Explain 10 negative effects of information technology in the society of today
Cybersecurity
In the initial milestone writing assignment, you will evaluate the history of cryptography from its origins. Analyze how cryptography was used and describe how it grew within history. The writing assignment requires a minimum of two written pages to evaluate the history. You must use a minimum of three scholarly articles to complete the assignment. The assignment must be properly APA formatted with a separate title and reference page.
Answer minimum in 300 words and should be in APA format.
Discuss a particular type of Malware and how has it been used in “todays news” and the respective impact on cyber security. Add to your discussion ways the Malware could have been detected and potentially avoided.
Linux Implementation Proposal: Training Guide
Linux Implementation Proposal: Training Guide
Hide Assignment InformationTurnitin®This assignment will be submitted to Turnitin®.Instructions
You’ve won the business! Faster Computing has agreed to the project. As the final stage of pre-implementation, you have been asked to produce a training guide that will demonstrate how to install Linux and provide an overview of several common commands, as follows:
(11.1.3: Install the software.)
- Use a hypervisor of your choice to install Linux. Many hypervisors are available, such as Oracle’s VirtualBox, which is a free download. In addition, as part of UMGC’s agreement with VMware, you can download VMware Workstation for free. See below for specific screenshot requirements. You should include at least 3 screenshots (e.g., disk partitioning, timezone selection, creating the default account). Each screenshot should be accompanied by a brief explanation of what you did.
NOTE: It is not necessary to include screenshots of installing the hypervisor software.
(1.2.3: Explain specialized terms or concepts to facilitate audience comprehension.)
- Demonstrate command-line operations that will provide the following information:
- A listing of files in a directory and common file attributes
- The current directory (hint: also known as the present working directory)
- Create a file, then copy it to a different directory
- Create a second file and move it to a different directory
- Remove the first file, as well as the copy you created
- The manual page for a given command
- Create a text file, then use an editor to modify the content. Then display the content of the modified file
(1.4.2: Use vocabulary appropriate for the discipline, genre, and intended audience.)
In the above section (demonstrate CLI operations) show the commands with options/arguments (e.g., ls, cp, mv, rm) in your documentation as well as in your screenshots.
(11.2.1: Configure technology according to stakeholder specifications and requirements.)
- Show running processes on the system. Demonstrate how to search for a specific process
- Forcibly stop a running process
In the above section (demonstrate CLI operations) show the commands with options/arguments (e.g., top, kill, -9, ps) in your documentation as well as in your screenshots.
(13.1.1: Create documentation appropriate to the stakeholder.)
The deliverable for the final phase of the project is a written paper with screenshots. There is no minimum or maximum page requirement, but all of the requirements must be met. Use the Training Guide Template to record your work. This section will be graded upon the overall usefulness of the training guide to the organization.
(11.3.1: Add and update systems as required.)
This portion of the training guide helps determine your submission is unique.
Important Requirement
On the final screenshot, you need to open a command line and type in the following commands (without the quotes):
“date”
“echo CMIT391”
“echo
The recommended format is to provide screenshots incorporated within the written narrative. The screenshots must all be your own. Screenshots from external sources are not permitted. You must include the specific screenshot listed above or your project will not be accepted.
(1.1.4: Explain the relationship between the ideas presented to enhance clarity and comprehension.)
The training guide must have a cover page, an introduction, summary, and at least 3-5 references.
(1.2.2: Employ a format, style, and tone appropriate to the audience, context, and goal.)
Employ proper spelling and grammar. All Linux commands must be lower case.
(2.2.3: Explain the assumptions underlying viewpoints, solutions, or conclusions.)
In your conclusion of at least a paragraph, summarize why using Linux is beneficial for employees, management, and the organization as a whole.
How Will My Work Be Evaluated?
In this training guide, you will demonstrate how to install Linux and provide an overview of common commands for your client/customer. You’ll be combining your technical skills with effective communication techniques to provide learning resources for the client/customer.
The following evaluation criteria aligned to the competencies will be used to grade your assignment:
- 1.1.4: Explain the relationship between the ideas presented to enhance clarity and comprehension.
- 1.2.2: Employ a format, style, and tone appropriate to the audience, context, and goal.
- 1.2.3: Explain specialized terms or concepts to facilitate audience comprehension.
- 1.4.2: Use vocabulary appropriate for the discipline, genre, and intended audience.
- 2.2.3: Explain the assumptions underlying viewpoints, solutions, or conclusions.
- 11.1.3: Install the software.
- 11.2.1: Configure technology according to stakeholder specifications and requirements.
- 11.3.1: Add and update systems as required.
- 13.1.1: Create documentation appropriate to the stakeholder.
Enterprise Architecture
Question A
- Explain what the enterprise architecture entails, and what is an attack surface?
Question B
Each week, research a unique news story or article related to Information Security/Information Technology. Post a summary of what you learned to the discussion thread, please also provide a link to the original article. Source is your choice; however please fully cite your source.
500 words
APA format references needed.
System analysis and design
- Describe how Unified Modelling Language (UML) is used in systems design.
- Give examples of UML in use.
research questions and hypotheses
Primary Task Response: Within the Discussion Board area, write 300–500 words that respond to the following questions with your thoughts, ideas, and comments. This will be the foundation for future discussions by your classmates. Be substantive and clear, and use examples to reinforce your ideas.
Quantitative research questions use the scientific method to answer and, therefore, each research question has two associated hypotheses.
- What are the differences between research questions and hypotheses?
- What key information needs to be included in quantitative research questions and hypotheses?
- Provide an example of one quantitative research question and its two associated hypotheses.
homework help
Basic Loop Drawing
Basic Loop Drawing
Cc-D-1
Write at least 500 words on fractional ownership and it’s relation to cloud computing. Use at least one example from another industry.
Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list. Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs. Stand alone quotes will not count toward the 3 required quotes.