- It must be written in APA style, without grammar and spelling errors. You can find the APA citation samples and references in the teacher’s web site by clicking Comps Guide button. You are welcome to use the Microsoft Word APA style tool to insert APA style citations/References by clicking on References — Insert Citation — Add New Source, then fill out the APA form in Word according to the source provided.
- Your writing must address the question to the point, and demonstrate a clear understanding of the question. The answer that roams away from the topic/question is not acceptable.
- The paper needs to be four pages long for comps and six pages long for term paper, double space, in Times New Roman font type, and font size 12. You need to cite at least four academic publication reference citations.
- The writer needs to be able to go into an in-depth understanding of the issues you are discussing, and describe knowledgeably, experientially, theoretically, scholastically, analytically and critically. The superficial or shallow answer is not appropriate. The answer with a bunch of facts that lacks theory-based critical analysis is not appropriate, either.
- The writer needs to present evidence(s) to support his/her argument(s). It needs to develop logically, clearly and coherently with clarity.
- It needs a starting (introductory) paragraph and an ending (conclusion) paragraph.
- It needs correct in-text citation and at least four references at the end of the paper (The reference page does not count for the paper length).
- The paper could get higher grade points that is written wisely, critically, reflectively, creatively and imaginatively. It should be related to the personal experiences or the current school practice in accordance with the academic knowledge and theories.
Research Paper
See the attachment for question
Opposing Shadow IT
Organizations do not always provide information systems that allow their staff to perform their responsibilities efficiently and effectively. Read the article, “Lifting the Veil Off Shadow IT.” Then, respond to the following:
- Take a position favoring or opposing shadow IT.
- If you are in favor, give one reason that shadow IT should be allowed. If you are not in favor, provide one way that the organization can reduce the risks of shadow IT.
Footprinting
FOOTPRINTING, you now have an idea as to how to conduct a digital investigative project. For this assignment, you are asked to develop your own crime scenario. Explain the incident that occurred, and then list the steps you would follow to solve this case (examples might include: a lost child, an unauthorized charge on your credit card, an unidentified charge made with your EZ PASS, etc.).
No plagarism
PLw7
In 500 words.
Watch the Movie War Games from 1983. According to the https://www.nytimes.com/2016/02/21/movies/wargames-and-cybersecuritys-debt-to-a-hollywood-hack.html, this movie had a tremendous effect on President Ronald Reagan. Discuss in 500 words your opinion on whether it should be required viewing in social studies classes in high school. Do not repeat the story. Discuss it’s use in school
need project data
need project data for project
Research paper
7 pages
Cloud Computing Discussion 8
Discuss in 500 words or more federated architecture in cloud systems. Remember that this is a cloud class not a database class.
Use at least three sources. Do Use Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list. Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs. Stand alone quotes will not count toward the 3 required quotes.
Application Security to Software development
- How does Application Security relate to software development?
- Define application and software development
- Briefly describe the role of application security in software development
- Discuss two software development approaches
- For each briefly discuss the high-level principles/approach
- Discuss how Application Security should be included in each phase/step of the approaches
- Discuss what elements of the application should be addressed and how. Examples: data at rest, data in motion, identity management, etc.
- Discuss the potential downfalls that can occur if Application Security is not integrated with application development
For all writing assignments ensure that you do the following:
- Write 1000 to 1500 words in APA format.
- Utilize at least five scholarly references.
- Note that scholarly references do not include Wikipedia, .COM websites, blogs, or other non-peer reviewed sources.
- Utilize Google Scholar and/or the university library.
- Do not copy and paste bulleted lists. Instead, read the material and in your words, describe the recommendation citing the source.
- Review the rubric to see how you will be graded.
- Plagiarism will result in a zero for the assignment.
- The second instance of plagiarism will result in your failure of this class.
- If you use a source, cite it. If you do not, it is plagiarism.
Discuss about Cloud Security Myths.
Review in 500 words or more the video link mentioned below called Cloud Security Myths.