in a thorough manner, providing specific examples of concepts, topics, definitions, and other elements asked for in the questions. Your paper should be highly organized, logical, and focused.

Your paper must be written in Standard English and demonstrate exceptional content, organization, style, and grammar and mechanics.

Your paper should provide a clearly established and sustained viewpoint and purpose.

Your writing should be well ordered, logical and unified, as well as original and insightful.

A separate page at the end of your research paper should contain a list of references, in APA format. Use your textbook, the Library, and the internet for research.

Structured External Assignment Proposal

  

The objective is to present a Bid Response Proposal that provides a security solution for any business process of your choice. The financial business has 60 employees and is struggling with security issues both internal and external. Employees use laptops and have remote access to the office systems. Your Bid Response needs to be a turnkey solution that will provide a solution to but not limited to the following problems (so be creative):

1) Equipment is disappearing

2) No building or computer room security.

3) No policies (AUP)

4) No virus protection and experiencing viruses daily

5) No intrusion detection and experiencing intrusions daily 

6) Passwords compromised 

7) There is an Internet connection but no protection and content filtering

8) Sensitive information is being copied from systems

9) If a disaster should happen to the building there are no plans to recover

Develop a disaster recovery plan using ISO 27031 or ISO 24762 template

 Develop a disaster recovery plan for an organization. There are many different templates available online for you to use as reference and guidance. Your plan should cover the following sections (these sections detail the elements in a DR plan in the sequence defined by industry compliance standards ISO 27031 and ISO 24762): 

  1. Important: This section should summarize key action steps (such as where to assemble employees if forced to evacuate the building) and list key contacts with contact information for ease of authorizing and launching the plan.
  2. Introduction
  3. Roles and Responsibilities
  4. Incident Response
  5. Plan Activation
  6. Document History
  7. Procedures

Your paper should meet the following requirements: 100% original content

  • Be approximately 4 to 6 pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least four scholarly journal articles to support your positions, claims, and observations
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

COMPUTER SECURITY_Week 11

Read Chapter 10 of the Easttom text, Security Policies

Primary topics:

  • Recognizing the importance of security policies
  • Understanding the various policies and the rationale for them.
  • Knowing what elements go into good policies
  • Creating policies for network administration.Using the guidelines provided in this week’s chapter (and other resources as needed), create a step-by-step IT security policy for handling user accounts/rights for a student who is leaving prematurely (drops, is expelled, and so on).

You will need to consider specialized student scenarios, such as a student who works as an assistant to a faculty member or as a lab assistant in a computer lab and may have access to resources most students do not.

300 words discussion

Discussion point: (300 Words Minimum)

Web Analytics is a valuable tool, it allows you to track mobile users, mobile websites and mobile applications whether or not the mobile device runs JavaScript. This is made possible by using a server-side code snippet on your mobile website.

Question: With the multi-millions of mobile users in the U.S. alone, is it a good business decision to track mobile users who visit your web site and why, please support your answer with examples? Please, include the following in your discussion post.

Compare and Contrast the business decision to track mobile users that visit your website.

Describe why this would be a good or bad decision for your company to pursue.

Cookies, what DO they DO?

In the world of Web analytics there is a debate revolving around cookies that never seems to be resolved or truly understood. Cookies are a very simple and well-established way to track visitors to your web site. However, their simplicity and transparency makes it very easy for users to turn off cookies or delete them from their computers. Cookie information is vital for web analytics because it identifies visitors, their referring source, and subsequent page view data. What is a business to do?!

The new Pokémon Go (https://nianticlabs.com/privacy/en/) has been released for Smartphones! It’s the latest craze or just crazy?! Check out the terms of service/privacy policy and this snippet on last week’s topic – cookies. Provide your analysis on the policy snippet or the entire policy itself. Pokémon Go! or Pokémon No! What do you decide?